首页 > 最新文献

International Journal of Cyber Warfare and Terrorism最新文献

英文 中文
Cyber Hygiene in Health Care Data Breaches 医疗保健数据泄露中的网络卫生
IF 0.5 Q4 POLITICAL SCIENCE Pub Date : 2020-01-01 DOI: 10.4018/IJPHIM.2018010103
Jomin George, A. Emmanuel
This article describes how data breaches have become the norm, as highlighted by the significant number of breaches experienced by healthcare providers. These breaches have led to the scrutiny of cybersecurity technologies, protocols and strategies applied in the health care sector. As such, this article will explore the cyber security available in health care that is used and can be used to deter data breaches. Health care sectors are currently looking on different technologies and strategies to prevent and secure the patient information from data hackers. But some of these techniques have been effective, and some have not.
本文描述了数据泄露如何成为常态,正如医疗保健提供商所经历的大量数据泄露所强调的那样。这些漏洞导致了对医疗保健行业应用的网络安全技术、协议和策略的审查。因此,本文将探讨医疗保健中可用的网络安全,这些安全已被用于阻止数据泄露。卫生保健部门目前正在寻找不同的技术和战略,以防止和保护患者信息免受数据黑客的攻击。但是这些技巧有些是有效的,有些则没有。
{"title":"Cyber Hygiene in Health Care Data Breaches","authors":"Jomin George, A. Emmanuel","doi":"10.4018/IJPHIM.2018010103","DOIUrl":"https://doi.org/10.4018/IJPHIM.2018010103","url":null,"abstract":"This article describes how data breaches have become the norm, as highlighted by the significant number of breaches experienced by healthcare providers. These breaches have led to the scrutiny of cybersecurity technologies, protocols and strategies applied in the health care sector. As such, this article will explore the cyber security available in health care that is used and can be used to deter data breaches. Health care sectors are currently looking on different technologies and strategies to prevent and secure the patient information from data hackers. But some of these techniques have been effective, and some have not.","PeriodicalId":41462,"journal":{"name":"International Journal of Cyber Warfare and Terrorism","volume":"28 1","pages":""},"PeriodicalIF":0.5,"publicationDate":"2020-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"75274424","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
What We Know and What Else We Need to Do to Address the Problem of Violent Extremism Online 我们知道什么,我们还需要做些什么来解决网络暴力极端主义的问题
IF 0.5 Q4 POLITICAL SCIENCE Pub Date : 2020-01-01 DOI: 10.4018/978-1-7998-2466-4.ch095
Majeed Khader
This concluding chapter is an attempt made to summarise and analyse the chapters provided by the various authors in this book. The analysis used in this chapter is based on a public health prevention model created by Quick, Quick, Nelson, and Hurrell (1997). The value of this approach is the systemic prevention angle that it undertakes to examine problems and solutions.
这最后一章试图总结和分析本书中不同作者提供的章节。本章中使用的分析是基于Quick, Quick, Nelson和Hurrell(1997)创建的公共卫生预防模型。这种方法的价值在于它从系统预防的角度审视问题和解决办法。
{"title":"What We Know and What Else We Need to Do to Address the Problem of Violent Extremism Online","authors":"Majeed Khader","doi":"10.4018/978-1-7998-2466-4.ch095","DOIUrl":"https://doi.org/10.4018/978-1-7998-2466-4.ch095","url":null,"abstract":"This concluding chapter is an attempt made to summarise and analyse the chapters provided by the various authors in this book. The analysis used in this chapter is based on a public health prevention model created by Quick, Quick, Nelson, and Hurrell (1997). The value of this approach is the systemic prevention angle that it undertakes to examine problems and solutions.","PeriodicalId":41462,"journal":{"name":"International Journal of Cyber Warfare and Terrorism","volume":"77 1","pages":""},"PeriodicalIF":0.5,"publicationDate":"2020-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"77523073","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Distributed System Implementation Based on “Ants Feeding Birds” Algorithm 基于“蚂蚁喂鸟”算法的分布式系统实现
IF 0.5 Q4 POLITICAL SCIENCE Pub Date : 2020-01-01 DOI: 10.4018/978-1-7998-2466-4.ch047
Preeti Mulay, Krishna Patel, Hector Gómez Gauchía
Evolving technologies are intricately woven into the fabric of social and institutional systems. With the invent of “Internet of Everything (IoE)” concept it is realistic now to employ animals and or humans to transmit details electronically. IoE concepts with sensor technology can prove wonders in any domain for that matter starting from eFarming, eHealth, eCare and what not. Humans can transform electronics by using various eConnected gadgets also motivated due to or based on “Nature Inspired Algorithms”. The confluence of IT, psychology with non-IT systems will be part of new generation's life. Such collaborative concept can be implemented practically with the help of “Cloud-to-Dew-Computing” based technologies. To include so many concepts together, it is essential to concentrate also on Cyber Security and Risk associated with such conceptual implementation. Dew-Computing at root levels will take care of Cyber Security effectually. Dew-Computing being backend support of Distributed System, can process multiple entities resourcefully. “Animal Data Interchange Standards” are very well considered innovative business opportunity these days and for years to come. These standards have started their work focusing on the Dairy related animal standard. Every dairy animal should enjoy life to remain healthy and more productive. Incremental Learning about Animal Life Data and Animal Identification, behavior, seasonal-changes, health etc. can be easily achieved with IoE.
