Publisher: Bridgewater State University   (Total: 4 journals)   [Sort alphabetically]

Showing 1 - 4 of 4 Journals sorted by number of followers
Bridgewater Review     Open Access   (Followers: 4)
J. of Intl. Women's Studies     Open Access   (Followers: 4, SJR: 0.184, CiteScore: 0)
nternational J. of Cybersecurity Intelligence & Cybercrime     Open Access   (Followers: 3)
J. of Cape Verdean Studies     Open Access  
Similar Journals
Journal Cover
nternational Journal of Cybersecurity Intelligence & Cybercrime
Number of Followers: 3  

  This is an Open Access Journal Open Access journal
ISSN (Print) 2578-3297 - ISSN (Online) 2578-3289
Published by Bridgewater State University Homepage  [4 journals]
  • Cybersecurity Risk in U.S. Critical Infrastructure: An Analysis of
           Publicly Available U.S. Government Alerts and Advisories

    • Authors: Zachary Lanz
      Abstract: As threat actor operations become increasingly sophisticated and emphasize the targeting of critical infrastructure and services, the need for cybersecurity information sharing will continue to grow. Escalating demand for cyber threat intelligence and information sharing across the cybersecurity community has resulted in the need to better understand the information produced by reputable sources such as U.S. CISA Alerts and ICS-CERT advisories. The text analysis program, Profiler Plus, is used to extract information from 1,574 U.S. government alerts and advisories to develop visualizations and generate enhanced insights into different cyber threat actor types, the tactics which can be used for cyber operations, and sectors of critical infrastructure at risk of an attack. The findings of this study enhance cyber threat intelligence activities by enabling an understanding of the trends in public information sharing as well as identifying gaps in open-source reporting on cyber-threat information.
      PubDate: Thu, 21 Apr 2022 23:00:54 PDT
       
  • Social Construction of Internet Fraud as Innovation among Youths in
           Nigeria

    • Authors: Austin Ayodele Mr. et al.
      Abstract: The proliferation of internet technologies has shaped interactions in contemporary society. Despite the pivotal importance of the internet to the global economy, it has several negative consequences such as internet fraud. This study examined the perception that young adults in Nigeria hold about internet fraud as an innovative means to economic survival rather than as a criminal enterprise. Robert Merton’s Anomie/Strain Theory (AST) was adopted as the theoretical thrust of the study. Adopting a qualitative data collection method, 15 participants were selected using the non-probabilistic purposive and snowballing techniques while opinions were sampled through in-depth interviews in different locations within the Ibadan metropolis of Nigeria. Study findings revealed that youths are engaged in internet fraud mainly to support themselves financially despite harsh economic realities as a form of deviant innovation. The study established that internet fraudsters in Nigeria are socially organized based on specializations. Furthermore, the study established that the accumulation of wealth and “clients” are the major basis for hierarchy. Although there are extant laws on the prohibition and prosecution of internet crimes in Nigeria, the fraudsters claimed that the compromised security apparatus of the state is often manipulated to allow them to continue in the “business”. Only those who do not know their way are prosecuted while successful internet fraudsters gallivant and invest their illegal proceeds in legitimate businesses as cover-ups. The study established the need for value reorientation for youths as well as the creation of jobs.
      PubDate: Thu, 21 Apr 2022 23:00:44 PDT
       
  • The Relationship between Parenting Practices and Cyberbullying
           Perpetration: The Mediating Role of Moral Beliefs

    • Authors: Jaeyong Choi et al.
      Abstract: Criminologists and psychologists have long recognized that parenting practices can affect childhood outcomes and the development of moral beliefs in children. Another body of literature provides evidence that morality is a key cause of antisocial behavior. Yet, a noticeable gap in this line of work has been testing the mediation effects of parenting practices on cyberbullying via moral beliefs. Using a sample of South Korean adolescents, we tested whether moral beliefs mediate the relationships between parenting practices and cyberbullying perpetration. Results show that parental supervision and excessive parenting can influence cyberbullying perpetration and that the impact of parenting practices is partially indirect through moral beliefs.
      PubDate: Thu, 21 Apr 2022 23:00:34 PDT
       
  • Understanding Cybercrime Offending and Victimization Patterns from a
           Global Perspective

