Subjects -> LAW (Total: 1523 journals)
    - CIVIL LAW (36 journals)
    - CONSTITUTIONAL LAW (51 journals)
    - CORPORATE LAW (90 journals)
    - CRIMINAL LAW (27 journals)
    - CRIMINOLOGY AND LAW ENFORCEMENT (152 journals)
    - FAMILY AND MATRIMONIAL LAW (23 journals)
    - INTERNATIONAL LAW (190 journals)
    - JUDICIAL SYSTEMS (22 journals)
    - LAW (923 journals)
    - LAW: GENERAL (9 journals)

INTERNATIONAL LAW (190 journals)                     

Showing 1 - 190 of 190 Journals sorted alphabetically
Acta Juridica Hungarica     Full-text available via subscription   (Followers: 6)
African Journal of International and Comparative Law     Hybrid Journal   (Followers: 19)
African Yearbook of International Law Online : Annuaire Africain de droit international Online     Hybrid Journal   (Followers: 10)
Afrilex     Open Access   (Followers: 6)
Agora International Journal of Juridical Sciences     Open Access   (Followers: 3)
AJIL Unbound     Open Access  
American Business Law Journal     Hybrid Journal   (Followers: 24)
American Journal of International Law     Hybrid Journal   (Followers: 64)
American University International Law Review     Open Access   (Followers: 11)
Annuaire Français de Droit International     Full-text available via subscription   (Followers: 2)
Annual Review of Law and Social Science     Full-text available via subscription   (Followers: 14)
Annual Survey of International & Comparative Law     Open Access   (Followers: 15)
Antitrust Chronicle - Competition Policy International     Full-text available via subscription   (Followers: 6)
Anuario Colombiano de Derecho Internacional     Open Access  
Anuario de Derechos Humanos     Open Access  
Anuario Español de Derecho Internacional     Full-text available via subscription   (Followers: 1)
Anuario español de derecho internacional privado     Partially Free  
Anuario Iberoamericano de Derecho Internacional Penal     Open Access   (Followers: 1)
Anuario Mexicano de Derecho Internacional     Open Access   (Followers: 1)
Arbitration International     Full-text available via subscription   (Followers: 22)
ASA Bulletin     Full-text available via subscription   (Followers: 5)
Asia-Pacific Journal of Ocean Law and Policy     Hybrid Journal  
Asian International Arbitration Journal     Full-text available via subscription   (Followers: 4)
Asian Journal of Comparative Law     Hybrid Journal   (Followers: 11)
Asian Journal of International Law     Hybrid Journal   (Followers: 18)
Australasian Policing     Full-text available via subscription   (Followers: 6)
Australian International Law Journal     Full-text available via subscription   (Followers: 22)
Australian Journal of Asian Law     Full-text available via subscription   (Followers: 4)
Austrian Review of International and European Law Online     Hybrid Journal   (Followers: 6)
Baltic Yearbook of International Law Online     Hybrid Journal   (Followers: 4)
Berkeley Journal of International Law     Open Access   (Followers: 23)
Boletin Mexicano de Derecho Comparado     Open Access   (Followers: 2)
Boston College International & Comparative Law Review     Open Access   (Followers: 13)
Brigham Young University International Law and Management Review     Open Access   (Followers: 2)
British Yearbook of International Law     Hybrid Journal   (Followers: 35)
Brooklyn Journal of International Law     Open Access   (Followers: 5)
California Western International Law Journal     Open Access   (Followers: 5)
Canadian Yearbook of International Law / Annuaire canadien de droit international     Full-text available via subscription   (Followers: 3)
Cape Town Convention Journal     Open Access  
Case Western Reserve Journal of International Law     Full-text available via subscription   (Followers: 5)
Chicago Journal of International Law     Full-text available via subscription   (Followers: 8)
Chinese Journal of Environmental Law     Hybrid Journal  
Chinese Journal of Global Governance     Open Access   (Followers: 3)
Chinese Journal of International Law     Hybrid Journal   (Followers: 24)
Climate law     Hybrid Journal   (Followers: 5)
Columbia Journal of Transnational Law     Open Access   (Followers: 9)
Common Law World Review     Full-text available via subscription   (Followers: 18)
Commonwealth Law Bulletin     Hybrid Journal   (Followers: 13)
Comparative and International Law Journal of Southern Africa     Full-text available via subscription   (Followers: 4)
Comparative Strategy     Hybrid Journal   (Followers: 10)
Computer Law Review International     Hybrid Journal   (Followers: 1)
Contemporary Security Policy     Hybrid Journal   (Followers: 19)
Cornell International Law Journal     Open Access   (Followers: 5)
Corporate Governance An International Review     Hybrid Journal   (Followers: 18)
Criterios     Open Access  
Denver Journal of International Law and Policy     Full-text available via subscription   (Followers: 5)
Deusto Journal of Human Rights     Open Access  
Duke Journal of Comparative & International Law     Open Access   (Followers: 17)
European Business Law Review     Full-text available via subscription   (Followers: 16)
European Company Law     Full-text available via subscription   (Followers: 12)