不断发展的技术错综复杂地交织在社会和制度系统的结构中。随着“万物互联(IoE)”概念的发明,现在使用动物或人类以电子方式传输细节是现实的。具有传感器技术的物联网概念可以在任何领域证明奇迹,从农业、电子健康、医疗保健等领域开始。人类可以通过使用各种由“自然启发算法”驱动或基于“自然启发算法”的互联设备来改造电子产品。IT、心理学与非IT系统的融合将成为新一代生活的一部分。这种协作概念可以在基于“云到露计算”的技术的帮助下实际实现。为了将如此多的概念整合在一起,必须将重点放在与这些概念实施相关的网络安全和风险上。露水计算在根级将有效地照顾网络安全。露水计算作为分布式系统的后端支持,可以资源化地处理多个实体。“动物数据交换标准”被认为是当今乃至未来几年的创新商机。这些标准已经开始了他们的工作,重点是乳制品相关动物标准。每只奶牛都应该享受生活,保持健康,提高生产力。通过IoE可以轻松实现动物生命数据和动物识别、行为、季节变化、健康等方面的增量学习。
{"title":"Distributed System Implementation Based on “Ants Feeding Birds” Algorithm","authors":"Preeti Mulay, Krishna Patel, Hector Gómez Gauchía","doi":"10.4018/978-1-7998-2466-4.ch047","DOIUrl":"https://doi.org/10.4018/978-1-7998-2466-4.ch047","url":null,"abstract":"Evolving technologies are intricately woven into the fabric of social and institutional systems. With the invent of “Internet of Everything (IoE)” concept it is realistic now to employ animals and or humans to transmit details electronically. IoE concepts with sensor technology can prove wonders in any domain for that matter starting from eFarming, eHealth, eCare and what not. Humans can transform electronics by using various eConnected gadgets also motivated due to or based on “Nature Inspired Algorithms”. The confluence of IT, psychology with non-IT systems will be part of new generation's life. Such collaborative concept can be implemented practically with the help of “Cloud-to-Dew-Computing” based technologies. To include so many concepts together, it is essential to concentrate also on Cyber Security and Risk associated with such conceptual implementation. Dew-Computing at root levels will take care of Cyber Security effectually. Dew-Computing being backend support of Distributed System, can process multiple entities resourcefully. “Animal Data Interchange Standards” are very well considered innovative business opportunity these days and for years to come. These standards have started their work focusing on the Dairy related animal standard. Every dairy animal should enjoy life to remain healthy and more productive. Incremental Learning about Animal Life Data and Animal Identification, behavior, seasonal-changes, health etc. can be easily achieved with IoE.","PeriodicalId":41462,"journal":{"name":"International Journal of Cyber Warfare and Terrorism","volume":"27 1","pages":""},"PeriodicalIF":0.5,"publicationDate":"2020-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"83672253","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A Review on Cyberattacks 网络攻击研究综述
IF 0.5 Q4 POLITICAL SCIENCE Pub Date : 2020-01-01 DOI: 10.4018/978-1-5225-7189-6.CH008
Gaganjot Kaur Saini, M. Halgamuge, Pallavi Sharma, James Stephen Purkis
Research questions remain to be answered in terms of discovering how security could be provided for different resources, such as data, devices, and networks. Most organizations compromise their security measures due to high budgets despite its primary importance in today's highly dependent cyber world and as such there are always some loopholes in security systems, which cybercriminals take advantage of. In this chapter, the authors have completed an analysis of data obtained from 31 peer-reviewed scientific research studies (2009-2017) describing cybersecurity issues and solutions. The results demonstrated that the majority of applications in this area are from the government and the public sector (17%) whereas transportation and other areas have a minor percentage (6%). This study determined that the government sector is the main application area in cybersecurity and is more susceptible to cyber-attacks whereas the wireless sensor network and healthcare areas are less exposed to attack.
