首页 > 最新文献

Journal of Applied Security Research最新文献

英文 中文
From Conventional to Unconventional Mechanism: The Public Dilemma of Kidnapping Business in the South-East and South-South Regions of Nigeria 从常规机制到非常规机制:尼日利亚东南和南南地区绑架业务的公共困境
IF 1.3 Q3 CRIMINOLOGY & PENOLOGY Pub Date : 2021-07-16 DOI: 10.1080/19361610.2021.1947114
Otu Akanu Otu, A. Adedeji
Abstract Kidnapping activities has become the most recurring organized crime in strategic cities, villages and communities in southeast and south-south Nigeria. It has generated a frenzy-like situation among members of the public. It needs to be known why civil police with its dexterity for conventional mechanisms in crime prevention and control are incapacitated to combat recent spate of kidnapping activities in Nigeria. Some pertinent questions about menace of kidnapping in Nigeria are: Why did conventional approach fail to control kidnapping activities in Nigeria? What control strategies were put in place by the respective state governments in southern states? What is the philosophy behind the adoption of unconventional means? What are the instances of its effectiveness? Is there any backlash with this strategy? With fieldworks in two purposively selected states in the southern regions of Nigeria, the study recommends among others, the creation of a specialized court with the mandate to convict suspects/sponsors of kidnapping business if found guilty within a stipulated timeframe.
绑架活动已成为尼日利亚东南部和南南战略城市、村庄和社区最常见的有组织犯罪。这在公众中引发了一种疯狂的局面。需要知道的是,民警在预防和控制犯罪方面的传统机制很灵活,但却没有能力打击尼日利亚最近大量发生的绑架活动。关于尼日利亚绑架威胁的一些相关问题是:为什么传统方法无法控制尼日利亚的绑架活动?南方各州各自的州政府采取了哪些控制策略?采用非常规手段背后的哲学是什么?它的有效性有哪些实例?这一策略是否会引发反弹?通过在尼日利亚南部地区的两个州进行实地考察,该研究建议设立一个专门法庭,如果在规定的时间内被判有罪,就有权对绑架业务的嫌疑人/赞助者定罪。
{"title":"From Conventional to Unconventional Mechanism: The Public Dilemma of Kidnapping Business in the South-East and South-South Regions of Nigeria","authors":"Otu Akanu Otu, A. Adedeji","doi":"10.1080/19361610.2021.1947114","DOIUrl":"https://doi.org/10.1080/19361610.2021.1947114","url":null,"abstract":"Abstract Kidnapping activities has become the most recurring organized crime in strategic cities, villages and communities in southeast and south-south Nigeria. It has generated a frenzy-like situation among members of the public. It needs to be known why civil police with its dexterity for conventional mechanisms in crime prevention and control are incapacitated to combat recent spate of kidnapping activities in Nigeria. Some pertinent questions about menace of kidnapping in Nigeria are: Why did conventional approach fail to control kidnapping activities in Nigeria? What control strategies were put in place by the respective state governments in southern states? What is the philosophy behind the adoption of unconventional means? What are the instances of its effectiveness? Is there any backlash with this strategy? With fieldworks in two purposively selected states in the southern regions of Nigeria, the study recommends among others, the creation of a specialized court with the mandate to convict suspects/sponsors of kidnapping business if found guilty within a stipulated timeframe.","PeriodicalId":44585,"journal":{"name":"Journal of Applied Security Research","volume":"17 1","pages":"165 - 189"},"PeriodicalIF":1.3,"publicationDate":"2021-07-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://sci-hub-pdf.com/10.1080/19361610.2021.1947114","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"48921807","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Data Hiding Using PVD and Improving Security Using RSA 使用PVD隐藏数据和使用RSA提高安全性
IF 1.3 Q3 CRIMINOLOGY & PENOLOGY Pub Date : 2021-07-09 DOI: 10.1080/19361610.2021.1900692
Hemalatha Jeyaprakash, K. Kartheeban, A. Sahu, Balasubramanian Chokkalingam
Abstract Steganography deals with hiding information, which offers ultimate security in defense, profitable usages, thus sending the imperceptible information, will not be bare or distinguished by others. In this paper, a multidirectional PVD hiding scheme with RSA algorithm is proposed. Secret bits are embedded in three directions of a color image by dividing the non-overlapping blocks into R, G, b channels by selecting the minimum pixels of each block regrouping. In order to ensure the security of an stego-image, the work proposed by scheme is used, and in addition to that RSA algorithm is proposed.
