首页 > 最新文献

Journal of Applied Security Research最新文献

英文 中文
Cluster Based Malicious Node Detection System for Mobile Ad-Hoc Network Using ANFIS Classifier 基于ANFIS分类器的移动Ad-Hoc网络恶意节点检测系统
IF 1.3 Q3 CRIMINOLOGY & PENOLOGY Pub Date : 2021-11-24 DOI: 10.1080/19361610.2021.2002118
Gopalakrishnan Subburayalu, Hemanand Duraivelu, Arunprasath Raveendran, Rajesh Arunachalam, Deepika Kongara, C. Thangavel
Abstract Improvement of efficient packet access in a wireless Mobile Ad-Hoc network (MANET) is vital for achieving high speed data rate. The degradation occurs due to identification of malicious node and hence, reducing the severity will be a complex problem due to similar characteristics with trusty nodes in sensing area. In this work, Adaptive Neuro Fuzzy Inference System (ANFIS) classifier based defected node identification system is developed. The conviction parameters to be extract of the reliable and malevolent nodes and these parameters are qualified by ANFIS classifier. Further, the individual nodes in MANET are classified in testing mode of classifier. The network performance will be degraded with the increased number of malicious nodes. Certain conditions like packet delivery ratio, throughput, detection rate, energy consumption, and precision value and link failures occur due to malicious node in the network. The anticipated malicious node detection structure be compare by means of the conservative techniques such as Optimized energy efficient routing protocol (OEERP), Low energy adaptive clustering hierarchy (LEACH), Data routing in network aggregation (DRINA)and Base station controlled dynamic clustering protocol (BCDCP). The proposed ANFIS classifier is designed in Matrix Laboratory (MATLAB) and it can be interfaced with NS2 using “c” programming.
摘要提高无线移动自组网(MANET)的分组访问效率是实现高速数据传输的关键。由于感知区域内的恶意节点与可信节点具有相似的特性,因此由于恶意节点的识别会导致降级,降低严重程度将是一个复杂的问题。本文研究了基于自适应神经模糊推理系统(ANFIS)分类器的缺陷节点识别系统。利用ANFIS分类器对需要提取的可靠节点和恶意节点的定罪参数进行鉴定。在此基础上,采用分类器测试模式对MANET中的单个节点进行分类。随着恶意节点数量的增加,网络性能将会下降。由于网络中存在恶意节点,会导致报文投递率、吞吐量、检测率、能耗、精度值、链路故障等情况发生。采用优化节能路由协议(OEERP)、低能量自适应聚类层次协议(LEACH)、网络聚合中的数据路由(DRINA)和基站控制动态聚类协议(BCDCP)等保守技术,比较了预期的恶意节点检测结构。所提出的ANFIS分类器是在MATLAB中设计的,并可以使用c编程与NS2接口。
{"title":"Cluster Based Malicious Node Detection System for Mobile Ad-Hoc Network Using ANFIS Classifier","authors":"Gopalakrishnan Subburayalu, Hemanand Duraivelu, Arunprasath Raveendran, Rajesh Arunachalam, Deepika Kongara, C. Thangavel","doi":"10.1080/19361610.2021.2002118","DOIUrl":"https://doi.org/10.1080/19361610.2021.2002118","url":null,"abstract":"Abstract Improvement of efficient packet access in a wireless Mobile Ad-Hoc network (MANET) is vital for achieving high speed data rate. The degradation occurs due to identification of malicious node and hence, reducing the severity will be a complex problem due to similar characteristics with trusty nodes in sensing area. In this work, Adaptive Neuro Fuzzy Inference System (ANFIS) classifier based defected node identification system is developed. The conviction parameters to be extract of the reliable and malevolent nodes and these parameters are qualified by ANFIS classifier. Further, the individual nodes in MANET are classified in testing mode of classifier. The network performance will be degraded with the increased number of malicious nodes. Certain conditions like packet delivery ratio, throughput, detection rate, energy consumption, and precision value and link failures occur due to malicious node in the network. The anticipated malicious node detection structure be compare by means of the conservative techniques such as Optimized energy efficient routing protocol (OEERP), Low energy adaptive clustering hierarchy (LEACH), Data routing in network aggregation (DRINA)and Base station controlled dynamic clustering protocol (BCDCP). The proposed ANFIS classifier is designed in Matrix Laboratory (MATLAB) and it can be interfaced with NS2 using “c” programming.","PeriodicalId":44585,"journal":{"name":"Journal of Applied Security Research","volume":"18 1","pages":"402 - 420"},"PeriodicalIF":1.3,"publicationDate":"2021-11-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"46484280","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 13