在发现如何为不同的资源(如数据、设备和网络)提供安全性方面,研究问题仍有待回答。尽管在当今高度依赖的网络世界中,安全措施至关重要,但大多数组织由于高预算而损害了安全措施,因此安全系统中总是存在一些漏洞,网络罪犯可以利用这些漏洞。在本章中,作者完成了对31项同行评议的科学研究(2009-2017)数据的分析,这些研究描述了网络安全问题和解决方案。结果表明,该领域的大部分应用来自政府和公共部门(17%),而交通和其他领域的应用占很小的比例(6%)。这项研究确定,政府部门是网络安全的主要应用领域,更容易受到网络攻击,而无线传感器网络和医疗保健领域受到攻击的可能性较小。
{"title":"A Review on Cyberattacks","authors":"Gaganjot Kaur Saini, M. Halgamuge, Pallavi Sharma, James Stephen Purkis","doi":"10.4018/978-1-5225-7189-6.CH008","DOIUrl":"https://doi.org/10.4018/978-1-5225-7189-6.CH008","url":null,"abstract":"Research questions remain to be answered in terms of discovering how security could be provided for different resources, such as data, devices, and networks. Most organizations compromise their security measures due to high budgets despite its primary importance in today's highly dependent cyber world and as such there are always some loopholes in security systems, which cybercriminals take advantage of. In this chapter, the authors have completed an analysis of data obtained from 31 peer-reviewed scientific research studies (2009-2017) describing cybersecurity issues and solutions. The results demonstrated that the majority of applications in this area are from the government and the public sector (17%) whereas transportation and other areas have a minor percentage (6%). This study determined that the government sector is the main application area in cybersecurity and is more susceptible to cyber-attacks whereas the wireless sensor network and healthcare areas are less exposed to attack.","PeriodicalId":41462,"journal":{"name":"International Journal of Cyber Warfare and Terrorism","volume":"28 1","pages":""},"PeriodicalIF":0.5,"publicationDate":"2020-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"73477807","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
The Communicating and Marketing of Radicalism 激进主义的传播与营销
IF 0.5 Q4 POLITICAL SCIENCE Pub Date : 2020-01-01 DOI: 10.4018/978-1-7998-2466-4.ch039
D. McElreath, D. Doss, Leisa S. McElreath, A. Lindsley, Glenna Lusk, J. Skinner, Ashley Wellman
This article considers social media as a radicalization venue within the context of terrorism. The 2016 extremist/terrorist attack in Orlando, Florida showed the potential of an ISIS type extremist organization to leverage social media toward a lethal outcome within American society. While the ISIS organization originated overseas in a culture of which mainstream American society is unfamiliar, it is in many ways remarkable the level of success they quickly achieved connecting globally. Their efforts reflect the potential of social media to market a message of radicalism worldwide toward generating murderous converts who are willing to travel to join the fight or attack at home. Given these notions, this article considers the use of social media as an extremist cyber-recruitment tool.
