Pub Date : 2020-01-01DOI: 10.4018/978-1-7998-2466-4.ch014
Jim Q. Chen
Deception is a strategy that has been widely used in cyber conflicts. How to detect deception in a timely manner is always a challenge, especially for a cyber commander who is at the point of making decisions with respect to the actual target to go after, the exact location of the target, the starting and ending time of a cyber operation, the type of cyber operation, the way of launching the cyber operation, and the amount of resources and support needed. It is absolutely important for a cyber commander to know for sure that he/she is not deceived by an adversary so he/she will be able to make right decisions. Varied solutions do exist. However, they are either too narrow or too broad. The solutions represented by signature technology are narrow in scope, so that they are not capable of dealing with the deception that they have not handled before. The solutions represented by behavioral analysis are relatively broad, so that they require extra time to re-adjust their focuses, incorporate contextual information, and combine heterogeneous data resources in order to get to what is exactly needed. In addition, the use of contexts in analysis is at random and not in a systematic way in most cases. Even when contexts are included in analysis, their relations with the relevant events are not well explored in all these solutions. To address these issues, this paper proposes a new strategic and systematic solution applying the Operational-Level Cybersecurity Strategy Formation Framework. This new solution employs purpose analysis, contextual analysis, and risk analysis. A case study is provided to test the effectiveness of this solution in detecting deception in a timely manner. The benefits and limitations of this solution are discussed. The capabilities of the Operational-Level Cybersecurity Strategy Formation Framework are evidently proved via this use case.
{"title":"Deception Detection in Cyber Conflicts","authors":"Jim Q. Chen","doi":"10.4018/978-1-7998-2466-4.ch014","DOIUrl":"https://doi.org/10.4018/978-1-7998-2466-4.ch014","url":null,"abstract":"Deception is a strategy that has been widely used in cyber conflicts. How to detect deception in a timely manner is always a challenge, especially for a cyber commander who is at the point of making decisions with respect to the actual target to go after, the exact location of the target, the starting and ending time of a cyber operation, the type of cyber operation, the way of launching the cyber operation, and the amount of resources and support needed. It is absolutely important for a cyber commander to know for sure that he/she is not deceived by an adversary so he/she will be able to make right decisions. Varied solutions do exist. However, they are either too narrow or too broad. The solutions represented by signature technology are narrow in scope, so that they are not capable of dealing with the deception that they have not handled before. The solutions represented by behavioral analysis are relatively broad, so that they require extra time to re-adjust their focuses, incorporate contextual information, and combine heterogeneous data resources in order to get to what is exactly needed. In addition, the use of contexts in analysis is at random and not in a systematic way in most cases. Even when contexts are included in analysis, their relations with the relevant events are not well explored in all these solutions. To address these issues, this paper proposes a new strategic and systematic solution applying the Operational-Level Cybersecurity Strategy Formation Framework. This new solution employs purpose analysis, contextual analysis, and risk analysis. A case study is provided to test the effectiveness of this solution in detecting deception in a timely manner. The benefits and limitations of this solution are discussed. The capabilities of the Operational-Level Cybersecurity Strategy Formation Framework are evidently proved via this use case.","PeriodicalId":41462,"journal":{"name":"International Journal of Cyber Warfare and Terrorism","volume":"75 1","pages":""},"PeriodicalIF":0.5,"publicationDate":"2020-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"76532751","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2020-01-01DOI: 10.4018/978-1-5225-3015-2.CH001
Madhvaraj M. Shetty, D. Manjaiah
Today constant increase in number of cyber threats apparently shows that current countermeasures are not enough to defend it. With the help of huge generated data, big data brings transformative potential for various sectors. While many are using it for better operations, some of them are noticing that it can also be used for security by providing broader view of vulnerabilities and risks. Meanwhile, deep learning is coming up as a key role by providing predictive analytics solutions. Deep learning and big data analytics are becoming two high-focus of data science. Threat intelligence becoming more and more effective. Since it is based on how much data collected about active threats, this reason has taken many independent vendors into partnerships. In this chapter, we explore big data and big data analytics with its benefits. And we provide a brief overview of deep analytics and finally we present collaborative threat Detection. We also investigate some aspects of standards and key functions of it. We conclude by presenting benefits and challenges of collaborative threat detection.
