首页 > 最新文献

Journal of Applied Security Research最新文献

英文 中文
Internet-of-Things Security and Vulnerabilities: Case Study 物联网安全与漏洞:案例研究
IF 1.3 Q3 CRIMINOLOGY & PENOLOGY Pub Date : 2022-02-03 DOI: 10.1080/19361610.2022.2031841
Ghaida Alqarawi, Bashayer Alkhalifah, N. Alharbi, Salim El Khediri
Abstract The incorporation of IoT in the world has had tremendous popularity in the field of Technology. This great innovation has enabled seamless transformation in business and operation transformation. However, significant usage of this innovation also poses a security threat which has become a more critical point of concern to many businesses across the globe. Many companies that depend on IoT have faced security breaches and threats. The IoT countermeasures have not been well-factored upon, which poses a more significant challenge to many organizations that heavily rely on this technology. In this survey, we propose a security survey that will help tackle the problems associated with IoT and offer security solutions on all the IoT layers. The results show that authentication is the most critical security measure to implement in IoT.
摘要物联网在世界范围内的融合在技术领域非常受欢迎。这一伟大的创新使业务和运营转型实现了无缝转型。然而,这种创新的大量使用也带来了安全威胁,这已成为全球许多企业关注的一个更关键的问题。许多依赖物联网的公司都面临着安全漏洞和威胁。物联网对策没有得到很好的考虑,这对许多严重依赖该技术的组织构成了更大的挑战。在本次调查中,我们提出了一项安全调查,该调查将有助于解决与物联网相关的问题,并为所有物联网层提供安全解决方案。结果表明,身份验证是物联网中最关键的安全措施。
{"title":"Internet-of-Things Security and Vulnerabilities: Case Study","authors":"Ghaida Alqarawi, Bashayer Alkhalifah, N. Alharbi, Salim El Khediri","doi":"10.1080/19361610.2022.2031841","DOIUrl":"https://doi.org/10.1080/19361610.2022.2031841","url":null,"abstract":"Abstract The incorporation of IoT in the world has had tremendous popularity in the field of Technology. This great innovation has enabled seamless transformation in business and operation transformation. However, significant usage of this innovation also poses a security threat which has become a more critical point of concern to many businesses across the globe. Many companies that depend on IoT have faced security breaches and threats. The IoT countermeasures have not been well-factored upon, which poses a more significant challenge to many organizations that heavily rely on this technology. In this survey, we propose a security survey that will help tackle the problems associated with IoT and offer security solutions on all the IoT layers. The results show that authentication is the most critical security measure to implement in IoT.","PeriodicalId":44585,"journal":{"name":"Journal of Applied Security Research","volume":"18 1","pages":"559 - 575"},"PeriodicalIF":1.3,"publicationDate":"2022-02-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"47481848","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Reverse Social Engineering to Counter Social Engineering in Mobile Money Theft: A Tanzanian Context 反社会工程对抗移动货币盗窃中的社会工程:坦桑尼亚的背景
IF 1.3 Q3 CRIMINOLOGY & PENOLOGY Pub Date : 2022-01-31 DOI: 10.1080/19361610.2022.2031702
Hassan Kilavo, Leonard J. Mselle, Ramadhani I. Rais, Salehe I. Mrutu
Abstract Social engineering entails deception where one manipulates individuals into divulging confidential or any personal information that may be used for fraudulent purposes. In mobile money theft, the attackers plan a “lure” to tempt a victim directly, via mobile phones; mostly to gain money by proposing a phony undertaking. The victim is often asked to pay some money to facilitate a lucrative undertaking, which in reality is phony. Once the victim has paid the money, the attackers become inaccessible. Reverse social engineering entails deception of the predator by the pray in order to capture or discourage the predator. Through a case study, this paper investigates and presents an incident where a victim of mobile social engineering attempts to reverse the process in order to arraign the attackers.
