首页 > 最新文献

International Journal of Cyber Warfare and Terrorism最新文献

英文 中文
Deception Detection in Cyber Conflicts 网络冲突中的欺骗检测
IF 0.5 Q4 POLITICAL SCIENCE Pub Date : 2020-01-01 DOI: 10.4018/978-1-7998-2466-4.ch014
Jim Q. Chen
Deception is a strategy that has been widely used in cyber conflicts. How to detect deception in a timely manner is always a challenge, especially for a cyber commander who is at the point of making decisions with respect to the actual target to go after, the exact location of the target, the starting and ending time of a cyber operation, the type of cyber operation, the way of launching the cyber operation, and the amount of resources and support needed. It is absolutely important for a cyber commander to know for sure that he/she is not deceived by an adversary so he/she will be able to make right decisions. Varied solutions do exist. However, they are either too narrow or too broad. The solutions represented by signature technology are narrow in scope, so that they are not capable of dealing with the deception that they have not handled before. The solutions represented by behavioral analysis are relatively broad, so that they require extra time to re-adjust their focuses, incorporate contextual information, and combine heterogeneous data resources in order to get to what is exactly needed. In addition, the use of contexts in analysis is at random and not in a systematic way in most cases. Even when contexts are included in analysis, their relations with the relevant events are not well explored in all these solutions. To address these issues, this paper proposes a new strategic and systematic solution applying the Operational-Level Cybersecurity Strategy Formation Framework. This new solution employs purpose analysis, contextual analysis, and risk analysis. A case study is provided to test the effectiveness of this solution in detecting deception in a timely manner. The benefits and limitations of this solution are discussed. The capabilities of the Operational-Level Cybersecurity Strategy Formation Framework are evidently proved via this use case.
欺骗是一种在网络冲突中广泛使用的策略。如何及时发现欺骗始终是一个挑战,特别是对于网络指挥官来说,他需要就实际目标,目标的确切位置,网络行动的开始和结束时间,网络行动的类型,发起网络行动的方式以及所需的资源和支持数量做出决定。对于网络指挥官来说,确保他/她没有被对手欺骗是绝对重要的,这样他/她才能做出正确的决定。不同的解决方案确实存在。然而,它们不是太窄就是太宽。签名技术所代表的解决方案范围很窄,因此无法处理以前没有处理过的欺骗。行为分析所代表的解决方案相对广泛,因此它们需要额外的时间来重新调整焦点、合并上下文信息和组合异构数据资源,以便获得确切需要的内容。此外,在大多数情况下,上下文在分析中的使用是随机的,而不是系统的。即使在分析中包含上下文,它们与相关事件的关系也没有在所有这些解决方案中得到很好的探讨。为了解决这些问题,本文提出了一个新的战略和系统的解决方案,应用运营级网络安全战略形成框架。这个新的解决方案采用了目的分析、上下文分析和风险分析。通过一个案例研究,验证了该解决方案在及时发现欺骗行为方面的有效性。讨论了该解决方案的优点和局限性。通过这个用例,可以明显地证明操作级网络安全战略形成框架的能力。
{"title":"Deception Detection in Cyber Conflicts","authors":"Jim Q. Chen","doi":"10.4018/978-1-7998-2466-4.ch014","DOIUrl":"https://doi.org/10.4018/978-1-7998-2466-4.ch014","url":null,"abstract":"Deception is a strategy that has been widely used in cyber conflicts. How to detect deception in a timely manner is always a challenge, especially for a cyber commander who is at the point of making decisions with respect to the actual target to go after, the exact location of the target, the starting and ending time of a cyber operation, the type of cyber operation, the way of launching the cyber operation, and the amount of resources and support needed. It is absolutely important for a cyber commander to know for sure that he/she is not deceived by an adversary so he/she will be able to make right decisions. Varied solutions do exist. However, they are either too narrow or too broad. The solutions represented by signature technology are narrow in scope, so that they are not capable of dealing with the deception that they have not handled before. The solutions represented by behavioral analysis are relatively broad, so that they require extra time to re-adjust their focuses, incorporate contextual information, and combine heterogeneous data resources in order to get to what is exactly needed. In addition, the use of contexts in analysis is at random and not in a systematic way in most cases. Even when contexts are included in analysis, their relations with the relevant events are not well explored in all these solutions. To address these issues, this paper proposes a new strategic and systematic solution applying the Operational-Level Cybersecurity Strategy Formation Framework. This new solution employs purpose analysis, contextual analysis, and risk analysis. A case study is provided to test the effectiveness of this solution in detecting deception in a timely manner. The benefits and limitations of this solution are discussed. The capabilities of the Operational-Level Cybersecurity Strategy Formation Framework are evidently proved via this use case.","PeriodicalId":41462,"journal":{"name":"International Journal of Cyber Warfare and Terrorism","volume":"75 1","pages":""},"PeriodicalIF":0.5,"publicationDate":"2020-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"76532751","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Advanced Threat Detection Based on Big Data Technologies 基于大数据技术的高级威胁检测