    • Authors: Jin R. Lee
      Abstract: Cybercrime research within criminology and criminal justice sciences has increased over the past few decades, improving the knowledge and evidence-base around cybercrime offending and victimization generally. While earlier cybercrime studies were based primarily in the United States, there has been a recent surge in studies using international samples and multidisciplinary approaches to understand cybercrime patterns. The current issue of the International Journal of Cybersecurity Intelligence and Cybercrime consists of four articles that seek to advance our understanding of cybercrime behaviors from a global perspective. To that end, the objective of this paper is to provide a brief overview of the articles included in this issue. The overview will comprise a summary report of each study’s objectives, main findings, and implications. Exploring cybercrime from an international perspective underscores both the global nature of the phenomena and the need to form deeper insights into its unique properties.
      PubDate: Thu, 21 Apr 2022 23:00:23 PDT
       
  • Level of Engagement with Social Networking Services and Fear of Online
           Victimization: The Role of Online Victimization Experiences

    • Authors: Yeonjae Park et al.
      PubDate: Thu, 19 Aug 2021 19:50:57 PDT
       
  • Malware Infections in the U.S. during the COVID-19 Pandemic: An Empirical
           Study

    • Authors: Sydney Gero et al.
      Abstract: The COVID-19 pandemic has changed the world in many ways, especially in the landscape of cyber threats. The pandemic has pro-vided cybercriminals with more opportunities to commit crimes due to more people engaging in online activities, along with the increased use of computers for school, work, and social events. The current study seeks to explore cybercrime trends, in particular malware infections, during the COVID-19 pandemic. Thus, this study examines the relationship between the number of malware in-fections, COVID-19 positive cases, closed non-essential businesses, and closed K-12 public schools in the United States. Data utilized in this study derives from (1) Kaspersky Cyberthreat Real-Time Map, (2) Centers for Disease Control and Prevention (CDC), and (3) COVID-19 US State Policy Database over the course of six months from January of 2020 to June of 2020. The findings of this study reveal that there are associations between the number of malware infections, COVID-19 positive cases, and closed non-essential busi-nesses. However, interestingly, there is no link between the number of malware infections and closed K-12 public schools. Policy impli-cations and the limitations of this study are also discussed.
      PubDate: Thu, 19 Aug 2021 19:50:47 PDT
       
  • North Korean Cyber Attacks and Policy Responses: An Interdisciplinary
           Theoretical Framework

    • Authors: Jeeseon Hwang et al.
      PubDate: Thu, 19 Aug 2021 19:50:38 PDT
       
  • Editorial introduction to the special issue: Supporting future scholarship
           on cybercrime

    • Authors: Jaeyong Choi et al.
      Abstract: This editorial introduction will present an overview of the three papers published in this special issue of the International Journal of Cybersecurity Intelligence and Cybercrime. The winners of the student paper competition during the 2021 Whitehat Conference have prepared their papers for this special issue. Their research directs our attention to key issues regarding cybercrime that have often been overlooked in the literature ranging from North Korean cyberterrorism to the relationship between COVID-19 and cybercrime and to fear of online victimization.
      PubDate: Thu, 19 Aug 2021 19:50:29 PDT
       
  • Cyber-victimization Trends in Trinidad & Tobago: The Results of An
           Empirical Research

    • Authors: Troy Smith et al.
      Abstract: Cybertechnology has brought benefits to the Caribbean in the form of new regional economic and social growth. In the last years, Caribbean countries have also become attractive targets for cybercrime due to increased economic success and online presence with a low level of cyber resilience. This study examines the online-related activities that affect cybercrime victimization by using the Routine Activity Theory (RAT). The present study seeks to identify activities that contribute to different forms of cybercrime victimization and develop risk models for these crimes, particularly the understudied cyber-dependent crimes of Hacking and Malware. It also aims to explore if there are similarities or differences in factors leading to victimization, which correlate to the classification of crimes as either cyber-dependent or cyber-enabled. The data analysis suggests that there is significant applicability for RAT in explaining Online Harassment victimization, while the usability of the RAT for predicting Malware victimization proved to be minimal, with only two significant variables being identified, with both being associated with Capable Guardianship.
      PubDate: Mon, 05 Apr 2021 09:51:19 PDT
       