摘要社会工程涉及欺骗,即操纵个人泄露机密或任何可能用于欺诈目的的个人信息。在移动货币盗窃中,攻击者计划通过手机直接引诱受害者;主要是通过提出虚假承诺来赚钱。受害者经常被要求支付一些钱来促进一项有利可图的事业,而事实上这是虚假的。一旦受害者支付了这笔钱,攻击者就无法进入。逆向社会工程需要祈祷者欺骗捕食者,以捕捉或劝阻捕食者。通过案例研究,本文调查并介绍了一起移动社会工程受害者试图逆转这一过程以传讯攻击者的事件。
{"title":"Reverse Social Engineering to Counter Social Engineering in Mobile Money Theft: A Tanzanian Context","authors":"Hassan Kilavo, Leonard J. Mselle, Ramadhani I. Rais, Salehe I. Mrutu","doi":"10.1080/19361610.2022.2031702","DOIUrl":"https://doi.org/10.1080/19361610.2022.2031702","url":null,"abstract":"Abstract Social engineering entails deception where one manipulates individuals into divulging confidential or any personal information that may be used for fraudulent purposes. In mobile money theft, the attackers plan a “lure” to tempt a victim directly, via mobile phones; mostly to gain money by proposing a phony undertaking. The victim is often asked to pay some money to facilitate a lucrative undertaking, which in reality is phony. Once the victim has paid the money, the attackers become inaccessible. Reverse social engineering entails deception of the predator by the pray in order to capture or discourage the predator. Through a case study, this paper investigates and presents an incident where a victim of mobile social engineering attempts to reverse the process in order to arraign the attackers.","PeriodicalId":44585,"journal":{"name":"Journal of Applied Security Research","volume":"18 1","pages":"546 - 558"},"PeriodicalIF":1.3,"publicationDate":"2022-01-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"42572329","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Performance Analysis of Channel Estimation for Massive MIMO Communication Using DL-Based Fully Connected Neural Network (DL-FCNN) Architecture 基于DL-FCNN的大规模MIMO通信信道估计性能分析
IF 1.3 Q3 CRIMINOLOGY & PENOLOGY Pub Date : 2022-01-10 DOI: 10.1080/19361610.2021.2024050
Swapna Tangelapalli, Pokkunuri PardhaSaradhi, R. Pandya, S. Iyer
Abstract The latest research for applying deep learning in wireless communications gives several opportunities to reduce complex signal processing. The channel estimation is important to study the nature of the varying channel and to calculate channel state information (CSI) value which is utilized at the receiver to nullify the interference which occurs during multipath transmission. In the current article, considering the massive Multiple Input Multiple Output (MIMO) channel model, a DL approach is developed with a fully connected neural network (NN) architecture which is used to estimate the channel with minimum error. The proposed DL architecture uses an openly available channel dataset. Further, using generated pilot symbols of lengths 2 and 4, the performance of DL-based Fully connected NN (DL-FCNN) is analyzed to estimate the channel in uplink massive MIMO communication. The obtained results demonstrate that the channel estimation performance was calculated in terms of normalized mean square error((NMSE) for different values of SNR added at receiver base station (BS) to the signals over the range of BS antennas. Also, the channel estimation error over a large number of BS antennas for massive MIMO scenarios is observed, and it is observed that the NMSE reduces with a greater number of antennas. Hence, it can be inferred that the DL models will be the future for most physical layer signal processing techniques such as channel estimation, modulation detection, etc. within massive MIMO networks.
将深度学习应用于无线通信的最新研究为减少复杂的信号处理提供了一些机会。信道估计对于研究变化信道的性质和计算信道状态信息(CSI)值具有重要意义,该值在接收端用于消除多径传输过程中产生的干扰。本文针对大规模多输入多输出(MIMO)信道模型,提出了一种基于全连接神经网络(NN)架构的深度学习方法,用于以最小误差估计信道。提出的深度学习架构使用一个公开可用的通道数据集。此外,利用生成的导频符号长度为2和4,分析了基于DL-FCNN的全连接神经网络(DL-FCNN)在上行海量MIMO通信中的信道估计性能。结果表明,信道估计性能是根据接收基站(BS)对BS天线范围内的信号添加不同信噪比值的归一化均方误差(NMSE)来计算的。此外,还观察了大规模MIMO场景下大量BS天线的信道估计误差,并且观察到NMSE随着天线数量的增加而减小。因此,可以推断,DL模型将是未来大多数物理层信号处理技术的未来,如大规模MIMO网络中的信道估计、调制检测等。
{"title":"Performance Analysis of Channel Estimation for Massive MIMO Communication Using DL-Based Fully Connected Neural Network (DL-FCNN) Architecture","authors":"Swapna Tangelapalli, Pokkunuri PardhaSaradhi, R. Pandya, S. Iyer","doi":"10.1080/19361610.2021.2024050","DOIUrl":"https://doi.org/10.1080/19361610.2021.2024050","url":null,"abstract":"Abstract The latest research for applying deep learning in wireless communications gives several opportunities to reduce complex signal processing. The channel estimation is important to study the nature of the varying channel and to calculate channel state information (CSI) value which is utilized at the receiver to nullify the interference which occurs during multipath transmission. In the current article, considering the massive Multiple