首页 > 最新文献

Journal of Applied Security Research最新文献

英文 中文
Addressing the Threat of a bioterrorist Attack by Means of an Unmanned Drone 应对利用无人机进行生物恐怖袭击的威胁
IF 1.3 Q1 Social Sciences Pub Date : 2022-01-05 DOI: 10.1080/19361610.2021.2018923
Katalin Pethő-Kiss
Abstract As drone technology advances, the potential for illicit criminal exploitation of these unmanned capabilities has been escalating. There has been an ever-growing concern about the peril posed by a drone attack delivering a biological payload into a vulnerable terrorist target. To achieve a more realistic understanding of this threat and to enhance existing national security arrangements to this scenario, this paper attempts to provide a novel approach for counter policies and procedures for the prevention, preparedness and response. With this in mind, criminal activities attempting to conduct a bioattack by means of an UAV are insightfully scrutinized. To do this, the phases of perpetration provide the basis for this discussion. In each phase of commission, the potential threat indicators of malevolent non-state actor activities are identified and accordingly, the most effective countermeasures designed.
摘要随着无人机技术的进步,非法利用这些无人驾驶能力的可能性不断升级。人们越来越担心无人机将生物有效载荷送入易受攻击的恐怖目标所带来的危险。为了更现实地理解这种威胁,并加强现有的国家安全安排,以应对这种情况,本文试图为预防、准备和应对的反政策和程序提供一种新的方法。考虑到这一点,对试图通过无人机进行生物攻击的犯罪活动进行了深入审查。为了做到这一点,犯罪的各个阶段为这一讨论提供了基础。在委员会的每个阶段,都会确定恶意非国家行为者活动的潜在威胁指标,并据此制定最有效的对策。
{"title":"Addressing the Threat of a bioterrorist Attack by Means of an Unmanned Drone","authors":"Katalin Pethő-Kiss","doi":"10.1080/19361610.2021.2018923","DOIUrl":"https://doi.org/10.1080/19361610.2021.2018923","url":null,"abstract":"Abstract As drone technology advances, the potential for illicit criminal exploitation of these unmanned capabilities has been escalating. There has been an ever-growing concern about the peril posed by a drone attack delivering a biological payload into a vulnerable terrorist target. To achieve a more realistic understanding of this threat and to enhance existing national security arrangements to this scenario, this paper attempts to provide a novel approach for counter policies and procedures for the prevention, preparedness and response. With this in mind, criminal activities attempting to conduct a bioattack by means of an UAV are insightfully scrutinized. To do this, the phases of perpetration provide the basis for this discussion. In each phase of commission, the potential threat indicators of malevolent non-state actor activities are identified and accordingly, the most effective countermeasures designed.","PeriodicalId":44585,"journal":{"name":"Journal of Applied Security Research","volume":null,"pages":null},"PeriodicalIF":1.3,"publicationDate":"2022-01-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"45281648","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
A Study of Lightweight Approaches to Analyze Crime Conditions in India 分析印度犯罪状况的轻量级方法研究
IF 1.3 Q1 Social Sciences Pub Date : 2021-12-02 DOI: 10.1080/19361610.2021.2006031
B. Saini, Dinesh Saini, S. Srivastava, Mayank Aggarwal
Abstract Crime prediction is an effort to cut down the crime rate and criminal activities in the society. This paper concentrates on monitoring the crime trends in India using data from 2001 to 2019. The work analyzes the crime condition in India by following a top-to bottom approach and implementing visualization and machine learning algorithms. Heat map visualization of India is done to focus on specific crime types for all states. Furthermore, various demography of human population like age-groups, sex, caste, etc., are considered to have a larger perspective of the issue. The model also suggest proactive measures based on these findings.
