首页 > 最新文献

International Journal of Cyber Warfare and Terrorism最新文献

英文 中文
Knowledge Extraction on the Nexus Between Terrorism Criteria and Attacks on Private Citizens and Property 恐怖主义标准与对公民私人财产的袭击之间关系的知识提取
IF 0.5 Q4 POLITICAL SCIENCE Pub Date : 2021-01-01 DOI: 10.4018/IJCWT.2021010102
D. Atsa’am, R. Wario
This study extracted knowledge on the association between terrorism inclusion criteria and one of the terrorism target/victim types known as “private citizens and property.” Three criteria determine what constitutes a terror attack: Criterion 1: the action is done with intention to attain a political, economic, religious, or social goal; Criterion 2: the action is done with the intention to coerce, intimidate or publicize to larger audience(s); Criterion 3: the action is outside international humanitarian law. Literally, all terror incidents satify Criterion 3. As for Criteria 1 and 2, the odds ratio was deployed on the global terrorism database, consisting of 170,350 records of terrorist attack incidents, to evaluate the nexus between each of these criteria and terror attacks on private citizens and property. The results showed that any terror attack on private citizens and property is 2.2 times more likely to have been perpetrated by a terror group in order to achieve Criterion 2 than to achieve Criterion 1. The implications of the outcome in counterterrorism are discussed.
这项研究提取了有关恐怖主义纳入标准与恐怖主义目标/受害者类型之一(称为“私人公民和财产”)之间关系的知识。恐怖袭击的构成有三个标准:标准1:行动的目的是达到政治、经济、宗教或社会目标;标准2:该行为具有强迫、恐吓或向更多受众宣传的意图;标准3:行动不符合国际人道主义法。从字面上看,所有恐怖事件都符合标准3。关于标准1和标准2,在全球恐怖主义数据库(包括170350起恐怖袭击事件的记录)中使用了比值比,以评价每项标准与对普通公民和财产的恐怖袭击之间的联系。结果显示,任何针对普通公民和财产的恐怖袭击是由恐怖组织实施的,以达到标准2的可能性是达到标准1的2.2倍。讨论了结果在反恐中的含义。
{"title":"Knowledge Extraction on the Nexus Between Terrorism Criteria and Attacks on Private Citizens and Property","authors":"D. Atsa’am, R. Wario","doi":"10.4018/IJCWT.2021010102","DOIUrl":"https://doi.org/10.4018/IJCWT.2021010102","url":null,"abstract":"This study extracted knowledge on the association between terrorism inclusion criteria and one of the terrorism target/victim types known as “private citizens and property.” Three criteria determine what constitutes a terror attack: Criterion 1: the action is done with intention to attain a political, economic, religious, or social goal; Criterion 2: the action is done with the intention to coerce, intimidate or publicize to larger audience(s); Criterion 3: the action is outside international humanitarian law. Literally, all terror incidents satify Criterion 3. As for Criteria 1 and 2, the odds ratio was deployed on the global terrorism database, consisting of 170,350 records of terrorist attack incidents, to evaluate the nexus between each of these criteria and terror attacks on private citizens and property. The results showed that any terror attack on private citizens and property is 2.2 times more likely to have been perpetrated by a terror group in order to achieve Criterion 2 than to achieve Criterion 1. The implications of the outcome in counterterrorism are discussed.","PeriodicalId":41462,"journal":{"name":"International Journal of Cyber Warfare and Terrorism","volume":"20 7 1","pages":"20-30"},"PeriodicalIF":0.5,"publicationDate":"2021-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"83471218","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Between the Devil and the Deep Blue Sea: Insurgency and Humanitarian Conditions in IDP Camps in Nigeria 魔鬼与深蓝海之间:尼日利亚国内流离失所者营地的叛乱和人道主义状况
IF 0.5 Q4 POLITICAL SCIENCE Pub Date : 2021-01-01 DOI: 10.4018/IJCWT.2021010101
S. Joshua, S. Idowu, F. O. Olanrewaju
The world is currently faced with the problem of refugees and internally displaced persons (IDPs). Africa and Middle East has the highest figure of IDPs. Nigeria tops the list of countries with largest population of IDPs in Africa. The Boko Haram insurgency has made Nigeria one of the flash points of high concentration of IDPs. Anchored on forced /involuntary migration theory, using primary and secondary data gathering techniques, the study examines insurgency and conditions of IDPs camps in Nigeria, focusing on NYSC camp in Girei Local Government, Adamawa State. The study finds that the condition in NYSC IDP camp is deplorable as IDPs lack access to basic essentials of life. The study recommends among others the need for the government to be more committed to the welfare of IDPs and also curb corruption of government officials in the camp as this has worsen the already deplorable condition of IDPs.
