Table of Contents | IGI Global
-
Upload
khangminh22 -
Category
Documents
-
view
2 -
download
0
Transcript of Table of Contents | IGI Global
Table of Contents
Preface..............................................................................................................................................xxvii
Volume ISection 1
Fundamental Concepts and Theories
Chapter 1DigitalEvidenceinPractice:ProcedureandTools................................................................................ 1
Uma N. Dulhare, MJCET, IndiaShaik Rasool, MJCET, India
Chapter 2IntroductiontoTourismSecurity:TourismintheAgeofTerrorism................................................... 23
Maximiliano Emanuel Korstanje, University of Palermo, Argentina
Chapter 3EnglishSpeakingCountriesandtheCultureofFear:UnderstandingTechnologyandTerrorism...... 42
Maximiliano Emanuel Korstanje, University of Palermo, Argentina
Chapter 4TheCyberTalentGapandCybersecurityProfessionalizing................................................................ 56
Calvin Nobles, University of Maryland University College, Adelphi, USA
Chapter 5TheFundamentalsofDigitalForensicsandCyberLaw....................................................................... 64
Kirti Raj Raj Bhatele, BSF Academy, IndiaDeepak Dutt Mishra, BSF Academy, IndiaHimanshu Bhatt, BSF Academy, IndiaKarishma Das, BSF Academy, India
Chapter 6DarkandDeepWebs-LibertyorAbuse................................................................................................ 82
Lev Topor, Bar Ilan University, Ramat Gan, Israel
Chapter 7AReviewonCyberattacks:SecurityThreatsandSolutionTechniquesforDifferentApplications.... 98
Gaganjot Kaur Saini, Charles Sturt University, AustraliaMalka N. Halgamuge, Charles Sturt University, AustraliaPallavi Sharma, Charles Sturt University, AustraliaJames Stephen Purkis, Charles Sturt University, Australia
Section 2Development and Design Methodologies
Chapter 8Cyber-PhysicalSystems:AnOverviewofDesignProcess,Applications,andSecurity.................... 128
Lydia Ray, Columbus State University, USA
Chapter 9DevelopingaMilitaryCyberMaturityModelforMulti-DomainBattleMissionResilienceandSuccess................................................................................................................................................ 151
David Ormrod, Australian Centre for Cyber-Security, University of New South Wales at the Australian Defence Force Academy, Canberra, Australia
Benjamin Turnbull, Australian Centre for Cyber-Security, University of New South Wales at the Australian Defence Force Academy, Canberra, Australia
Chapter 10AdvancesinDigitalForensicsFrameworksandTools:AComparativeInsightandRanking........... 165
Muhammad Abulaish, Department of Computer Science, South Asian University, New Delhi, India
Nur Al Hasan Haldar, Center of Excellence in Information Assurance (CoEIA), King Saud University, Riyadh, Saudi Arabia
Chapter 11SituationUnderstandingforOperationalArtinCyberOperations.................................................... 192
Tuija Kuusisto, Ministry of Finance and National Defence University, Helsinki, FinlandRauno Kuusisto, The Finnish Defence Research Agency, Riihimäki, Finland and National
Defence University, Helsinki, Finland and University of Jyväskylä, Jyväskylä, FinlandWolfgang Roehrig, European Defence Agency, Brussels, Belgium
Chapter 12ANewDynamicCyberDefenseFramework...................................................................................... 207
Jim Q. Chen, DoD National Defense University, Washington, D.C., USA
Chapter 13ACyberCrimeInvestigationModelBasedonCaseCharacteristics................................................. 218
Zhi Jun Liu, Hubei University of Police, Hubei, China
Chapter 14DeceptionDetectioninCyberConflicts:AUseCasefortheCybersecurityStrategyFormationFramework.......................................................................................................................................... 227
Jim Q. Chen, DoD National Defense University, Washington D.C., USA
Chapter 15UsinganOntologyforNetworkAttackPlanning............................................................................... 240
Renier van Heerden, Council for Scientific and Industrial Research (CSIR) and Nelson Mandela Metropolitan University, South Africa