European Foreign Affairs Review     Full-text available via subscription   (Followers: 34)
European Journal for Security Research     Hybrid Journal   (Followers: 1)
European Journal of International Law     Hybrid Journal   (Followers: 230)
European Journal of Migration and Law     Hybrid Journal   (Followers: 39)
European Labour Law Journal     Full-text available via subscription   (Followers: 17)
European Political Science     Hybrid Journal   (Followers: 40)
European Property Law Journal     Hybrid Journal   (Followers: 6)
Fordham International Law Journal     Full-text available via subscription   (Followers: 21)
Foreign Policy Bulletin     Hybrid Journal   (Followers: 6)
Frontiers of Law in China     Hybrid Journal   (Followers: 2)
Georgetown Journal of International Law     Full-text available via subscription   (Followers: 12)
Georgia Journal of International and Comparative Law     Open Access   (Followers: 4)
Global Jurist     Hybrid Journal   (Followers: 7)
Global Justice : Theory Practice Rhetoric     Open Access   (Followers: 1)
Harvard International Law Journal     Free   (Followers: 51)
Houston Journal of International Law     Full-text available via subscription   (Followers: 5)
ICSID Review : Foreign Investment Law Journal     Hybrid Journal   (Followers: 12)
Indian Journal of International Law     Hybrid Journal  
Inter: Revista de Direito Internacional e Direitos Humanos da UFRJ     Open Access   (Followers: 1)
Intergenerational Justice Review     Open Access  
International & Comparative Law Quarterly     Full-text available via subscription   (Followers: 262)
International Area Studies Review     Hybrid Journal   (Followers: 3)
International Commentary on Evidence     Hybrid Journal   (Followers: 1)
International Community Law Review     Hybrid Journal   (Followers: 10)
International Comparative Jurisprudence     Open Access   (Followers: 2)
International Human Rights Law Review     Hybrid Journal   (Followers: 26)
International Journal for Court Administration     Open Access   (Followers: 1)
International Journal for the Semiotics of Law     Hybrid Journal   (Followers: 6)
International Journal of Comparative and Applied Criminal Justice     Hybrid Journal   (Followers: 4)
International Journal of Comparative Labour Law and Industrial Relations     Full-text available via subscription   (Followers: 25)
International Journal of Discrimination and the Law     Hybrid Journal   (Followers: 8)
International Journal of Evidence and Proof     Full-text available via subscription   (Followers: 12)
International Journal of Information Privacy, Security and Integrity     Hybrid Journal   (Followers: 27)
International Journal of Language & Law     Open Access   (Followers: 3)
International Journal of Law in Context     Hybrid Journal   (Followers: 17)
International Journal of Law, Crime and Justice     Hybrid Journal   (Followers: 61)
International Journal of Law, Policy and the Family     Hybrid Journal   (Followers: 25)
International Journal of Nuclear Law     Hybrid Journal   (Followers: 4)
International Journal of Political Economy     Full-text available via subscription   (Followers: 17)
International Journal of Private Law     Hybrid Journal   (Followers: 10)
International Journal of Public Law and Policy     Hybrid Journal   (Followers: 11)
International Journal of Refugee Law     Hybrid Journal   (Followers: 40)
International Journal of Transitional Justice     Hybrid Journal   (Followers: 14)
International Law: Revista Colombiana de Derecho Internacional     Open Access   (Followers: 3)
International Negotiation     Hybrid Journal   (Followers: 15)
International Organizations Law Review     Hybrid Journal   (Followers: 21)
International Planning Studies     Hybrid Journal   (Followers: 6)
International Review of Law     Open Access   (Followers: 6)
International Review of the Red Cross     Full-text available via subscription   (Followers: 12)
International Security     Hybrid Journal   (Followers: 76)
Israel Law Review     Hybrid Journal   (Followers: 2)
Italian Yearbook of International Law Online     Hybrid Journal   (Followers: 4)
Ius Gentium     Open Access   (Followers: 4)
Jerusalem Review of Legal Studies     Hybrid Journal  
Journal of Biosecurity Biosafety and Biodefense Law     Hybrid Journal   (Followers: 3)
Journal of European Competition Law & Practice     Hybrid Journal   (Followers: 22)
Journal of Genocide Research     Hybrid Journal   (Followers: 14)
Journal of International Commercial Law and Technology     Open Access   (Followers: 3)
Journal of International Dispute Settlement     Hybrid Journal   (Followers: 16)
Journal of International Economic Law     Hybrid Journal   (Followers: 33)
Journal of International Humanitarian Legal Studies     Hybrid Journal   (Followers: 8)
Journal of International Political Theory     Hybrid Journal   (Followers: 18)
Journal of Law, Policy and Globalization     Open Access   (Followers: 18)
Journal of Liberty and International Affairs     Open Access   (Followers: 4)
Journal of Migration and Refugee Issues, The     Full-text available via subscription   (Followers: 34)
Journal of Private International Law     Hybrid Journal   (Followers: 11)
Journal of the History of International Law     Hybrid Journal   (Followers: 16)