One Vote Away: How a Single Supreme Court Seat Can Change History 一票之差:一个最高法院席位如何改变历史
IF 1.3 Q3 CRIMINOLOGY & PENOLOGY Pub Date : 2021-11-22 DOI: 10.1080/19361610.2021.1969865
H. Cooper
{"title":"One Vote Away: How a Single Supreme Court Seat Can Change History","authors":"H. Cooper","doi":"10.1080/19361610.2021.1969865","DOIUrl":"https://doi.org/10.1080/19361610.2021.1969865","url":null,"abstract":"","PeriodicalId":44585,"journal":{"name":"Journal of Applied Security Research","volume":"18 1","pages":"648 - 662"},"PeriodicalIF":1.3,"publicationDate":"2021-11-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"48525894","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Executing Effective Social Engineering Penetration Tests: A Qualitative Analysis 执行有效的社会工程渗透测试:定性分析
IF 1.3 Q3 CRIMINOLOGY & PENOLOGY Pub Date : 2021-11-14 DOI: 10.1080/19361610.2021.2002119
Kevin F. Steinmetz
Abstract Penetration testing is an increasingly common strategy adopted by organizations to mitigate security risks including those posed by social engineering—the deception of individuals for the purposes of circumventing information security measures. Drawing from 54 interviews with security auditors, IT professionals, and social engineers, this study explores participant descriptions of the (1) importance of social engineering penetration tests, (2) measurement of assessment outcomes, (3) use of penetration tests as part of security awareness programs, and (4) attitude social engineers should adopt in working with client organizations and their employees. Implications for security research and penetration testing are considered.
渗透测试是一种越来越普遍的策略,被组织用来降低安全风险,包括社会工程带来的风险——为了规避信息安全措施而欺骗个人。通过对安全审计员、IT专业人员和社会工程师的54次访谈,本研究探讨了参与者对以下方面的描述:(1)社会工程渗透测试的重要性,(2)评估结果的度量,(3)将渗透测试作为安全意识计划的一部分的使用,以及(4)社会工程师在与客户组织及其员工合作时应采取的态度。考虑了安全研究和渗透测试的含义。
{"title":"Executing Effective Social Engineering Penetration Tests: A Qualitative Analysis","authors":"Kevin F. Steinmetz","doi":"10.1080/19361610.2021.2002119","DOIUrl":"https://doi.org/10.1080/19361610.2021.2002119","url":null,"abstract":"Abstract Penetration testing is an increasingly common strategy adopted by organizations to mitigate security risks including those posed by social engineering—the deception of individuals for the purposes of circumventing information security measures. Drawing from 54 interviews with security auditors, IT professionals, and social engineers, this study explores participant descriptions of the (1) importance of social engineering penetration tests, (2) measurement of assessment outcomes, (3) use of penetration tests as part of security awareness programs, and (4) attitude social engineers should adopt in working with client organizations and their employees. Implications for security research and penetration testing are considered.","PeriodicalId":44585,"journal":{"name":"Journal of Applied Security Research","volume":"18 1","pages":"246 - 266"},"PeriodicalIF":1.3,"publicationDate":"2021-11-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"48649278","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Cybersecurity Policy Compliance in Higher Education: A Theoretical Framework 高等教育网络安全政策合规的理论框架
IF 1.3 Q3 CRIMINOLOGY & PENOLOGY Pub Date : 2021-10-27 DOI: 10.1080/19361610.2021.1989271
Salifu Yusif, Abdul Hafeez-Baig
Abstract HEIs Higher education institutions (HEIs) are open in their nature, decentralized, rich in population and private data, home to some ground-breaking research and innovations. They attract quite a substantial threat and cyberattacks due to their heavy reliance on the Internet. However, there is poor cybersecurity culture and low awareness that are motivated by generational differences that are characterized by “digital natives” and “digital residents” and gaps in technology savviness impacting cybersecurity compliance in specific higher education environments. The understanding of cybersecurity and organizational culture, compliance theory and protected motivated theory (PMT) respectively is key to achieving cybersecurity compliance.
