Pub Date : 2022-01-01DOI: 10.1504/ijesdf.2022.10046538
Simranjot Kaur, Rajneesh Rani, Ritu Garg, N. Sharma
{"title":"State-of-the-art techniques for passive image forgery detection: a brief review","authors":"Simranjot Kaur, Rajneesh Rani, Ritu Garg, N. Sharma","doi":"10.1504/ijesdf.2022.10046538","DOIUrl":"https://doi.org/10.1504/ijesdf.2022.10046538","url":null,"abstract":"","PeriodicalId":54070,"journal":{"name":"International Journal of Electronic Security and Digital Forensics","volume":"2 1","pages":"456-473"},"PeriodicalIF":0.8,"publicationDate":"2022-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"77478279","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2022-01-01DOI: 10.1504/ijesdf.2022.10043964
G.M. Ishkibayeva, D. Nurmukhankyzy
{"title":"Problems of legal regulation of activities for the commercial use of space communications","authors":"G.M. Ishkibayeva, D. Nurmukhankyzy","doi":"10.1504/ijesdf.2022.10043964","DOIUrl":"https://doi.org/10.1504/ijesdf.2022.10043964","url":null,"abstract":"","PeriodicalId":54070,"journal":{"name":"International Journal of Electronic Security and Digital Forensics","volume":"149 1","pages":"474-487"},"PeriodicalIF":0.8,"publicationDate":"2022-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"79428648","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2022-01-01DOI: 10.1504/ijesdf.2022.10044518
Aashish Bhardwaj, V. Kumar
The COVID-19 pandemic has changed the working of almost all the organisations from physical to online mode, due to its social distancing norms. Working in online mode requires a collaboration platform for sharing documents, audio and video in real time. However, due to poor privacy barriers and ignorance of participants, pranksters, fraudsters and cyber criminals are able to breach the privacy in these collaborations. The present work highlights the privacy features of the popular collaboration tools and their implications for the users. Major privacy breach incidences have been presented along with the associated technological glitches. A privacy enhancement framework has been proposed with six significant pillars as: 1) user centric privacy design;2) compliance to privacy laws;3) access control;4) transparency;5) awareness and education;6) ethical contact tracing. The privacy framework will be able to take-up the privacy challenges in online collaboration, if properly implemented. Also, the framework is more user centric rather than organisation centric, hence it can be used by both the individual and institutional users.
{"title":"A framework for enhancing privacy in online collaboration","authors":"Aashish Bhardwaj, V. Kumar","doi":"10.1504/ijesdf.2022.10044518","DOIUrl":"https://doi.org/10.1504/ijesdf.2022.10044518","url":null,"abstract":"The COVID-19 pandemic has changed the working of almost all the organisations from physical to online mode, due to its social distancing norms. Working in online mode requires a collaboration platform for sharing documents, audio and video in real time. However, due to poor privacy barriers and ignorance of participants, pranksters, fraudsters and cyber criminals are able to breach the privacy in these collaborations. The present work highlights the privacy features of the popular collaboration tools and their implications for the users. Major privacy breach incidences have been presented along with the associated technological glitches. A privacy enhancement framework has been proposed with six significant pillars as: 1) user centric privacy design;2) compliance to privacy laws;3) access control;4) transparency;5) awareness and education;6) ethical contact tracing. The privacy framework will be able to take-up the privacy challenges in online collaboration, if properly implemented. Also, the framework is more user centric rather than organisation centric, hence it can be used by both the individual and institutional users.","PeriodicalId":54070,"journal":{"name":"International Journal of Electronic Security and Digital Forensics","volume":"55 1","pages":"413-432"},"PeriodicalIF":0.8,"publicationDate":"2022-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"84127809","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2022-01-01DOI: 10.1504/IJESDF.2022.10040479
B. A. Umitchinova, Y. Gavrilova, Galina A. Menzuk, Kairat O. Alembayev, D. Z. Kozhuganova