{"title":"Advanced Threat Detection Based on Big Data Technologies","authors":"Madhvaraj M. Shetty, D. Manjaiah","doi":"10.4018/978-1-5225-3015-2.CH001","DOIUrl":"https://doi.org/10.4018/978-1-5225-3015-2.CH001","url":null,"abstract":"Today constant increase in number of cyber threats apparently shows that current countermeasures are not enough to defend it. With the help of huge generated data, big data brings transformative potential for various sectors. While many are using it for better operations, some of them are noticing that it can also be used for security by providing broader view of vulnerabilities and risks. Meanwhile, deep learning is coming up as a key role by providing predictive analytics solutions. Deep learning and big data analytics are becoming two high-focus of data science. Threat intelligence becoming more and more effective. Since it is based on how much data collected about active threats, this reason has taken many independent vendors into partnerships. In this chapter, we explore big data and big data analytics with its benefits. And we provide a brief overview of deep analytics and finally we present collaborative threat Detection. We also investigate some aspects of standards and key functions of it. We conclude by presenting benefits and challenges of collaborative threat detection.","PeriodicalId":41462,"journal":{"name":"International Journal of Cyber Warfare and Terrorism","volume":"50 1","pages":""},"PeriodicalIF":0.5,"publicationDate":"2020-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"86458934","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2020-01-01DOI: 10.4018/978-1-7998-2466-4.ch064
Hakiimu Kawalya
Right from the onset, man woke up to a strenuous and hostile surrounding. He had to swiftly learn that just like the planet upon which his life hinged possessed enormous attractive endowments, so was it rich in hostility. Given its delicate nature humanity therefore had to adapt particular ways of living for survival and inevitably has since then evolved over thousands of years into the so called Homo-sapiens or modern man. Undoubtedly as modern man's continued trajectory to transformation gave birth to philosophy and science along with the icing that came with it, man finds himself entangled in a more complex and chaotic web with threats far greater than his imagination. One such a threat is biological weaponry a product of science that has potential to be used as a tool to orchestrate murder, terror and other sophisticated crimes. Owing to the vast amount of resources required to assemble these biological weapons it's fervently rare to find an ordinary individual utilizing them, instead governments and of recent some heavily financed terrorist groups can harness the catastrophic potential of these weapons to destroy both local and foreign adversaries. In a world stirred up with tensions, the powerful ones are amassing weapons of every caliber to rise above perceived enemies, yet rocket speed advancing biotechnology is making the manufacturing of biological weapons easier and consequently proliferation of biological war material is becoming inevitable. Therefore whereas the world health organization and United Nation are grappling with keeping biological science generated terror or crimes under check, it is high time the world started viewing them in light of the actual threat they pose today as tools exploitable in the notion of politicking.