Journal on the Use of Force and International Law     Full-text available via subscription   (Followers: 16)
Korean Journal of International and Comparative Law     Hybrid Journal   (Followers: 2)
Law and Practice of International Courts and Tribunals     Hybrid Journal   (Followers: 21)
Legal Issues of Economic Integration     Full-text available via subscription   (Followers: 13)
Leiden Journal of International Law     Hybrid Journal   (Followers: 38)
LEX     Open Access   (Followers: 1)
London Review of International Law     Hybrid Journal   (Followers: 8)
Loyola of Los Angeles International and Comparative Law Review     Open Access   (Followers: 9)
Loyola University Chicago International Law Review     Open Access   (Followers: 4)
Maastricht Journal of European and Comparative Law     Full-text available via subscription   (Followers: 25)
Maryland Journal of International Law     Open Access   (Followers: 3)
Max Planck Yearbook of United Nations Law Online     Hybrid Journal   (Followers: 10)
Melbourne Journal of International Law     Full-text available via subscription   (Followers: 17)
Michigan State International Law Review     Open Access   (Followers: 6)
Netherlands International Law Review     Full-text available via subscription   (Followers: 20)
Netherlands Yearbook of International Law     Full-text available via subscription   (Followers: 15)
New Zealand Journal of Public and International Law     Full-text available via subscription   (Followers: 13)
New Zealand Yearbook of International Law, The     Full-text available via subscription   (Followers: 9)
Nordic Journal of International Law     Hybrid Journal   (Followers: 18)
Northwestern Journal of International Human Rights     Open Access   (Followers: 5)
Northwestern Journal of International Law & Business     Open Access   (Followers: 5)
Notre Dame Journal of International & Comparative Law     Open Access   (Followers: 5)
Oromia Law Journal     Open Access   (Followers: 1)
Pace International Law Review     Open Access   (Followers: 8)
Palestine Yearbook of International Law Online     Hybrid Journal   (Followers: 7)
Penn State Journal of Law & International Affairs     Open Access   (Followers: 4)
Polar Journal     Hybrid Journal   (Followers: 5)
Public and Private International Law Bulletin     Open Access   (Followers: 2)
Recht der Werkelijkheid     Full-text available via subscription   (Followers: 2)
Review of European Community & International Environmental Law     Hybrid Journal   (Followers: 7)
Review of European, Comparative & International Environmental Law     Hybrid Journal   (Followers: 7)
Revista de Derecho de la Unión Europea     Open Access   (Followers: 4)
Revista de Direito Brasileira     Open Access   (Followers: 1)
Revista de la Secretaría del Tribunal Permanente de Revisión     Open Access  
Revista Tribuna Internacional     Open Access   (Followers: 1)
Revista Videre     Open Access   (Followers: 1)
Revue québécoise de droit international / Quebec Journal of International Law / Revista quebequense de derecho internacional     Open Access   (Followers: 2)
Santa Clara Journal of International Law     Open Access   (Followers: 2)
South African Yearbook of International Law     Full-text available via subscription   (Followers: 2)
South Carolina Journal of International Law and Business     Open Access   (Followers: 4)
Stanford Journal of International Law     Full-text available via subscription   (Followers: 11)
Syracuse Journal of International Law and Commerce     Open Access   (Followers: 3)
TDM Transnational Dispute Management Journal     Full-text available via subscription   (Followers: 6)
Texas International Law Journal     Full-text available via subscription   (Followers: 5)
Tilburg Law Review     Open Access   (Followers: 5)
Transnational Environmental Law     Hybrid Journal   (Followers: 5)
Uniform Law Review     Hybrid Journal   (Followers: 3)
University of Miami Inter-American Law Review     Open Access   (Followers: 1)
Utrecht Journal of International and European Law     Open Access   (Followers: 17)
Vanderbilt Journal of Transnational Law     Free   (Followers: 5)
Virginia Journal of International Law     Free   (Followers: 4)
Washington University Global Studies Law Review     Open Access   (Followers: 11)
Wisconsin International Law Journal     Free   (Followers: 4)
World Journal of VAT/GST Law     Full-text available via subscription   (Followers: 1)
World Trade and Arbitration Materials     Full-text available via subscription   (Followers: 7)
Yale Journal of International Law     Free   (Followers: 18)
Yearbook of International Environmental Law     Hybrid Journal   (Followers: 12)
Yearbook of International Humanitarian Law     Full-text available via subscription   (Followers: 7)
Yearbook of Polar Law Online     Hybrid Journal  
Zeitschrift für Außen- und Sicherheitspolitik     Hybrid Journal   (Followers: 12)
Zeitschrift für das Privatrecht der Europäischen Union - European Union Private Law Review / Revue de droit privé de l'Union européenne     Hybrid Journal   (Followers: 1)
Zeitschrift für öffentliches Recht     Hybrid Journal   (Followers: 17)
Zeitschrift für Zivilprozess International     Hybrid Journal  