Input Multiple Output (MIMO) channel model, a DL approach is developed with a fully connected neural network (NN) architecture which is used to estimate the channel with minimum error. The proposed DL architecture uses an openly available channel dataset. Further, using generated pilot symbols of lengths 2 and 4, the performance of DL-based Fully connected NN (DL-FCNN) is analyzed to estimate the channel in uplink massive MIMO communication. The obtained results demonstrate that the channel estimation performance was calculated in terms of normalized mean square error((NMSE) for different values of SNR added at receiver base station (BS) to the signals over the range of BS antennas. Also, the channel estimation error over a large number of BS antennas for massive MIMO scenarios is observed, and it is observed that the NMSE reduces with a greater number of antennas. Hence, it can be inferred that the DL models will be the future for most physical layer signal processing techniques such as channel estimation, modulation detection, etc. within massive MIMO networks.","PeriodicalId":44585,"journal":{"name":"Journal of Applied Security Research","volume":"18 1","pages":"533 - 545"},"PeriodicalIF":1.3,"publicationDate":"2022-01-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"41680643","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Investigation of Card Skimming Cases: An Indian Perspective 从印度人的角度调查“抄牌”案件
IF 1.3 Q3 CRIMINOLOGY & PENOLOGY Pub Date : 2022-01-10 DOI: 10.1080/19361610.2021.2024049
A. Shetty, K. V. Murthy
Abstract Card frauds are one of the most common types of banking frauds out of which card skimming contributes the major share. Investigation and prosecution of card skimming cases are mainly dependent on digital evidence requiring trained and skilled law enforcement officers. Further, a single incident of card skimming leads to collection of information from hundreds of cards and hence the identification of all the victims is the real challenge for an investigating officer. This paper discusses different issues pertaining to card skimming providing a general overview of the modus operandi, investigation process and constraints faced by law enforcement agencies.
银行卡诈骗是最常见的银行诈骗类型之一,其中刷卡占主要份额。调查和检控刷卡案件主要依靠数码证据,需要训练有素和熟练的执法人员。此外,一次刷卡事件导致从数百张卡中收集信息,因此查明所有受害者是调查人员面临的真正挑战。本文讨论了与刷卡有关的不同问题,提供了执法机构所面临的操作方式、调查过程和限制的总体概述。
{"title":"Investigation of Card Skimming Cases: An Indian Perspective","authors":"A. Shetty, K. V. Murthy","doi":"10.1080/19361610.2021.2024049","DOIUrl":"https://doi.org/10.1080/19361610.2021.2024049","url":null,"abstract":"Abstract Card frauds are one of the most common types of banking frauds out of which card skimming contributes the major share. Investigation and prosecution of card skimming cases are mainly dependent on digital evidence requiring trained and skilled law enforcement officers. Further, a single incident of card skimming leads to collection of information from hundreds of cards and hence the identification of all the victims is the real challenge for an investigating officer. This paper discusses different issues pertaining to card skimming providing a general overview of the modus operandi, investigation process and constraints faced by law enforcement agencies.","PeriodicalId":44585,"journal":{"name":"Journal of Applied Security Research","volume":"18 1","pages":"519 - 532"},"PeriodicalIF":1.3,"publicationDate":"2022-01-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"45542977","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Addressing the Threat of a bioterrorist Attack by Means of an Unmanned Drone 应对利用无人机进行生物恐怖袭击的威胁
IF 1.3 Q3 CRIMINOLOGY & PENOLOGY Pub Date : 2022-01-05 DOI: 10.1080/19361610.2021.2018923
Katalin Pethő-Kiss
Abstract As drone technology advances, the potential for illicit criminal exploitation of these unmanned capabilities has been escalating. There has been an ever-growing concern about the peril posed by a drone attack delivering a biological payload into a vulnerable terrorist target. To achieve a more realistic understanding of this threat and to enhance existing national security arrangements to this scenario, this paper attempts to provide a novel approach for counter policies and procedures for the prevention, preparedness and response. With this in mind, criminal activities attempting to conduct a bioattack by means of an UAV are insightfully scrutinized. To do this, the phases of perpetration provide the basis for this discussion. In each phase of commission, the potential threat indicators of malevolent non-state actor activities are identified and accordingly, the most effective countermeasures designed.