世界目前面临着难民和国内流离失所者的问题。非洲和中东的国内流离失所者人数最多。尼日利亚是非洲境内流离失所者人数最多的国家。博科圣地叛乱使尼日利亚成为国内流离失所者高度集中的爆发点之一。该研究以强迫/非自愿移民理论为基础,利用第一手和二手数据收集技术,调查了尼日利亚境内境内流离失所者营地的叛乱和状况,重点关注阿达马瓦州Girei地方政府的NYSC营地。研究发现,NYSC国内流离失所者营地的状况令人遗憾,因为国内流离失所者无法获得基本的生活必需品。该研究建议政府需要更加致力于国内流离失所者的福利,并遏制难民营中政府官员的腐败,因为这已经使国内流离失所者的悲惨状况恶化。
{"title":"Between the Devil and the Deep Blue Sea: Insurgency and Humanitarian Conditions in IDP Camps in Nigeria","authors":"S. Joshua, S. Idowu, F. O. Olanrewaju","doi":"10.4018/IJCWT.2021010101","DOIUrl":"https://doi.org/10.4018/IJCWT.2021010101","url":null,"abstract":"The world is currently faced with the problem of refugees and internally displaced persons (IDPs). Africa and Middle East has the highest figure of IDPs. Nigeria tops the list of countries with largest population of IDPs in Africa. The Boko Haram insurgency has made Nigeria one of the flash points of high concentration of IDPs. Anchored on forced /involuntary migration theory, using primary and secondary data gathering techniques, the study examines insurgency and conditions of IDPs camps in Nigeria, focusing on NYSC camp in Girei Local Government, Adamawa State. The study finds that the condition in NYSC IDP camp is deplorable as IDPs lack access to basic essentials of life. The study recommends among others the need for the government to be more committed to the welfare of IDPs and also curb corruption of government officials in the camp as this has worsen the already deplorable condition of IDPs.","PeriodicalId":41462,"journal":{"name":"International Journal of Cyber Warfare and Terrorism","volume":"22 1","pages":"1-19"},"PeriodicalIF":0.5,"publicationDate":"2021-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"77238922","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Social Media: A Protagonist for Terrorism 社交媒体:恐怖主义的主角
IF 0.5 Q4 POLITICAL SCIENCE Pub Date : 2021-01-01 DOI: 10.4018/IJCWT.2021010103
Yinka Olomojobi, Odusanya Temitope Omotola
Terrorism is ubiquitous. Most states around the world have experienced some form of terrorism. Terrorism has undermined the profile of Nigeria and has generated a tense and fragile political system. This paper underscores that the prevalence of grievance and the lack of an innovative economic base in Nigeria are amongst the key factors that stimulate terrorism in the state. In Nigeria, terrorist activities have become endemic. A cursory look on these activities has proven that social media has become a source for propagating terrorism. This has generated multifarious security challenges as well. This paper is aimed at analyzing terrorism and social media. It further proceeds to examine the main thrust of the paper submitting that social media is a viable tool for terrorists. From this standpoint, the paper explores a case study analysis to further explain and evaluate the symbiotic relationship between social media and terrorism in Nigeria.