本文认为社交媒体是恐怖主义背景下的激进化场所。2016年在佛罗里达州奥兰多发生的极端主义/恐怖袭击表明,ISIS类型的极端组织有可能利用社交媒体在美国社会造成致命后果。虽然ISIS组织起源于美国主流社会所不熟悉的海外文化,但从许多方面来看,他们在全球范围内迅速取得的成功令人瞩目。他们的努力反映出,社交媒体有可能在全球范围内传播激进主义的信息,从而产生愿意前往国内参加战斗或袭击的杀人皈依者。鉴于这些观点,本文认为使用社交媒体作为极端分子的网络招募工具。
{"title":"The Communicating and Marketing of Radicalism","authors":"D. McElreath, D. Doss, Leisa S. McElreath, A. Lindsley, Glenna Lusk, J. Skinner, Ashley Wellman","doi":"10.4018/978-1-7998-2466-4.ch039","DOIUrl":"https://doi.org/10.4018/978-1-7998-2466-4.ch039","url":null,"abstract":"This article considers social media as a radicalization venue within the context of terrorism. The 2016 extremist/terrorist attack in Orlando, Florida showed the potential of an ISIS type extremist organization to leverage social media toward a lethal outcome within American society. While the ISIS organization originated overseas in a culture of which mainstream American society is unfamiliar, it is in many ways remarkable the level of success they quickly achieved connecting globally. Their efforts reflect the potential of social media to market a message of radicalism worldwide toward generating murderous converts who are willing to travel to join the fight or attack at home. Given these notions, this article considers the use of social media as an extremist cyber-recruitment tool.","PeriodicalId":41462,"journal":{"name":"International Journal of Cyber Warfare and Terrorism","volume":"73 1","pages":""},"PeriodicalIF":0.5,"publicationDate":"2020-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"80578024","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Advances in Digital Forensics Frameworks and Tools 数字取证框架和工具的进展
IF 0.5 Q4 POLITICAL SCIENCE Pub Date : 2020-01-01 DOI: 10.4018/978-1-7998-2466-4.ch010
M. Abulaish, Nur Al Hasan Haldar
Digital forensics science is a well-known initiative to unearth computer-assisted crimes. The thriving criminal activities using digital media have changed the typical definition of a traditional crime. Meanwhile, the means and targets of criminal activities have been transformed in a broader context due to the diverse nature of offenses associated with the multiple crime categories, affecting the way of investigations as well. In order to withstand the difficulties caused due to the crime complexity, forensics investigation frameworks are being tuned to adjust with the nature and earnestness of the felonies being committed. This article presents an in-depth comparative survey of fourteen popular and most cited digital forensics process models and various forensics tools associated with different phases of these models. The relationships among these forensics process models and their evolutions are analyzed and a graph-theoretic approach is presented to rank the existing process models to facilitate investigators in selecting an appropriate model for their investigation tasks.
数字取证科学是一项众所周知的发现计算机辅助犯罪的倡议。蓬勃发展的数字媒体犯罪活动改变了传统犯罪的典型定义。与此同时,由于与多种犯罪类别有关的犯罪性质不同,犯罪活动的手段和目标在更广泛的范围内发生了变化,也影响了调查的方式。为了克服犯罪复杂性带来的困难,正在调整法医学调查框架,根据犯罪的性质和严重性进行调整。本文对14个流行的和被引用最多的数字取证过程模型以及与这些模型的不同阶段相关的各种取证工具进行了深入的比较调查。分析了这些取证过程模型之间的关系及其演变,并提出了一种图论方法对现有的取证过程模型进行排序,以方便调查人员为其调查任务选择合适的模型。
{"title":"Advances in Digital Forensics Frameworks and Tools","authors":"M. Abulaish, Nur Al Hasan Haldar","doi":"10.4018/978-1-7998-2466-4.ch010","DOIUrl":"https://doi.org/10.4018/978-1-7998-2466-4.ch010","url":null,"abstract":"Digital forensics science is a well-known initiative to unearth computer-assisted crimes. The thriving criminal activities using digital media have changed the typical definition of a traditional crime. Meanwhile, the means and targets of criminal activities have been transformed in a broader context due to the diverse nature of offenses associated with the multiple crime categories, affecting the way of investigations as well. In order to withstand the difficulties caused due to the crime complexity, forensics investigation frameworks are being tuned to adjust with the nature and earnestness of the felonies being committed. This article presents an in-depth comparative survey of fourteen popular and most cited digital forensics process models and various forensics tools associated with different phases of these models. The relationships among these forensics process models and their evolutions are analyzed and a graph-theoretic approach is presented to rank the existing process models to facilitate investigators in selecting an appropriate model for their investigation tasks.","PeriodicalId":41462,"journal":{"name":"International Journal of Cyber Warfare and Terrorism","volume":"39 1","pages":""},"PeriodicalIF":0.5,"publicationDate":"2020-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"88492024","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