  • Cyberbullying: Its Social and Psychological Harms Among Schoolers

    • Authors: Hyeyoung Lim et al.
      Abstract: Criminal justice around the world has prioritized the prevention and protection of bullying and its victims due to the rapid increases in peer violence. Nevertheless, relatively few studies have examined what treatments or assistance are effective for peer victims to reduce and recover from their social and psychological suffering, especially in cyberbullying cases. Using data derived from the National Crime Victimization Survey-School Crime Supplement data in 2011 and 2013 (N=823), the current study examined the impact of two emotional support groups (i.e., adult and peer groups) on cyberbullying victims' social and psychological harm. The findings indicated that both adult and peer support reduced social and psychological harm inflicted by cyberbullying victimization. Based on these findings, the study recommends developing or modifying existing adult and peer support groups to minimize victims' social and psychological distress.
      PubDate: Mon, 05 Apr 2021 09:51:10 PDT
       
  • Assessing the Credibility of Cyber Adversaries

    • Authors: Jenny A. Wells et al.
      Abstract: Online communications are ever increasing, and we are constantly faced with the challenge of whether online information is credible or not. Being able to assess the credibility of others was once the work solely of intelligence agencies. In the current times of disinformation and misinformation, understanding what we are reading and to who we are paying attention to is essential for us to make considered, informed, and accurate decisions, and it has become everyone’s business. This paper employs a literature review to examine the empirical evidence across online credibility, trust, deception, and fraud detection in an effort to consolidate this information to understand adversary online credibility – how do we know with whom we are conversing is who they say they are' Based on this review, we propose a model that includes examining information as well as user and interaction characteristics to best inform an assessment of online credibility. Limitations and future opportunities are highlighted.
      PubDate: Mon, 05 Apr 2021 09:51:02 PDT
       
  • The Challenges of Identifying Dangers Online and Predictors of
           Victimization

    • Authors: Catherine D. Marcum
      Abstract: This short paper will provide an overview of the impressive pieces included in this issue of the International Journal of Cybersecurity Intelligence and Cybercrime. This issue includes articles on the following pertinent topic, utilizing a range of approaches and methodologies: 1) online credibility; 2) cyberbullying; and 3) unauthorized access of information. An emphasis on the importance of policy development and better protection of potential victims is a common thread throughout the issue.
      PubDate: Mon, 05 Apr 2021 09:50:53 PDT
       
  • Book Review: Computer capers: Tales of electronic thievery, embezzlement,
           and fraud. By Thomas Whiteside

    • Authors: Brian Nussbaum
      PubDate: Tue, 03 Nov 2020 12:06:12 PST
       
  • Proposal for the Development and Addition of a Cybersecurity Assessment
           Section into Technology Involving Global Public Health

    • Authors: Stanley Mierzwa et al.
      Abstract: This paper discusses and proposes the inclusion of a cyber or security risk assessment section during the course of public health initiatives involving the use of information and communication computer technology. Over the last decade, many public health research efforts have included information technologies such as Mobile Health (mHealth), Electronic Health (eHealth), Telehealth, and Digital Health to assist with unmet global development health needs. This paper provides a background on the lack of documentation on cybersecurity risks or vulnerability assessments in global public health areas. This study suggests existing frameworks and policies be adopted for public health. We also propose to incorporate a simple assessment toolbox and a research paper section intended to help minimize cybersecurity and information security risks for public, non-profit, and healthcare organizations.
      PubDate: Tue, 03 Nov 2020 12:06:01 PST
       
  • Cyber-Situational Crime Prevention and the Breadth of Cybercrimes among
           Higher Education Institutions

    • Authors: Sinchul Back et al.
      Abstract: Academic institutions house enormous amounts of critical information from social security numbers of students to proprietary research data. Thus, maintaining up to date cybersecurity practices to protect academic institutions’ information and facilities against cyber-perpetrators has become a top priority. The purpose of this study is to assess common cybersecurity measures through a situational crime prevention (SCP) theoretical framework. Using a national data set of academic institutions in the United States, this study investigates the link between common cybersecurity measures, crime prevention activities, and cybercrimes. By focusing on the conceptualization of cybersecurity measures as SCP techniques, this study also offers the SCP approach as a framework by which universities can seek to reduce incidents of cybercrime through the design, maintenance, and use of the built environment in the digital realm. Implications for theory, research and practice are discussed.
      PubDate: Tue, 03 Nov 2020 12:05:51 PST
       
  • The Effects of Self-control on the Cyber Victim-Offender Overlap

    • Authors: Brooke Nodeland
      Abstract: Increasingly, the overlap between victims and offenders has received empirical attention with regard to traditional forms of deviance. More recently, the growth of cyber offending has led to a need to examine whether traditional criminological theories can be used to explain these crimes in the same manner as traditional offenses. However, limited attention has been given to victim-offender overlap in cyber-offending. The current study uses a sample of American college students to examine the influence of self-control on cyber offending, cyber victimization, and the cyber victim-offender overlap. The results indicate that low self-control significantly predicts participation in cyber offending as well as cyber victim-offending, but has a weak relationship with cyber victimization. Interestingly, associating with deviant cyber peers was a significant predictor across all models. Results are discussed in the context of the existing literature.
      PubDate: Tue, 03 Nov 2020 12:05:40 PST
       