IF 0.5 Q4 POLITICAL SCIENCE Pub Date : 2020-01-01 DOI: 10.4018/978-1-5225-3015-2.CH001
Madhvaraj M. Shetty, D. Manjaiah
Today constant increase in number of cyber threats apparently shows that current countermeasures are not enough to defend it. With the help of huge generated data, big data brings transformative potential for various sectors. While many are using it for better operations, some of them are noticing that it can also be used for security by providing broader view of vulnerabilities and risks. Meanwhile, deep learning is coming up as a key role by providing predictive analytics solutions. Deep learning and big data analytics are becoming two high-focus of data science. Threat intelligence becoming more and more effective. Since it is based on how much data collected about active threats, this reason has taken many independent vendors into partnerships. In this chapter, we explore big data and big data analytics with its benefits. And we provide a brief overview of deep analytics and finally we present collaborative threat Detection. We also investigate some aspects of standards and key functions of it. We conclude by presenting benefits and challenges of collaborative threat detection.
今天,不断增加的网络威胁显然表明,目前的对策不足以防御它。借助巨大的生成数据,大数据为各行各业带来了变革潜力。虽然许多人将其用于更好的操作,但其中一些人注意到,它还可以通过提供更广泛的漏洞和风险视图来用于安全性。与此同时,深度学习通过提供预测分析解决方案而成为关键角色。深度学习和大数据分析正在成为数据科学的两大热点。威胁情报变得越来越有效。由于它是基于收集到的有关活动威胁的数据量,因此许多独立供应商结成了合作伙伴关系。在本章中,我们将探讨大数据和大数据分析及其好处。我们简要概述了深度分析,最后介绍了协作威胁检测。我们还对标准的一些方面和关键功能进行了探讨。最后,我们介绍了协作威胁检测的好处和挑战。
{"title":"Advanced Threat Detection Based on Big Data Technologies","authors":"Madhvaraj M. Shetty, D. Manjaiah","doi":"10.4018/978-1-5225-3015-2.CH001","DOIUrl":"https://doi.org/10.4018/978-1-5225-3015-2.CH001","url":null,"abstract":"Today constant increase in number of cyber threats apparently shows that current countermeasures are not enough to defend it. With the help of huge generated data, big data brings transformative potential for various sectors. While many are using it for better operations, some of them are noticing that it can also be used for security by providing broader view of vulnerabilities and risks. Meanwhile, deep learning is coming up as a key role by providing predictive analytics solutions. Deep learning and big data analytics are becoming two high-focus of data science. Threat intelligence becoming more and more effective. Since it is based on how much data collected about active threats, this reason has taken many independent vendors into partnerships. In this chapter, we explore big data and big data analytics with its benefits. And we provide a brief overview of deep analytics and finally we present collaborative threat Detection. We also investigate some aspects of standards and key functions of it. We conclude by presenting benefits and challenges of collaborative threat detection.","PeriodicalId":41462,"journal":{"name":"International Journal of Cyber Warfare and Terrorism","volume":"50 1","pages":""},"PeriodicalIF":0.5,"publicationDate":"2020-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"86458934","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Bioterrorism, Bio Crimes and Politics 生物恐怖主义,生物犯罪和政治
IF 0.5 Q4 POLITICAL SCIENCE Pub Date : 2020-01-01 DOI: 10.4018/978-1-7998-2466-4.ch064
Hakiimu Kawalya
Right from the onset, man woke up to a strenuous and hostile surrounding. He had to swiftly learn that just like the planet upon which his life hinged possessed enormous attractive endowments, so was it rich in hostility. Given its delicate nature humanity therefore had to adapt particular ways of living for survival and inevitably has since then evolved over thousands of years into the so called Homo-sapiens or modern man. Undoubtedly as modern man's continued trajectory to transformation gave birth to philosophy and science along with the icing that came with it, man finds himself entangled in a more complex and chaotic web with threats far greater than his imagination. One such a threat is biological weaponry a product of science that has potential to be used as a tool to orchestrate murder, terror and other sophisticated crimes. Owing to the vast amount of resources required to assemble these biological weapons it's fervently rare to find an ordinary individual utilizing them, instead governments and of recent some heavily financed terrorist groups can harness the catastrophic potential of these weapons to destroy both local and foreign adversaries. In a world stirred up with tensions, the powerful ones are amassing weapons of every caliber to rise above perceived enemies, yet rocket speed advancing biotechnology is making the manufacturing of biological weapons easier and consequently proliferation of biological war material is becoming inevitable. Therefore whereas the world health organization and United Nation are grappling with keeping biological science generated terror or crimes under check, it is high time the world started viewing them in light of the actual threat they pose today as tools exploitable in the notion of politicking.