The Next Generation of Scientific-Based Risk Metrics 新一代基于科学的风险度量
IF 0.5 Q4 POLITICAL SCIENCE Pub Date : 2020-01-01 DOI: 10.4018/978-1-7998-2466-4.ch099
Lanier A Watkins, J. Hurley
One of the major challenges to an organization achieving a certain level of preparedness to “effectively” combat existing and future cyber threats and vulnerabilities is its ability to ensure the security and reliability of its networks. Most of the existing efforts are quantitative, by nature, and limited solely to the networks and systems of the organization. It would be unfair to not acknowledge that for sure some progress has been achieved in the way that organizations, as a whole, are now positioning themselves to address the threats (GAO 2012). Unfortunately, so have the skill sets and resource levels improved for attackers--they are increasingly getting better at achieving the unwanted access to organizations' information assets. In large part the authors believe that some of this is due to the failure by methods to assess the overall vulnerability of the networks. In addition, significant levels of threats and vulnerabilities beyond organizations' networks and systems are not being given the level of attention that is warranted. In this paper, the authors propose a more comprehensive approach that enables an organization to more realistically assess its “cyber maturity” level in hope of better positioning itself to address existing and new cyber threats. The authors also propose the need to better understand another missing critical piece to the puzzle--the reliability and security of networks in terms of scientific risk-based metrics (e.g., the severity of individual vulnerabilities and overall vulnerability of the network). Their risk-based metrics focus on the probability of compromise due to a given vulnerability; employee non-adherence to company cyber-based policies; insider threats. They are: (1) built on the CVSS Base Score which is modified by developing weights derived from the Analytic Hierarchy Process (AHP) to make the overall score more representative of the impact the vulnerability has on the global infrastructure, and (2) rooted in repeatable quantitative characteristics (i.e., vulnerabilities) such as the sum of the probabilities that devices will be compromised via client-side or server-side attacks stemming from software or hardware vulnerabilities. The authors will demonstrate the feasibility of their method by applying their approach to a case study and highlighting the benefits and impediments which result.
组织要实现一定程度的准备以“有效”应对现有和未来的网络威胁和漏洞,主要挑战之一是确保其网络的安全性和可靠性的能力。大多数现有的工作本质上是定量的,并且仅仅局限于组织的网络和系统。如果不承认组织作为一个整体在应对威胁方面确实取得了一些进展(GAO 2012),那将是不公平的。不幸的是,攻击者的技能集和资源水平也得到了提高——他们越来越擅长获得对组织信息资产的不必要访问。在很大程度上,作者认为,部分原因是由于评估网络整体脆弱性的方法失败。此外,组织网络和系统之外的重大威胁和漏洞没有得到应有的重视。在本文中,作者提出了一种更全面的方法,使组织能够更现实地评估其“网络成熟度”水平,以期更好地定位自己以应对现有和新的网络威胁。作者还提出,需要更好地理解拼图中另一个缺失的关键部分——基于科学风险指标的网络可靠性和安全性(例如,单个漏洞的严重程度和网络的整体漏洞)。他们基于风险的度量标准侧重于由于给定漏洞而导致的妥协概率;员工不遵守公司的网络政策;内部威胁。它们是:(1)建立在由开发从分析层次过程(AHP)派生的权重修改的CVSS基础分数上,使总体得分更能代表漏洞对全球基础设施的影响,并且(2)根植于可重复的定量特征(即漏洞),例如设备将通过源于软件或硬件漏洞的客户端或服务器端攻击受到损害的概率总和。作者将通过将他们的方法应用于案例研究并强调其结果的好处和障碍来证明其方法的可行性。
{"title":"The Next Generation of Scientific-Based Risk Metrics","authors":"Lanier A Watkins, J. Hurley","doi":"10.4018/978-1-7998-2466-4.ch099","DOIUrl":"https://doi.org/10.4018/978-1-7998-2466-4.ch099","url":null,"abstract":"One of the major challenges to an organization achieving a certain level of preparedness to “effectively” combat existing and future cyber threats and vulnerabilities is its ability to ensure the security and reliability of its networks. Most of the existing efforts are quantitative, by nature, and limited solely to the networks and systems of the organization. It would be unfair to not acknowledge that for sure some progress has been achieved in the way that organizations, as a whole, are now positioning themselves to address the threats (GAO 2012). Unfortunately, so have the skill sets and resource levels improved for attackers--they are increasingly getting better at achieving the unwanted access to organizations' information assets. In large part the authors believe that some of this is due to the failure by methods to assess the overall vulnerability of the networks. In addition, significant levels of threats and vulnerabilities beyond