摘要随着无人机技术的进步,非法利用这些无人驾驶能力的可能性不断升级。人们越来越担心无人机将生物有效载荷送入易受攻击的恐怖目标所带来的危险。为了更现实地理解这种威胁,并加强现有的国家安全安排,以应对这种情况,本文试图为预防、准备和应对的反政策和程序提供一种新的方法。考虑到这一点,对试图通过无人机进行生物攻击的犯罪活动进行了深入审查。为了做到这一点,犯罪的各个阶段为这一讨论提供了基础。在委员会的每个阶段,都会确定恶意非国家行为者活动的潜在威胁指标,并据此制定最有效的对策。
{"title":"Addressing the Threat of a bioterrorist Attack by Means of an Unmanned Drone","authors":"Katalin Pethő-Kiss","doi":"10.1080/19361610.2021.2018923","DOIUrl":"https://doi.org/10.1080/19361610.2021.2018923","url":null,"abstract":"Abstract As drone technology advances, the potential for illicit criminal exploitation of these unmanned capabilities has been escalating. There has been an ever-growing concern about the peril posed by a drone attack delivering a biological payload into a vulnerable terrorist target. To achieve a more realistic understanding of this threat and to enhance existing national security arrangements to this scenario, this paper attempts to provide a novel approach for counter policies and procedures for the prevention, preparedness and response. With this in mind, criminal activities attempting to conduct a bioattack by means of an UAV are insightfully scrutinized. To do this, the phases of perpetration provide the basis for this discussion. In each phase of commission, the potential threat indicators of malevolent non-state actor activities are identified and accordingly, the most effective countermeasures designed.","PeriodicalId":44585,"journal":{"name":"Journal of Applied Security Research","volume":"18 1","pages":"495 - 518"},"PeriodicalIF":1.3,"publicationDate":"2022-01-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"45281648","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
A Study of Lightweight Approaches to Analyze Crime Conditions in India 分析印度犯罪状况的轻量级方法研究
IF 1.3 Q3 CRIMINOLOGY & PENOLOGY Pub Date : 2021-12-02 DOI: 10.1080/19361610.2021.2006031
B. Saini, Dinesh Saini, S. Srivastava, Mayank Aggarwal
Abstract Crime prediction is an effort to cut down the crime rate and criminal activities in the society. This paper concentrates on monitoring the crime trends in India using data from 2001 to 2019. The work analyzes the crime condition in India by following a top-to bottom approach and implementing visualization and machine learning algorithms. Heat map visualization of India is done to focus on specific crime types for all states. Furthermore, various demography of human population like age-groups, sex, caste, etc., are considered to have a larger perspective of the issue. The model also suggest proactive measures based on these findings.
摘要犯罪预测是为了降低犯罪率和减少社会犯罪活动。本文利用2001年至2019年的数据,重点监测印度的犯罪趋势。这项工作通过自上而下的方法分析了印度的犯罪状况,并实现了可视化和机器学习算法。印度热图可视化是为了关注所有邦的特定犯罪类型。此外,各种人口统计学,如年龄组、性别、种姓等,被认为对这个问题有更大的看法。该模型还提出了基于这些发现的积极措施。
{"title":"A Study of Lightweight Approaches to Analyze Crime Conditions in India","authors":"B. Saini, Dinesh Saini, S. Srivastava, Mayank Aggarwal","doi":"10.1080/19361610.2021.2006031","DOIUrl":"https://doi.org/10.1080/19361610.2021.2006031","url":null,"abstract":"Abstract Crime prediction is an effort to cut down the crime rate and criminal activities in the society. This paper concentrates on monitoring the crime trends in India using data from 2001 to 2019. The work analyzes the crime condition in India by following a top-to bottom approach and implementing visualization and machine learning algorithms. Heat map visualization of India is done to focus on specific crime types for all states. Furthermore, various demography of human population like age-groups, sex, caste, etc., are considered to have a larger perspective of the issue. The model also suggest proactive measures based on these findings.","PeriodicalId":44585,"journal":{"name":"Journal of Applied Security Research","volume":"18 1","pages":"221 - 245"},"PeriodicalIF":1.3,"publicationDate":"2021-12-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"43338399","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Securing Relational Databases against Security Vulnerabilities: A Case of Microsoft SQL Server and PostgreSQL 关系型数据库的安全防范:以Microsoft SQL Server和PostgreSQL为例
IF 1.3 Q3 CRIMINOLOGY & PENOLOGY Pub Date : 2021-11-29 DOI: 10.1080/19361610.2021.2006032
Hassan Kilavo, Salehe I. Mrutu, Robert G. Dudu
Abstract This study evaluates mechanisms to secure relational databases against security vulnerabilities and utilized PostgreSQL and Microsoft SQL Server due to data breach incidences reported across the world. Emulation experiments with documentary review were employed to collect necessary study data. Identification of security features and vulnerabilities that are found to affect the data tier of the web applications were examined. The findings from the study have shown that Microsoft SQL Server is more security feature-rich in terms of Confidentiality, Integrity, and Availability compared to PostgreSQL and Microsoft SQL Server is more resilient to security attacks in its default behavior compared to PostgreSQL.