Peter Chan, Council for Scientific and Industrial Research (CSIR), Pretoria, South AfricaLouise Leenen, Council for Scientific and Industrial Research (CSIR), Pretoria and Cape
Peninsula University of Technology, Cape Town, South AfricaJacques Theron, South African National Defence Force (SANDF), Pretoria, South Africa
Chapter 16ContrastModificationForensicsAlgorithmBasedonMergedWeightHistogramofRunLength... 255
Liang Yang, Nankai University, Tianjin, ChinaTiegang Gao, College of Software, Nankai University, Tianjin, ChinaYan Xuan, Nankai University, Tianjin, ChinaHang Gao, Nankai University, Tianjin, China
Chapter 17AFrameworkforDarkWebThreatIntelligenceAnalysis................................................................. 266
Xuan Zhang, Criminal Investigation Department of Shandong Police College, Jinan, ChinaKP Chow, Department of Computer Science University of Hong Kong, Hong Kong, China
Chapter 18AClassificationFrameworkforDataMiningApplicationsinCriminalScienceandInvestigations...................................................................................................................................... 277
Mahima Goyal, Ambedkar Institute of Advanced Communication Technologies and Research, India
Vishal Bhatnagar, Ambedkar Institute of Advanced Communication Technologies and Research, India
Arushi Jain, Ambedkar Institute of Advanced Communication Technologies and Research, India
Chapter 19TowardaModelforEthicalCybersecurityLeadership...................................................................... 294
Marisa Cleveland, Northeastern University, Boston, USATonia Spangler, Florida SouthWestern State College, Fort Myers, USA
Chapter 20AlgorithmforSecureHybridCloudDesignAgainstDDoSAttacks................................................. 303
Akashdeep Bhardwaj, University of Petroleum & Energy Studies, Dehradun, IndiaSam Goundar, Victoria University of Wellington, New Zealand
Chapter 21ModellingCyber-CrimeProtectionBehaviouramongComputerUsersintheContextofBangladesh.......................................................................................................................................... 321
Imran Mahmud, University Sains Malaysia, Malaysia & Daffodil International University, Bangladesh
T. Ramayah, University Sains Malaysia, Malaysia & International Business School, Universiti Teknologi Malaysia, Malaysia
Md. Mahedi Hasan Nayeem, Daffodil International University, BangladeshS. M. Muzahidul Islam, Daffodil International University, BangladeshPei Leng Gan, University Sains Malaysia, Malaysia
Chapter 22APrivacyProtectionApproachBasedonAndroidApplication’sRuntimeBehaviorMonitorandControl................................................................................................................................................ 342
Fan Wu, Beijing University of Posts and Telecommunications, Beijing, ChinaRan Sun, Beijing University of Posts and Telecommunications, Beijing, ChinaWenhao Fan, Beijing University of Posts and Telecommunications, Beijing, ChinaYuan’An Liu, Beijing University of Posts and Telecommunications, Beijing, ChinaFeng Liu, State Key Laboratory of Information Security, Institute of Information Engineering
and School of Cybersecurity University of Chinese Academy of Sciences, Chinese Academy of Sciences, Beijing, China
Hui Lu, Guangzhou University, Guangzhou, China
Chapter 23ASteganalyticSchemeBasedonClassifierSelectionUsingJointImageCharacteristics................. 362
Jie Zhu, State Key Laboratory of Information Security, Institute of Information Engineering, Chinese Academy of Sciences, Beijing, China & School of Cyber Security, University of Chinese Academy of Sciences, Beijing, China
Qingxiao Guan, State Key Laboratory of Information Security, Institute of Information Engineering, Chinese Academy of Sciences, Beijing, China & School of Cyber Security, University of Chinese Academy of Sciences, Beijing, China
Xianfeng Zhao, State Key Laboratory of Information Security, Institute of Information Engineering, Chinese Academy of Sciences, Beijing, China & School of Cyber Security, University of Chinese Academy of Sciences, Beijing, China
Yun Cao, State Key Laboratory of Information Security, Institute of Information Engineering, Chinese Academy of Sciences, Beijing, China & School of Cyber Security, University of Chinese Academy of Sciences, Beijing, China
