Pub Date : 2020-01-01DOI: 10.4018/IJPHIM.2018010103
Jomin George, A. Emmanuel
This article describes how data breaches have become the norm, as highlighted by the significant number of breaches experienced by healthcare providers. These breaches have led to the scrutiny of cybersecurity technologies, protocols and strategies applied in the health care sector. As such, this article will explore the cyber security available in health care that is used and can be used to deter data breaches. Health care sectors are currently looking on different technologies and strategies to prevent and secure the patient information from data hackers. But some of these techniques have been effective, and some have not.
{"title":"Cyber Hygiene in Health Care Data Breaches","authors":"Jomin George, A. Emmanuel","doi":"10.4018/IJPHIM.2018010103","DOIUrl":"https://doi.org/10.4018/IJPHIM.2018010103","url":null,"abstract":"This article describes how data breaches have become the norm, as highlighted by the significant number of breaches experienced by healthcare providers. These breaches have led to the scrutiny of cybersecurity technologies, protocols and strategies applied in the health care sector. As such, this article will explore the cyber security available in health care that is used and can be used to deter data breaches. Health care sectors are currently looking on different technologies and strategies to prevent and secure the patient information from data hackers. But some of these techniques have been effective, and some have not.","PeriodicalId":41462,"journal":{"name":"International Journal of Cyber Warfare and Terrorism","volume":"28 1","pages":""},"PeriodicalIF":0.5,"publicationDate":"2020-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"75274424","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2020-01-01DOI: 10.4018/978-1-7998-2466-4.ch095
Majeed Khader
This concluding chapter is an attempt made to summarise and analyse the chapters provided by the various authors in this book. The analysis used in this chapter is based on a public health prevention model created by Quick, Quick, Nelson, and Hurrell (1997). The value of this approach is the systemic prevention angle that it undertakes to examine problems and solutions.
{"title":"What We Know and What Else We Need to Do to Address the Problem of Violent Extremism Online","authors":"Majeed Khader","doi":"10.4018/978-1-7998-2466-4.ch095","DOIUrl":"https://doi.org/10.4018/978-1-7998-2466-4.ch095","url":null,"abstract":"This concluding chapter is an attempt made to summarise and analyse the chapters provided by the various authors in this book. The analysis used in this chapter is based on a public health prevention model created by Quick, Quick, Nelson, and Hurrell (1997). The value of this approach is the systemic prevention angle that it undertakes to examine problems and solutions.","PeriodicalId":41462,"journal":{"name":"International Journal of Cyber Warfare and Terrorism","volume":"77 1","pages":""},"PeriodicalIF":0.5,"publicationDate":"2020-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"77523073","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2020-01-01DOI: 10.4018/978-1-7998-2466-4.ch047
Preeti Mulay, Krishna Patel, Hector Gómez Gauchía
Evolving technologies are intricately woven into the fabric of social and institutional systems. With the invent of “Internet of Everything (IoE)” concept it is realistic now to employ animals and or humans to transmit details electronically. IoE concepts with sensor technology can prove wonders in any domain for that matter starting from eFarming, eHealth, eCare and what not. Humans can transform electronics by using various eConnected gadgets also motivated due to or based on “Nature Inspired Algorithms”. The confluence of IT, psychology with non-IT systems will be part of new generation's life. Such collaborative concept can be implemented practically with the help of “Cloud-to-Dew-Computing” based technologies. To include so many concepts together, it is essential to concentrate also on Cyber Security and Risk associated with such conceptual implementation. Dew-Computing at root levels will take care of Cyber Security effectually. Dew-Computing being backend support of Distributed System, can process multiple entities resourcefully. “Animal Data Interchange Standards” are very well considered innovative business opportunity these days and for years to come. These standards have started their work focusing on the Dairy related animal standard. Every dairy animal should enjoy life to remain healthy and more productive. Incremental Learning about Animal Life Data and Animal Identification, behavior, seasonal-changes, health etc. can be easily achieved with IoE.