摘要犯罪预测是为了降低犯罪率和减少社会犯罪活动。本文利用2001年至2019年的数据,重点监测印度的犯罪趋势。这项工作通过自上而下的方法分析了印度的犯罪状况,并实现了可视化和机器学习算法。印度热图可视化是为了关注所有邦的特定犯罪类型。此外,各种人口统计学,如年龄组、性别、种姓等,被认为对这个问题有更大的看法。该模型还提出了基于这些发现的积极措施。
{"title":"A Study of Lightweight Approaches to Analyze Crime Conditions in India","authors":"B. Saini, Dinesh Saini, S. Srivastava, Mayank Aggarwal","doi":"10.1080/19361610.2021.2006031","DOIUrl":"https://doi.org/10.1080/19361610.2021.2006031","url":null,"abstract":"Abstract Crime prediction is an effort to cut down the crime rate and criminal activities in the society. This paper concentrates on monitoring the crime trends in India using data from 2001 to 2019. The work analyzes the crime condition in India by following a top-to bottom approach and implementing visualization and machine learning algorithms. Heat map visualization of India is done to focus on specific crime types for all states. Furthermore, various demography of human population like age-groups, sex, caste, etc., are considered to have a larger perspective of the issue. The model also suggest proactive measures based on these findings.","PeriodicalId":44585,"journal":{"name":"Journal of Applied Security Research","volume":null,"pages":null},"PeriodicalIF":1.3,"publicationDate":"2021-12-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"43338399","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Securing Relational Databases against Security Vulnerabilities: A Case of Microsoft SQL Server and PostgreSQL 关系型数据库的安全防范:以Microsoft SQL Server和PostgreSQL为例
IF 1.3 Q1 Social Sciences Pub Date : 2021-11-29 DOI: 10.1080/19361610.2021.2006032
Hassan Kilavo, Salehe I. Mrutu, Robert G. Dudu
Abstract This study evaluates mechanisms to secure relational databases against security vulnerabilities and utilized PostgreSQL and Microsoft SQL Server due to data breach incidences reported across the world. Emulation experiments with documentary review were employed to collect necessary study data. Identification of security features and vulnerabilities that are found to affect the data tier of the web applications were examined. The findings from the study have shown that Microsoft SQL Server is more security feature-rich in terms of Confidentiality, Integrity, and Availability compared to PostgreSQL and Microsoft SQL Server is more resilient to security attacks in its default behavior compared to PostgreSQL.
摘要本研究评估了保护关系数据库免受安全漏洞影响的机制,并因世界各地报告的数据泄露事件而使用PostgreSQL和Microsoft SQL Server。采用文献综述的仿真实验来收集必要的研究数据。对影响网络应用程序数据层的安全功能和漏洞的识别进行了检查。研究结果表明,与PostgreSQL相比,Microsoft SQL Server在机密性、完整性和可用性方面具有更丰富的安全功能,并且与PostgreQL相比,Microsoft SQL Server在默认行为下更能抵御安全攻击。
{"title":"Securing Relational Databases against Security Vulnerabilities: A Case of Microsoft SQL Server and PostgreSQL","authors":"Hassan Kilavo, Salehe I. Mrutu, Robert G. Dudu","doi":"10.1080/19361610.2021.2006032","DOIUrl":"https://doi.org/10.1080/19361610.2021.2006032","url":null,"abstract":"Abstract This study evaluates mechanisms to secure relational databases against security vulnerabilities and utilized PostgreSQL and Microsoft SQL Server due to data breach incidences reported across the world. Emulation experiments with documentary review were employed to collect necessary study data. Identification of security features and vulnerabilities that are found to affect the data tier of the web applications were examined. The findings from the study have shown that Microsoft SQL Server is more security feature-rich in terms of Confidentiality, Integrity, and Availability compared to PostgreSQL and Microsoft SQL Server is more resilient to security attacks in its default behavior compared to PostgreSQL.","PeriodicalId":44585,"journal":{"name":"Journal of Applied Security Research","volume":null,"pages":null},"PeriodicalIF":1.3,"publicationDate":"2021-11-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"45828478","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Achieving Cyber Power Through Integrated Government Capability: Factors Jeopardizing Civil-Military Cooperation on Cyber Defense 通过综合政府能力实现网络力量:影响网络防御军民合作的因素
IF 1.3 Q1 Social Sciences Pub Date : 2021-11-26 DOI: 10.1080/19361610.2021.2006033
Roman Pačka, M. Mareš
Abstract The article examines one narrowly focused aspect of the government interagency cooperation on cyber defense that serves as a basis to achieve a cyber power. It reviews the civil-military interagency cooperation and aims to identify factors that could jeopardize it. First, it provides a theoretical background for the research and then according to interviews and surveys, the factors with the highest negative impact are recognized. Based on this research, the most significant challenges in bridging the gap between civilian and military worlds seems to be power and budget struggles and a lack of political direction on cyber matters from leaders.