Gong Chen, State Key Laboratory of Information Security, Institute of Information Engineering, Chinese Academy of Sciences, Beijing, China & School of Cyber Security, University of Chinese Academy of Sciences, Beijing, China
Chapter 24AttackDetectioninCloudNetworksBasedonArtificialIntelligenceApproaches........................... 377
Zuleyha Yiner, Siirt University, TurkeyNurefsan Sertbas, Istanbul University – Cerrahpaşa, TurkeySafak Durukan-Odabasi, Istanbul University – Cerrahpaşa, TurkeyDerya Yiltas-Kaplan, Istanbul University – Cerrahpaşa, Turkey
Chapter 25AnEconomicalMethodologytoRhetoricalIdentificationsinCloudVictimizationVirtualMachineSnapshots............................................................................................................................. 395
Neeraj Bhargava, School of Engineering and System Sciences, Department of Computer Science, MDS University, Ajmer, India
Srinivas Kumar Palvadi, SatyaSai University of Technology and Medical Sciences, Sehore, India
Abhishek Kumar, Aryabhatta College of Engineering and Research Center, Ajmer, IndiaPramod Singh Rathore, Aryabhatta College of Engineering and Research Center, Ajmer,
India
Section 3Tools and Technologies
Chapter 26Cyber-PhysicalSystemsinVehicularCommunications..................................................................... 411
Amjad Mehmood, Kohat University of Science and Technology, PakistanSyed Hassan Ahmed, Kyungpook National University, South KoreaMahasweta Sarkar, San Diego State University, USA
Chapter 27Technology-EnhancedLearninginCyber-PhysicalSystemsEmbeddingModelingandSimulation........................................................................................................................................... 432
Dietmar P. F. Möller, Clausthal University of Technology, Clausthal-Zellerfeld, Germany & University of Nebraska – Lincoln, Lincoln, USA
Hamid Vakilzadian, University of Nebraska – Lincoln, Lincoln, USA
Chapter 28SCADASystemsCyberSecurityforCriticalInfrastructures:CaseStudiesinMultipleSectors...... 446
Suhaila Ismail, School of Information Technology and Mathematical Sciences, University of South Australia, Adelaide, Australia
Elena Sitnikova, Australian Centre for Cyber Security (ACCS), University of New South Wales at ADFA, Canberra, Australia
Jill Slay, Australian Centre for Cyber Security (ACCS), University of New South Wales at ADFA, Canberra, Australia
Chapter 29QuantifyingDecisionMakingintheCriticalInfrastructureviatheAnalyticHierarchyProcess(AHP).................................................................................................................................................. 465
John S. Hurley, College of Information and Cyberspace (CIC), JPME and Cyber-L Department, National Defense University, iCollege, Washington, DC, USA & Information, Communications, Technology and Acquisition Department, National Defense University, Washington, DC, USA
Chapter 30SocialMediaandtheUseofDiscursiveMarkersofOnlineExtremismandRecruitment................ 478
Robyn Torok, Edith Cowan University, Australia
Chapter 31AnOverviewonPassiveImageForensicsTechnologyforAutomaticComputerForgery................ 509
Jie Zhao, School of Computer and Information Engineering, Tianjin Chengjian University, Tianjin, China
Qiuzi Wang, School of Electronic Information Engineering, Tianjin University, Tianjin, China
Jichang Guo, School of Electronic Information Engineering, Tianjin University, Tianjin, China
Lin Gao, College of Software, Nankai University, Tianjin, China & School of Computer and Information Engineering, Tianjin ChengJian University, Tianjin, China
Fusheng Yang, School of Computer and Information Engineering, Tianjin Chengjian University, Tianjin, China
Chapter 32SecureInteroperabilityinCyber-PhysicalSystems............................................................................ 521
Cristina Alcaraz, University of Malaga, SpainJavier Lopez, University of Malaga, Spain
Chapter 33AutonomicComputingArchitectureforSCADACyberSecurity...................................................... 543
Sajid Nazir, Firstco Ltd., London, UKShushma Patel, Faculty of Business, London South Bank University, London, UKDilip Patel, Faculty of Business, London South Bank University, London, UK
Volume II
Chapter 34BlindImageSourceDeviceIdentification:PracticalityandChallenges............................................ 558