{"title":"Legal nature and transformation of the national security concept in the context of global challenges of the present (on the example of the Republic of Kazakhstan)","authors":"B. A. Umitchinova, Y. Gavrilova, Galina A. Menzuk, Kairat O. Alembayev, D. Z. Kozhuganova","doi":"10.1504/IJESDF.2022.10040479","DOIUrl":"https://doi.org/10.1504/IJESDF.2022.10040479","url":null,"abstract":"","PeriodicalId":54070,"journal":{"name":"International Journal of Electronic Security and Digital Forensics","volume":"59 1","pages":"264-273"},"PeriodicalIF":0.8,"publicationDate":"2022-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"82999885","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2022-01-01DOI: 10.1504/ijesdf.2022.126459
Vemuri Dwijesh Sai, P. Arya, S. Gupta, Srikrisnhudu Nagandla
{"title":"A framework for evaluating cyber forensic tools","authors":"Vemuri Dwijesh Sai, P. Arya, S. Gupta, Srikrisnhudu Nagandla","doi":"10.1504/ijesdf.2022.126459","DOIUrl":"https://doi.org/10.1504/ijesdf.2022.126459","url":null,"abstract":"","PeriodicalId":54070,"journal":{"name":"International Journal of Electronic Security and Digital Forensics","volume":"50 1","pages":"594-615"},"PeriodicalIF":0.8,"publicationDate":"2022-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"85668077","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2022-01-01DOI: 10.1504/ijesdf.2022.10045312
I. Leroy
{"title":"The relationship between cyber-attacks and dynamics of company stock: the role of reputation management","authors":"I. Leroy","doi":"10.1504/ijesdf.2022.10045312","DOIUrl":"https://doi.org/10.1504/ijesdf.2022.10045312","url":null,"abstract":"","PeriodicalId":54070,"journal":{"name":"International Journal of Electronic Security and Digital Forensics","volume":"1 1","pages":"309-317"},"PeriodicalIF":0.8,"publicationDate":"2022-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"83680148","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2022-01-01DOI: 10.1504/ijesdf.2022.10043341
Sasikala C, Vijayakumar Peroumal, Poornima E
{"title":"A Secured Data Sharing Framework for Dynamic Groups using an Attribute-based Cryptography in Public cloud: Agri-Cloud","authors":"Sasikala C, Vijayakumar Peroumal, Poornima E","doi":"10.1504/ijesdf.2022.10043341","DOIUrl":"https://doi.org/10.1504/ijesdf.2022.10043341","url":null,"abstract":"","PeriodicalId":54070,"journal":{"name":"International Journal of Electronic Security and Digital Forensics","volume":"1 1","pages":""},"PeriodicalIF":0.8,"publicationDate":"2022-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"66715189","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2022-01-01DOI: 10.1504/ijesdf.2022.121181
V. Sawant, A. Bhise
{"title":"Hybrid turbo code for information security and reliability","authors":"V. Sawant, A. Bhise","doi":"10.1504/ijesdf.2022.121181","DOIUrl":"https://doi.org/10.1504/ijesdf.2022.121181","url":null,"abstract":"","PeriodicalId":54070,"journal":{"name":"International Journal of Electronic Security and Digital Forensics","volume":"65 18","pages":"165-187"},"PeriodicalIF":0.8,"publicationDate":"2022-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"72367704","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2022-01-01DOI: 10.1504/ijesdf.2022.125399
Rupashree Sahoo, Paromita Chattoraj
{"title":"Child pornography through cyberspace - a comparative analysis of laws and criminal justice responses in India, USA, UK and Japan","authors":"Rupashree Sahoo, Paromita Chattoraj","doi":"10.1504/ijesdf.2022.125399","DOIUrl":"https://doi.org/10.1504/ijesdf.2022.125399","url":null,"abstract":"","PeriodicalId":54070,"journal":{"name":"International Journal of Electronic Security and Digital Forensics","volume":"99 1","pages":"433-455"},"PeriodicalIF":0.8,"publicationDate":"2022-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"77097942","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2022-01-01DOI: 10.1504/IJESDF.2022.10039939
E. Nurtazin, Aizhan Kozhaknmetova, K. A. Sultankulova, Baktygul K. Ilyasova, G. Teleuyev
{"title":"The role and problems of legal culture in the social security of the population of the Republic of Kazakhstan","authors":"E. Nurtazin, Aizhan Kozhaknmetova, K. A. Sultankulova, Baktygul K. Ilyasova, G. Teleuyev","doi":"10.1504/IJESDF.2022.10039939","DOIUrl":"https://doi.org/10.1504/IJESDF.2022.10039939","url":null,"abstract":"","PeriodicalId":54070,"journal":{"name":"International Journal of Electronic Security and Digital Forensics","volume":"105 1","pages":"223-237"},"PeriodicalIF":0.8,"publicationDate":"2022-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"90850317","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}