{"title":"Distributed System Implementation Based on “Ants Feeding Birds” Algorithm","authors":"Preeti Mulay, Krishna Patel, Hector Gómez Gauchía","doi":"10.4018/978-1-7998-2466-4.ch047","DOIUrl":"https://doi.org/10.4018/978-1-7998-2466-4.ch047","url":null,"abstract":"Evolving technologies are intricately woven into the fabric of social and institutional systems. With the invent of “Internet of Everything (IoE)” concept it is realistic now to employ animals and or humans to transmit details electronically. IoE concepts with sensor technology can prove wonders in any domain for that matter starting from eFarming, eHealth, eCare and what not. Humans can transform electronics by using various eConnected gadgets also motivated due to or based on “Nature Inspired Algorithms”. The confluence of IT, psychology with non-IT systems will be part of new generation's life. Such collaborative concept can be implemented practically with the help of “Cloud-to-Dew-Computing” based technologies. To include so many concepts together, it is essential to concentrate also on Cyber Security and Risk associated with such conceptual implementation. Dew-Computing at root levels will take care of Cyber Security effectually. Dew-Computing being backend support of Distributed System, can process multiple entities resourcefully. “Animal Data Interchange Standards” are very well considered innovative business opportunity these days and for years to come. These standards have started their work focusing on the Dairy related animal standard. Every dairy animal should enjoy life to remain healthy and more productive. Incremental Learning about Animal Life Data and Animal Identification, behavior, seasonal-changes, health etc. can be easily achieved with IoE.","PeriodicalId":41462,"journal":{"name":"International Journal of Cyber Warfare and Terrorism","volume":"27 1","pages":""},"PeriodicalIF":0.5,"publicationDate":"2020-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"83672253","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2020-01-01DOI: 10.4018/978-1-5225-7189-6.CH008
Gaganjot Kaur Saini, M. Halgamuge, Pallavi Sharma, James Stephen Purkis
Research questions remain to be answered in terms of discovering how security could be provided for different resources, such as data, devices, and networks. Most organizations compromise their security measures due to high budgets despite its primary importance in today's highly dependent cyber world and as such there are always some loopholes in security systems, which cybercriminals take advantage of. In this chapter, the authors have completed an analysis of data obtained from 31 peer-reviewed scientific research studies (2009-2017) describing cybersecurity issues and solutions. The results demonstrated that the majority of applications in this area are from the government and the public sector (17%) whereas transportation and other areas have a minor percentage (6%). This study determined that the government sector is the main application area in cybersecurity and is more susceptible to cyber-attacks whereas the wireless sensor network and healthcare areas are less exposed to attack.
{"title":"A Review on Cyberattacks","authors":"Gaganjot Kaur Saini, M. Halgamuge, Pallavi Sharma, James Stephen Purkis","doi":"10.4018/978-1-5225-7189-6.CH008","DOIUrl":"https://doi.org/10.4018/978-1-5225-7189-6.CH008","url":null,"abstract":"Research questions remain to be answered in terms of discovering how security could be provided for different resources, such as data, devices, and networks. Most organizations compromise their security measures due to high budgets despite its primary importance in today's highly dependent cyber world and as such there are always some loopholes in security systems, which cybercriminals take advantage of. In this chapter, the authors have completed an analysis of data obtained from 31 peer-reviewed scientific research studies (2009-2017) describing cybersecurity issues and solutions. The results demonstrated that the majority of applications in this area are from the government and the public sector (17%) whereas transportation and other areas have a minor percentage (6%). This study determined that the government sector is the main application area in cybersecurity and is more susceptible to cyber-attacks whereas the wireless sensor network and healthcare areas are less exposed to attack.","PeriodicalId":41462,"journal":{"name":"International Journal of Cyber Warfare and Terrorism","volume":"28 1","pages":""},"PeriodicalIF":0.5,"publicationDate":"2020-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"73477807","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2020-01-01DOI: 10.4018/978-1-7998-2466-4.ch039
D. McElreath, D. Doss, Leisa S. McElreath, A. Lindsley, Glenna Lusk, J. Skinner, Ashley Wellman
This article considers social media as a radicalization venue within the context of terrorism. The 2016 extremist/terrorist attack in Orlando, Florida showed the potential of an ISIS type extremist organization to leverage social media toward a lethal outcome within American society. While the ISIS organization originated overseas in a culture of which mainstream American society is unfamiliar, it is in many ways remarkable the level of success they quickly achieved connecting globally. Their efforts reflect the potential of social media to market a message of radicalism worldwide toward generating murderous converts who are willing to travel to join the fight or attack at home. Given these notions, this article considers the use of social media as an extremist cyber-recruitment tool.