本文考察了政府在网络防御方面的机构间合作的一个狭义方面,该合作是实现网络力量的基础。它审查了军民机构间的合作,旨在确定可能危及这种合作的因素。首先为研究提供理论背景,然后通过访谈和调查,识别出负面影响最大的因素。根据这项研究,弥合民用和军事世界之间差距的最重大挑战似乎是权力和预算斗争,以及领导人在网络问题上缺乏政治方向。
{"title":"Achieving Cyber Power Through Integrated Government Capability: Factors Jeopardizing Civil-Military Cooperation on Cyber Defense","authors":"Roman Pačka, M. Mareš","doi":"10.1080/19361610.2021.2006033","DOIUrl":"https://doi.org/10.1080/19361610.2021.2006033","url":null,"abstract":"Abstract The article examines one narrowly focused aspect of the government interagency cooperation on cyber defense that serves as a basis to achieve a cyber power. It reviews the civil-military interagency cooperation and aims to identify factors that could jeopardize it. First, it provides a theoretical background for the research and then according to interviews and surveys, the factors with the highest negative impact are recognized. Based on this research, the most significant challenges in bridging the gap between civilian and military worlds seems to be power and budget struggles and a lack of political direction on cyber matters from leaders.","PeriodicalId":44585,"journal":{"name":"Journal of Applied Security Research","volume":null,"pages":null},"PeriodicalIF":1.3,"publicationDate":"2021-11-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"46099547","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
The Concept of Lawful Behavior in the Digital Age 数字时代的合法行为概念
IF 1.3 Q1 Social Sciences Pub Date : 2021-11-26 DOI: 10.1080/19361610.2021.2006034
R. Zhamiyeva, L. Arenova, A. Serikbayev, B. Zhakupov, G. Balgimbekova
Abstract The global situation with cybercrime is worsening. The study aims to investigate the concept of lawful behavior in the context of challenges facing the IT sector and from the perspective of previous and modern theoretical and legal views concerning the formation of lawful behavior. The paper outlines factors that shape the lawful behavior of digital natives. The results of the literature review suggest that a digital shift of legal relations objectively reduces the role of the socio-hierarchical factor in the formation of lawful behavior. This research is of practical interest to specialists in legal and sociological fields.
全球网络犯罪形势日益严峻。本研究旨在从过去和现代关于合法行为形成的理论和法律观点出发,在IT行业面临挑战的背景下,对合法行为的概念进行考察。本文概述了影响数字原生代合法行为的因素。文献综述的结果表明,法律关系的数字化转变客观上降低了社会等级因素在合法行为形成中的作用。这项研究对法律和社会学领域的专家具有实际意义。
{"title":"The Concept of Lawful Behavior in the Digital Age","authors":"R. Zhamiyeva, L. Arenova, A. Serikbayev, B. Zhakupov, G. Balgimbekova","doi":"10.1080/19361610.2021.2006034","DOIUrl":"https://doi.org/10.1080/19361610.2021.2006034","url":null,"abstract":"Abstract The global situation with cybercrime is worsening. The study aims to investigate the concept of lawful behavior in the context of challenges facing the IT sector and from the perspective of previous and modern theoretical and legal views concerning the formation of lawful behavior. The paper outlines factors that shape the lawful behavior of digital natives. The results of the literature review suggest that a digital shift of legal relations objectively reduces the role of the socio-hierarchical factor in the formation of lawful behavior. This research is of practical interest to specialists in legal and sociological fields.","PeriodicalId":44585,"journal":{"name":"Journal of Applied Security Research","volume":null,"pages":null},"PeriodicalIF":1.3,"publicationDate":"2021-11-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"44540818","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Modeling Public Policy: Influences on Terrorism and Public Opinion 公共政策建模:对恐怖主义和公众舆论的影响
IF 1.3 Q1 Social Sciences Pub Date : 2021-11-25 DOI: 10.1080/19361610.2021.2005503
Omi Hodwitz, Seth L. King
Abstract This article examines the effects of counterterrorism policy in Canada, the United States, and the United Kingdom between 1997 and 2016. We use time series analysis and series hazard models to examine the influence of policy on (a) incidents of terrorist violence and (b) citizen perceptions of the threat of terrorism. Results indicate that counterterrorism policy is, for the most part, not related to significant changes in Canada but does report significant results for public opinion and terrorist incidents in the United States and the United Kingdom, although these effects are temporally defined.