Udaya Sameer Venkata, Department of Computer Science and Engineering, National Institute of Technology, Rourkela, India
Ruchira Naskar, Department of Computer Science and Engineering, National Institute of Technology, Rourkela, India
Chapter 35DigitalForensicandMachineLearning............................................................................................. 576
Poonkodi Mariappan, SRM University, IndiaPadhmavathi B., SRM University, IndiaTalluri Srinivasa Teja, SRM University, India
Chapter 36DisconnectsofSpecializedMobileDigitalForensicswithintheGeneralizedFieldofDigitalForensicScience................................................................................................................................. 593
Gregory H. Carlton, California State Polytechnic University, Pomona, USAGary C. Kessler, Embry-Riddle Aeronautical University, Daytona Beach, USA
Chapter 37AReliableDataProvenanceandPrivacyPreservationArchitectureforBusiness-DrivenCyber-PhysicalSystemsUsingBlockchain................................................................................................... 597
Xueping Liang, Institute of Information Engineering, Chinese Academy of Sciences, China & School of Cyber Security, University of Chinese Academy of Sciences, China & Old Dominion University, USA
Sachin Shetty, Old Dominion University, USADeepak K. Tosh, Department of Computer Science, University of Texas at El Paso, USAJuan Zhao, Tennessee State University, USADanyi Li, Institute of Information Engineering, Chinese Academy of Sciences, Beijing, ChinaJihong Liu, Institute of Information Engineering, Chinese Academy of Sciences, Beijing,
China
Chapter 38Cyber-SecurityforICS/SCADA:ASouthAfricanPerspective......................................................... 613
Barend Pretorius, Transnet and University of KwaZulu-Natal, Durban, South AfricaBrett van Niekerk, Transnet and University of KwaZulu-Natal, Durban, South Africa
Chapter 39TheCommunicatingandMarketingofRadicalism:ACaseStudyofISISandCyberRecruitment......................................................................................................................................... 631
David H. McElreath, University of Mississippi, Oxford, USADaniel Adrian Doss, University of West Alabama, Livingston, USALeisa McElreath, Mississippi Crime Stoppers Board, Jackson, USAAshley Lindsley, Southern Illinois University, Carbondale, USAGlenna Lusk, University of Mississippi, Oxford, USAJoseph Skinner, University of Mississippi, Oxford, USAAshley Wellman, Texas Christian University, Fort Worth, USA
Chapter 40OptimizationofOperationalLarge-Scale(Cyber)AttacksbyaCombinationalApproach............... 654
Éric Filiol, Operational Cryptology and Virology Laboratory, ESIEA, Laval, FranceCécilia Gallais, Operational Cryptology and Virology Laboratory, ESIEA, Laval, France
Chapter 41GPSPatentsandTheirEffectsonOurFutureandRights.................................................................. 671
Chloe S. Margulis, University of Minnesota Law School, Minneapolis, USABrian J. Galli, Assistant Professor and Graduate Program Director, Master of Science in
Engineering Management Industrial Engineering, Hofstra University, USA
Chapter 42DetectingSynchronizationSignalJammingAttacksforCybersecurityinCyber-PhysicalEnergyGridSystems....................................................................................................................................... 685
Danda B. Rawat, Howard University, USABrycent A. Chatfield, Georgia Southern University, USA
Chapter 43Slacktivism,Supervision,and#Selfies:IlluminatingSocialMediaCompositionthroughReceptionTheory................................................................................................................................ 696
Elisabeth H. Buck, University of Massachusetts Dartmouth, USA
Chapter 44AnImageForgeryDetectionApproachBasedonCamera’sIntrinsicNoiseProperties.................... 712
Shikha Gautam, GLA University, Mathura, IndiaAnand Singh Jalal, Institute of Engineering and Technology, GLA University, Mathura, India
Chapter 45OnMoreParadigmsofSteganalysis................................................................................................... 723
Xianfeng Zhao, State Key Laboratory of Information Security, Institute of Information Engineering, Chinese Academy of Sciences, Beijing, China