{"title":"The Communicating and Marketing of Radicalism","authors":"D. McElreath, D. Doss, Leisa S. McElreath, A. Lindsley, Glenna Lusk, J. Skinner, Ashley Wellman","doi":"10.4018/978-1-7998-2466-4.ch039","DOIUrl":"https://doi.org/10.4018/978-1-7998-2466-4.ch039","url":null,"abstract":"This article considers social media as a radicalization venue within the context of terrorism. The 2016 extremist/terrorist attack in Orlando, Florida showed the potential of an ISIS type extremist organization to leverage social media toward a lethal outcome within American society. While the ISIS organization originated overseas in a culture of which mainstream American society is unfamiliar, it is in many ways remarkable the level of success they quickly achieved connecting globally. Their efforts reflect the potential of social media to market a message of radicalism worldwide toward generating murderous converts who are willing to travel to join the fight or attack at home. Given these notions, this article considers the use of social media as an extremist cyber-recruitment tool.","PeriodicalId":41462,"journal":{"name":"International Journal of Cyber Warfare and Terrorism","volume":"73 1","pages":""},"PeriodicalIF":0.5,"publicationDate":"2020-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"80578024","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2020-01-01DOI: 10.4018/978-1-7998-2466-4.ch010
M. Abulaish, Nur Al Hasan Haldar
Digital forensics science is a well-known initiative to unearth computer-assisted crimes. The thriving criminal activities using digital media have changed the typical definition of a traditional crime. Meanwhile, the means and targets of criminal activities have been transformed in a broader context due to the diverse nature of offenses associated with the multiple crime categories, affecting the way of investigations as well. In order to withstand the difficulties caused due to the crime complexity, forensics investigation frameworks are being tuned to adjust with the nature and earnestness of the felonies being committed. This article presents an in-depth comparative survey of fourteen popular and most cited digital forensics process models and various forensics tools associated with different phases of these models. The relationships among these forensics process models and their evolutions are analyzed and a graph-theoretic approach is presented to rank the existing process models to facilitate investigators in selecting an appropriate model for their investigation tasks.
{"title":"Advances in Digital Forensics Frameworks and Tools","authors":"M. Abulaish, Nur Al Hasan Haldar","doi":"10.4018/978-1-7998-2466-4.ch010","DOIUrl":"https://doi.org/10.4018/978-1-7998-2466-4.ch010","url":null,"abstract":"Digital forensics science is a well-known initiative to unearth computer-assisted crimes. The thriving criminal activities using digital media have changed the typical definition of a traditional crime. Meanwhile, the means and targets of criminal activities have been transformed in a broader context due to the diverse nature of offenses associated with the multiple crime categories, affecting the way of investigations as well. In order to withstand the difficulties caused due to the crime complexity, forensics investigation frameworks are being tuned to adjust with the nature and earnestness of the felonies being committed. This article presents an in-depth comparative survey of fourteen popular and most cited digital forensics process models and various forensics tools associated with different phases of these models. The relationships among these forensics process models and their evolutions are analyzed and a graph-theoretic approach is presented to rank the existing process models to facilitate investigators in selecting an appropriate model for their investigation tasks.","PeriodicalId":41462,"journal":{"name":"International Journal of Cyber Warfare and Terrorism","volume":"39 1","pages":""},"PeriodicalIF":0.5,"publicationDate":"2020-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"88492024","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2020-01-01DOI: 10.4018/978-1-7998-2466-4.ch099
Lanier A Watkins, J. Hurley
One of the major challenges to an organization achieving a certain level of preparedness to “effectively” combat existing and future cyber threats and vulnerabilities is its ability to ensure the security and reliability of its networks. Most of the existing efforts are quantitative, by nature, and limited solely to the networks and systems of the organization. It would be unfair to not acknowledge that for sure some progress has been achieved in the way that organizations, as a whole, are now positioning themselves to address the threats (GAO 2012). Unfortunately, so have the skill sets and resource levels improved for attackers--they are increasingly getting better at achieving the unwanted access to organizations' information assets. In large part the authors believe that some of this is due to the failure by methods to assess the overall vulnerability of the networks. In addition, significant levels of threats and vulnerabilities beyond organizations' networks and systems are not being given the level of attention that is warranted. In this paper, the authors propose a more comprehensive approach that enables an organization to more realistically assess its “cyber maturity” level in hope of better positioning itself to address existing and new cyber threats. The authors also propose the need to better understand another missing critical piece to the puzzle--the reliability and security of networks in terms of scientific risk-based metrics (e.g., the severity of individual vulnerabilities and overall vulnerability of the network). Their risk-based metrics focus on the probability of compromise due to a given vulnerability; employee non-adherence to company cyber-based policies; insider threats. They are: (1) built on the CVSS Base Score which is modified by developing weights derived from the Analytic Hierarchy Process (AHP) to make the overall score more representative of the impact the vulnerability has on the global infrastructure, and (2) rooted in repeatable quantitative characteristics (i.e., vulnerabilities) such as the sum of the probabilities that devices will be compromised via client-side or server-side attacks stemming from software or hardware vulnerabilities. The authors will demonstrate the feasibility of their method by applying their approach to a case study and highlighting the benefits and impediments which result.