{"title":"Bioterrorism, Bio Crimes and Politics","authors":"Hakiimu Kawalya","doi":"10.4018/978-1-7998-2466-4.ch064","DOIUrl":"https://doi.org/10.4018/978-1-7998-2466-4.ch064","url":null,"abstract":"Right from the onset, man woke up to a strenuous and hostile surrounding. He had to swiftly learn that just like the planet upon which his life hinged possessed enormous attractive endowments, so was it rich in hostility. Given its delicate nature humanity therefore had to adapt particular ways of living for survival and inevitably has since then evolved over thousands of years into the so called Homo-sapiens or modern man. Undoubtedly as modern man's continued trajectory to transformation gave birth to philosophy and science along with the icing that came with it, man finds himself entangled in a more complex and chaotic web with threats far greater than his imagination. One such a threat is biological weaponry a product of science that has potential to be used as a tool to orchestrate murder, terror and other sophisticated crimes. Owing to the vast amount of resources required to assemble these biological weapons it's fervently rare to find an ordinary individual utilizing them, instead governments and of recent some heavily financed terrorist groups can harness the catastrophic potential of these weapons to destroy both local and foreign adversaries. In a world stirred up with tensions, the powerful ones are amassing weapons of every caliber to rise above perceived enemies, yet rocket speed advancing biotechnology is making the manufacturing of biological weapons easier and consequently proliferation of biological war material is becoming inevitable. Therefore whereas the world health organization and United Nation are grappling with keeping biological science generated terror or crimes under check, it is high time the world started viewing them in light of the actual threat they pose today as tools exploitable in the notion of politicking.","PeriodicalId":41462,"journal":{"name":"International Journal of Cyber Warfare and Terrorism","volume":"65 1","pages":""},"PeriodicalIF":0.5,"publicationDate":"2020-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"81477810","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2020-01-01DOI: 10.4018/978-1-7998-2466-4.ch071
Kenneth J. Boyte
This comparative international case study of cyber warfare provides a context for considering the evolution of cyber technologies as elements of hybrid warfare capable of creating confusion, disrupting communications, and impacting physical infrastructure (such as power grids and satellite-based communications and weapons systems). Expanding an unpublished paper recognized by the ASIS Foundation in its 2012 international student writing competition concerning global security, which compared the cyberattacks against Estonia in 2007 and the United States in 2012, this study re-examines and updates the original data in a broader analysis that primarily includes the cyberattacks against Ukraine during the 2013-2015 conflict, but also considers other incidents on the timeline of digitization. The study shows how cyber warfare, first reported in the 1990s, has become an integral component of war today for both state and non-state actors who use zombies and robot armies to penetrate national boundaries and firewalls via satellites.
{"title":"A Comparative Analysis of the Cyberattacks Against Estonia, the United States, and Ukraine","authors":"Kenneth J. Boyte","doi":"10.4018/978-1-7998-2466-4.ch071","DOIUrl":"https://doi.org/10.4018/978-1-7998-2466-4.ch071","url":null,"abstract":"This comparative international case study of cyber warfare provides a context for considering the evolution of cyber technologies as elements of hybrid warfare capable of creating confusion, disrupting communications, and impacting physical infrastructure (such as power grids and satellite-based communications and weapons systems). Expanding an unpublished paper recognized by the ASIS Foundation in its 2012 international student writing competition concerning global security, which compared the cyberattacks against Estonia in 2007 and the United States in 2012, this study re-examines and updates the original data in a broader analysis that primarily includes the cyberattacks against Ukraine during the 2013-2015 conflict, but also considers other incidents on the timeline of digitization. The study shows how cyber warfare, first reported in the 1990s, has become an integral component of war today for both state and non-state actors who use zombies and robot armies to penetrate national boundaries and firewalls via satellites.","PeriodicalId":41462,"journal":{"name":"International Journal of Cyber Warfare and Terrorism","volume":"23 1","pages":""},"PeriodicalIF":0.5,"publicationDate":"2020-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"83208235","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2020-01-01DOI: 10.4018/978-1-7998-2466-4.ch087
D. DeFilippi, K. Michael
This chapter provides a single person case study of Mr. Dan DeFilippi who was arrested for credit card fraud by the US Secret Service in December 2004. The chapter delves into the psychology of a cybercriminal and the inner workings of credit card fraud. A background context of credit card fraud is presented to frame the primary interview. A section on the identification of issues and controversies with respect to carding is then given. Finally, recommendations are made by the convicted cybercriminal turned key informant on how to decrease the rising incidence of cybercrime. A major finding is that credit card fraud is all too easy to enact and merchants need to conduct better staff training to catch fraudsters early. With increases in global online purchasing, international carding networks are proliferating, making it difficult for law enforcement agencies to be “policing” unauthorized transactions. Big data may well have a role to play in analyzing behaviors that expose cybercrime.