摘要高等教育机构本质上是开放的、分散的、丰富的人口和私人数据,是一些突破性研究和创新的所在地。由于它们严重依赖互联网,因此吸引了相当大的威胁和网络攻击。然而,由于“数字原住民”和“数字居民”的代际差异以及影响特定高等教育环境中网络安全合规性的技术知识差距,网络安全文化较差,意识低下。分别理解网络安全和组织文化、合规理论和受保护动机理论是实现网络安全合规的关键。
{"title":"Cybersecurity Policy Compliance in Higher Education: A Theoretical Framework","authors":"Salifu Yusif, Abdul Hafeez-Baig","doi":"10.1080/19361610.2021.1989271","DOIUrl":"https://doi.org/10.1080/19361610.2021.1989271","url":null,"abstract":"Abstract HEIs Higher education institutions (HEIs) are open in their nature, decentralized, rich in population and private data, home to some ground-breaking research and innovations. They attract quite a substantial threat and cyberattacks due to their heavy reliance on the Internet. However, there is poor cybersecurity culture and low awareness that are motivated by generational differences that are characterized by “digital natives” and “digital residents” and gaps in technology savviness impacting cybersecurity compliance in specific higher education environments. The understanding of cybersecurity and organizational culture, compliance theory and protected motivated theory (PMT) respectively is key to achieving cybersecurity compliance.","PeriodicalId":44585,"journal":{"name":"Journal of Applied Security Research","volume":"18 1","pages":"267 - 288"},"PeriodicalIF":1.3,"publicationDate":"2021-10-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"44155242","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Fake News Detection Using Pos Tagging and Machine Learning 基于位置标记和机器学习的假新闻检测
IF 1.3 Q3 CRIMINOLOGY & PENOLOGY Pub Date : 2021-09-01 DOI: 10.1080/19361610.2021.1963605
Afreen Kansal
Abstract In this digital era, one major concern is not knowing what news to believe and not to believe. With the ever-growing progress being made in social media and technology, the problem has become more prominent. This also played a very important role in spreading fake information in this pandemic, creating chaos and worry throughout the world. Through the paper, I propose to understand and analyze the underlying writing style that can help in detecting fake news before it can be published, using a style-based approach in detection. An ensemble machine learning classification model was tried out to detect fake news.
摘要在这个数字时代,一个主要的问题是不知道该相信和不该相信什么新闻。随着社交媒体和技术的不断进步,这个问题变得更加突出。这也在这场疫情中传播虚假信息方面发挥了非常重要的作用,在全世界制造了混乱和担忧。通过这篇论文,我建议在假新闻发布之前,使用基于风格的检测方法来理解和分析有助于检测假新闻的潜在写作风格。尝试了一种集成的机器学习分类模型来检测假新闻。
{"title":"Fake News Detection Using Pos Tagging and Machine Learning","authors":"Afreen Kansal","doi":"10.1080/19361610.2021.1963605","DOIUrl":"https://doi.org/10.1080/19361610.2021.1963605","url":null,"abstract":"Abstract In this digital era, one major concern is not knowing what news to believe and not to believe. With the ever-growing progress being made in social media and technology, the problem has become more prominent. This also played a very important role in spreading fake information in this pandemic, creating chaos and worry throughout the world. Through the paper, I propose to understand and analyze the underlying writing style that can help in detecting fake news before it can be published, using a style-based approach in detection. An ensemble machine learning classification model was tried out to detect fake news.","PeriodicalId":44585,"journal":{"name":"Journal of Applied Security Research","volume":"18 1","pages":"164 - 179"},"PeriodicalIF":1.3,"publicationDate":"2021-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"47186690","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
A Comprehensive Review of the Internet of Things Security 物联网安全综述
IF 1.3 Q3 CRIMINOLOGY & PENOLOGY Pub Date : 2021-08-28 DOI: 10.1080/19361610.2021.1962677
Maroua Ahmid, O. Kazar
Abstract Currently, the Internet of Things (IoT) is the most contentious research subject. However, IoT still suffers from many security problems, and the security concerns are overgrowing with substantial IoT deployment. IoT will remain in danger unless understanding and addressing the security challenges. For this reason, this paper implements a full view of the IoT architecture and describes the characteristics and functionality of each layer. For a deeper understanding of IoT security challenges, we focus on identifying security requirements, and vulnerabilities in each IoT layer. Also, we discuss and classified the different security attacks in IoT.