{"title":"The Next Generation of Scientific-Based Risk Metrics","authors":"Lanier A Watkins, J. Hurley","doi":"10.4018/978-1-7998-2466-4.ch099","DOIUrl":"https://doi.org/10.4018/978-1-7998-2466-4.ch099","url":null,"abstract":"One of the major challenges to an organization achieving a certain level of preparedness to “effectively” combat existing and future cyber threats and vulnerabilities is its ability to ensure the security and reliability of its networks. Most of the existing efforts are quantitative, by nature, and limited solely to the networks and systems of the organization. It would be unfair to not acknowledge that for sure some progress has been achieved in the way that organizations, as a whole, are now positioning themselves to address the threats (GAO 2012). Unfortunately, so have the skill sets and resource levels improved for attackers--they are increasingly getting better at achieving the unwanted access to organizations' information assets. In large part the authors believe that some of this is due to the failure by methods to assess the overall vulnerability of the networks. In addition, significant levels of threats and vulnerabilities beyond organizations' networks and systems are not being given the level of attention that is warranted. In this paper, the authors propose a more comprehensive approach that enables an organization to more realistically assess its “cyber maturity” level in hope of better positioning itself to address existing and new cyber threats. The authors also propose the need to better understand another missing critical piece to the puzzle--the reliability and security of networks in terms of scientific risk-based metrics (e.g., the severity of individual vulnerabilities and overall vulnerability of the network). Their risk-based metrics focus on the probability of compromise due to a given vulnerability; employee non-adherence to company cyber-based policies; insider threats. They are: (1) built on the CVSS Base Score which is modified by developing weights derived from the Analytic Hierarchy Process (AHP) to make the overall score more representative of the impact the vulnerability has on the global infrastructure, and (2) rooted in repeatable quantitative characteristics (i.e., vulnerabilities) such as the sum of the probabilities that devices will be compromised via client-side or server-side attacks stemming from software or hardware vulnerabilities. The authors will demonstrate the feasibility of their method by applying their approach to a case study and highlighting the benefits and impediments which result.","PeriodicalId":41462,"journal":{"name":"International Journal of Cyber Warfare and Terrorism","volume":"58 1","pages":""},"PeriodicalIF":0.5,"publicationDate":"2020-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"83944522","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2020-01-01DOI: 10.4018/978-1-7998-2466-4.ch043
Elisabeth H. Buck
Since its original development for use in literary studies by German scholar Hans Robert Jauss in the late 1960s, reception theory has been successfully applied to fields as diverse as media studies, communications, and art history; its efficacy within rhetoric and composition pedagogy, however, has been less fully explored. I argue in this essay that reception theory can provide a meaningful way to understand and discuss social media composing practices, especially as a lens for thinking about why and how we participate in social media as both readers and writers in the 21st century. This essay thus examines the three “aesthetic experiences” of Jauss's reception theory—catharsis, aisthesis, and poiesis— which describe the ways that audiences derive satisfaction from engaging with texts. I apply each aesthetic concept to a corresponding mode of social media composition: practices of social media-based activism, regulation of content on social media, as well as the act of creating “selfies.” These applications stand as potential entry points for classroom discussion about how social media draws its users into producing a response. The “aesthetic experiences” represent ways to look at composing practices on social media cohesively, but they also give language to how individual social media users gain enjoyment from participating with these sites. I offer specific strategies for incorporating reception theory in a classroom context, and conclude that this approach helps students think more specifically about the intricacies and limitations of audience(s)—important recognitions for anyone who produces content in social media environments.