           

Similar Journals
Journal Cover
European Journal for Security Research
Number of Followers: 1  
 
  Hybrid Journal Hybrid journal (It can contain Open Access articles)
ISSN (Print) 2365-0931 - ISSN (Online) 2365-1695
Published by Springer-Verlag Homepage  [2570 journals]
  • Digitalization and Its Security Manifestations
    • PubDate: 2020-01-13
       
  • Of New Technologies and Old Laws: Do We Need a Right to Violate the
           Law'
    • Abstract: Abstract New technologies that can force compliance with the law are becoming increasingly widespread. At the same time, the previous constitutional arguments for defending against such structures are losing weight under the new conditions of powerful artificial intelligence. This paper opens a new line of argument using the search term of a “right to violate the law,” which will make it possible to restrict the use of modern law-enforcing technologies in an effective and criteria-based manner also in the future.
      PubDate: 2020-01-04
       
  • Benefits and Limits of Autonomous Systems in Public Security
    • Abstract: Abstract The replacement of traditional deterministic machines by autonomous, self-organizing systems in the realm of security technologies represents a new challenge. Operative and strategic autonomy must be made more distinct, while moral autonomy should remain a human responsibility. Depending on the type of mechanical learning, the systems gain a black box character that impedes the tracing of the authorship of the systems’ actions. The proposed method of monitoring system decisions (Digital Charta Art. 5, DSGVO Art. 22) must deal with complex networks of responsibility. For this reason, a new legal framework and new political terms of negotiation must be developed.
      PubDate: 2019-12-16
       