恐怖主义无处不在。世界上大多数国家都经历过某种形式的恐怖主义。恐怖主义破坏了尼日利亚的形象,造成了紧张和脆弱的政治制度。本文强调,尼日利亚普遍存在的不满情绪和缺乏创新的经济基础是刺激该州恐怖主义的关键因素之一。在尼日利亚,恐怖主义活动已成为一种流行病。粗略地看一下这些活动就会发现,社交媒体已经成为宣传恐怖主义的来源。这也带来了各种安全挑战。本文旨在分析恐怖主义和社交媒体。文章进一步分析了这篇论文的主旨,即社交媒体是恐怖分子的可行工具。从这个角度出发,本文探索了一个案例研究分析,以进一步解释和评估尼日利亚社交媒体与恐怖主义之间的共生关系。
{"title":"Social Media: A Protagonist for Terrorism","authors":"Yinka Olomojobi, Odusanya Temitope Omotola","doi":"10.4018/IJCWT.2021010103","DOIUrl":"https://doi.org/10.4018/IJCWT.2021010103","url":null,"abstract":"Terrorism is ubiquitous. Most states around the world have experienced some form of terrorism. Terrorism has undermined the profile of Nigeria and has generated a tense and fragile political system. This paper underscores that the prevalence of grievance and the lack of an innovative economic base in Nigeria are amongst the key factors that stimulate terrorism in the state. In Nigeria, terrorist activities have become endemic. A cursory look on these activities has proven that social media has become a source for propagating terrorism. This has generated multifarious security challenges as well. This paper is aimed at analyzing terrorism and social media. It further proceeds to examine the main thrust of the paper submitting that social media is a viable tool for terrorists. From this standpoint, the paper explores a case study analysis to further explain and evaluate the symbiotic relationship between social media and terrorism in Nigeria.","PeriodicalId":41462,"journal":{"name":"International Journal of Cyber Warfare and Terrorism","volume":"10 1","pages":"31-44"},"PeriodicalIF":0.5,"publicationDate":"2021-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"81960032","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Tracing the Cultural Background of Lone-Wolf Terrorism: Dilemmas, Contradictions, and Opportunities for the Next Decade 追踪独狼恐怖主义的文化背景:未来十年的困境、矛盾与机遇
IF 0.5 Q4 POLITICAL SCIENCE Pub Date : 2021-01-01 DOI: 10.4018/IJCWT.2021010104
M. Korstanje
The end of the Cold War, as well as the collapse of the Soviet Union, posed new greater challenges and risks for the “Global North.” Terrorism—doubtless—seems to be one of them. Over the recent years, and particularly after 9/11, terrorists changed the focus of their attacks. While classic terrorism targeted important persons such as politicians, chief police officers, or celebrities, modern terrorism planned attacks on leisure-spots spaces, tourist destinations, and lay-persons. This is particularly troublesome for policymakers (who are in charge of orchestrating all-pervading models to preserve homeland security) and for field-workers who are seriously punished when they are in contact with radicalized cells. For this reason, specialists traverse for many problems to understand the complexity of terrorism as well as the motivation of young lone-wolves to attack societies where they are native. The present conceptual research focuses not only on the borders of travel literature but also the colonial stereotypes forged during the European expansion to draw and model an “alterity” strictly limited to the ideals of the Enlightenment. In a nutshell, the allegories revolving around the “lone-wolf terrorism” continues the imprint of the “archetype of the noble savage” coined in 18th century.
冷战的结束,以及苏联的解体,给“全球北方”带来了新的更大的挑战和风险。毫无疑问,恐怖主义似乎就是其中之一。近年来,特别是在9/11之后,恐怖分子改变了袭击的重点。传统恐怖主义的目标是政治家、警察局长或名人等重要人物,而现代恐怖主义的目标是休闲场所、旅游目的地和普通人。这对政策制定者(他们负责协调各种模式以维护国土安全)和那些与激进组织接触而受到严厉惩罚的外勤工作人员来说尤其麻烦。出于这个原因,专家们穿越了许多问题,以了解恐怖主义的复杂性,以及年轻的孤狼攻击他们家乡社会的动机。目前的概念研究不仅关注旅行文学的边界,而且关注欧洲扩张期间形成的殖民刻板印象,以描绘和模拟严格限于启蒙运动理想的“另类”。简而言之,围绕“独狼恐怖主义”展开的寓言延续了18世纪创造的“高贵野蛮人原型”的印记。
{"title":"Tracing the Cultural Background of Lone-Wolf Terrorism: Dilemmas, Contradictions, and Opportunities for the Next Decade","authors":"M. Korstanje","doi":"10.4018/IJCWT.2021010104","DOIUrl":"https://doi.org/10.4018/IJCWT.2021010104","url":null,"abstract":"The end of the Cold War, as well as the collapse of the Soviet Union, posed new greater challenges and risks for the “Global North.” Terrorism—doubtless—seems to be one of them. Over the recent years, and particularly after 9/11, terrorists changed the focus of their attacks. While classic terrorism targeted important persons such as politicians, chief police officers, or celebrities, modern terrorism planned attacks on leisure-spots spaces, tourist destinations, and lay-persons. This is particularly troublesome for policymakers (who are in charge of orchestrating all-pervading models to preserve homeland security) and for field-workers who are seriously punished when they are in contact with radicalized cells. For this reason, specialists traverse for many