自20世纪60年代末德国学者汉斯·罗伯特·约斯(Hans Robert Jauss)最初将其用于文学研究以来,接受理论已成功地应用于媒体研究、传播学和艺术史等不同领域;然而,它在修辞学和作文教育学中的作用尚未得到充分的探索。我在这篇文章中认为,接受理论可以为理解和讨论社交媒体创作实践提供一种有意义的方式,特别是作为思考21世纪我们作为读者和作者为什么以及如何参与社交媒体的一个镜头。因此,本文考察了约斯接受理论中的三种“审美体验”——宣泄、审美和评论——它们描述了观众从与文本的接触中获得满足的方式。我将每个美学概念应用于相应的社交媒体构成模式:基于社交媒体的行动主义实践,社交媒体上的内容监管,以及创造“自拍”的行为。这些应用程序可以作为课堂讨论的潜在切入点,讨论社交媒体如何吸引用户做出回应。“审美体验”代表了一种看待社交媒体上的创作实践的方式,但它们也为个人社交媒体用户如何从参与这些网站中获得乐趣提供了语言。我提供了将接受理论纳入课堂环境的具体策略,并得出结论,这种方法有助于学生更具体地思考受众的复杂性和局限性——这对任何在社交媒体环境中制作内容的人来说都是重要的认识。
{"title":"Slacktivism, Supervision, and #Selfies","authors":"Elisabeth H. Buck","doi":"10.4018/978-1-7998-2466-4.ch043","DOIUrl":"https://doi.org/10.4018/978-1-7998-2466-4.ch043","url":null,"abstract":"Since its original development for use in literary studies by German scholar Hans Robert Jauss in the late 1960s, reception theory has been successfully applied to fields as diverse as media studies, communications, and art history; its efficacy within rhetoric and composition pedagogy, however, has been less fully explored. I argue in this essay that reception theory can provide a meaningful way to understand and discuss social media composing practices, especially as a lens for thinking about why and how we participate in social media as both readers and writers in the 21st century. This essay thus examines the three “aesthetic experiences” of Jauss's reception theory—catharsis, aisthesis, and poiesis— which describe the ways that audiences derive satisfaction from engaging with texts. I apply each aesthetic concept to a corresponding mode of social media composition: practices of social media-based activism, regulation of content on social media, as well as the act of creating “selfies.” These applications stand as potential entry points for classroom discussion about how social media draws its users into producing a response. The “aesthetic experiences” represent ways to look at composing practices on social media cohesively, but they also give language to how individual social media users gain enjoyment from participating with these sites. I offer specific strategies for incorporating reception theory in a classroom context, and conclude that this approach helps students think more specifically about the intricacies and limitations of audience(s)—important recognitions for anyone who produces content in social media environments.","PeriodicalId":41462,"journal":{"name":"International Journal of Cyber Warfare and Terrorism","volume":"50 1","pages":""},"PeriodicalIF":0.5,"publicationDate":"2020-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"89634663","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2020-01-01DOI: 10.4018/ijcwt.2020010102
Mariah Talia Solis, Jessica Pearson, Deirdre P. Dixon, Abigail Blanco, Raymond Papp
Discussions regarding terrorism are more relevant today than ever before. Terror threats can take on many forms from physical violence against military forces, individual companies, and ordinary citizens, to actions against infrastructure, to cyber terrorism. These forms of terror and others, in a number of ways, threaten the physical and financial safety of people around the world. The purpose of this qualitative research study is to evaluate the effects of terrorism—particularly the attacks on September 11, 2001—on U.S. enterprises in the period since the attacks. Utilizing interviews with representatives from various industries, the authors found that employees with long company histories believe their companies have implemented changes regarding their security measures as a safeguard against possible future terrorist attacks. The research findings revealed that while businesses have made changes in their use of technology to change their (1) cybersecurity, (2) training methods, and (3) hiring processes, there remains a gap in understanding the efficacy and efficiency of these changes. Though the September 11 attacks raised the concerns regarding terrorism overall and formed the genesis for thinking about the effects of terrorism, the authors found that interviewees had limited knowledge of how terrorist activities truly affected their business, and identified a strong need to empirically study the technology changes implemented in the past two decades as a response to terrorism, and a need for a thorough sharing of knowledge within the cybersecurity industry to other businesses.