摘要隐写术处理的是隐藏信息,它在防御方面提供了最终的安全性,并提供了有利可图的用途,从而发送了不可察觉的信息,不会被他人暴露或区分。本文提出了一种基于RSA算法的多向PVD隐藏方案。通过选择每个块的最小像素重新组合,将非重叠块划分为R、G、b通道,在彩色图像的三个方向上嵌入秘密比特。为了保证stego图像的安全性,使用了scheme提出的工作,并在此基础上提出了RSA算法。
{"title":"Data Hiding Using PVD and Improving Security Using RSA","authors":"Hemalatha Jeyaprakash, K. Kartheeban, A. Sahu, Balasubramanian Chokkalingam","doi":"10.1080/19361610.2021.1900692","DOIUrl":"https://doi.org/10.1080/19361610.2021.1900692","url":null,"abstract":"Abstract Steganography deals with hiding information, which offers ultimate security in defense, profitable usages, thus sending the imperceptible information, will not be bare or distinguished by others. In this paper, a multidirectional PVD hiding scheme with RSA algorithm is proposed. Secret bits are embedded in three directions of a color image by dividing the non-overlapping blocks into R, G, b channels by selecting the minimum pixels of each block regrouping. In order to ensure the security of an stego-image, the work proposed by scheme is used, and in addition to that RSA algorithm is proposed.","PeriodicalId":44585,"journal":{"name":"Journal of Applied Security Research","volume":"17 1","pages":"413 - 420"},"PeriodicalIF":1.3,"publicationDate":"2021-07-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://sci-hub-pdf.com/10.1080/19361610.2021.1900692","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"41411834","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
A Review-Based Taxonomy for Secure Health Care Monitoring: Wireless Smart Cameras 基于评论的安全医疗监控分类:无线智能摄像头
IF 1.3 Q3 CRIMINOLOGY & PENOLOGY Pub Date : 2021-07-05 DOI: 10.1080/19361610.2021.1947112
Ravi Teja Batchu, A. Alsadoon, P. Prasad, R. Ali, Tarik A. Rashid, Ghossoon Alsadoon, Oday D. Jerew
Abstract Health records data security is one of the main challenges in e-health systems. Authentication is one of the essential security services to support the stored data confidentiality, integrity, and availability. This research focuses on the secure storage of patient and medical records in the healthcare sector where data security and unauthorized access is an ongoing issue. A potential solution comes from biometrics, although their use may be time-consuming and can slow down data retrieval. The aim of this research is to overcome these challenges and enhance data access control in the healthcare sector through the addition of biometrics in the form of fingerprints. The proposed model for application in the healthcare sector consists of Collection, Network communication, and Authentication (CNA) using biometrics which replaces an existing, password-based access control method. A sensor then collects data, and by using a network (wireless or Zig-bee), a connection is established, after connectivity analytics and data management work which processes and aggregate the data. Subsequently, access is granted to authenticated users of the application. This IoT-based biometric authentication system facilitates effective recognition and ensures confidentiality, integrity, and reliability of patients’ records and other sensitive data. The proposed solution provides reliable access to healthcare data and enables secure access through the process of user and device authentication. The proposed model has been developed for access control to data through authentication of users in healthcare to reduce data manipulation or theft.