problems to understand the complexity of terrorism as well as the motivation of young lone-wolves to attack societies where they are native. The present conceptual research focuses not only on the borders of travel literature but also the colonial stereotypes forged during the European expansion to draw and model an “alterity” strictly limited to the ideals of the Enlightenment. In a nutshell, the allegories revolving around the “lone-wolf terrorism” continues the imprint of the “archetype of the noble savage” coined in 18th century.","PeriodicalId":41462,"journal":{"name":"International Journal of Cyber Warfare and Terrorism","volume":"17 1","pages":"45-56"},"PeriodicalIF":0.5,"publicationDate":"2021-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"78491586","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Understanding the Relationship Between the Dark Triad of Personality Traits and Neutralization Techniques Toward Cybersecurity Behaviour 了解人格特质的黑暗三合一与网络安全行为的中和技术之间的关系
IF 0.5 Q4 POLITICAL SCIENCE Pub Date : 2020-10-01 DOI: 10.4018/IJCWT.2020100101
Keshnee Padayachee
This study considers the framework of neutralization techniques, which responds to the attitude/rationalization leg of the fraud triangle with respect to the dark triad of personality traits' predictability toward compliant cybersecurity behaviour. Logically, organizations focus on reducing the insider's motivation and opportunities for malfeasance. However, it may be prudent to consider the rationalization for insider crime, which is arguably the most obscure element. This study is a unique contribution as it considers both the roles of neutralization techniques and the dark triad of personality traits with respect to insider threats and compliance intention. Furthermore, the specific categories of neutralization techniques will be considered as antecedents towards insider maleficence.
本研究考虑了中和技术的框架,该框架在人格特质对顺从网络安全行为的可预测性的黑暗三合一方面回应了欺诈三角的态度/合理化腿。从逻辑上讲,组织关注的是减少内部人员的动机和不法行为的机会。然而,考虑内幕犯罪的合理化可能是谨慎的,这可以说是最模糊的因素。本研究是一个独特的贡献,因为它考虑了中和技术和人格特质的黑暗三合一在内部威胁和服从意愿方面的作用。此外,具体类别的中和技术将被视为对内部恶意的先决条件。
{"title":"Understanding the Relationship Between the Dark Triad of Personality Traits and Neutralization Techniques Toward Cybersecurity Behaviour","authors":"Keshnee Padayachee","doi":"10.4018/IJCWT.2020100101","DOIUrl":"https://doi.org/10.4018/IJCWT.2020100101","url":null,"abstract":"This study considers the framework of neutralization techniques, which responds to the attitude/rationalization leg of the fraud triangle with respect to the dark triad of personality traits' predictability toward compliant cybersecurity behaviour. Logically, organizations focus on reducing the insider's motivation and opportunities for malfeasance. However, it may be prudent to consider the rationalization for insider crime, which is arguably the most obscure element. This study is a unique contribution as it considers both the roles of neutralization techniques and the dark triad of personality traits with respect to insider threats and compliance intention. Furthermore, the specific categories of neutralization techniques will be considered as antecedents towards insider maleficence.","PeriodicalId":41462,"journal":{"name":"International Journal of Cyber Warfare and Terrorism","volume":"6 1","pages":"1-19"},"PeriodicalIF":0.5,"publicationDate":"2020-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"79980406","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
A South African Legal Perspective on the Regulation of Net Neutrality and Its Implications for Cyber-Security and Cyber-Warfare 南非法律对网络中立性的监管及其对网络安全和网络战的影响
IF 0.5 Q4 POLITICAL SCIENCE Pub Date : 2020-10-01 DOI: 10.4018/IJCWT.2020100103
Trishana Ramluckan
With the approval of Articles 11 and 13 in Europe, net neutrality has become a contentious issue globally. These articles refer to European Union (EU) copyright law, which could possibly destroy the freedom of the internet that once existed. Throughout Europe it has become known as the “meme ban,” referring to the censorship elements. While there is much opposition to these articles, its supporters consider it necessary for the preservation for creative works online. Opposition to the legislation, which includes certain websites and internet presences, remains of the opinion that these two pieces of legislation will mean an end to “meme culture and user-generated content.” Along with the limitation to the freedom of the internet, cyber-security and cyber-warfare risks and vulnerabilities are imminent. This paper seeks to provide an in-depth discussion on the implications of neutrality on cyber-security and cyber-warfare.