从一开始,人类就被艰苦而充满敌意的环境所唤醒。他必须很快认识到,就像他的生命所依赖的星球拥有巨大的吸引力一样,它也充满了敌意。鉴于其脆弱的天性,人类因此不得不适应特定的生存方式,并不可避免地从那时起进化成所谓的智人或现代人。毫无疑问,随着现代人不断转型的轨迹催生了哲学和科学,以及随之而来的糖衣,人类发现自己陷入了一个更复杂、更混乱的网络,其威胁远比他想象的要大。其中一个威胁是生物武器,这是一种科学产品,有可能被用作策划谋杀、恐怖和其他复杂犯罪的工具。由于组装这些生物武器需要大量的资源,很难找到一个普通人使用它们,相反,政府和最近一些资金雄厚的恐怖组织可以利用这些武器的灾难性潜力来摧毁当地和外国的对手。在一个紧张的世界里,强大的国家正在积累各种口径的武器,以超越他们认为的敌人,然而,火箭速度发展的生物技术使生物武器的制造变得更加容易,因此,生物战争材料的扩散是不可避免的。因此,虽然世界卫生组织和联合国正在努力控制生物科学产生的恐怖或犯罪,但现在是世界开始根据它们今天构成的实际威胁来看待它们的时候了,它们是政治概念中可利用的工具。
{"title":"Bioterrorism, Bio Crimes and Politics","authors":"Hakiimu Kawalya","doi":"10.4018/978-1-7998-2466-4.ch064","DOIUrl":"https://doi.org/10.4018/978-1-7998-2466-4.ch064","url":null,"abstract":"Right from the onset, man woke up to a strenuous and hostile surrounding. He had to swiftly learn that just like the planet upon which his life hinged possessed enormous attractive endowments, so was it rich in hostility. Given its delicate nature humanity therefore had to adapt particular ways of living for survival and inevitably has since then evolved over thousands of years into the so called Homo-sapiens or modern man. Undoubtedly as modern man's continued trajectory to transformation gave birth to philosophy and science along with the icing that came with it, man finds himself entangled in a more complex and chaotic web with threats far greater than his imagination. One such a threat is biological weaponry a product of science that has potential to be used as a tool to orchestrate murder, terror and other sophisticated crimes. Owing to the vast amount of resources required to assemble these biological weapons it's fervently rare to find an ordinary individual utilizing them, instead governments and of recent some heavily financed terrorist groups can harness the catastrophic potential of these weapons to destroy both local and foreign adversaries. In a world stirred up with tensions, the powerful ones are amassing weapons of every caliber to rise above perceived enemies, yet rocket speed advancing biotechnology is making the manufacturing of biological weapons easier and consequently proliferation of biological war material is becoming inevitable. Therefore whereas the world health organization and United Nation are grappling with keeping biological science generated terror or crimes under check, it is high time the world started viewing them in light of the actual threat they pose today as tools exploitable in the notion of politicking.","PeriodicalId":41462,"journal":{"name":"International Journal of Cyber Warfare and Terrorism","volume":"65 1","pages":""},"PeriodicalIF":0.5,"publicationDate":"2020-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"81477810","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A Comparative Analysis of the Cyberattacks Against Estonia, the United States, and Ukraine 爱沙尼亚、美国和乌克兰网络攻击的比较分析
IF 0.5 Q4 POLITICAL SCIENCE Pub Date : 2020-01-01 DOI: 10.4018/978-1-7998-2466-4.ch071
Kenneth J. Boyte
This comparative international case study of cyber warfare provides a context for considering the evolution of cyber technologies as elements of hybrid warfare capable of creating confusion, disrupting communications, and impacting physical infrastructure (such as power grids and satellite-based communications and weapons systems). Expanding an unpublished paper recognized by the ASIS Foundation in its 2012 international student writing competition concerning global security, which compared the cyberattacks against Estonia in 2007 and the United States in 2012, this study re-examines and updates the original data in a broader analysis that primarily includes the cyberattacks against Ukraine during the 2013-2015 conflict, but also considers other incidents on the timeline of digitization. The study shows how cyber warfare, first reported in the 1990s, has become an integral component of war today for both state and non-state actors who use zombies and robot armies to penetrate national boundaries and firewalls via satellites.