摘要健康记录数据安全是电子健康系统面临的主要挑战之一。身份验证是支持存储数据的机密性、完整性和可用性的重要安全服务之一。这项研究的重点是医疗保健部门中患者和医疗记录的安全存储,因为数据安全和未经授权的访问是一个持续存在的问题。一个潜在的解决方案来自生物识别技术,尽管它们的使用可能很耗时,并且会减慢数据检索速度。这项研究的目的是通过添加指纹形式的生物识别技术,克服这些挑战,加强医疗保健部门的数据访问控制。所提出的医疗保健领域应用模型包括收集、网络通信和身份验证(CNA),使用生物识别技术取代了现有的基于密码的访问控制方法。然后,传感器收集数据,并通过使用网络(无线或Zig-bee),在处理和聚合数据的连接分析和数据管理工作之后,建立连接。随后,将访问权限授予应用程序的已验证用户。这种基于物联网的生物识别认证系统有助于有效识别,并确保患者记录和其他敏感数据的机密性、完整性和可靠性。所提出的解决方案提供了对医疗保健数据的可靠访问,并通过用户和设备身份验证过程实现了安全访问。所提出的模型是为通过医疗保健中的用户身份验证来控制数据访问而开发的,以减少数据操纵或盗窃。
{"title":"A Review-Based Taxonomy for Secure Health Care Monitoring: Wireless Smart Cameras","authors":"Ravi Teja Batchu, A. Alsadoon, P. Prasad, R. Ali, Tarik A. Rashid, Ghossoon Alsadoon, Oday D. Jerew","doi":"10.1080/19361610.2021.1947112","DOIUrl":"https://doi.org/10.1080/19361610.2021.1947112","url":null,"abstract":"Abstract Health records data security is one of the main challenges in e-health systems. Authentication is one of the essential security services to support the stored data confidentiality, integrity, and availability. This research focuses on the secure storage of patient and medical records in the healthcare sector where data security and unauthorized access is an ongoing issue. A potential solution comes from biometrics, although their use may be time-consuming and can slow down data retrieval. The aim of this research is to overcome these challenges and enhance data access control in the healthcare sector through the addition of biometrics in the form of fingerprints. The proposed model for application in the healthcare sector consists of Collection, Network communication, and Authentication (CNA) using biometrics which replaces an existing, password-based access control method. A sensor then collects data, and by using a network (wireless or Zig-bee), a connection is established, after connectivity analytics and data management work which processes and aggregate the data. Subsequently, access is granted to authenticated users of the application. This IoT-based biometric authentication system facilitates effective recognition and ensures confidentiality, integrity, and reliability of patients’ records and other sensitive data. The proposed solution provides reliable access to healthcare data and enables secure access through the process of user and device authentication. The proposed model has been developed for access control to data through authentication of users in healthcare to reduce data manipulation or theft.","PeriodicalId":44585,"journal":{"name":"Journal of Applied Security Research","volume":"18 1","pages":"16 - 48"},"PeriodicalIF":1.3,"publicationDate":"2021-07-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://sci-hub-pdf.com/10.1080/19361610.2021.1947112","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"42476283","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Shoplifting in Shopping Malls in an Emerging Market: Evidence from Turkey 新兴市场的商场行窃:来自土耳其的证据
IF 1.3 Q3 CRIMINOLOGY & PENOLOGY Pub Date : 2021-06-21 DOI: 10.1080/19361610.2021.1933323
Mine Özaşçılar, Hakki Ozturk
Abstract Shoplifting is at serious retail crime for all retailers, which reduces profitability. This study investigates the extent and impact of shoplifting in shopping malls in Istanbul, Turkey. It specifically examines differences in the extent and impact of shoplifting by retail sector and shopping mall size and location. Data collection was based on 389 face-to-face interviews with store managers and shopping mall managers in Istanbul. The results revealed that shoplifting is a serious crime for all retail sectors and sizes of shopping malls. The implications for future studies and limitations of the current study are discussed.