随着第11条和第13条在欧洲的批准,网络中立性已经成为一个有争议的全球问题。这些条款指的是欧盟(EU)版权法,这可能会破坏曾经存在的互联网自由。在整个欧洲,这被称为“表情包禁令”,指的是审查内容。虽然有很多人反对这些文章,但其支持者认为有必要保护在线创意作品。反对这项立法的人,包括某些网站和互联网存在,仍然认为这两项立法将意味着“模因文化和用户生成内容”的终结。随着互联网自由受到限制,网络安全和网络战争的风险和漏洞迫在眉睫。本文旨在对网络安全和网络战争中立性的含义进行深入讨论。
{"title":"A South African Legal Perspective on the Regulation of Net Neutrality and Its Implications for Cyber-Security and Cyber-Warfare","authors":"Trishana Ramluckan","doi":"10.4018/IJCWT.2020100103","DOIUrl":"https://doi.org/10.4018/IJCWT.2020100103","url":null,"abstract":"With the approval of Articles 11 and 13 in Europe, net neutrality has become a contentious issue globally. These articles refer to European Union (EU) copyright law, which could possibly destroy the freedom of the internet that once existed. Throughout Europe it has become known as the “meme ban,” referring to the censorship elements. While there is much opposition to these articles, its supporters consider it necessary for the preservation for creative works online. Opposition to the legislation, which includes certain websites and internet presences, remains of the opinion that these two pieces of legislation will mean an end to “meme culture and user-generated content.” Along with the limitation to the freedom of the internet, cyber-security and cyber-warfare risks and vulnerabilities are imminent. This paper seeks to provide an in-depth discussion on the implications of neutrality on cyber-security and cyber-warfare.","PeriodicalId":41462,"journal":{"name":"International Journal of Cyber Warfare and Terrorism","volume":"63 1","pages":"36-47"},"PeriodicalIF":0.5,"publicationDate":"2020-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"87566995","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Cross-Regional Analysis of Terrorism Reporting and Dynamics of Ethnic Relations in Nigeria 尼日利亚恐怖主义报告和民族关系动态的跨区域分析
IF 0.5 Q4 POLITICAL SCIENCE Pub Date : 2020-10-01 DOI: 10.4018/IJCWT.2020100102
D. N. Morah, O. Oladokun
The news sociology and news determinism perspectives do project both the integrationist and disintegrative capabilities of the media. This projection is premised on their agenda-setting tradition, meaning that the social responsibility performance credential of the reporter can help build a nation or be a factor of the collapse of social control. This work explores this oxymoron by examining terrorism reporting and how it impacts on ethnic relations among the three dominant regions in Nigeria. A total of 400 respondents from Southeast and Southwest Nigeria respond to seven items on their relationship with the Northern Region that has been affected by the activities of the terror group Boko Haram. The findings portray a violent nature of the Northern Region. However, they do not support six of the media-framed and widely-held assumptions by the southerners about the conflict, including the statement that the insurgents represent northerners' interest. The media can scale down ethnic tension by publishing and framing stories that promote de-escalation.