organizations' networks and systems are not being given the level of attention that is warranted. In this paper, the authors propose a more comprehensive approach that enables an organization to more realistically assess its “cyber maturity” level in hope of better positioning itself to address existing and new cyber threats. The authors also propose the need to better understand another missing critical piece to the puzzle--the reliability and security of networks in terms of scientific risk-based metrics (e.g., the severity of individual vulnerabilities and overall vulnerability of the network). Their risk-based metrics focus on the probability of compromise due to a given vulnerability; employee non-adherence to company cyber-based policies; insider threats. They are: (1) built on the CVSS Base Score which is modified by developing weights derived from the Analytic Hierarchy Process (AHP) to make the overall score more representative of the impact the vulnerability has on the global infrastructure, and (2) rooted in repeatable quantitative characteristics (i.e., vulnerabilities) such as the sum of the probabilities that devices will be compromised via client-side or server-side attacks stemming from software or hardware vulnerabilities. The authors will demonstrate the feasibility of their method by applying their approach to a case study and highlighting the benefits and impediments which result.","PeriodicalId":41462,"journal":{"name":"International Journal of Cyber Warfare and Terrorism","volume":"58 1","pages":""},"PeriodicalIF":0.5,"publicationDate":"2020-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"83944522","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Slacktivism, Supervision, and #Selfies 懒汉行动主义、监督和#自拍
IF 0.5 Q4 POLITICAL SCIENCE Pub Date : 2020-01-01 DOI: 10.4018/978-1-7998-2466-4.ch043
Elisabeth H. Buck
Since its original development for use in literary studies by German scholar Hans Robert Jauss in the late 1960s, reception theory has been successfully applied to fields as diverse as media studies, communications, and art history; its efficacy within rhetoric and composition pedagogy, however, has been less fully explored. I argue in this essay that reception theory can provide a meaningful way to understand and discuss social media composing practices, especially as a lens for thinking about why and how we participate in social media as both readers and writers in the 21st century. This essay thus examines the three “aesthetic experiences” of Jauss's reception theory—catharsis, aisthesis, and poiesis— which describe the ways that audiences derive satisfaction from engaging with texts. I apply each aesthetic concept to a corresponding mode of social media composition: practices of social media-based activism, regulation of content on social media, as well as the act of creating “selfies.” These applications stand as potential entry points for classroom discussion about how social media draws its users into producing a response. The “aesthetic experiences” represent ways to look at composing practices on social media cohesively, but they also give language to how individual social media users gain enjoyment from participating with these sites. I offer specific strategies for incorporating reception theory in a classroom context, and conclude that this approach helps students think more specifically about the intricacies and limitations of audience(s)—important recognitions for anyone who produces content in social media environments.
自20世纪60年代末德国学者汉斯·罗伯特·约斯(Hans Robert Jauss)最初将其用于文学研究以来,接受理论已成功地应用于媒体研究、传播学和艺术史等不同领域;然而,它在修辞学和作文教育学中的作用尚未得到充分的探索。我在这篇文章中认为,接受理论可以为理解和讨论社交媒体创作实践提供一种有意义的方式,特别是作为思考21世纪我们作为读者和作者为什么以及如何参与社交媒体的一个镜头。因此,本文考察了约斯接受理论中的三种“审美体验”——宣泄、审美和评论——它们描述了观众从与文本的接触中获得满足的方式。我将每个美学概念应用于相应的社交媒体构成模式:基于社交媒体的行动主义实践,社交媒体上的内容监管,以及创造“自拍”的行为。这些应用程序可以作为课堂讨论的潜在切入点,讨论社交媒体如何吸引用户做出回应。“审美体验”代表了一种看待社交媒体上的创作实践的方式,但它们也为个人社交媒体用户如何从参与这些网站中获得乐趣提供了语言。我提供了将接受理论纳入课堂环境的具体策略,并得出结论,这种方法有助于学生更具体地思考受众的复杂性和局限性——这对任何在社交媒体环境中制作内容的人来说都是重要的认识。