网络战争的国际比较案例研究提供了一个背景,考虑网络技术的演变作为混合战争的要素,能够制造混乱,破坏通信,影响物理基础设施(如电网和基于卫星的通信和武器系统)。本研究扩展了一篇未发表的论文,该论文在2012年ASIS基金会举办的关于全球安全的国际学生写作竞赛中获得认可,该论文比较了2007年对爱沙尼亚和2012年对美国的网络攻击,并在更广泛的分析中重新审视和更新了原始数据,主要包括2013-2015年冲突期间对乌克兰的网络攻击,但也考虑了数字化时间线上的其他事件。这项研究表明,20世纪90年代首次报道的网络战,如今已成为国家和非国家行为体使用僵尸和机器人军队通过卫星渗透国界和防火墙的不可或缺的组成部分。
{"title":"A Comparative Analysis of the Cyberattacks Against Estonia, the United States, and Ukraine","authors":"Kenneth J. Boyte","doi":"10.4018/978-1-7998-2466-4.ch071","DOIUrl":"https://doi.org/10.4018/978-1-7998-2466-4.ch071","url":null,"abstract":"This comparative international case study of cyber warfare provides a context for considering the evolution of cyber technologies as elements of hybrid warfare capable of creating confusion, disrupting communications, and impacting physical infrastructure (such as power grids and satellite-based communications and weapons systems). Expanding an unpublished paper recognized by the ASIS Foundation in its 2012 international student writing competition concerning global security, which compared the cyberattacks against Estonia in 2007 and the United States in 2012, this study re-examines and updates the original data in a broader analysis that primarily includes the cyberattacks against Ukraine during the 2013-2015 conflict, but also considers other incidents on the timeline of digitization. The study shows how cyber warfare, first reported in the 1990s, has become an integral component of war today for both state and non-state actors who use zombies and robot armies to penetrate national boundaries and firewalls via satellites.","PeriodicalId":41462,"journal":{"name":"International Journal of Cyber Warfare and Terrorism","volume":"23 1","pages":""},"PeriodicalIF":0.5,"publicationDate":"2020-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"83208235","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Credit Card Fraud 信用卡诈骗
IF 0.5 Q4 POLITICAL SCIENCE Pub Date : 2020-01-01 DOI: 10.4018/978-1-7998-2466-4.ch087
D. DeFilippi, K. Michael
This chapter provides a single person case study of Mr. Dan DeFilippi who was arrested for credit card fraud by the US Secret Service in December 2004. The chapter delves into the psychology of a cybercriminal and the inner workings of credit card fraud. A background context of credit card fraud is presented to frame the primary interview. A section on the identification of issues and controversies with respect to carding is then given. Finally, recommendations are made by the convicted cybercriminal turned key informant on how to decrease the rising incidence of cybercrime. A major finding is that credit card fraud is all too easy to enact and merchants need to conduct better staff training to catch fraudsters early. With increases in global online purchasing, international carding networks are proliferating, making it difficult for law enforcement agencies to be “policing” unauthorized transactions. Big data may well have a role to play in analyzing behaviors that expose cybercrime.