摘要商店行窃对所有零售商来说都是严重的零售犯罪,它降低了盈利能力。本研究调查了土耳其伊斯坦布尔购物中心商店行窃的程度和影响。它具体考察了零售业、购物中心规模和位置在商店行窃程度和影响方面的差异。数据收集基于对伊斯坦布尔商店经理和购物中心经理的389次面对面采访。调查结果显示,商店行窃对所有零售业和购物中心规模来说都是严重犯罪。讨论了对未来研究的影响和当前研究的局限性。
{"title":"Shoplifting in Shopping Malls in an Emerging Market: Evidence from Turkey","authors":"Mine Özaşçılar, Hakki Ozturk","doi":"10.1080/19361610.2021.1933323","DOIUrl":"https://doi.org/10.1080/19361610.2021.1933323","url":null,"abstract":"Abstract Shoplifting is at serious retail crime for all retailers, which reduces profitability. This study investigates the extent and impact of shoplifting in shopping malls in Istanbul, Turkey. It specifically examines differences in the extent and impact of shoplifting by retail sector and shopping mall size and location. Data collection was based on 389 face-to-face interviews with store managers and shopping mall managers in Istanbul. The results revealed that shoplifting is a serious crime for all retail sectors and sizes of shopping malls. The implications for future studies and limitations of the current study are discussed.","PeriodicalId":44585,"journal":{"name":"Journal of Applied Security Research","volume":"18 1","pages":"70 - 85"},"PeriodicalIF":1.3,"publicationDate":"2021-06-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://sci-hub-pdf.com/10.1080/19361610.2021.1933323","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"46881071","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
A Review on Cryptocurrencies Security 加密货币安全综述
IF 1.3 Q3 CRIMINOLOGY & PENOLOGY Pub Date : 2021-06-11 DOI: 10.1080/19361610.2021.1933322
T. M. Navamani
Abstract Security and privacy are the two terms that are well connected with the current trends in cryptocurrency, and this study gives an extensive review of the same. Cryptocurrency adds security to the transaction flow and regulates the formation of additional units of currency. The massive growth in the market assessment of cryptocurrency leads to misuse of deficiencies for profit by adversaries. In this study, a review was made to focus on the security and protection measurements of cryptocurrencies specifically on Bitcoin. This study describes cryptocurrency conventions, their usefulness, and communications within the framework.
摘要安全和隐私是与加密货币当前趋势密切相关的两个术语,本研究对此进行了广泛的回顾。加密货币为交易流增加了安全性,并规范了额外货币单位的形成。加密货币市场评估的巨大增长导致对手滥用缺陷牟利。在这项研究中,对加密货币的安全和保护措施进行了审查,特别是比特币。本研究描述了加密货币约定、它们的有用性以及框架内的通信。
{"title":"A Review on Cryptocurrencies Security","authors":"T. M. Navamani","doi":"10.1080/19361610.2021.1933322","DOIUrl":"https://doi.org/10.1080/19361610.2021.1933322","url":null,"abstract":"Abstract Security and privacy are the two terms that are well connected with the current trends in cryptocurrency, and this study gives an extensive review of the same. Cryptocurrency adds security to the transaction flow and regulates the formation of additional units of currency. The massive growth in the market assessment of cryptocurrency leads to misuse of deficiencies for profit by adversaries. In this study, a review was made to focus on the security and protection measurements of cryptocurrencies specifically on Bitcoin. This study describes cryptocurrency conventions, their usefulness, and communications within the framework.","PeriodicalId":44585,"journal":{"name":"Journal of Applied Security Research","volume":"18 1","pages":"49 - 69"},"PeriodicalIF":1.3,"publicationDate":"2021-06-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://sci-hub-pdf.com/10.1080/19361610.2021.1933322","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"46761095","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 13
Security has Gone to Pot: An Analysis of Marijuana Cultivation Security Laws and Regulations in the United States 安全走向了大麻:美国大麻种植安全法律法规分析
IF 1.3 Q3 CRIMINOLOGY & PENOLOGY Pub Date : 2021-05-31 DOI: 10.1080/19361610.2021.1908103
Brian R. Johnson, C. Kierkus
Abstract Using the principle of defense in depth and Routine Activities Theory, and a qualitative methodology that led to the construction of themes and subthemes, it was found that the most common security requirements are related to detection-based elements that include camera-related and CCTV systems. Security requirements related to deterrence, delay, and response elements, while present in many states, are required to a lesser degree. These findings, therefore, suggest that not all state regulations and subsequent security policies have a comprehensive defense in depth strategy for the physical protection of commercial marijuana cultivation facilities.