目前,物联网(IoT)是最具争议的研究课题。然而,物联网仍然存在许多安全问题,并且随着物联网的大量部署,安全问题正在过度增长。除非理解并解决安全挑战,否则物联网仍将处于危险之中。因此,本文实现了物联网架构的完整视图,并描述了每一层的特征和功能。为了更深入地了解物联网安全挑战,我们专注于识别每个物联网层的安全需求和漏洞。此外,我们还讨论并分类了物联网中的不同安全攻击。
{"title":"A Comprehensive Review of the Internet of Things Security","authors":"Maroua Ahmid, O. Kazar","doi":"10.1080/19361610.2021.1962677","DOIUrl":"https://doi.org/10.1080/19361610.2021.1962677","url":null,"abstract":"Abstract Currently, the Internet of Things (IoT) is the most contentious research subject. However, IoT still suffers from many security problems, and the security concerns are overgrowing with substantial IoT deployment. IoT will remain in danger unless understanding and addressing the security challenges. For this reason, this paper implements a full view of the IoT architecture and describes the characteristics and functionality of each layer. For a deeper understanding of IoT security challenges, we focus on identifying security requirements, and vulnerabilities in each IoT layer. Also, we discuss and classified the different security attacks in IoT.","PeriodicalId":44585,"journal":{"name":"Journal of Applied Security Research","volume":"18 1","pages":"289 - 305"},"PeriodicalIF":1.3,"publicationDate":"2021-08-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"41411770","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 11
Problems of Proving the Electronic Arbitration Agreement in Applicable International Laws and Agreements 在适用的国际法和协议中证明电子仲裁协议的问题
IF 1.3 Q3 CRIMINOLOGY & PENOLOGY Pub Date : 2021-08-26 DOI: 10.1080/19361610.2021.1964324
Muawya Naser Al Dalaien, Ziad Al Enizi, Ahmad Al Dalaien

Abstract

This research deals with the legal problems faced by the proof of the electronic arbitration agreement in the national laws. The research ended with important results, one of them is at the level of national legislation, that some national legislations require the use of public-key technology in order for the electronic arbitration agreement to have evidentiary value, and other legislations do not require the use of a specific technology. The study concluded that the best solution at the international level is to make amendments to the New York Convention.