本章以2004年12月因信用卡诈骗被美国特勤局逮捕的Dan DeFilippi先生为个案进行分析。这一章深入探讨了网络罪犯的心理和信用卡诈骗的内部运作。信用卡诈骗的背景背景提出框架的主要采访。然后给出了有关梳理的问题和争议的识别部分。最后,由被定罪的网络罪犯转为关键线人,就如何降低不断上升的网络犯罪发生率提出了建议。一项重大发现是,信用卡欺诈太容易实施,商家需要对员工进行更好的培训,以便及早发现欺诈者。随着全球在线购物的增加,国际信用卡网络正在激增,这使得执法机构很难“监管”未经授权的交易。大数据很可能在分析暴露网络犯罪的行为方面发挥作用。
{"title":"Credit Card Fraud","authors":"D. DeFilippi, K. Michael","doi":"10.4018/978-1-7998-2466-4.ch087","DOIUrl":"https://doi.org/10.4018/978-1-7998-2466-4.ch087","url":null,"abstract":"This chapter provides a single person case study of Mr. Dan DeFilippi who was arrested for credit card fraud by the US Secret Service in December 2004. The chapter delves into the psychology of a cybercriminal and the inner workings of credit card fraud. A background context of credit card fraud is presented to frame the primary interview. A section on the identification of issues and controversies with respect to carding is then given. Finally, recommendations are made by the convicted cybercriminal turned key informant on how to decrease the rising incidence of cybercrime. A major finding is that credit card fraud is all too easy to enact and merchants need to conduct better staff training to catch fraudsters early. With increases in global online purchasing, international carding networks are proliferating, making it difficult for law enforcement agencies to be “policing” unauthorized transactions. Big data may well have a role to play in analyzing behaviors that expose cybercrime.","PeriodicalId":41462,"journal":{"name":"International Journal of Cyber Warfare and Terrorism","volume":"481 1","pages":""},"PeriodicalIF":0.5,"publicationDate":"2020-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"76066754","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Determinants of Terrorism in South Asia 南亚恐怖主义的决定因素
IF 0.5 Q4 POLITICAL SCIENCE Pub Date : 2020-01-01 DOI: 10.4018/978-1-7998-2466-4.ch094
R. Das, Sovik Mukherjee
Terrorist activities in the post-Paris Peace Treaties have emerged as one of the most perilous agendas that are troubling the world economies and political figures in securing their nations and regions. Several socio-economic factors were evidenced to be the crucial factors in determining terrorist activities all around the world. The present article strives to identify the significance of several socio economic factors, namely, refugee population, access to good sanitation facilities, youth unemployment rate, percentage of education expenditure to GDP, percentage of military expenditure to GDP, per capita GDP and political stability in the panel of seven South Asian countries and China for the period 2002-2016. By applying both static and dynamic panel models, the article observes that all of the selected variables explain the terrorism index with expected signs. The article thus prescribes that the governments of the selected countries should concentrate on allocating their budgets on the improvements of sectors underlying the associated indicators.
