Privacy

Enhancing the European Cyber Threat Prevention Mechanism

Abstract: 

This research will determine how it is possible to implement the national cyber threat prevention system into the EU level Early Warning System. Decision makers have recognized that lack of cooperation between EU member countries affects public safety at the international level. Separate operational functions and procedures between national cyber situation centres create challenges.

Privacy in Open Source Intelligence and Big Data Analytics: Case ‘MARISA’ for Maritime Surveillance

Abstract:

This case study analyses Open Source Intelligence (OSINT) and Big Data Analytics (BDA) with an emphasis on cyber reconnaissance and the associated privacy concerns. The main focus is privacy considerations in OSINT and BDA. The study also analyses how maritime surveillance authorities can act so that their reconnaissance efforts would gain/maintain public approval. The empirical case explores privacy challenges in the Maritime Integrated Surveillance Awareness (MARISA) project. The overall goal is to accelerate the discussion on the problem of privacy breaches that may lead to restrictions of individual liberty and erosion of the foundations of trust in society.

Cybersecurity and Global Governance

ABSTRACT

To understand better the challenges of developing a unified system of global cyber governance, a comparative analysis of national cybersecurity strategy and frameworks in 10 countries and the European Union from diverse regions in both the developed and developing world was conducted. Based on empirical research and an analysis of national and international cybersecurity strategies and policies, this paper explores the challenges and benefits of establishing a global legal and policy framework for cyber activity that advances the goals of national intelligence and technological innovation, while enhancing confidence and improving legal certainty in the global electronic marketplace.

Shared Electronic Health Records: A Changing Landscape for Security in Medical Practice

ABSTRACT

The advances in networking and communications have created a landscape of change for information security in medical practice with the use of electronic health records. Whilst the benefits of improved quality are accepted, the ethical, logistical and security demands have increased. To resolve the problems faced, mapping how medical practice has to adapt to the shifting nature of security in this environment is necessary. The solutions are far from uncomplicated and include education, information governance and policy. Despite the benefits, the success of nationally shared electronic health records requires demonstration of security assurance and recognition medical practice will need assistance to adapt. 

Asymmetrical Adversarialism in National Defense Policy, The Marketplace and Personal Privacy

ABSTRACT

I once calculated, on the back of a napkin thoroughly drenched in Outback steak juice, that it takes a whole lot of paper to wage a war. I mean, a terrific amount of paper: something like 3,412.7 pieces of papers for every combatant and support soldier in the chain of command. If the war or Operation Other Than War (OOW) or a peace keeping mission carries on for more than six weeks, the paperwork jungle doubles and as the war continues into months, the paperwork increases, but at a lesser rate of bureaucratic indulgence

All of this war-fighting paper means there has to be a whole lot of paper pushers to push the paper needed to fight the war. To support the paper pushers, you have to have people to buy the paper and the pens at the right price; a price that the government would be proud to pay as long as they’re fighting a war. And of course, you have to have bean counters to count how much paper the paper pushers are pushing which is what really makes the whole war business worth doing in the first place. You see, war is a lot about paper.

Protecting E-mail Anonymity with an Anonymizer Bouncer

ABSTRACT

Communication between people has always been a part of society. In the past, people could omit the return address from a letter to keep the sender’s identity private. The problem is that it is not as easy to achieve anonymity when sending and receiving e-mails. This paper discusses ways of achieving anonymity when using e-mail as communication for instance, in lodging complaints to a grievance department. Anonymity is defined as hiding the identity and personal information of an individual. The proposed model uses an anonymous re-mailer to show how the sender of an e-mail’s identity can remain anonymous.

Factors that Influence Young Adults’ Online Security Awareness in Durban in South Africa

ABSTRACT

Online fraud is aggressively threatening individuals and some believe that it can turn into a weapon of electronic warfare in the near future. There is strong agreement that society is required to develop its own resilience against this risk (Jakobsson & Srikwan, 2008).  Vast sums are spent by both the government and business sectors on deflecting mechanisms and on cleaning up after online attacks which are becoming increasingly sophisticated and diverse (Gartner, 2009). The goal of this exploratory study was to establish what the factors that influenced online security were amongst young South African, Durban based adults. The conceptual framework used to guide this approach was Protection Motivation Theory (Rogers, 1983). Data for this study was collected via an online survey. The questionnaire was e-mailed to prospective participants at the University of KwaZulu Natal, where they could submit it electronically. The survey was also sent to the researchers Facebook friends and Twitter followers who fitted the criteria. Significant findings were that gender, race and employment status affected user awareness of online security.

Public/Private Partnerships in Cyberspace: Building a Sustainable Collaboration

ABSTRACT

Much has been written about the legal rights and interests of government, private industry, and individual users in cyberspace. However, relatively little has been written about how codes of conduct, public/private partnerships, and standards and collaborative efforts can be used to structure advancement in technological knowledge for the benefit of all users, or how these efforts could better prioritize the rights and responsibilities of each of the actors in cyberspace. Based on empirical research, this paper presents a conceptual framework for building sustainable partnerships between government and private industry, and looks to models of successful partnerships both nationally and internationally.

Journal of Information Warfare

The definitive publication for the best and latest research and analysis on information warfare, information operations, and cyber crime. Available in traditional hard copy or online.

Keywords

A

AI
APT

C

C2
C2S
CDX
CIA
CIP
CPS

D

DNS
DoD
DoS

I

IA
ICS

M

S

SOA

X

XRY

Quill Logo

The definitive publication for the best and latest research and analysis on information warfare, information operations, and cyber crime. Available in traditional hard copy or online.

SUBSCRIBE NOW

Get in touch

Registered Agent and Mailing Address

  • Journal of Information Warfare
  •  ArmisteadTEC
  • Dr Leigh Armistead, President
  • 1624 Wakefield Drive
  • Virginia Beach, VA 23455

 757.510.4574

 JIW@ArmisteadTec.com