Jie Zhu, State Key Laboratory of Information Security, Institute of Information Engineering, Chinese Academy of Sciences, Beijing, China
Haibo Yu, State Key Laboratory of Information Security, Institute of Information Engineering, Chinese Academy of Sciences, Beijing, China
Chapter 46Copy-MoveForgeryDetectionUsingDyWT..................................................................................... 741
Choudhary Shyam Prakash, Indian Institute of Technology, Department of Computer Science and Engineering, Dhanbad, India
Sushila Maheshkar, Indian Institute of Technology, Department of Computer Science and Engineering, Dhanbad, India
Chapter 47DistributedSystemImplementationBasedon“AntsFeedingBirds”Algorithm:ElectronicsTransformationviaAnimalsandHuman............................................................................................ 751
Preeti Mulay, Symbiosis Institute of Technology, IndiaKrishnal Patel, Symbiosis Institute of Technology, IndiaHecto Gomez Gauchia, University of Madrid, Spain
Chapter 48ACyber-PhysicalPhotovoltaicArrayMonitoringandControlSystem............................................. 786
Gowtham Muniraju, SenSIP Center, Arizona State University, Tempe, USASunil Rao, SenSIP Center, Arizona State University, Tempe, USASameeksha Katoch, SenSIP Center, Arizona State University, Tempe, USAAndreas Spanias, SenSIP Center, Arizona State University, Tempe, USACihan Tepedelenlioglu, SenSIP Center, Arizona State University, Tempe, USAPavan Turaga, SenSIP Center, Arizona State University, Tempe, USAMahesh K Banavar, Clarkson Center for Complex Systems Science, Clarkson University,
Potsdam, USADevarajan Srinivasan, Poundra Inc, Tempe, USA
Chapter 49AdvancedThreatDetectionBasedonBigDataTechnologies........................................................... 808
Madhvaraj M. Shetty, Mangalore University, IndiaManjaiah D. H., Mangalore University, India
Chapter 50Possibilities,Impediments,andChallengesforNetworkSecurityinBigData.................................. 823
Anuj Kumar Dwivedi, Govt. Vijay Bhusan Singh Deo Girls Degree College, IndiaO. P. Vyas, Indian Institute of Information Technology Allahabad, India
Chapter 51BigDataAnalyticsPlatformsforElectricVehicleIntegrationinTransportOrientedSmartCities:ComputingPlatformsforPlatformsforElectricVehicleIntegrationinSmartCities........................ 833
Md Muzakkir Hussain, Aligarh Muslim University, Aligarh, IndiaM.M. Sufyan Beg, Aligarh Muslim University, Aligarh, IndiaMohammad Saad Alam, Aligarh Muslim University, Aligarh, IndiaShahedul Haque Laskar, NIT SILCHAR, Silchar, India
Chapter 52ComputerForensicInvestigationinCloudofThings......................................................................... 855
A. Surendar, Vignan’s Foundation for Science, Technology and Research (Deemed to be University), India
Chapter 53DistProv-DataProvenanceinDistributedCloudforSecureTransferofDigitalAssetswithEthereumBlockchainusingZKP........................................................................................................ 866
Navya Gouru, GITAM (Deemed to be University), Visakhapatnam, IndiaNagaLakshmi Vadlamani, GITAM (Deemed to be University), Visakhapatnam, India
Section 4Utilization and Applications
Chapter 54PunchingAboveTheirDigitalWeight:WhyIranisDevelopingCyberwarfareCapabilitiesFarBeyondExpectations........................................................................................................................... 892
Ralph Peter Martins, Harvard University, Cambridge, USA
Chapter 55Cyberattacks,CybercrimeandCyberterrorism.................................................................................. 909
Saurabh Ranjan Srivastava, Malviya National Institute of Technology, IndiaSachin Dube, Malviya National Institute of Technology, India
Chapter 56CyberSecurityVulnerabilityManagementinCBRNIndustrialControlSystems(ICS)................... 931
Roberto Mugavero, Department of Electronic Engineering – University of Rome “Tor Vergata”, Rome, Italy
Stanislav Abaimov, National Inter-Universitary Consortium for Telecommunications, ItalyFederico Benolli, OSDIFE - Observatory on Security and CBRNe Defence, Rome, ItalyValentina Sabato, OSDIFE - Observatory on Security and CBRNe Deefence, Rome, Italy