摘要 本研究涉及各国法律中电子仲裁协议的证明所面临的法律问题。研究得出了重要结果,其中之一是在国家立法层面,一些国家立法要求使用公钥技术才能使电子仲裁协议具有证据价值,而另一些国家立法则不要求使用特定技术。研究得出的结论是,国际层面的最佳解决方案是对《纽约公约》进行修订。
{"title":"Problems of Proving the Electronic Arbitration Agreement in Applicable International Laws and Agreements","authors":"Muawya Naser Al Dalaien, Ziad Al Enizi, Ahmad Al Dalaien","doi":"10.1080/19361610.2021.1964324","DOIUrl":"https://doi.org/10.1080/19361610.2021.1964324","url":null,"abstract":"<p><b>Abstract</b></p><p>This research deals with the legal problems faced by the proof of the electronic arbitration agreement in the national laws. The research ended with important results, one of them is at the level of national legislation, that some national legislations require the use of public-key technology in order for the electronic arbitration agreement to have evidentiary value, and other legislations do not require the use of a specific technology. The study concluded that the best solution at the international level is to make amendments to the New York Convention.</p>","PeriodicalId":44585,"journal":{"name":"Journal of Applied Security Research","volume":"6 1","pages":""},"PeriodicalIF":1.3,"publicationDate":"2021-08-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139103431","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Using Ethnography to Identify Deviant Behaviors, for the Development of Crime Prevention Interventions 利用人种学识别偏差行为,促进犯罪预防干预措施的发展
IF 1.3 Q3 CRIMINOLOGY & PENOLOGY Pub Date : 2021-07-26 DOI: 10.1080/19361610.2021.1956268
David Harding
Abstract This paper introduces a crime prevention methodology that focuses on deviant beliefs and behaviors. Situated between developmental and environmental crime prevention approaches, this empirical study utilized ethnographical methods to identify potential and active deviants and their support networks. Interventions were implemented through the community program of Neighborhood Watch, which focused on the identified deviant communities before the actuation of a burglary crime. Comparison between the pre-intervention period and intervention periods show the incidence of burglary crime reducing by 42%. If validated through replication, other fields that engage with active actors, such as insurgents, gangs, and terrorists, may have similar success.
摘要本文介绍了一种预防犯罪的方法,其重点是越轨的信仰和行为。本实证研究介于发展性和环境性犯罪预防方法之间,利用民族志方法识别潜在和活跃的越轨者及其支持网络。干预措施是通过邻里守望的社区计划实施的,该计划侧重于在入室盗窃犯罪发生之前确定的越轨社区。干预前和干预期的对比表明,入室盗窃犯罪率下降了42%。如果通过复制验证,其他与活跃参与者(如叛乱分子、帮派和恐怖分子)接触的领域可能也会取得类似的成功。
{"title":"Using Ethnography to Identify Deviant Behaviors, for the Development of Crime Prevention Interventions","authors":"David Harding","doi":"10.1080/19361610.2021.1956268","DOIUrl":"https://doi.org/10.1080/19361610.2021.1956268","url":null,"abstract":"Abstract This paper introduces a crime prevention methodology that focuses on deviant beliefs and behaviors. Situated between developmental and environmental crime prevention approaches, this empirical study utilized ethnographical methods to identify potential and active deviants and their support networks. Interventions were implemented through the community program of Neighborhood Watch, which focused on the identified deviant communities before the actuation of a burglary crime. Comparison between the pre-intervention period and intervention periods show the incidence of burglary crime reducing by 42%. If validated through replication, other fields that engage with active actors, such as insurgents, gangs, and terrorists, may have similar success.","PeriodicalId":44585,"journal":{"name":"Journal of Applied Security Research","volume":"18 1","pages":"180 - 201"},"PeriodicalIF":1.3,"publicationDate":"2021-07-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://sci-hub-pdf.com/10.1080/19361610.2021.1956268","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"48336326","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Simulating Interrogation in the Lab: Examining the Effectiveness of Physical Pain, Coercive Verbal Pressure, and Rapport-Building for Obtaining Reliable Information 在实验室模拟审讯:检验身体疼痛、强制性语言压力和建立可靠信息的关系的有效性
IF 1.3 Q3 CRIMINOLOGY & PENOLOGY Pub Date : 2021-07-22 DOI: 10.1080/19361610.2021.1949954
S. Houck, Joeann M. Salvati, A. Vrij, L. Newman
Abstract Three lab experiments used an interrogation simulation to examine the relative effectiveness of pain, coercive verbal pressure, and rapport-building for obtaining reliable information. Investigators questioned participants about information they were instructed to keep secret. We measured how many people gave reliable and unreliable information under pain (Study 1; N = 49), verbal pressure alone and in combination with pain (Study 2; N = 87), and verbal pressure and pain compared to a rapport-based interrogation (Study 3; N = 158). Results empirically support much of what field experts and scholars have previously claimed: pain and psychological coercion result in unreliable information.