{"title":"Credit Card Fraud","authors":"D. DeFilippi, K. Michael","doi":"10.4018/978-1-7998-2466-4.ch087","DOIUrl":"https://doi.org/10.4018/978-1-7998-2466-4.ch087","url":null,"abstract":"This chapter provides a single person case study of Mr. Dan DeFilippi who was arrested for credit card fraud by the US Secret Service in December 2004. The chapter delves into the psychology of a cybercriminal and the inner workings of credit card fraud. A background context of credit card fraud is presented to frame the primary interview. A section on the identification of issues and controversies with respect to carding is then given. Finally, recommendations are made by the convicted cybercriminal turned key informant on how to decrease the rising incidence of cybercrime. A major finding is that credit card fraud is all too easy to enact and merchants need to conduct better staff training to catch fraudsters early. With increases in global online purchasing, international carding networks are proliferating, making it difficult for law enforcement agencies to be “policing” unauthorized transactions. Big data may well have a role to play in analyzing behaviors that expose cybercrime.","PeriodicalId":41462,"journal":{"name":"International Journal of Cyber Warfare and Terrorism","volume":"481 1","pages":""},"PeriodicalIF":0.5,"publicationDate":"2020-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"76066754","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2020-01-01DOI: 10.4018/978-1-7998-2466-4.ch094
R. Das, Sovik Mukherjee
Terrorist activities in the post-Paris Peace Treaties have emerged as one of the most perilous agendas that are troubling the world economies and political figures in securing their nations and regions. Several socio-economic factors were evidenced to be the crucial factors in determining terrorist activities all around the world. The present article strives to identify the significance of several socio economic factors, namely, refugee population, access to good sanitation facilities, youth unemployment rate, percentage of education expenditure to GDP, percentage of military expenditure to GDP, per capita GDP and political stability in the panel of seven South Asian countries and China for the period 2002-2016. By applying both static and dynamic panel models, the article observes that all of the selected variables explain the terrorism index with expected signs. The article thus prescribes that the governments of the selected countries should concentrate on allocating their budgets on the improvements of sectors underlying the associated indicators.
{"title":"Determinants of Terrorism in South Asia","authors":"R. Das, Sovik Mukherjee","doi":"10.4018/978-1-7998-2466-4.ch094","DOIUrl":"https://doi.org/10.4018/978-1-7998-2466-4.ch094","url":null,"abstract":"Terrorist activities in the post-Paris Peace Treaties have emerged as one of the most perilous agendas that are troubling the world economies and political figures in securing their nations and regions. Several socio-economic factors were evidenced to be the crucial factors in determining terrorist activities all around the world. The present article strives to identify the significance of several socio economic factors, namely, refugee population, access to good sanitation facilities, youth unemployment rate, percentage of education expenditure to GDP, percentage of military expenditure to GDP, per capita GDP and political stability in the panel of seven South Asian countries and China for the period 2002-2016. By applying both static and dynamic panel models, the article observes that all of the selected variables explain the terrorism index with expected signs. The article thus prescribes that the governments of the selected countries should concentrate on allocating their budgets on the improvements of sectors underlying the associated indicators.","PeriodicalId":41462,"journal":{"name":"International Journal of Cyber Warfare and Terrorism","volume":"50 1","pages":""},"PeriodicalIF":0.5,"publicationDate":"2020-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"74735414","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2020-01-01DOI: 10.4018/ijcwt.2020010103
Miika Sartonen, A. Huhtinen, P. Simola, Kari T. Takamaa, Veli-Pekka Kivimäki
The development of communications technology has enabled the internet to become a new theatre of military operations. The influence aspects of military operations in information battlespace, however, are difficult both in theory and in practice, especially concerning international law. As a result, there is a variety of national and organizational solutions of how to divide tasks and responsibilities between authorities. This asymmetry generated by different approaches and rules of conduct provides opportunities for actors with more relaxed interpretation of international law, allowing them to use weapons of influence in order to pursue military goals. In this article the authors ask whether military influence operations, just like cyber operations, could be treated as acts of war. To help militaries address the complex issue of influence operations, a framework consisting of three categories is suggested.