摘要利用深度防御原理和日常活动理论,以及导致主题和子主题构建的定性方法,发现最常见的安全要求与基于检测的元素有关,包括与摄像头相关的和CCTV系统。与威慑、拖延和反应要素有关的安全要求虽然在许多州都存在,但要求的程度较低。因此,这些发现表明,并非所有的州法规和随后的安全政策都对商业大麻种植设施的物理保护有全面的纵深防御战略。
{"title":"Security has Gone to Pot: An Analysis of Marijuana Cultivation Security Laws and Regulations in the United States","authors":"Brian R. Johnson, C. Kierkus","doi":"10.1080/19361610.2021.1908103","DOIUrl":"https://doi.org/10.1080/19361610.2021.1908103","url":null,"abstract":"Abstract Using the principle of defense in depth and Routine Activities Theory, and a qualitative methodology that led to the construction of themes and subthemes, it was found that the most common security requirements are related to detection-based elements that include camera-related and CCTV systems. Security requirements related to deterrence, delay, and response elements, while present in many states, are required to a lesser degree. These findings, therefore, suggest that not all state regulations and subsequent security policies have a comprehensive defense in depth strategy for the physical protection of commercial marijuana cultivation facilities.","PeriodicalId":44585,"journal":{"name":"Journal of Applied Security Research","volume":"17 1","pages":"497 - 529"},"PeriodicalIF":1.3,"publicationDate":"2021-05-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://sci-hub-pdf.com/10.1080/19361610.2021.1908103","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"48430996","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Ethical Issues in Police Robots. The Case of Crowd Control Robots in a Pandemic 警用机器人的伦理问题。流行病中的人群控制机器人案例
IF 1.3 Q3 CRIMINOLOGY & PENOLOGY Pub Date : 2021-05-27 DOI: 10.1080/19361610.2021.1923365
K. Szocik, Rakhat Abylkasymova
Abstract Progress in automatization and robotization is unavoidable. However, while progress in some fields is relatively rapid, others including policing seem to be untouched by automatization. This article discusses arguments which favor the use of police robots, in particular crowd control robots. The special case of pandemics is discussed. The article argues that while we have some ethical issues associated with crowd control robots, in general, the benefits are higher than the possible risks.
自动化和机器人化的进步是不可避免的。然而,尽管一些领域的进展相对较快,但包括警务在内的其他领域似乎没有受到自动化的影响。本文讨论了支持使用警用机器人,特别是人群控制机器人的论点。讨论了流行病的特殊情况。文章认为,虽然我们在人群控制机器人方面存在一些道德问题,但总的来说,其收益高于可能的风险。
{"title":"Ethical Issues in Police Robots. The Case of Crowd Control Robots in a Pandemic","authors":"K. Szocik, Rakhat Abylkasymova","doi":"10.1080/19361610.2021.1923365","DOIUrl":"https://doi.org/10.1080/19361610.2021.1923365","url":null,"abstract":"Abstract Progress in automatization and robotization is unavoidable. However, while progress in some fields is relatively rapid, others including policing seem to be untouched by automatization. This article discusses arguments which favor the use of police robots, in particular crowd control robots. The special case of pandemics is discussed. The article argues that while we have some ethical issues associated with crowd control robots, in general, the benefits are higher than the possible risks.","PeriodicalId":44585,"journal":{"name":"Journal of Applied Security Research","volume":"17 1","pages":"530 - 545"},"PeriodicalIF":1.3,"publicationDate":"2021-05-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://sci-hub-pdf.com/10.1080/19361610.2021.1923365","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"47029418","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
A Conceptual Model for Cybersecurity Governance 网络安全治理的概念模型
IF 1.3 Q3 CRIMINOLOGY & PENOLOGY Pub Date : 2021-05-10 DOI: 10.1080/19361610.2021.1918995
Salifu Yusif, Abdul Hafeez-Baig
Abstract Cybersecurity is a growing problem associated with everything an individual or an organization does that is facilitated by the Internet. It is a multi-facetted program that can be addressed by cybersecurity governance. However, research has shown that many organizations face at least five basic challenges of cybersecurity. In this study, we developed a model for an effective cybersecurity governance that hopes to address these challenges, conceptualized as factors that must continuously be measured and evaluated. They are: (1) Cybersecurity strategy; (2) Standardized processes, (3) Compliance, (4) Senior leadership oversight, and (5) Resources.