新闻社会学和新闻决定论的观点确实反映了媒体的整合和分裂能力。这种预测是以他们的议程设定传统为前提的,这意味着记者的社会责任表现凭证可以帮助建立一个国家,也可以成为社会控制崩溃的因素。这项工作通过检查恐怖主义报道以及它如何影响尼日利亚三个主要地区之间的种族关系来探讨这种矛盾修辞。来自尼日利亚东南部和西南部的400名受访者就他们与受到恐怖组织博科圣地活动影响的北部地区的关系回答了7个问题。调查结果描绘了北部地区暴力的本质。然而,他们不支持南方人对冲突的六种媒体框架和广泛持有的假设,包括叛乱分子代表北方人利益的声明。媒体可以通过发布和构思有助于缓和紧张局势的故事来缓解种族紧张局势。
{"title":"Cross-Regional Analysis of Terrorism Reporting and Dynamics of Ethnic Relations in Nigeria","authors":"D. N. Morah, O. Oladokun","doi":"10.4018/IJCWT.2020100102","DOIUrl":"https://doi.org/10.4018/IJCWT.2020100102","url":null,"abstract":"The news sociology and news determinism perspectives do project both the integrationist and disintegrative capabilities of the media. This projection is premised on their agenda-setting tradition, meaning that the social responsibility performance credential of the reporter can help build a nation or be a factor of the collapse of social control. This work explores this oxymoron by examining terrorism reporting and how it impacts on ethnic relations among the three dominant regions in Nigeria. A total of 400 respondents from Southeast and Southwest Nigeria respond to seven items on their relationship with the Northern Region that has been affected by the activities of the terror group Boko Haram. The findings portray a violent nature of the Northern Region. However, they do not support six of the media-framed and widely-held assumptions by the southerners about the conflict, including the statement that the insurgents represent northerners' interest. The media can scale down ethnic tension by publishing and framing stories that promote de-escalation.","PeriodicalId":41462,"journal":{"name":"International Journal of Cyber Warfare and Terrorism","volume":"24 1","pages":"20-35"},"PeriodicalIF":0.5,"publicationDate":"2020-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"90503773","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Proposed Framework of Smart Transportation in Pakistan: Issues, Challenges, Vulnerabilities, and Solutions 巴基斯坦智能交通建议框架:问题、挑战、漏洞和解决方案
IF 0.5 Q4 POLITICAL SCIENCE Pub Date : 2020-10-01 DOI: 10.4018/IJCWT.2020100104
Jawad Hussain Awan, S. Memon, Azhar Shah, K. Pathan
This paper proposes a framework for a smart transportation system of Pakistan and discusses modern approaches as solutions to emerging threats and vulnerabilities of STS. In addition, STS changes the life of people and decreases the number of accidents, deaths, and traffic incidents. STS is saving the time of users and makes the urban city even smarter. The aim of STS is to accomplish more efficiency of traffic by decreasing traffic issues. It also provides the information about route traffic toward destination, local expediency, passing, vehicle dynamic or requested information, availability of seats to users, which decreases journey time of commuters and improves their security and ease. This paper discusses STS, its application and working mechanism, and the main parameters of the proposed framework of STS of Pakistan such as road condition monitoring, traffic management, municipal involvement, link data for society, accidental measures, and security, which are necessary while designing or implementing such systems.
本文提出了巴基斯坦智能交通系统的框架,并讨论了解决STS新出现的威胁和脆弱性的现代方法。此外,化粪池系统改变了人们的生活,减少了事故、死亡和交通事故的数量。STS节省了用户的时间,使城市更加智能。STS的目的是通过减少交通问题来提高交通效率。它还提供了通往目的地的路线交通、当地便利、通行、车辆动态或请求信息、用户可用座位等信息,减少了通勤者的旅程时间,提高了他们的安全性和便利性。本文讨论了STS及其应用和工作机制,以及巴基斯坦STS框架的主要参数,如道路状况监测、交通管理、市政参与、社会链路数据、意外措施和安全,这些是设计或实施此类系统所必需的。
{"title":"Proposed Framework of Smart Transportation in Pakistan: Issues, Challenges, Vulnerabilities, and Solutions","authors":"Jawad Hussain Awan, S. Memon, Azhar Shah, K. Pathan","doi":"10.4018/IJCWT.2020100104","DOIUrl":"https://doi.org/10.4018/IJCWT.2020100104","url":null,"abstract":"This paper proposes a framework for a smart transportation system of Pakistan and discusses modern approaches as solutions to emerging threats and vulnerabilities of STS. In addition, STS changes the life of people and decreases the number of accidents, deaths, and traffic incidents. STS is saving the time of users and makes the urban city even smarter. The aim of STS is to accomplish more efficiency of traffic by decreasing traffic issues. It also provides the information about route traffic toward destination, local expediency, passing, vehicle dynamic or requested information, availability of seats to users, which decreases journey time of commuters and improves their security and ease. This paper discusses STS, its application and working mechanism, and the main parameters of the proposed framework of STS of Pakistan such as road condition monitoring, traffic management, municipal involvement, link data for society, accidental measures, and security, which are necessary while designing or implementing such systems.","PeriodicalId":41462,"journal":{"name":"International Journal of Cyber Warfare and Terrorism","volume":"111 1","pages":"48-63"},"PeriodicalIF":0.5,"publicationDate":"2020-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"80990005","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Political Cyber Operations: A South Pacific Case Study 政治网络操作:南太平洋案例研究
IF 0.5 Q4 POLITICAL SCIENCE Pub Date : 2020-07-01 DOI: 10.4018/ijcwt.2020070102
M. Warren
Social media impacts all aspects of society from citizens to businesses, but also political parties. The article proposes a new social media engagement model that evaluates political cyber operations and the success of such campaigns during elections. The article will use the Cook Islands 2018 general election to validate the model.