  • A Toy Model Study for Long-Term Terror Event Time Series Prediction with
           CNN
    • Abstract: Abstract Followed by the 9/11 attacks in 2001 and the subsequent events, terrorism and other asymmetrical threat situations became increasingly important for security-related efforts of most western societies. In a similar period, the development of data gathering and analysis techniques especially using the methods of machine learning has made rapid progress. Aiming to utilize this development, this paper employs artificial neural networks for long-term time series prediction of terrorist event data. A major focus of the paper lies on the specific use of convolutional neural networks (CNNs) for this task, as well as the comparison to the performance of classical methods for (long-term) time series prediction. As the databases like Global Terrorism Database and Fraunhofer’s terrorist event database are not extensive enough to train a deep learning method, a simple toy model for the generation of time series data from one or more terrorist groups with defined properties is established. Metrics for comparison of the different approaches are collected and discussed, and a customized sliding-window metric is introduced. The study shows the principle applicability of CNNs for this task and offers constraints as well as possible extensions for future studies. Based on these results, continuation and further extension of data collection efforts and ML optimization techniques are encouraged.
      PubDate: 2019-12-11
       
  • The Complication of Presence in Telemedical Collaboration:
           Intersituativity and Its Organizational Consequences
    • Abstract: Abstract New information and communication technologies change social relations. The article introduces a concept by Stefan Hirschauer grasping this change as a complication of presence. For Emergency Medical Services, full presence of all participants is usually considered essential; however, telemedicine, telehealth physicians, and telecooperation are also gaining ground here. The study describes the foundation and challenges of telemedical situations and analyses how they are managed by physicians, paramedics, and patients being only gradually present for each other. On the organizational level, formal guidelines become more important, and responsibilities shift toward the rescue workers on-site.
      PubDate: 2019-12-10
       
  • Automating Security in and Around Soccer Stadiums Through Camera
           Systems' Report on a Research Project
    • Abstract: Abstract The article reports on the results of the DFG-funded interdisciplinary (social science and project neuroinformatics) Emotion. Escalation. Violence. The question was whether escalation processes (in and around football stadiums) can be detected automatically using a camera and appropriate evaluation software. The analysis of the data collected in the project (video, participant observation, interviews) showed that an automatic detection system that only looks at all factors in the situation and on site can make only limited statements about the probability of escalation processes. In addition, there is always a need for experienced human actors who are familiar with these processes and can contribute to the assessment of the situation.
      PubDate: 2019-12-10
       
  • Using Smartphones in Police Operations: The Necessity of Media Literacy in
           Police Forces in the Age of Transparency
    • Abstract: Abstract The internet and especially social media networks had and still have a deep impact on the organizational communication. Beside the possibilities of self-representation, social media allow a fast dialogue between organization and its stakeholders—for enterprises as well as for public administration, such as the police. Moreover, not only the official PR departments use these channels, also employees use text, photograph, and video to inform about their experiences. The article deals with the upcoming fuzzy logic of many responders, the new age of transparency and dialogue, the lack of media literacy, and the role of high-rank police officers.
      PubDate: 2019-12-07
       
  • Reflecting on the Ethical and Legal Implications of the State-Led War
           Against International Terrorism
    • Abstract: Abstract This article takes critical issue with the state-led global war against international terrorism, focusing specifically on the ethical and legal implications of that protracted international conflict. Following others, the paper conceptualises terrorism as an aspect of modern political violence that tends to service the overall interest of extant liberal global political economy at the expense of the human security challenges. To this end, the article seeks to shed light on the flux of alliances and allegiances between formal state agents and informal political actors (e.g. religious extremist or terrorist groups and left-/right-wing para-militias, etc.), whose bellicose political activities not only underscore the global war on terror but in part also inform the post-Cold War liberal international order. It is only in viewing the ongoing state-led global war against international terrorism through the prism of the state system’s perennial bellicose activities that we would be able to fully appreciate the adverse effects the global war on terror on the development of both domestic and international law that is critical to safeguarding the security and/or protection of civilians in times of peace and war.
      PubDate: 2019-11-28
       