摘要本文考察了1997年至2016年间加拿大、美国和英国反恐政策的影响。我们使用时间序列分析和序列风险模型来检验政策对(a)恐怖主义暴力事件和(b)公民对恐怖主义威胁的感知的影响。结果表明,反恐政策在很大程度上与加拿大的重大变化无关,但确实报告了美国和英国的舆论和恐怖事件的重大结果,尽管这些影响是暂时确定的。
{"title":"Modeling Public Policy: Influences on Terrorism and Public Opinion","authors":"Omi Hodwitz, Seth L. King","doi":"10.1080/19361610.2021.2005503","DOIUrl":"https://doi.org/10.1080/19361610.2021.2005503","url":null,"abstract":"Abstract This article examines the effects of counterterrorism policy in Canada, the United States, and the United Kingdom between 1997 and 2016. We use time series analysis and series hazard models to examine the influence of policy on (a) incidents of terrorist violence and (b) citizen perceptions of the threat of terrorism. Results indicate that counterterrorism policy is, for the most part, not related to significant changes in Canada but does report significant results for public opinion and terrorist incidents in the United States and the United Kingdom, although these effects are temporally defined.","PeriodicalId":44585,"journal":{"name":"Journal of Applied Security Research","volume":null,"pages":null},"PeriodicalIF":1.3,"publicationDate":"2021-11-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"47102047","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Cluster Based Malicious Node Detection System for Mobile Ad-Hoc Network Using ANFIS Classifier 基于ANFIS分类器的移动Ad-Hoc网络恶意节点检测系统
IF 1.3 Q1 Social Sciences Pub Date : 2021-11-24 DOI: 10.1080/19361610.2021.2002118
Gopalakrishnan Subburayalu, Hemanand Duraivelu, Arunprasath Raveendran, Rajesh Arunachalam, Deepika Kongara, C. Thangavel
Abstract Improvement of efficient packet access in a wireless Mobile Ad-Hoc network (MANET) is vital for achieving high speed data rate. The degradation occurs due to identification of malicious node and hence, reducing the severity will be a complex problem due to similar characteristics with trusty nodes in sensing area. In this work, Adaptive Neuro Fuzzy Inference System (ANFIS) classifier based defected node identification system is developed. The conviction parameters to be extract of the reliable and malevolent nodes and these parameters are qualified by ANFIS classifier. Further, the individual nodes in MANET are classified in testing mode of classifier. The network performance will be degraded with the increased number of malicious nodes. Certain conditions like packet delivery ratio, throughput, detection rate, energy consumption, and precision value and link failures occur due to malicious node in the network. The anticipated malicious node detection structure be compare by means of the conservative techniques such as Optimized energy efficient routing protocol (OEERP), Low energy adaptive clustering hierarchy (LEACH), Data routing in network aggregation (DRINA)and Base station controlled dynamic clustering protocol (BCDCP). The proposed ANFIS classifier is designed in Matrix Laboratory (MATLAB) and it can be interfaced with NS2 using “c” programming.