{"title":"A Framework for the Weapons of Influence","authors":"Miika Sartonen, A. Huhtinen, P. Simola, Kari T. Takamaa, Veli-Pekka Kivimäki","doi":"10.4018/ijcwt.2020010103","DOIUrl":"https://doi.org/10.4018/ijcwt.2020010103","url":null,"abstract":"The development of communications technology has enabled the internet to become a new theatre of military operations. The influence aspects of military operations in information battlespace, however, are difficult both in theory and in practice, especially concerning international law. As a result, there is a variety of national and organizational solutions of how to divide tasks and responsibilities between authorities. This asymmetry generated by different approaches and rules of conduct provides opportunities for actors with more relaxed interpretation of international law, allowing them to use weapons of influence in order to pursue military goals. In this article the authors ask whether military influence operations, just like cyber operations, could be treated as acts of war. To help militaries address the complex issue of influence operations, a framework consisting of three categories is suggested.","PeriodicalId":41462,"journal":{"name":"International Journal of Cyber Warfare and Terrorism","volume":"5 1","pages":"34-49"},"PeriodicalIF":0.5,"publicationDate":"2020-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"75169272","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2020-01-01DOI: 10.4018/978-1-7998-2466-4.ch078
Jethro Tan, Yingmin Wang, Danielle Gomes
The threat of violent extremism in the Internet age has undoubtedly become one important focus of research, policy, and government bodies all over the world. Understandably, many resources have been invested into counter violent extremism efforts, such as the identification of possible radicalised individuals, and understanding the psychology behind violent extremism. These methods adopt a resistance stance and attempt to prevent violent extremism. However, this chapter argues that resilience is equally, if not more important given the unpredictable nature of violent extremism. The first part examines ‘systems' within a nation such as critical infrastructure and how concepts such as ‘resilient-by-design' can be incorporated to ensure continuity in times of attacks. The second part will explore ‘person' factors of crisis communication, cohesion, and social capital, and how these factors can afford a cohesive society that can overcome the cracks in social order and harmony often caused by violent extremism.
{"title":"Building National Resilience in the Digital Era of Violent Extremism","authors":"Jethro Tan, Yingmin Wang, Danielle Gomes","doi":"10.4018/978-1-7998-2466-4.ch078","DOIUrl":"https://doi.org/10.4018/978-1-7998-2466-4.ch078","url":null,"abstract":"The threat of violent extremism in the Internet age has undoubtedly become one important focus of research, policy, and government bodies all over the world. Understandably, many resources have been invested into counter violent extremism efforts, such as the identification of possible radicalised individuals, and understanding the psychology behind violent extremism. These methods adopt a resistance stance and attempt to prevent violent extremism. However, this chapter argues that resilience is equally, if not more important given the unpredictable nature of violent extremism. The first part examines ‘systems' within a nation such as critical infrastructure and how concepts such as ‘resilient-by-design' can be incorporated to ensure continuity in times of attacks. The second part will explore ‘person' factors of crisis communication, cohesion, and social capital, and how these factors can afford a cohesive society that can overcome the cracks in social order and harmony often caused by violent extremism.","PeriodicalId":41462,"journal":{"name":"International Journal of Cyber Warfare and Terrorism","volume":"39 1 1","pages":""},"PeriodicalIF":0.5,"publicationDate":"2020-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"76064394","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2020-01-01DOI: 10.4018/978-1-5225-0182-4.CH007
A. Dwivedi, O. Vyas
With the time, Big Data became the core competitive factor for enterprises to develop and grow. Some enterprises such as, information industrial enterprises will put more focus on the technology or product innovation for solving the challenges of big data, i.e., capture, storage, analysis and application. Enterprises like, manufacturing, banking and other enterprises will also benefit from analysis and manage big data, and be provided more opportunities for management innovation, strategy innovation or marketing innovation. High performance network capacity provides the backbone for high end computing systems. These high end computing systems plays vital role in Big Data. Persistent and Sophisticated targeted network attacks have challenged today's enterprise security teams. By exploring each aspect of high performance network capacity, the major objective of this book chapter is to present fundamental theoretical aspects in analytical way with deep focus on possibilities, impediments and challenges for network security in Big Data.