  • Before, Now, and After the Event of Terror: Situational Terror Awareness
           for Civilians in US Homeland Security
    • Abstract: This article examines terror awareness as an individualized security practice that allows civilians to respond to situations of emergent terror as they occur, that is, in real time. It is a practice that targets the “time–space” (Walters in Comp Eur Polit 15(5):794–817, 2016) just before, during, and immediately after an event of terror. In recent years, the notion of “terror awareness” has gained salience in official US homeland security discourses. To protect themselves and their communities from harm and ensure an uninterrupted “way of life,” citizens are routinely encouraged to be vigilant and aware to signs of potential terror as they attend to their daily affairs. They are asked to stay informed, remain alert, and be ready to respond to the incipiency of terror so that they may avert—or, at least mitigate—its potentially catastrophic and disruptive consequences. According to the authorities, this kind of habitualized threat awareness can help prevent acts of terror and strengthen community resilience. But what exactly do government and security officials mean when they speak of “terror awareness”' What does this practice of being “terror aware” entail' And how is it supposed to function as a protective mechanism against potential terror' What is its relationship to such abstract concepts as “security,” “preparedness,” and “resilience”' This article seeks to answer these questions. It is based on a careful reading of official and publicly available texts (press statements, policy documents, reports, training brochures, websites, etc.) about homeland security and anti-terrorism, where the notion of “awareness” finds mention and a specific understanding of it—namely as an individualized security technology—is being communicated to the wider public.
      PubDate: 2019-11-06
       
  • An Acid Test for Europeanization: Public Cyber Security Procurement in the
           European Union
    • Abstract: Abstract Public procurement refers to processes through which national, regional, and local public authorities, state-owned enterprises, or other related bodies governed by public law, purchase products, services, and public work. Such purchases have been a particularly important element in developing the Internal Market of the European Union (EU). Given recent procurement reforms in the EU, including the 2009 reform on defense procurement, this paper examines public cyber security procurement in Europe. Two questions are examined: (1) whether cyber security procurement differs from public procurement in general, and (2) whether there are any noteworthy signs of Europeanization in terms of cyber security procurement. According to the empirical results, cyber security procurement tends to differ from general public procurement. In particular, competition obstacles are visible in terms of bids for cyber security procurement tenders. This result is accompanied with a visible lack of Europeanization, although the same observation generalizes to public procurement in the EU generally. With these results and the accompanying discussion, the paper contributes to the recent lively discussion about European security and its relation to marketization.
      PubDate: 2019-10-05
       
  • A Fast-Track Method for Assessing the Risk of a Terrorist Attack on
           Transportation Facilities
    • Abstract: Abstract The study reported in this paper was designed to develop a fast-track method for assessing the risk of a terrorist attack on transportation facilities. This method may be of particular significance for transportation systems with numerous facilities, like subways and railroads. For instance, in a situation where there is information that in the coming days a terrorist attack may occur along a subway line, employing this method can enable the experts to promptly determine the facilities (stations) which are the likeliest to be attacked by the terrorists. Upon receipt of the data, the police and security team will be able to go ahead and concentrate the forces around those specific facilities, which should help boost the likelihood of the terrorist attack getting prevented.
      PubDate: 2019-10-01
       
  • A Framework for GDPR Compliance for Small- and Medium-Sized Enterprises
    • Abstract: Abstract The EU’s General Data Protection (GDPR) is an EU regulation that affects everyone in the EU and all organisations outside the EU that wants to do business with the EU. GDPR introduces tougher requirements for processing personal data, which may be difficult for many small- and medium-sized enterprises (SMEs) to follow without major adjustments. This work uses design science to develop a framework for SMEs to adapt to GDPR. The framework was empirically evaluated in three different types of organisations, resulting of GDPR compliance according to their Data Protection Officers. It was also theoretical evaluated against scientific literature including the identified implications of GDPR. In this paper the framework is presented, from initial analysis and design to implementation and future work, with advice on how to work with each part to achieve compliance. The paper also highlights some of the most important changes in GDPR compared to its predecessor, Directive 95/46/EC of the European Parliament and of the Council of 24 October 1995 on the protection of individuals with regard to the processing of personal data and on the free movement of such data (DIR95).
      PubDate: 2019-10-01
       