{"title":"Terrorism Effects on Businesses Post 9/11","authors":"Mariah Talia Solis, Jessica Pearson, Deirdre P. Dixon, Abigail Blanco, Raymond Papp","doi":"10.4018/ijcwt.2020010102","DOIUrl":"https://doi.org/10.4018/ijcwt.2020010102","url":null,"abstract":"Discussions regarding terrorism are more relevant today than ever before. Terror threats can take on many forms from physical violence against military forces, individual companies, and ordinary citizens, to actions against infrastructure, to cyber terrorism. These forms of terror and others, in a number of ways, threaten the physical and financial safety of people around the world. The purpose of this qualitative research study is to evaluate the effects of terrorism—particularly the attacks on September 11, 2001—on U.S. enterprises in the period since the attacks. Utilizing interviews with representatives from various industries, the authors found that employees with long company histories believe their companies have implemented changes regarding their security measures as a safeguard against possible future terrorist attacks. The research findings revealed that while businesses have made changes in their use of technology to change their (1) cybersecurity, (2) training methods, and (3) hiring processes, there remains a gap in understanding the efficacy and efficiency of these changes. Though the September 11 attacks raised the concerns regarding terrorism overall and formed the genesis for thinking about the effects of terrorism, the authors found that interviewees had limited knowledge of how terrorist activities truly affected their business, and identified a strong need to empirically study the technology changes implemented in the past two decades as a response to terrorism, and a need for a thorough sharing of knowledge within the cybersecurity industry to other businesses.","PeriodicalId":41462,"journal":{"name":"International Journal of Cyber Warfare and Terrorism","volume":"120 1","pages":"15-33"},"PeriodicalIF":0.5,"publicationDate":"2020-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"87725227","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2020-01-01DOI: 10.4018/978-1-7998-2466-4.ch085
Ahmed Al-Rawi, J. Groshek
This article focuses on ISIS followers on Twitter in an effort to understand the nature of their social media propaganda. The research study provides unique insight into one of the largest data sets that investigates ISIS propaganda efforts on Twitter by examining over 50 million tweets posted by more than 8 million unique users that referenced the keywords “ISIS” or “ISIL.” The authors then searched this corpus for eight keywords in Arabic that included terms of support for ISIS and the names of different Al-Qaeda leaders. A mixed research method was used, and the findings indicate that ISIS activity on Twitter witnessed a gradual decline, but the group was still able to post different types of tweets to maintain its online presence. Also, the feud between ISIS and Al-Qaeda was intense, ongoing, and prevalent in online interactions among ISIS followers. The study provides an understanding of using big data to better grasp the propaganda activities of terrorist groups.
{"title":"Jihadist Propaganda on Social Media","authors":"Ahmed Al-Rawi, J. Groshek","doi":"10.4018/978-1-7998-2466-4.ch085","DOIUrl":"https://doi.org/10.4018/978-1-7998-2466-4.ch085","url":null,"abstract":"This article focuses on ISIS followers on Twitter in an effort to understand the nature of their social media propaganda. The research study provides unique insight into one of the largest data sets that investigates ISIS propaganda efforts on Twitter by examining over 50 million tweets posted by more than 8 million unique users that referenced the keywords “ISIS” or “ISIL.” The authors then searched this corpus for eight keywords in Arabic that included terms of support for ISIS and the names of different Al-Qaeda leaders. A mixed research method was used, and the findings indicate that ISIS activity on Twitter witnessed a gradual decline, but the group was still able to post different types of tweets to maintain its online presence. Also, the feud between ISIS and Al-Qaeda was intense, ongoing, and prevalent in online interactions among ISIS followers. The study provides an understanding of using big data to better grasp the propaganda activities of terrorist groups.","PeriodicalId":41462,"journal":{"name":"International Journal of Cyber Warfare and Terrorism","volume":"54 1","pages":""},"PeriodicalIF":0.5,"publicationDate":"2020-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"75424756","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}