{"title":"Slacktivism, Supervision, and #Selfies","authors":"Elisabeth H. Buck","doi":"10.4018/978-1-7998-2466-4.ch043","DOIUrl":"https://doi.org/10.4018/978-1-7998-2466-4.ch043","url":null,"abstract":"Since its original development for use in literary studies by German scholar Hans Robert Jauss in the late 1960s, reception theory has been successfully applied to fields as diverse as media studies, communications, and art history; its efficacy within rhetoric and composition pedagogy, however, has been less fully explored. I argue in this essay that reception theory can provide a meaningful way to understand and discuss social media composing practices, especially as a lens for thinking about why and how we participate in social media as both readers and writers in the 21st century. This essay thus examines the three “aesthetic experiences” of Jauss's reception theory—catharsis, aisthesis, and poiesis— which describe the ways that audiences derive satisfaction from engaging with texts. I apply each aesthetic concept to a corresponding mode of social media composition: practices of social media-based activism, regulation of content on social media, as well as the act of creating “selfies.” These applications stand as potential entry points for classroom discussion about how social media draws its users into producing a response. The “aesthetic experiences” represent ways to look at composing practices on social media cohesively, but they also give language to how individual social media users gain enjoyment from participating with these sites. I offer specific strategies for incorporating reception theory in a classroom context, and conclude that this approach helps students think more specifically about the intricacies and limitations of audience(s)—important recognitions for anyone who produces content in social media environments.","PeriodicalId":41462,"journal":{"name":"International Journal of Cyber Warfare and Terrorism","volume":"50 1","pages":""},"PeriodicalIF":0.5,"publicationDate":"2020-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"89634663","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Terrorism Effects on Businesses Post 9/11 9/11后恐怖主义对企业的影响
IF 0.5 Q4 POLITICAL SCIENCE Pub Date : 2020-01-01 DOI: 10.4018/ijcwt.2020010102
Mariah Talia Solis, Jessica Pearson, Deirdre P. Dixon, Abigail Blanco, Raymond Papp
Discussions regarding terrorism are more relevant today than ever before. Terror threats can take on many forms from physical violence against military forces, individual companies, and ordinary citizens, to actions against infrastructure, to cyber terrorism. These forms of terror and others, in a number of ways, threaten the physical and financial safety of people around the world. The purpose of this qualitative research study is to evaluate the effects of terrorism—particularly the attacks on September 11, 2001—on U.S. enterprises in the period since the attacks. Utilizing interviews with representatives from various industries, the authors found that employees with long company histories believe their companies have implemented changes regarding their security measures as a safeguard against possible future terrorist attacks. The research findings revealed that while businesses have made changes in their use of technology to change their (1) cybersecurity, (2) training methods, and (3) hiring processes, there remains a gap in understanding the efficacy and efficiency of these changes. Though the September 11 attacks raised the concerns regarding terrorism overall and formed the genesis for thinking about the effects of terrorism, the authors found that interviewees had limited knowledge of how terrorist activities truly affected their business, and identified a strong need to empirically study the technology changes implemented in the past two decades as a response to terrorism, and a need for a thorough sharing of knowledge within the cybersecurity industry to other businesses.
今天,有关恐怖主义的讨论比以往任何时候都更有意义。恐怖威胁可以采取多种形式,从针对军队、个别公司和普通公民的肢体暴力,到针对基础设施的行动,再到网络恐怖主义。这些形式和其他形式的恐怖活动以多种方式威胁着世界各地人民的人身和经济安全。本定性研究的目的是评估恐怖主义——特别是2001年9月11日的袭击——在袭击发生后对美国企业的影响。通过对各行各业代表的采访,作者发现,拥有悠久公司历史的员工认为,他们的公司已经在安全措施方面实施了改革,以防范未来可能发生的恐怖袭击。研究结果显示,虽然企业在使用技术方面做出了改变,以改变其(1)网络安全、(2)培训方法和(3)招聘流程,但在理解这些变化的功效和效率方面仍存在差距。尽管9·11恐怖袭击引起了人们对恐怖主义的关注,并形成了思考恐怖主义影响的起源,但作者发现,受访者对恐怖主义活动如何真正影响其业务的了解有限,并且强烈需要对过去二十年来为应对恐怖主义而实施的技术变革进行实证研究。网络安全行业内部的知识需要与其他企业全面共享。