Chapter 57ACaseforUsingBlendedLearningandDevelopmentTechniquestoAidtheDeliveryofaUKCybersecurityCoreBodyofKnowledge............................................................................................ 964
David A Bird, Learning and Performance Institute, Coventry, UKJohn Curry, Bath Spa University, Bath, UK
Chapter 58ModernInformationTechnology,GlobalRisk,andtheChallengesofCrimeintheEraofLateModernity............................................................................................................................................ 985
Ajibade Ebenezer Jegede, Covenant University, Nigeria
Chapter 59TheNeedforHigherEducationinCyberSupplyChainSecurityandHardwareAssurance........... 1001
Brian Cohen, Institute for Defense Analyses, Alexandria, USAMichelle G. Albert, Institute for Defense Analyses, Alexandria, USAElizabeth A. McDaniel, Institute for Defense Analyses, Alexandria, USA
Chapter 60TowardApproachestoBigDataAnalysisforTerroristicBehaviorIdentification:ChildSoldiersinIllegalArmedGroupsDuringtheConflictintheDonbasRegion(EastUkraine)........................... 1016
Yuriy V. Kostyuchenko, Scientific Centre for Aerospace Research of the Earth, National Academy of Sciences of Ukraine, Kiev, Ukraine
Maxim Yuschenko, Scientific Centre for Aerospace Research of the Earth, National Academy of Sciences of Ukraine, Kiev, Ukraine
Chapter 61RussianActiveMeasuresandSeptember11,2001:NostradamusThemedDisinformation?.......... 1029
Michael Bennett Hotchkiss, Independent Researcher, USA
Chapter 62CounteringOnlineViolentExtremism:StateActionasStrategicCommunication......................... 1048
Damien D. Cheong, Nanyang Technological University, Singapore
Chapter 63AnExplorationoftheCybersecurityWorkforceShortage............................................................... 1072
Darrell Norman Burrell, The Florida Institute of Technology, Melbourne, USA
Chapter 64Bioterrorism,BioCrimesandPolitics:ACaseofChaosandComplexity...................................... 1082
Hakiimu Kawalya, Ankara University, Turkey
Chapter 65ManagingOrganizedCrime.............................................................................................................. 1093
Roberto Musotto, University of Messina, ItalyDavide Di Fatta, University of Messina, ItalyWalter Vesperi, University of Messina, ItalyGiacomo Morabito, University of Messina, ItalyVittorio D’Aleo, University of Messina, ItalySalvatore Lo Bue, University of Messina, Italy
Chapter 66CybercrimeasaThreattoZimbabwe’sPeaceandSecurity............................................................. 1107
Jeffrey Kurebwa, Bindura University of Science Education, ZimbabweJacqueline Rumbidzai Tanhara, Chinhoyi University of Technology, Zimbabwe
Volume III
Chapter 67WhyIsISISsoPsychologicallyAttractive?..................................................................................... 1123
Loo Seng Neo, Home Team Behavioural Sciences Centre, Ministry of Home Affairs, Singapore
Priscilla Shi, Home Team Behavioural Sciences Centre, Ministry of Home Affairs, SingaporeLeevia Dillon, Home Team Behavioural Sciences Centre, Ministry of Home Affairs,
SingaporeJethro Tan, Home Team Behavioural Sciences Centre, Ministry of Home Affairs, SingaporeYingmin Wang, Home Team Behavioural Sciences Centre, Ministry of Home Affairs,
SingaporeDanielle Gomes, Home Team Behavioural Sciences Centre, Ministry of Home Affairs,
Singapore
Chapter 68AssessmentofHoneypots:Issues,ChallengesandFutureDirections.............................................. 1142
B. B. Gupta, National Institute of Technology Kurukshtra, IndiaAlisha Gupta, National Institute of Technology Kurukshtra, India
Chapter 69DigitalForensicsintheContextoftheInternetofThings............................................................... 1178
Mariya Shafat Kirmani, University of Kashmir, IndiaMohammad Tariq Banday, University of Kashmir, India
Chapter 70ASocio-TechnicalPerspectiveonThreatIntelligenceInformedDigitalForensicReadiness.......... 1201
Nikolaos Serketzis, Aristotle University of Thessaloniki, Thessaloniki, GreeceVasilios Katos, Bournemouth University, Poole, UKChristos Ilioudis, Alexander Technological Educational Institute of Thessaloniki,
Thessaloniki, GreeceDimitrios Baltatzis, International Hellenic University, Thessaloniki, GreeceGeorge J Pangalos, Aristotle University of Thessaloniki, Thessaloniki, Greece
Section 5Organizational and Social Implications