  • Behavioural Economics of Security
    • Abstract: Abstract For years, the field of behavioural psychology has shaped the understanding of human behaviour. More and more findings of that discipline are also applied in economics. However, potential implications for the specific area of economics of security have been widely ignored. This paper transfers empirically proven phenomena of behavioural psychology, such as decision heuristics and fallacies, to the economics of security. In particular, we will focus on the subjective perception of risks and its implications on the evaluation of security solutions. Our paper provides an overview on aspects of behavioural psychology in economics of security. We argue that findings from behavioural psychology bear the potential to influence the assessment of security measures, and therefore need to be clearly identified for ensuring the efficient allocation of limited budgets for security solutions. In our view, sensitising decision-makers in the field of security for aspects of behavioural psychology is useful and conducive to enhance the management of risks for public security.
      PubDate: 2019-10-01
       
  • Indus Water Treaty in the Doldrums Due to Water–Power Nexus
    • Abstract: Abstract Hydropower dams on rivers in the Indus Basin are becoming new elements in power geopolitics due to the threat of “aqua bombs” to downstream regions. Water law may limit such perceived water wars. The transboundary river water sharing agreements that bind bordering states are overstretched, particularly between Pakistan and India. Meanwhile, factors such as the expansion in industry and population, global warming, and reduction in oil and gas resources diminish scarce natural water resources. In addition, due to water pumping at levels above natural recharge rates, the underground water table has reached a state of continual free fall in the Indian and Pakistani Punjab. This work points out the dire need to reform international law to address such transboundary river conflicts, as water conflicts may become fully fledged armed conflicts with the current approach. The concurrence of power, energy, food, and water crises may wreak havoc on international river agreements if not addressed in international law. However, the laws that define rights among developed states may not be suitable for developing countries, and water and food security are critical issues for sovereign nations. Water sustains life, effectively determining all other geopolitical issues. The aim of this work is to investigate how international law could be adjusted with regard to international water sharing in order to resolve issues such as the energy crisis, economic collapse, global warming, and climate change.
      PubDate: 2019-10-01
       
  • On the Application of the Safety-II Concept in a Security Context
    • Abstract: Abstract This paper presents an alternative and broader security risk perspective, incorporating uncertainty, as a two-dimensional combination of (1) threat (Th) on value (Vl), (2) vulnerability (Vu) given coping capabilities (Cc), and associated uncertainties U (will the threat scenario occur' and to what degree are we vulnerable'). Moreover, this work attempts to provide an integrated approach to the safety and security fields. We look closely into the issues related to Safety-I, Safety-II and security. Whereas conventional safety management approaches (Safety-I) are based on hindsight knowledge and risk assessments calculating historical data-based probabilities, the concept of Safety-II looks for ways to enhance the ability of organisations to be resilient in the sense that they recognise, adapt to and absorb disturbances. Three determinants that shape the Safety-II concept in the security perspective are the capacity of organisations to operate in changing circumstances; formulating strategies that promote a willingness to devote resources to security purposes, driven mainly by the organisation’s leader; and an organisational culture that encourage people to speak up (respond), think creatively (anticipate), and act as mindful participants (monitor and learn). Based on clarifying some of the fundamental building blocks of security risk assessment, this work develops an extended security risk assessment, including an analysis of both vulnerability and resilience. The analysis explores how the system works following any type of threat scenario and determines whether key functions and operations can be sustained.
      PubDate: 2019-10-01
       
  • A Review of Methods for Evaluating Security Awareness Initiatives
    • Abstract: Abstract The ‘human factor’ is commonly considered to be the weakest link in an organization’s security chain, and a significant percentage of companies have implemented security awareness (SA) programs to address this vulnerability. However, an element whose usefulness is still underestimated is the importance to perform measurements of the different SA programs’ effectiveness in order to assess their adequateness for achieving the intended goals. This gap has serious consequences as most of the security awareness campaigns have resulted to be largely unsuccessful. Awareness measurement tools might be determinant in providing feedback on the outcome of a program as well as in helping with the strategic planning for endorsing security. This article will introduce and critically compare a set of measurement methods. It will then discuss their attributes and suggested applications.
      PubDate: 2019-09-26
       