《巴黎和平条约》之后的恐怖主义活动已成为最危险的议程之一,正在困扰世界经济和政治人物确保其国家和区域的安全。若干社会经济因素被证明是决定世界各地恐怖主义活动的关键因素。本文试图确定几个社会经济因素的重要性,即难民人口、获得良好卫生设施的机会、青年失业率、教育支出占GDP的百分比、军费支出占GDP的百分比、人均GDP和政治稳定在2002-2016年期间的七个南亚国家和中国的小组中。通过应用静态和动态面板模型,本文观察到所有选择的变量都以期望符号解释恐怖主义指数。因此,该条规定,选定国家的政府应集中把预算分配给改善相关指标所依据的部门。
{"title":"Determinants of Terrorism in South Asia","authors":"R. Das, Sovik Mukherjee","doi":"10.4018/978-1-7998-2466-4.ch094","DOIUrl":"https://doi.org/10.4018/978-1-7998-2466-4.ch094","url":null,"abstract":"Terrorist activities in the post-Paris Peace Treaties have emerged as one of the most perilous agendas that are troubling the world economies and political figures in securing their nations and regions. Several socio-economic factors were evidenced to be the crucial factors in determining terrorist activities all around the world. The present article strives to identify the significance of several socio economic factors, namely, refugee population, access to good sanitation facilities, youth unemployment rate, percentage of education expenditure to GDP, percentage of military expenditure to GDP, per capita GDP and political stability in the panel of seven South Asian countries and China for the period 2002-2016. By applying both static and dynamic panel models, the article observes that all of the selected variables explain the terrorism index with expected signs. The article thus prescribes that the governments of the selected countries should concentrate on allocating their budgets on the improvements of sectors underlying the associated indicators.","PeriodicalId":41462,"journal":{"name":"International Journal of Cyber Warfare and Terrorism","volume":"50 1","pages":""},"PeriodicalIF":0.5,"publicationDate":"2020-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"74735414","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A Framework for the Weapons of Influence 影响力武器框架
IF 0.5 Q4 POLITICAL SCIENCE Pub Date : 2020-01-01 DOI: 10.4018/ijcwt.2020010103
Miika Sartonen, A. Huhtinen, P. Simola, Kari T. Takamaa, Veli-Pekka Kivimäki
The development of communications technology has enabled the internet to become a new theatre of military operations. The influence aspects of military operations in information battlespace, however, are difficult both in theory and in practice, especially concerning international law. As a result, there is a variety of national and organizational solutions of how to divide tasks and responsibilities between authorities. This asymmetry generated by different approaches and rules of conduct provides opportunities for actors with more relaxed interpretation of international law, allowing them to use weapons of influence in order to pursue military goals. In this article the authors ask whether military influence operations, just like cyber operations, could be treated as acts of war. To help militaries address the complex issue of influence operations, a framework consisting of three categories is suggested.
通信技术的发展使互联网成为军事行动的新战场。然而,信息战空间中军事行动的影响方面在理论上和实践中都是困难的,特别是在国际法方面。因此,对于如何在当局之间划分任务和责任,有各种各样的国家和组织解决方案。不同的做法和行为规则造成的这种不对称,为行为者提供了对国际法更宽松解释的机会,使他们能够使用影响力武器来追求军事目标。在这篇文章中,作者提出了一个问题,即军事影响行动是否可以像网络行动一样被视为战争行为。为了帮助军队解决影响行动的复杂问题,建议建立一个由三类组成的框架。
{"title":"A Framework for the Weapons of Influence","authors":"Miika Sartonen, A. Huhtinen, P. Simola, Kari T. Takamaa, Veli-Pekka Kivimäki","doi":"10.4018/ijcwt.2020010103","DOIUrl":"https://doi.org/10.4018/ijcwt.2020010103","url":null,"abstract":"The development of communications technology has enabled the internet to become a new theatre of military operations. The influence aspects of military operations in information battlespace, however, are difficult both in theory and in practice, especially concerning international law. As a result, there is a variety of national and organizational solutions of how to divide tasks and responsibilities between authorities. This asymmetry generated by different approaches and rules of conduct provides opportunities for actors with more relaxed interpretation of international law, allowing them to use weapons of influence in order to pursue military goals. In this article the authors ask whether military influence operations, just like cyber operations, could be treated as acts of war. To help militaries address the complex issue of influence operations, a framework consisting of three categories is suggested.","PeriodicalId":41462,"journal":{"name":"International Journal of Cyber Warfare and Terrorism","volume":"5 1","pages":"34-49"},"PeriodicalIF":0.5,"publicationDate":"2020-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"75169272","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Building National Resilience in the Digital Era of Violent Extremism 在暴力极端主义的数字时代建设国家复原力
IF 0.5 Q4 POLITICAL SCIENCE Pub Date : 2020-01-01 DOI: 10.4018/978-1-7998-2466-4.ch078
Jethro Tan, Yingmin Wang, Danielle Gomes
The threat of violent extremism in the Internet age has undoubtedly become one important focus of research, policy, and government bodies all over the world. Understandably, many resources have been invested into counter violent extremism efforts, such as the identification of possible radicalised individuals, and understanding the psychology behind violent extremism. These methods adopt a resistance stance and attempt to prevent violent extremism. However, this chapter argues that resilience is equally, if not more important given the unpredictable nature of violent extremism. The first part examines ‘systems' within a nation such as critical infrastructure and how concepts such as ‘resilient-by-design' can be incorporated to ensure continuity in times of attacks. The second part will explore ‘person' factors of crisis communication, cohesion, and social capital, and how these factors can afford a cohesive society that can overcome the cracks in social order and harmony often caused by violent extremism.