摘要本研究评估了保护关系数据库免受安全漏洞影响的机制,并因世界各地报告的数据泄露事件而使用PostgreSQL和Microsoft SQL Server。采用文献综述的仿真实验来收集必要的研究数据。对影响网络应用程序数据层的安全功能和漏洞的识别进行了检查。研究结果表明,与PostgreSQL相比,Microsoft SQL Server在机密性、完整性和可用性方面具有更丰富的安全功能,并且与PostgreQL相比,Microsoft SQL Server在默认行为下更能抵御安全攻击。
{"title":"Securing Relational Databases against Security Vulnerabilities: A Case of Microsoft SQL Server and PostgreSQL","authors":"Hassan Kilavo, Salehe I. Mrutu, Robert G. Dudu","doi":"10.1080/19361610.2021.2006032","DOIUrl":"https://doi.org/10.1080/19361610.2021.2006032","url":null,"abstract":"Abstract This study evaluates mechanisms to secure relational databases against security vulnerabilities and utilized PostgreSQL and Microsoft SQL Server due to data breach incidences reported across the world. Emulation experiments with documentary review were employed to collect necessary study data. Identification of security features and vulnerabilities that are found to affect the data tier of the web applications were examined. The findings from the study have shown that Microsoft SQL Server is more security feature-rich in terms of Confidentiality, Integrity, and Availability compared to PostgreSQL and Microsoft SQL Server is more resilient to security attacks in its default behavior compared to PostgreSQL.","PeriodicalId":44585,"journal":{"name":"Journal of Applied Security Research","volume":"18 1","pages":"421 - 435"},"PeriodicalIF":1.3,"publicationDate":"2021-11-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"45828478","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Achieving Cyber Power Through Integrated Government Capability: Factors Jeopardizing Civil-Military Cooperation on Cyber Defense 通过综合政府能力实现网络力量:影响网络防御军民合作的因素
IF 1.3 Q3 CRIMINOLOGY & PENOLOGY Pub Date : 2021-11-26 DOI: 10.1080/19361610.2021.2006033
Roman Pačka, M. Mareš
Abstract The article examines one narrowly focused aspect of the government interagency cooperation on cyber defense that serves as a basis to achieve a cyber power. It reviews the civil-military interagency cooperation and aims to identify factors that could jeopardize it. First, it provides a theoretical background for the research and then according to interviews and surveys, the factors with the highest negative impact are recognized. Based on this research, the most significant challenges in bridging the gap between civilian and military worlds seems to be power and budget struggles and a lack of political direction on cyber matters from leaders.
本文考察了政府在网络防御方面的机构间合作的一个狭义方面,该合作是实现网络力量的基础。它审查了军民机构间的合作,旨在确定可能危及这种合作的因素。首先为研究提供理论背景,然后通过访谈和调查,识别出负面影响最大的因素。根据这项研究,弥合民用和军事世界之间差距的最重大挑战似乎是权力和预算斗争,以及领导人在网络问题上缺乏政治方向。
{"title":"Achieving Cyber Power Through Integrated Government Capability: Factors Jeopardizing Civil-Military Cooperation on Cyber Defense","authors":"Roman Pačka, M. Mareš","doi":"10.1080/19361610.2021.2006033","DOIUrl":"https://doi.org/10.1080/19361610.2021.2006033","url":null,"abstract":"Abstract The article examines one narrowly focused aspect of the government interagency cooperation on cyber defense that serves as a basis to achieve a cyber power. It reviews the civil-military interagency cooperation and aims to identify factors that could jeopardize it. First, it provides a theoretical background for the research and then according to interviews and surveys, the factors with the highest negative impact are recognized. Based on this research, the most significant challenges in bridging the gap between civilian and military worlds seems to be power and budget struggles and a lack of political direction on cyber matters from leaders.","PeriodicalId":44585,"journal":{"name":"Journal of Applied Security Research","volume":"18 1","pages":"436 - 461"},"PeriodicalIF":1.3,"publicationDate":"2021-11-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"46099547","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
The Concept of Lawful Behavior in the Digital Age 数字时代的合法行为概念
IF 1.3 Q3 CRIMINOLOGY & PENOLOGY Pub Date : 2021-11-26 DOI: 10.1080/19361610.2021.2006034
R. Zhamiyeva, L. Arenova, A. Serikbayev, B. Zhakupov, G. Balgimbekova
Abstract The global situation with cybercrime is worsening. The study aims to investigate the concept of lawful behavior in the context of challenges facing the IT sector and from the perspective of previous and modern theoretical and legal views concerning the formation of lawful behavior. The paper outlines factors that shape the lawful behavior of digital natives. The results of the literature review suggest that a digital shift of legal relations objectively reduces the role of the socio-hierarchical factor in the formation of lawful behavior. This research is of practical interest to specialists in legal and sociological fields.