Chapter 71AComparativeAnalysisoftheCyberattacksAgainstEstonia,theUnitedStates,andUkraine:ExemplifyingtheEvolutionofInternet-SupportedWarfare............................................................. 1214
Kenneth J. Boyte, Cabrillo College, Castroville, USA
Chapter 72EriksonianAnalysisofTerrorisminWestAfrica............................................................................. 1232
Chris Mensah-Ankrah, West Africa Centre for Counter Extremism, Accra, Ghana
Chapter 73Tourism,Terrorism,Morality,andMarketing:AStudyoftheRoleofReciprocityinTourismMarketing.......................................................................................................................................... 1251
Peter E. Tarlow, Texas A&M University, USA
Chapter 74TheRootsofTerror:TheLesserEvilDoctrineunderCriticism...................................................... 1265
Maximiliano Emanuel Korstanje, University of Palermo, Argentina
Chapter 75ISISRhetoricfortheCreationoftheUmmah.................................................................................. 1278
Amaryllis Maria Georges, TRENDS Research and Advisory, UAE
Chapter 76ExploringMythsinDigitalForensics:SeparatingScienceFromRitual.......................................... 1299
Gary C. Kessler, Embry-Riddle Aeronautical University, Daytona Beach, USAGregory H. Carlton, California State Polytechnic University, Pomona, USA
Chapter 77CyberHygieneinHealthCareDataBreaches.................................................................................. 1309
Jomin George, Namibia University of Science and Technology, Windhoek, NamibiaAroma Emmanuel, Namibia University of Science and Technology, Windhoek, Namibia
Chapter 78BuildingNationalResilienceintheDigitalEraofViolentExtremism:SystemsandPeople.......... 1322
Jethro Tan, Home Team Behavioural Sciences Centre, Ministry of Home Affairs, SingaporeYingmin Wang, Home Team Behavioural Sciences Centre, Ministry of Home Affairs,
SingaporeDanielle Gomes, Home Team Behavioural Sciences Centre, Ministry of Home Affairs,
Singapore
Chapter 79ARegionofAssociationandTurbulence......................................................................................... 1343
Meha Pant, Jawaharlal Nehru University, India
Chapter 80JusinBelloandtheActsofTerrorism:AStudy.............................................................................. 1363
Mohammad Saidul Islam, Department of Law, International Islamic University Chittagong, Chittagong, Bangladesh
Chapter 81Copy-MoveForgeryLocalizationUsingConvolutionalNeuralNetworksandCFAFeatures......... 1379
Lu Liu, Institute of Information Science, Beijing Jiaotong University, Beijing, ChinaYao Zhao, Institute of Information Science, Beijing Jiaotong University, Beijing, ChinaRongrong Ni, Institute of Information Science, Beijing Jiaotong University, Beijing, ChinaQi Tian, Department of Computer Science, University of Texas at San Antonio, San Antonio,
US
Chapter 82TheCyberethics,Cybersafety,andCybersecurityatSchools.......................................................... 1395
Irene L. Chen, University of Houston Downtown, Houston, USALibi Shen, University of Phoenix, Los Angeles, USA
Chapter 83FiltrationofTerrorism-RelatedTextsintheE-GovernmentEnvironment....................................... 1413
Rasim M. Alguliyev, Institute of Information Technology, Azerbaijan National Academy of Sciences, Baku, Azerbaijan
Ramiz M. Aliguliyev, Institute of Information Technology, Azerbaijan National Academy of Sciences, Baku, Azerbaijan
Gunay Y. Niftaliyeva, Institute of Information Technology, Azerbaijan National Academy of Sciences, Baku, Azerbaijan
Chapter 84TheEffectsofMoneyLaundering(ML)onGrowthApplicationtotheGulfCountries................. 1428
Fakhri Issaoui, University of Tunis, Faculty of Economics and Management, Tunis, TunisiaToumi Hassen, University of Sfax, Economics and Management, Sfax, TunisiaTouili Wassim, University of Tunis, Economics, Tunis, Tunisia
Chapter 85JihadistPropagandaonSocialMedia:AnExaminationofISISRelatedContentonTwitter.......... 1442
Ahmed Al-Rawi, Simon Fraser University, CanadaJacob Groshek, Boston University, USA
Chapter 86ManagingTerrorisminAfrica:AssessingPolicingIssues............................................................... 1458
Gerald Dapaah Gyamfi, University of Professional Studies, Accra, Ghana