  • Toward Mitigating, Minimizing, and Preventing Cybercrimes and
           Cybersecurity Risks

    • Authors: Claire Seungeun Lee
      Abstract: Cybercrime and cybersecurity are emerging fields of research, shaped by technological developments. Scholars in these interconnected fields have studied different types of cybercrimes as well as victimization and offending. Increasingly, some of these scholars have focused on the ways in which cybercrimes can be mitigated, minimized, and even prevented. However, such strategies are often difficult to achieve in reality due to the human and technical factors surrounding cybercrimes. In this issue of the International Journal of Cybersecurity Intelligence and Cybercrime, three papers adequately address such challenges using college student samples and nationally representative samples, as well as a framework through which cybersecurity can be better managed. Theoretically speaking, these studies use traditional criminological theories to explore different types of cybercrimes and cybersecurity while enhancing our understandings of both. The issue is concluded with a book review of a work about computer crime that was published before the Internet age and offers useful insights for current and future cybercrime studies.
      PubDate: Tue, 03 Nov 2020 12:05:30 PST
       
  • Book Review: The Cyber Risk Handbook By Domenic Antonucci

    • Authors: Stanley Mierzwa
      PubDate: Fri, 28 Feb 2020 10:26:20 PST
       
  • A Reverse Digital Divide: Comparing Information Security Behaviors of
           Generation Y and Generation Z Adults

    • Authors: Scott M. Debb et al.
      Abstract: How individuals conceptualize their accountability related to digital technology. There may also be age-based vulnerabilities resulting from personal perceptions about the importance of engaging in best-practices. However, age may not be as critical as experience when it comes to implementation of these behaviors. Using the Cybersecurity Behaviors subscale of the Online Security Behaviors and Beliefs Questionnaire (OSBBQ), this study compared the self-reported cybersecurity attitudes and behaviors across college-aged individuals from Generation Y and Generation Z. Data were derived from a convenience sample of predominantly African-American and Caucasian respondents (N=593) recruited from two public universities in Virginia, USA. Four of the eight OSBBQ subscale items demonstrated significant differences between Generation Y and Generation Z adults. Generation Y adults reported greater reviewing of privacy policies on social media, maintenance of antivirus updates, watching for unusual computer performance, and acting on malware alerts, but no significant differences on the other items. It is reasonable to assume that the observed elevated scores were accompanied by greater individual knowledge of information security simply because of being older as a cohort, suggesting that the group was also more experienced and less likely to perceive themselves as invulnerable to online victimization.
      PubDate: Fri, 28 Feb 2020 10:26:17 PST
       
  • An Empirical study to determine the role of file-system in modification of
           hash value

    • Authors: Kumarshankar Raychaudhuri et al.
      Abstract: In digital forensics, maintaining the integrity of digital exhibits is an essential aspect of the entire investigation and examination process, which is established using the technique of hashing. Lack of knowledge, while handling digital exhibits, might lead to unintentional alteration of computed hash, rendering the exhibit unacceptable in the court of Law. The hash value of a physical drive does not solely depend upon the data files present in it but also its file-system. Therefore, any change to the file-system might result in the change of the disk hash, even when the data files within it remain untouched. In this paper, our objective is to study the role of file-system in modification of the hash value. We examine and analyse the changes in the file-system of a NTFS formatted USB storage device, which leads to modification in its hash value when the device is plugged-in to the computer system without using write-blocker. The outcome of this research would justify the importance of write blockers while handling digital exhibits and also substantiate that the alteration in hash value of a storage device might not be an indication that data within the device has been tampered with.
      PubDate: Fri, 28 Feb 2020 10:26:14 PST
       
 
JournalTOCs
School of Mathematical and Computer Sciences
Heriot-Watt University
Edinburgh, EH14 4AS, UK
Email: journaltocs@hw.ac.uk
Tel: +00 44 (0)131 4513762
 


Your IP address: 34.231.247.88
 
Home (Search)
API
About JournalTOCs
News (blog, publications)
JournalTOCs on Twitter   JournalTOCs on Facebook

JournalTOCs © 2009-