摘要提高无线移动自组网(MANET)的分组访问效率是实现高速数据传输的关键。由于感知区域内的恶意节点与可信节点具有相似的特性,因此由于恶意节点的识别会导致降级,降低严重程度将是一个复杂的问题。本文研究了基于自适应神经模糊推理系统(ANFIS)分类器的缺陷节点识别系统。利用ANFIS分类器对需要提取的可靠节点和恶意节点的定罪参数进行鉴定。在此基础上,采用分类器测试模式对MANET中的单个节点进行分类。随着恶意节点数量的增加,网络性能将会下降。由于网络中存在恶意节点,会导致报文投递率、吞吐量、检测率、能耗、精度值、链路故障等情况发生。采用优化节能路由协议(OEERP)、低能量自适应聚类层次协议(LEACH)、网络聚合中的数据路由(DRINA)和基站控制动态聚类协议(BCDCP)等保守技术,比较了预期的恶意节点检测结构。所提出的ANFIS分类器是在MATLAB中设计的,并可以使用c编程与NS2接口。
{"title":"Cluster Based Malicious Node Detection System for Mobile Ad-Hoc Network Using ANFIS Classifier","authors":"Gopalakrishnan Subburayalu, Hemanand Duraivelu, Arunprasath Raveendran, Rajesh Arunachalam, Deepika Kongara, C. Thangavel","doi":"10.1080/19361610.2021.2002118","DOIUrl":"https://doi.org/10.1080/19361610.2021.2002118","url":null,"abstract":"Abstract Improvement of efficient packet access in a wireless Mobile Ad-Hoc network (MANET) is vital for achieving high speed data rate. The degradation occurs due to identification of malicious node and hence, reducing the severity will be a complex problem due to similar characteristics with trusty nodes in sensing area. In this work, Adaptive Neuro Fuzzy Inference System (ANFIS) classifier based defected node identification system is developed. The conviction parameters to be extract of the reliable and malevolent nodes and these parameters are qualified by ANFIS classifier. Further, the individual nodes in MANET are classified in testing mode of classifier. The network performance will be degraded with the increased number of malicious nodes. Certain conditions like packet delivery ratio, throughput, detection rate, energy consumption, and precision value and link failures occur due to malicious node in the network. The anticipated malicious node detection structure be compare by means of the conservative techniques such as Optimized energy efficient routing protocol (OEERP), Low energy adaptive clustering hierarchy (LEACH), Data routing in network aggregation (DRINA)and Base station controlled dynamic clustering protocol (BCDCP). The proposed ANFIS classifier is designed in Matrix Laboratory (MATLAB) and it can be interfaced with NS2 using “c” programming.","PeriodicalId":44585,"journal":{"name":"Journal of Applied Security Research","volume":null,"pages":null},"PeriodicalIF":1.3,"publicationDate":"2021-11-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"46484280","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 13
One Vote Away: How a Single Supreme Court Seat Can Change History 一票之差:一个最高法院席位如何改变历史
IF 1.3 Q1 Social Sciences Pub Date : 2021-11-22 DOI: 10.1080/19361610.2021.1969865
H. Cooper
{"title":"One Vote Away: How a Single Supreme Court Seat Can Change History","authors":"H. Cooper","doi":"10.1080/19361610.2021.1969865","DOIUrl":"https://doi.org/10.1080/19361610.2021.1969865","url":null,"abstract":"","PeriodicalId":44585,"journal":{"name":"Journal of Applied Security Research","volume":null,"pages":null},"PeriodicalIF":1.3,"publicationDate":"2021-11-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"48525894","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Executing Effective Social Engineering Penetration Tests: A Qualitative Analysis 执行有效的社会工程渗透测试:定性分析
IF 1.3 Q1 Social Sciences Pub Date : 2021-11-14 DOI: 10.1080/19361610.2021.2002119
Kevin F. Steinmetz
Abstract Penetration testing is an increasingly common strategy adopted by organizations to mitigate security risks including those posed by social engineering—the deception of individuals for the purposes of circumventing information security measures. Drawing from 54 interviews with security auditors, IT professionals, and social engineers, this study explores participant descriptions of the (1) importance of social engineering penetration tests, (2) measurement of assessment outcomes, (3) use of penetration tests as part of security awareness programs, and (4) attitude social engineers should adopt in working with client organizations and their employees. Implications for security research and penetration testing are considered.