摘要网络安全是一个日益严重的问题,与个人或组织在互联网推动下所做的一切有关。这是一个多方面的计划,可以通过网络安全治理来解决。然而,研究表明,许多组织在网络安全方面至少面临五个基本挑战。在这项研究中,我们开发了一个有效的网络安全治理模型,希望解决这些挑战,将其概念化为必须不断衡量和评估的因素。它们是:(1)网络安全战略;(2) 标准化流程,(3)合规性,(4)高级领导监督,以及(5)资源。
{"title":"A Conceptual Model for Cybersecurity Governance","authors":"Salifu Yusif, Abdul Hafeez-Baig","doi":"10.1080/19361610.2021.1918995","DOIUrl":"https://doi.org/10.1080/19361610.2021.1918995","url":null,"abstract":"Abstract Cybersecurity is a growing problem associated with everything an individual or an organization does that is facilitated by the Internet. It is a multi-facetted program that can be addressed by cybersecurity governance. However, research has shown that many organizations face at least five basic challenges of cybersecurity. In this study, we developed a model for an effective cybersecurity governance that hopes to address these challenges, conceptualized as factors that must continuously be measured and evaluated. They are: (1) Cybersecurity strategy; (2) Standardized processes, (3) Compliance, (4) Senior leadership oversight, and (5) Resources.","PeriodicalId":44585,"journal":{"name":"Journal of Applied Security Research","volume":"16 1","pages":"490 - 513"},"PeriodicalIF":1.3,"publicationDate":"2021-05-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://sci-hub-pdf.com/10.1080/19361610.2021.1918995","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"44187134","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 13
Adopting the Divide-and-Conquer Strategy for Use of Terrorists in Counterterrorism Through the Stag Hunt Game-Theoretic Environment 从阶段狩猎博弈论环境看利用恐怖分子实施分而治之的反恐策略
IF 1.3 Q3 CRIMINOLOGY & PENOLOGY Pub Date : 2021-05-06 DOI: 10.1080/19361610.2021.1908814
D. Atsa’am, R. Wario
Abstract This study interweaved the divide-and-conquer strategy with the stag hunt game to model a terrorism and counterterrorism environment. The records in the global terrorism database show that 98% of total terror attack incidents from 1970 to 2018 were targeted on law-abiding citizens/facilities, while 2% were targeted on terrorists. Three divide-and-conquer strategies are proposed: destruction of communication channels, payment of bribes, and fomenting distrust among terror groups. When these strategies are implemented, terrorists will effectively be used as tools in counterterrorism. Consequently, attacks on citizens will be reduced while attacks on terrorists will be increased.