社交媒体影响着社会的方方面面,从公民到企业,还有政党。这篇文章提出了一种新的社交媒体参与模式,用于评估选举期间的政治网络操作和此类活动的成功。本文将使用库克群岛2018年大选来验证该模型。
{"title":"Political Cyber Operations: A South Pacific Case Study","authors":"M. Warren","doi":"10.4018/ijcwt.2020070102","DOIUrl":"https://doi.org/10.4018/ijcwt.2020070102","url":null,"abstract":"Social media impacts all aspects of society from citizens to businesses, but also political parties. The article proposes a new social media engagement model that evaluates political cyber operations and the success of such campaigns during elections. The article will use the Cook Islands 2018 general election to validate the model.","PeriodicalId":41462,"journal":{"name":"International Journal of Cyber Warfare and Terrorism","volume":"15 1","pages":"15-27"},"PeriodicalIF":0.5,"publicationDate":"2020-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"84718541","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Cyber Warfare: An Enquiry Into the Applicability of National Law to Cyberspace 网络战:国家法律在网络空间的适用性探讨
IF 0.5 Q4 POLITICAL SCIENCE Pub Date : 2020-07-01 DOI: 10.4018/ijcwt.2020070103
Helaine Leggat
The Tallinn Manual on the International Law Applicable to Cyber Warfare (2013) sets out ninety-five ‘black-letter rules' governing conflicts and the basis for each in treaty and customary law. An earlier version of this article considered the applicability of national law to cyberspace. Specifically, whether there was sufficient basis at a national law level to establish norms for acceptable behavior at an international level. The proposition being it is time for a new kind of international cooperation in relation to cyber warfare and acceptable norms of behavior in cyberspace. This article provides detail from various national statutes to illustrate how national law applies to cyberspace. Both papers consider the applicability of current national criminal and tort law by using hypothetical scenarios in relation to self-defence, conspiracy and corporate responsibility in the private sector. The intention is to encourage experts to cooperate internationally to recognise national rules equivalent to the Tallinn work.
《适用于网络战的国际法塔林手册》(2013年)列出了95条管理冲突的“黑体字规则”,以及每条规则在条约和习惯法中的基础。本文的早期版本考虑了国家法律对网络空间的适用性。具体地说,在国家法律一级是否有充分的依据为国际一级可接受的行为制定准则。现在是时候在网络战争和网络空间可接受的行为规范方面进行一种新型的国际合作了。本文提供了不同国家法规的细节,以说明国家法律如何适用于网络空间。两篇论文都通过使用与私营部门的自卫、阴谋和公司责任有关的假设情景来考虑当前国家刑事和侵权法的适用性。其目的是鼓励专家进行国际合作,承认与塔林工作相当的国家规则。
{"title":"Cyber Warfare: An Enquiry Into the Applicability of National Law to Cyberspace","authors":"Helaine Leggat","doi":"10.4018/ijcwt.2020070103","DOIUrl":"https://doi.org/10.4018/ijcwt.2020070103","url":null,"abstract":"The Tallinn Manual on the International Law Applicable to Cyber Warfare (2013) sets out ninety-five ‘black-letter rules' governing conflicts and the basis for each in treaty and customary law. An earlier version of this article considered the applicability of national law to cyberspace. Specifically, whether there was sufficient basis at a national law level to establish norms for acceptable behavior at an international level. The proposition being it is time for a new kind of international cooperation in relation to cyber warfare and acceptable norms of behavior in cyberspace. This article provides detail from various national statutes to illustrate how national law applies to cyberspace. Both papers consider the applicability of current national criminal and tort law by using hypothetical scenarios in relation to self-defence, conspiracy and corporate responsibility in the private sector. The intention is to encourage experts to cooperate internationally to recognise national rules equivalent to the Tallinn work.","PeriodicalId":41462,"journal":{"name":"International Journal of Cyber Warfare and Terrorism","volume":"272 1","pages":"28-46"},"PeriodicalIF":0.5,"publicationDate":"2020-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"79929381","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
期刊
International Journal of Cyber Warfare and Terrorism
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1