Chapter 87CreditCardFraud:BehindtheScenes.............................................................................................. 1470
Dan DeFilippi, Independent Researcher, USAKatina Michael, University of Wollongong, Australia
Chapter 88TheThreatofCyberWarfareintheSADCRegion:TheCaseofZimbabwe.................................. 1485
Jeffrey Kurebwa, Bindura University of Science Education, ZimbabweKundai Lillian Matenga, Bindura University of Science Education, Zimbabwe
Chapter 89IslamicExtremistsinAfrica:SecuritySpotlightonKenyaandNigeria.......................................... 1506
Maurice Dawson, Illinois Institute of Technology, USAWale Adeboje, South Wesleyan University, USA
Chapter 90CloudRiskResilience:InvestigationofAuditPracticesandTechnologyAdvances-ATechnicalReport................................................................................................................................................ 1518
Akhilesh Mahesh, University at Buffalo School of Management, Amherst, USANiranjali Suresh, Pricewaterhouse Coopers, Atlanta, USAManish Gupta, University at Buffalo School of Management, Amherst, USARaj Sharman, University at Buffalo School of Management, Amherst, USA
Section 6Managerial Impact
Chapter 91ManagementApproachofRiskAnalysisinInformationSecurity................................................... 1550
Anca Gabriela Petrescu, Valahia University, Targoviste, Romania
Chapter 92CybersecurityBestPracticesandCulturalChangeinGlobalBusiness:SomePerspectivesfromtheEuropeanUnion.......................................................................................................................... 1566
José Manuel Saiz-Alvarez, Tecnológico de Monterrey, MexicoGuillermo Calleja Leal, Royal Academy of History, Spain
Section 7Critical Issues and Challenges
Chapter 93ResearchonDigitalForensicsBasedonUyghurWebTextClassification...................................... 1586
Yasen Aizezi, Xinjiang Police college, Urumqi, ChinaAnwar Jamal, Xinjiang Police College, Urumqi, ChinaRuxianguli Abudurexiti, Xinjiang Police College, Urumqi, ChinaMutalipu Muming, Xinjiang Police College, Urumqi, China
Chapter 94DeterminantsofTerrorisminSouthAsia:InsightsFromaDynamicPanelDataAnalysis............. 1598
Ramesh Chandra Das, Katwa College, Burdwan, IndiaSovik Mukherjee, St. Xavier’s University, Kolkata, India
Chapter 95WhatWeKnowandWhatElseWeNeedtoDotoAddresstheProblemofViolentExtremismOnline:ConcludingChapter............................................................................................................. 1618
Majeed Khader, Home Team Behavioural Sciences Centre, Ministry of Home Affairs, Singapore
Chapter 96EthosConstruction,Identification,andAuthenticityintheDiscoursesofAWSA:TheArabWomen’sSolidarityAssociationInternational................................................................................. 1629
Samaa Gamie, Lincoln University, USA
Chapter 97OnExperienceofSocialNetworksExplorationforComparativeAnalysisofNarrativesofForeignMembersofArmedGroups:ISandL/DPRinSyriaandUkrainein2015-2016............................. 1656
Yuriy V. Kostyuchenko, Scientific Centre for Aerospace Research of the Earth, National Academy of Sciences of Ukraine, Kiev, Ukraine
Maxim Yuschenko, Scientific Centre for Aerospace Research of the Earth, National Academy of Sciences of Ukraine, Kiev, Ukraine
Igor Artemenko, Scientific Centre for Aerospace Research of the Earth, National Academy of Sciences of Ukraine, Kiev, Ukraine
Chapter 98AWhiteHatStudyofaNation’sPubliclyAccessibleCriticalDigitalInfrastructureandaWayForward............................................................................................................................................. 1672
Timo Kiravuo, Aalto University, Helsinki, FinlandSeppo Tiilikainen, Aalto University, Helsinki, FinlandMikko Särelä, Aalto University, Helsinki, FinlandJukka Manner, Aalto University, Helsinki, Finland
Section 8Emerging Trends
Chapter 99TheNextGenerationofScientific-BasedRiskMetrics:MeasuringCyberMaturity....................... 1687
Lanier Watkins, Johns Hopkins University Information Security Institution, Baltimore, USAJohn S. Hurley, National Defense University, Washington D.C., USA
Index.................................................................................................................................................. xxxi