本研究将分而治之策略与猎鹿游戏相结合,模拟恐怖主义和反恐环境。全球恐怖主义数据库记录显示,1970年至2018年,98%的恐怖袭击事件针对的是守法公民/设施,2%针对的是恐怖分子。他们提出了三种分而治之的策略:破坏沟通渠道、支付贿赂、煽动恐怖组织之间的不信任。一旦实施这些战略,恐怖分子将被有效地用作反恐的工具。因此,对市民的攻击将减少,而对恐怖分子的攻击将增加。
{"title":"Adopting the Divide-and-Conquer Strategy for Use of Terrorists in Counterterrorism Through the Stag Hunt Game-Theoretic Environment","authors":"D. Atsa’am, R. Wario","doi":"10.1080/19361610.2021.1908814","DOIUrl":"https://doi.org/10.1080/19361610.2021.1908814","url":null,"abstract":"Abstract This study interweaved the divide-and-conquer strategy with the stag hunt game to model a terrorism and counterterrorism environment. The records in the global terrorism database show that 98% of total terror attack incidents from 1970 to 2018 were targeted on law-abiding citizens/facilities, while 2% were targeted on terrorists. Three divide-and-conquer strategies are proposed: destruction of communication channels, payment of bribes, and fomenting distrust among terror groups. When these strategies are implemented, terrorists will effectively be used as tools in counterterrorism. Consequently, attacks on citizens will be reduced while attacks on terrorists will be increased.","PeriodicalId":44585,"journal":{"name":"Journal of Applied Security Research","volume":"18 1","pages":"128 - 136"},"PeriodicalIF":1.3,"publicationDate":"2021-05-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://sci-hub-pdf.com/10.1080/19361610.2021.1908814","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"48946097","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Advanced Classification Techniques for Improving Networks’ Intrusion Detection System Efficiency 提高网络入侵检测系统效率的高级分类技术
IF 1.3 Q3 CRIMINOLOGY & PENOLOGY Pub Date : 2021-05-05 DOI: 10.1080/19361610.2021.1918500
Mohammed Al-Enazi, Salim El Khediri
Abstract This research aims to enhance the accuracy and speed of the intrusion detection process by using the feature selection method to reduce the feature space dimensions that eliminate irrelevant features. Further, we employed ensemble learning in the UNSW-NB15 dataset, by using a classifier of the Stacking method, to prevent the intrusion detection system (IDS) from becoming archaic, to adjust it with a modern attack resistance feature, and to make it less costly. We used logistic regression as a meta-classifier and combined random forests, sequential minimal optimization (SMO), and naïve Bayes methods. Our approach allowed us to achieve 97.88% accuracy in intrusion detection.
摘要采用特征选择方法降低特征空间维数,剔除不相关特征,提高入侵检测过程的准确性和速度。此外,我们在UNSW-NB15数据集中使用集成学习,通过使用堆叠方法的分类器,防止入侵检测系统(IDS)过时,并使用现代攻击抵抗特征对其进行调整,并使其成本更低。我们使用逻辑回归作为元分类器,并结合随机森林、顺序最小优化(SMO)和naïve贝叶斯方法。我们的方法使我们在入侵检测中达到97.88%的准确率。
{"title":"Advanced Classification Techniques for Improving Networks’ Intrusion Detection System Efficiency","authors":"Mohammed Al-Enazi, Salim El Khediri","doi":"10.1080/19361610.2021.1918500","DOIUrl":"https://doi.org/10.1080/19361610.2021.1918500","url":null,"abstract":"Abstract This research aims to enhance the accuracy and speed of the intrusion detection process by using the feature selection method to reduce the feature space dimensions that eliminate irrelevant features. Further, we employed ensemble learning in the UNSW-NB15 dataset, by using a classifier of the Stacking method, to prevent the intrusion detection system (IDS) from becoming archaic, to adjust it with a modern attack resistance feature, and to make it less costly. We used logistic regression as a meta-classifier and combined random forests, sequential minimal optimization (SMO), and naïve Bayes methods. Our approach allowed us to achieve 97.88% accuracy in intrusion detection.","PeriodicalId":44585,"journal":{"name":"Journal of Applied Security Research","volume":"17 1","pages":"257 - 273"},"PeriodicalIF":1.3,"publicationDate":"2021-05-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://sci-hub-pdf.com/10.1080/19361610.2021.1918500","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"42864338","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
期刊
Journal of Applied Security Research
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1