摘要:三个实验室实验采用审讯模拟来检验疼痛、强制性语言压力和建立关系对获得可靠信息的相对有效性。调查人员询问了参与者被要求保密的信息。我们测量了有多少人在疼痛时给出了可靠和不可靠的信息(研究1;N = 49),单独言语压力和合并疼痛(研究2;N = 87),与基于关系的审讯相比,言语压力和疼痛(研究3;n = 158)。研究结果从经验上支持了许多领域专家和学者先前的说法:痛苦和心理胁迫会导致不可靠的信息。
{"title":"Simulating Interrogation in the Lab: Examining the Effectiveness of Physical Pain, Coercive Verbal Pressure, and Rapport-Building for Obtaining Reliable Information","authors":"S. Houck, Joeann M. Salvati, A. Vrij, L. Newman","doi":"10.1080/19361610.2021.1949954","DOIUrl":"https://doi.org/10.1080/19361610.2021.1949954","url":null,"abstract":"Abstract Three lab experiments used an interrogation simulation to examine the relative effectiveness of pain, coercive verbal pressure, and rapport-building for obtaining reliable information. Investigators questioned participants about information they were instructed to keep secret. We measured how many people gave reliable and unreliable information under pain (Study 1; N = 49), verbal pressure alone and in combination with pain (Study 2; N = 87), and verbal pressure and pain compared to a rapport-based interrogation (Study 3; N = 158). Results empirically support much of what field experts and scholars have previously claimed: pain and psychological coercion result in unreliable information.","PeriodicalId":44585,"journal":{"name":"Journal of Applied Security Research","volume":"18 1","pages":"137 - 163"},"PeriodicalIF":1.3,"publicationDate":"2021-07-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://sci-hub-pdf.com/10.1080/19361610.2021.1949954","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"47983981","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Application and Criminalization of Artificial Intelligence in the Digital Society: Security Threats and the Regulatory Challenges 数字社会中人工智能的应用和犯罪化:安全威胁和监管挑战
IF 1.3 Q3 CRIMINOLOGY & PENOLOGY Pub Date : 2021-07-19 DOI: 10.1080/19361610.2021.1947113
A. Mahmud
Abstract We are living in a technology-based digital society where the application of autonomous machines and artificial intelligence (AI) is growing rapidly and is having an impact on our social life and the public sphere. Like many other technologies, AI will open new doors for criminals, and consequently, social security has been threatened by different modes of AI criminalization. It is imposing a complex challenge to frame an effective regulatory framework. This article provided a structured literature analysis of the application and criminalization of AI by recommending principles for countering the regulatory challenges and protect the right of individuals.
我们生活在一个以技术为基础的数字社会,自主机器和人工智能(AI)的应用正在迅速发展,并对我们的社会生活和公共领域产生影响。像许多其他技术一样,人工智能将为犯罪分子打开新的大门,因此,社会安全受到了不同模式的人工智能犯罪的威胁。这给构建有效的监管框架带来了复杂的挑战。本文通过提出应对监管挑战和保护个人权利的原则,对人工智能的应用和刑事定罪进行了结构化的文献分析。
{"title":"Application and Criminalization of Artificial Intelligence in the Digital Society: Security Threats and the Regulatory Challenges","authors":"A. Mahmud","doi":"10.1080/19361610.2021.1947113","DOIUrl":"https://doi.org/10.1080/19361610.2021.1947113","url":null,"abstract":"Abstract We are living in a technology-based digital society where the application of autonomous machines and artificial intelligence (AI) is growing rapidly and is having an impact on our social life and the public sphere. Like many other technologies, AI will open new doors for criminals, and consequently, social security has been threatened by different modes of AI criminalization. It is imposing a complex challenge to frame an effective regulatory framework. This article provided a structured literature analysis of the application and criminalization of AI by recommending principles for countering the regulatory challenges and protect the right of individuals.","PeriodicalId":44585,"journal":{"name":"Journal of Applied Security Research","volume":"18 1","pages":"1 - 15"},"PeriodicalIF":1.3,"publicationDate":"2021-07-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://sci-hub-pdf.com/10.1080/19361610.2021.1947113","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"41376275","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
期刊
Journal of Applied Security Research
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1