{"title":"Possibilities, Impediments, and Challenges for Network Security in Big Data","authors":"A. Dwivedi, O. Vyas","doi":"10.4018/978-1-5225-0182-4.CH007","DOIUrl":"https://doi.org/10.4018/978-1-5225-0182-4.CH007","url":null,"abstract":"With the time, Big Data became the core competitive factor for enterprises to develop and grow. Some enterprises such as, information industrial enterprises will put more focus on the technology or product innovation for solving the challenges of big data, i.e., capture, storage, analysis and application. Enterprises like, manufacturing, banking and other enterprises will also benefit from analysis and manage big data, and be provided more opportunities for management innovation, strategy innovation or marketing innovation. High performance network capacity provides the backbone for high end computing systems. These high end computing systems plays vital role in Big Data. Persistent and Sophisticated targeted network attacks have challenged today's enterprise security teams. By exploring each aspect of high performance network capacity, the major objective of this book chapter is to present fundamental theoretical aspects in analytical way with deep focus on possibilities, impediments and challenges for network security in Big Data.","PeriodicalId":41462,"journal":{"name":"International Journal of Cyber Warfare and Terrorism","volume":"12 1","pages":""},"PeriodicalIF":0.5,"publicationDate":"2020-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"79017930","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2020-01-01DOI: 10.4018/978-1-5225-0463-4.CH002
Mahima Goyal, Vishal Bhatnagar, Arushi Jain
The importance of data analysis across different domains is growing day by day. This is evident in the fact that crucial information is retrieved through data analysis, using different available tools. The usage of data mining as a tool to uncover the nuggets of critical and crucial information is evident in modern day scenarios. This chapter presents a discussion on the usage of data mining tools and techniques in the area of criminal science and investigations. The application of data mining techniques in criminal science help in understanding the criminal psychology and consequently provides insight into effective measures to curb crime. This chapter provides a state-of-the-art report on the research conducted in this domain of interest by using a classification scheme and providing a road map on the usage of various data mining tools and techniques. Furthermore, the challenges and opportunities in the application of data mining techniques in criminal investigation is explored and detailed in this chapter.
{"title":"A Classification Framework for Data Mining Applications in Criminal Science and Investigations","authors":"Mahima Goyal, Vishal Bhatnagar, Arushi Jain","doi":"10.4018/978-1-5225-0463-4.CH002","DOIUrl":"https://doi.org/10.4018/978-1-5225-0463-4.CH002","url":null,"abstract":"The importance of data analysis across different domains is growing day by day. This is evident in the fact that crucial information is retrieved through data analysis, using different available tools. The usage of data mining as a tool to uncover the nuggets of critical and crucial information is evident in modern day scenarios. This chapter presents a discussion on the usage of data mining tools and techniques in the area of criminal science and investigations. The application of data mining techniques in criminal science help in understanding the criminal psychology and consequently provides insight into effective measures to curb crime. This chapter provides a state-of-the-art report on the research conducted in this domain of interest by using a classification scheme and providing a road map on the usage of various data mining tools and techniques. Furthermore, the challenges and opportunities in the application of data mining techniques in criminal investigation is explored and detailed in this chapter.","PeriodicalId":41462,"journal":{"name":"International Journal of Cyber Warfare and Terrorism","volume":"81 1","pages":""},"PeriodicalIF":0.5,"publicationDate":"2020-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"81213337","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}