在互联网时代,暴力极端主义的威胁无疑已成为世界各国研究、政策和政府机构关注的一个重要焦点。可以理解的是,许多资源已经投入到打击暴力极端主义的努力中,例如识别可能的激进个人,以及了解暴力极端主义背后的心理学。这些方法采取抵抗立场,试图防止暴力极端主义。然而,本章认为,鉴于暴力极端主义的不可预测性,恢复力即使不是更重要,也是同样重要的。第一部分考察了一个国家内的“系统”,如关键基础设施,以及如何将“设计弹性”等概念纳入其中,以确保攻击时的连续性。第二部分将探讨危机沟通,凝聚力和社会资本的“人”因素,以及这些因素如何能够提供一个有凝聚力的社会,可以克服暴力极端主义经常造成的社会秩序与和谐的裂缝。
{"title":"Building National Resilience in the Digital Era of Violent Extremism","authors":"Jethro Tan, Yingmin Wang, Danielle Gomes","doi":"10.4018/978-1-7998-2466-4.ch078","DOIUrl":"https://doi.org/10.4018/978-1-7998-2466-4.ch078","url":null,"abstract":"The threat of violent extremism in the Internet age has undoubtedly become one important focus of research, policy, and government bodies all over the world. Understandably, many resources have been invested into counter violent extremism efforts, such as the identification of possible radicalised individuals, and understanding the psychology behind violent extremism. These methods adopt a resistance stance and attempt to prevent violent extremism. However, this chapter argues that resilience is equally, if not more important given the unpredictable nature of violent extremism. The first part examines ‘systems' within a nation such as critical infrastructure and how concepts such as ‘resilient-by-design' can be incorporated to ensure continuity in times of attacks. The second part will explore ‘person' factors of crisis communication, cohesion, and social capital, and how these factors can afford a cohesive society that can overcome the cracks in social order and harmony often caused by violent extremism.","PeriodicalId":41462,"journal":{"name":"International Journal of Cyber Warfare and Terrorism","volume":"39 1 1","pages":""},"PeriodicalIF":0.5,"publicationDate":"2020-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"76064394","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Possibilities, Impediments, and Challenges for Network Security in Big Data 大数据环境下网络安全的可能性、障碍与挑战
IF 0.5 Q4 POLITICAL SCIENCE Pub Date : 2020-01-01 DOI: 10.4018/978-1-5225-0182-4.CH007
A. Dwivedi, O. Vyas
With the time, Big Data became the core competitive factor for enterprises to develop and grow. Some enterprises such as, information industrial enterprises will put more focus on the technology or product innovation for solving the challenges of big data, i.e., capture, storage, analysis and application. Enterprises like, manufacturing, banking and other enterprises will also benefit from analysis and manage big data, and be provided more opportunities for management innovation, strategy innovation or marketing innovation. High performance network capacity provides the backbone for high end computing systems. These high end computing systems plays vital role in Big Data. Persistent and Sophisticated targeted network attacks have challenged today's enterprise security teams. By exploring each aspect of high performance network capacity, the major objective of this book chapter is to present fundamental theoretical aspects in analytical way with deep focus on possibilities, impediments and challenges for network security in Big Data.