{"title":"Terrorism Effects on Businesses Post 9/11","authors":"Mariah Talia Solis, Jessica Pearson, Deirdre P. Dixon, Abigail Blanco, Raymond Papp","doi":"10.4018/ijcwt.2020010102","DOIUrl":"https://doi.org/10.4018/ijcwt.2020010102","url":null,"abstract":"Discussions regarding terrorism are more relevant today than ever before. Terror threats can take on many forms from physical violence against military forces, individual companies, and ordinary citizens, to actions against infrastructure, to cyber terrorism. These forms of terror and others, in a number of ways, threaten the physical and financial safety of people around the world. The purpose of this qualitative research study is to evaluate the effects of terrorism—particularly the attacks on September 11, 2001—on U.S. enterprises in the period since the attacks. Utilizing interviews with representatives from various industries, the authors found that employees with long company histories believe their companies have implemented changes regarding their security measures as a safeguard against possible future terrorist attacks. The research findings revealed that while businesses have made changes in their use of technology to change their (1) cybersecurity, (2) training methods, and (3) hiring processes, there remains a gap in understanding the efficacy and efficiency of these changes. Though the September 11 attacks raised the concerns regarding terrorism overall and formed the genesis for thinking about the effects of terrorism, the authors found that interviewees had limited knowledge of how terrorist activities truly affected their business, and identified a strong need to empirically study the technology changes implemented in the past two decades as a response to terrorism, and a need for a thorough sharing of knowledge within the cybersecurity industry to other businesses.","PeriodicalId":41462,"journal":{"name":"International Journal of Cyber Warfare and Terrorism","volume":"120 1","pages":"15-33"},"PeriodicalIF":0.5,"publicationDate":"2020-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"87725227","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Jihadist Propaganda on Social Media 圣战分子在社交媒体上的宣传
IF 0.5 Q4 POLITICAL SCIENCE Pub Date : 2020-01-01 DOI: 10.4018/978-1-7998-2466-4.ch085
Ahmed Al-Rawi, J. Groshek
This article focuses on ISIS followers on Twitter in an effort to understand the nature of their social media propaganda. The research study provides unique insight into one of the largest data sets that investigates ISIS propaganda efforts on Twitter by examining over 50 million tweets posted by more than 8 million unique users that referenced the keywords “ISIS” or “ISIL.” The authors then searched this corpus for eight keywords in Arabic that included terms of support for ISIS and the names of different Al-Qaeda leaders. A mixed research method was used, and the findings indicate that ISIS activity on Twitter witnessed a gradual decline, but the group was still able to post different types of tweets to maintain its online presence. Also, the feud between ISIS and Al-Qaeda was intense, ongoing, and prevalent in online interactions among ISIS followers. The study provides an understanding of using big data to better grasp the propaganda activities of terrorist groups.
本文主要关注Twitter上的ISIS追随者,试图了解他们在社交媒体上宣传的本质。这项研究对800多万独立用户发布的5000多万条推文进行了调查,这些推文引用了关键词“ISIS”或“ISIL”,为调查ISIS在推特上的宣传工作提供了独特的见解。然后,作者在这个语料库中搜索了8个阿拉伯语关键词,其中包括支持ISIS的术语和不同基地组织领导人的名字。使用了混合研究方法,结果表明ISIS在Twitter上的活动逐渐减少,但该组织仍然能够发布不同类型的推文来维持其在线存在。此外,ISIS和基地组织之间的不和是激烈的,持续的,并且在ISIS追随者之间的在线互动中很普遍。该研究为利用大数据更好地掌握恐怖组织的宣传活动提供了理解。
{"title":"Jihadist Propaganda on Social Media","authors":"Ahmed Al-Rawi, J. Groshek","doi":"10.4018/978-1-7998-2466-4.ch085","DOIUrl":"https://doi.org/10.4018/978-1-7998-2466-4.ch085","url":null,"abstract":"This article focuses on ISIS followers on Twitter in an effort to understand the nature of their social media propaganda. The research study provides unique insight into one of the largest data sets that investigates ISIS propaganda efforts on Twitter by examining over 50 million tweets posted by more than 8 million unique users that referenced the keywords “ISIS” or “ISIL.” The authors then searched this corpus for eight keywords in Arabic that included terms of support for ISIS and the names of different Al-Qaeda leaders. A mixed research method was used, and the findings indicate that ISIS activity on Twitter witnessed a gradual decline, but the group was still able to post different types of tweets to maintain its online presence. Also, the feud between ISIS and Al-Qaeda was intense, ongoing, and prevalent in online interactions among ISIS followers. The study provides an understanding of using big data to better grasp the propaganda activities of terrorist groups.","PeriodicalId":41462,"journal":{"name":"International Journal of Cyber Warfare and Terrorism","volume":"54 1","pages":""},"PeriodicalIF":0.5,"publicationDate":"2020-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"75424756","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
International Journal of Cyber Warfare and Terrorism
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1