  • Risk and Resilience Analysis of Public Civil Buildings Against Shelling
           with Explosive Sources in Urban Contexts
    • Abstract: Abstract Due to their high availability and low cost level, passive protection measures are a key factor for reducing the vulnerability of persons within and close to assets against potentially impacting mortar, rocket and artillery threats. Particularly, mortar shelling has even most recently been reported. At risk are permanent and nonpermanent assets of civil, (non)governmental or peacekeeping organizations with corresponding effects, e.g., on civil society, civil services or successful nation building, respectively. Of interest are the identification of vulnerable areas and the assessment of the effectiveness of protective structures while taking also other counter measures into account. To this end, a seven-step quantitative risk and resilience analysis and management methodology is described and applied. It consists of the analysis of scenarios, frequencies, hazards, damage effects and risks and yields individual and collective risks for multi-threat scenarios. Local individual or collective risks can be minimized below criteria, thus reducing vulnerability and increasing resilience in an efficient way, e.g., by using geometrical changes, by structural roof, wall and window retrofits, by mitigating barriers and/or organizational measures. The approach is demonstrated along with three detailed example cases.
      PubDate: 2019-08-26
       
  • Obituary
    • PubDate: 2019-04-01
       
  • Trends of Modern Terrorism in the Metro Systems of the World
    • Abstract: Abstract The issue of anti-terrorist protection of metro systems in recent decades has significantly worsened. This is due to the general growth of the terrorist threat in the world. According to the Global Terrorism Database of the National Consortium for the Study of Terrorism and Responses to Terrorism (START), a number of terrorist attacks have been committed in metro systems of various countries of the world, including Britain, Russia, USA, Japan and France. For effective measures to counteract such attacks, it is necessary to clearly know the trends of modern terrorism, particularly on the basis of systematization and analysis of statistical data on the terrorist attacks committed in the metro systems with the subsequent formation of a matrix of trends, which in this case was carried out by the authors of the article. The main statistical analysis method is the factor analysis. The proposed matrix helps to assess terrorist threats for metro systems and can be used to develop measures to ensure their security. The Matrix of Trends of Modern Terrorism in the Metro Systems’ main trends are identified: frequency of attacks; object of attacks; tool of attacks; method of attacks.
      PubDate: 2019-04-01
       
  • On the Economic Impact of Crypto-ransomware Attacks: The State of the Art
           on Enterprise Systems
    • Abstract: Abstract According to Cybersecurity Ventures research in 2017, in every 40 s, a business falls prey to a ransomware attack and the rate is predicted to rise to 14 s by 2019. Business organizations have had to pay cybercriminals even up to $1 million in a single attack, while others have incurred losses in hundreds of millions of dollars. Clearly, ransomware is an emerging cyberthreat to enterprise systems that can no longer be ignored. In this paper, we address the various facets of the ransomware pandemic narrowing down to the technical and economic impacts. We formulate an attack model applicable to cascaded network design structures common in enterprise systems, detailing the various susceptible ransomware entry points. We evaluate how the incorporation of asymmetric and symmetric encryption in hybrid cryptosystems with worm-like properties in recent ransomware strains has brought about tragic targeted ransomware attacks campaigns such as WannaCry, Erebus, and SamSam. We also detail the economic impact of ransomware on various businesses in terms of paid ransoms and loss of revenue due to downtime and loss of production. Results show the substantial role played by the Bitcoin cryptocurrency and email as the prevalent attack vector in indiscriminate attack campaigns, while vulnerability exploitation is dominant in targeted attacks. Furthermore, results show that lack of offline backup and poorly implemented offline backup strategies end up costing businesses more than the ransom demand itself. We suggest mitigation strategies and recommend best practices based on the demystified core components of successful ransomware attacks campaigns.
      PubDate: 2019-04-01
       
 
JournalTOCs
School of Mathematical and Computer Sciences
Heriot-Watt University
Edinburgh, EH14 4AS, UK
Email: journaltocs@hw.ac.uk
Tel: +00 44 (0)131 4513762
 


Your IP address: 3.94.202.172
 
Home (Search)
API
About JournalTOCs
News (blog, publications)
JournalTOCs on Twitter   JournalTOCs on Facebook

JournalTOCs © 2009-