全球网络犯罪形势日益严峻。本研究旨在从过去和现代关于合法行为形成的理论和法律观点出发,在IT行业面临挑战的背景下,对合法行为的概念进行考察。本文概述了影响数字原生代合法行为的因素。文献综述的结果表明,法律关系的数字化转变客观上降低了社会等级因素在合法行为形成中的作用。这项研究对法律和社会学领域的专家具有实际意义。
{"title":"The Concept of Lawful Behavior in the Digital Age","authors":"R. Zhamiyeva, L. Arenova, A. Serikbayev, B. Zhakupov, G. Balgimbekova","doi":"10.1080/19361610.2021.2006034","DOIUrl":"https://doi.org/10.1080/19361610.2021.2006034","url":null,"abstract":"Abstract The global situation with cybercrime is worsening. The study aims to investigate the concept of lawful behavior in the context of challenges facing the IT sector and from the perspective of previous and modern theoretical and legal views concerning the formation of lawful behavior. The paper outlines factors that shape the lawful behavior of digital natives. The results of the literature review suggest that a digital shift of legal relations objectively reduces the role of the socio-hierarchical factor in the formation of lawful behavior. This research is of practical interest to specialists in legal and sociological fields.","PeriodicalId":44585,"journal":{"name":"Journal of Applied Security Research","volume":"18 1","pages":"462 - 474"},"PeriodicalIF":1.3,"publicationDate":"2021-11-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"44540818","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Modeling Public Policy: Influences on Terrorism and Public Opinion 公共政策建模:对恐怖主义和公众舆论的影响
IF 1.3 Q3 CRIMINOLOGY & PENOLOGY Pub Date : 2021-11-25 DOI: 10.1080/19361610.2021.2005503
Omi Hodwitz, Seth L. King
Abstract This article examines the effects of counterterrorism policy in Canada, the United States, and the United Kingdom between 1997 and 2016. We use time series analysis and series hazard models to examine the influence of policy on (a) incidents of terrorist violence and (b) citizen perceptions of the threat of terrorism. Results indicate that counterterrorism policy is, for the most part, not related to significant changes in Canada but does report significant results for public opinion and terrorist incidents in the United States and the United Kingdom, although these effects are temporally defined.
摘要本文考察了1997年至2016年间加拿大、美国和英国反恐政策的影响。我们使用时间序列分析和序列风险模型来检验政策对(a)恐怖主义暴力事件和(b)公民对恐怖主义威胁的感知的影响。结果表明,反恐政策在很大程度上与加拿大的重大变化无关,但确实报告了美国和英国的舆论和恐怖事件的重大结果,尽管这些影响是暂时确定的。
{"title":"Modeling Public Policy: Influences on Terrorism and Public Opinion","authors":"Omi Hodwitz, Seth L. King","doi":"10.1080/19361610.2021.2005503","DOIUrl":"https://doi.org/10.1080/19361610.2021.2005503","url":null,"abstract":"Abstract This article examines the effects of counterterrorism policy in Canada, the United States, and the United Kingdom between 1997 and 2016. We use time series analysis and series hazard models to examine the influence of policy on (a) incidents of terrorist violence and (b) citizen perceptions of the threat of terrorism. Results indicate that counterterrorism policy is, for the most part, not related to significant changes in Canada but does report significant results for public opinion and terrorist incidents in the United States and the United Kingdom, although these effects are temporally defined.","PeriodicalId":44585,"journal":{"name":"Journal of Applied Security Research","volume":"18 1","pages":"202 - 220"},"PeriodicalIF":1.3,"publicationDate":"2021-11-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"47102047","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
Journal of Applied Security Research
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1