随着时代的发展,大数据已经成为企业发展壮大的核心竞争因素。一些企业,如信息产业企业,将更多地关注解决大数据挑战的技术或产品创新,即捕获、存储、分析和应用。制造业、银行业等企业也将从大数据的分析和管理中受益,为管理创新、战略创新或营销创新提供更多机会。高性能网络容量为高端计算系统提供了骨干。这些高端计算系统在大数据中发挥着至关重要的作用。持续且复杂的目标网络攻击对当今的企业安全团队构成了挑战。通过探索高性能网络容量的各个方面,本章的主要目标是以分析的方式呈现基本理论方面,并深入关注大数据下网络安全的可能性、障碍和挑战。
{"title":"Possibilities, Impediments, and Challenges for Network Security in Big Data","authors":"A. Dwivedi, O. Vyas","doi":"10.4018/978-1-5225-0182-4.CH007","DOIUrl":"https://doi.org/10.4018/978-1-5225-0182-4.CH007","url":null,"abstract":"With the time, Big Data became the core competitive factor for enterprises to develop and grow. Some enterprises such as, information industrial enterprises will put more focus on the technology or product innovation for solving the challenges of big data, i.e., capture, storage, analysis and application. Enterprises like, manufacturing, banking and other enterprises will also benefit from analysis and manage big data, and be provided more opportunities for management innovation, strategy innovation or marketing innovation. High performance network capacity provides the backbone for high end computing systems. These high end computing systems plays vital role in Big Data. Persistent and Sophisticated targeted network attacks have challenged today's enterprise security teams. By exploring each aspect of high performance network capacity, the major objective of this book chapter is to present fundamental theoretical aspects in analytical way with deep focus on possibilities, impediments and challenges for network security in Big Data.","PeriodicalId":41462,"journal":{"name":"International Journal of Cyber Warfare and Terrorism","volume":"12 1","pages":""},"PeriodicalIF":0.5,"publicationDate":"2020-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"79017930","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A Classification Framework for Data Mining Applications in Criminal Science and Investigations 数据挖掘在刑事科学与侦查中的分类框架
IF 0.5 Q4 POLITICAL SCIENCE Pub Date : 2020-01-01 DOI: 10.4018/978-1-5225-0463-4.CH002
Mahima Goyal, Vishal Bhatnagar, Arushi Jain
The importance of data analysis across different domains is growing day by day. This is evident in the fact that crucial information is retrieved through data analysis, using different available tools. The usage of data mining as a tool to uncover the nuggets of critical and crucial information is evident in modern day scenarios. This chapter presents a discussion on the usage of data mining tools and techniques in the area of criminal science and investigations. The application of data mining techniques in criminal science help in understanding the criminal psychology and consequently provides insight into effective measures to curb crime. This chapter provides a state-of-the-art report on the research conducted in this domain of interest by using a classification scheme and providing a road map on the usage of various data mining tools and techniques. Furthermore, the challenges and opportunities in the application of data mining techniques in criminal investigation is explored and detailed in this chapter.
跨领域数据分析的重要性与日俱增。关键信息是通过使用不同的可用工具进行数据分析来检索的,这一点很明显。在现代场景中,使用数据挖掘作为发现关键和关键信息的工具是很明显的。本章讨论了数据挖掘工具和技术在刑事科学和调查领域的应用。数据挖掘技术在刑事科学中的应用有助于理解犯罪心理,从而为遏制犯罪提供有效的措施。本章通过使用分类方案提供了在这个感兴趣的领域进行的研究的最新报告,并提供了使用各种数据挖掘工具和技术的路线图。此外,本章还探讨了数据挖掘技术在刑事侦查中的应用所面临的挑战和机遇。
{"title":"A Classification Framework for Data Mining Applications in Criminal Science and Investigations","authors":"Mahima Goyal, Vishal Bhatnagar, Arushi Jain","doi":"10.4018/978-1-5225-0463-4.CH002","DOIUrl":"https://doi.org/10.4018/978-1-5225-0463-4.CH002","url":null,"abstract":"The importance of data analysis across different domains is growing day by day. This is evident in the fact that crucial information is retrieved through data analysis, using different available tools. The usage of data mining as a tool to uncover the nuggets of critical and crucial information is evident in modern day scenarios. This chapter presents a discussion on the usage of data mining tools and techniques in the area of criminal science and investigations. The application of data mining techniques in criminal science help in understanding the criminal psychology and consequently provides insight into effective measures to curb crime. This chapter provides a state-of-the-art report on the research conducted in this domain of interest by using a classification scheme and providing a road map on the usage of various data mining tools and techniques. Furthermore, the challenges and opportunities in the application of data mining techniques in criminal investigation is explored and detailed in this chapter.","PeriodicalId":41462,"journal":{"name":"International Journal of Cyber Warfare and Terrorism","volume":"81 1","pages":""},"PeriodicalIF":0.5,"publicationDate":"2020-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"81213337","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
International Journal of Cyber Warfare and Terrorism
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1