渗透测试是一种越来越普遍的策略,被组织用来降低安全风险,包括社会工程带来的风险——为了规避信息安全措施而欺骗个人。通过对安全审计员、IT专业人员和社会工程师的54次访谈,本研究探讨了参与者对以下方面的描述:(1)社会工程渗透测试的重要性,(2)评估结果的度量,(3)将渗透测试作为安全意识计划的一部分的使用,以及(4)社会工程师在与客户组织及其员工合作时应采取的态度。考虑了安全研究和渗透测试的含义。
{"title":"Executing Effective Social Engineering Penetration Tests: A Qualitative Analysis","authors":"Kevin F. Steinmetz","doi":"10.1080/19361610.2021.2002119","DOIUrl":"https://doi.org/10.1080/19361610.2021.2002119","url":null,"abstract":"Abstract Penetration testing is an increasingly common strategy adopted by organizations to mitigate security risks including those posed by social engineering—the deception of individuals for the purposes of circumventing information security measures. Drawing from 54 interviews with security auditors, IT professionals, and social engineers, this study explores participant descriptions of the (1) importance of social engineering penetration tests, (2) measurement of assessment outcomes, (3) use of penetration tests as part of security awareness programs, and (4) attitude social engineers should adopt in working with client organizations and their employees. Implications for security research and penetration testing are considered.","PeriodicalId":44585,"journal":{"name":"Journal of Applied Security Research","volume":null,"pages":null},"PeriodicalIF":1.3,"publicationDate":"2021-11-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"48649278","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Cybersecurity Policy Compliance in Higher Education: A Theoretical Framework 高等教育网络安全政策合规的理论框架
IF 1.3 Q1 Social Sciences Pub Date : 2021-10-27 DOI: 10.1080/19361610.2021.1989271
Salifu Yusif, Abdul Hafeez-Baig
Abstract HEIs Higher education institutions (HEIs) are open in their nature, decentralized, rich in population and private data, home to some ground-breaking research and innovations. They attract quite a substantial threat and cyberattacks due to their heavy reliance on the Internet. However, there is poor cybersecurity culture and low awareness that are motivated by generational differences that are characterized by “digital natives” and “digital residents” and gaps in technology savviness impacting cybersecurity compliance in specific higher education environments. The understanding of cybersecurity and organizational culture, compliance theory and protected motivated theory (PMT) respectively is key to achieving cybersecurity compliance.
摘要高等教育机构本质上是开放的、分散的、丰富的人口和私人数据,是一些突破性研究和创新的所在地。由于它们严重依赖互联网,因此吸引了相当大的威胁和网络攻击。然而,由于“数字原住民”和“数字居民”的代际差异以及影响特定高等教育环境中网络安全合规性的技术知识差距,网络安全文化较差,意识低下。分别理解网络安全和组织文化、合规理论和受保护动机理论是实现网络安全合规的关键。
{"title":"Cybersecurity Policy Compliance in Higher Education: A Theoretical Framework","authors":"Salifu Yusif, Abdul Hafeez-Baig","doi":"10.1080/19361610.2021.1989271","DOIUrl":"https://doi.org/10.1080/19361610.2021.1989271","url":null,"abstract":"Abstract HEIs Higher education institutions (HEIs) are open in their nature, decentralized, rich in population and private data, home to some ground-breaking research and innovations. They attract quite a substantial threat and cyberattacks due to their heavy reliance on the Internet. However, there is poor cybersecurity culture and low awareness that are motivated by generational differences that are characterized by “digital natives” and “digital residents” and gaps in technology savviness impacting cybersecurity compliance in specific higher education environments. The understanding of cybersecurity and organizational culture, compliance theory and protected motivated theory (PMT) respectively is key to achieving cybersecurity compliance.","PeriodicalId":44585,"journal":{"name":"Journal of Applied Security Research","volume":null,"pages":null},"PeriodicalIF":1.3,"publicationDate":"2021-10-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"44155242","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
期刊
Journal of Applied Security Research
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1