Table of Contents | IGI Global

16
Table of Contents Preface .............................................................................................................................................. xxvii Volume I Section 1 Fundamental Concepts and Theories Chapter 1 DigitalEvidenceinPractice:ProcedureandTools ................................................................................ 1 Uma N. Dulhare, MJCET, India Shaik Rasool, MJCET, India Chapter 2 IntroductiontoTourismSecurity:TourismintheAgeofTerrorism ................................................... 23 Maximiliano Emanuel Korstanje, University of Palermo, Argentina Chapter 3 EnglishSpeakingCountriesandtheCultureofFear:UnderstandingTechnologyandTerrorism...... 42 Maximiliano Emanuel Korstanje, University of Palermo, Argentina Chapter 4 TheCyberTalentGapandCybersecurityProfessionalizing ................................................................ 56 Calvin Nobles, University of Maryland University College, Adelphi, USA Chapter 5 TheFundamentalsofDigitalForensicsandCyberLaw....................................................................... 64 Kirti Raj Raj Bhatele, BSF Academy, India Deepak Dutt Mishra, BSF Academy, India Himanshu Bhatt, BSF Academy, India Karishma Das, BSF Academy, India Chapter 6 DarkandDeepWebs-LibertyorAbuse ................................................................................................ 82 Lev Topor, Bar Ilan University, Ramat Gan, Israel

Transcript of Table of Contents | IGI Global

Table of Contents

Preface..............................................................................................................................................xxvii

Volume ISection 1

Fundamental Concepts and Theories

Chapter 1DigitalEvidenceinPractice:ProcedureandTools................................................................................ 1

Uma N. Dulhare, MJCET, IndiaShaik Rasool, MJCET, India

Chapter 2IntroductiontoTourismSecurity:TourismintheAgeofTerrorism................................................... 23

Maximiliano Emanuel Korstanje, University of Palermo, Argentina

Chapter 3EnglishSpeakingCountriesandtheCultureofFear:UnderstandingTechnologyandTerrorism...... 42

Maximiliano Emanuel Korstanje, University of Palermo, Argentina

Chapter 4TheCyberTalentGapandCybersecurityProfessionalizing................................................................ 56

Calvin Nobles, University of Maryland University College, Adelphi, USA

Chapter 5TheFundamentalsofDigitalForensicsandCyberLaw....................................................................... 64

Kirti Raj Raj Bhatele, BSF Academy, IndiaDeepak Dutt Mishra, BSF Academy, IndiaHimanshu Bhatt, BSF Academy, IndiaKarishma Das, BSF Academy, India

Chapter 6DarkandDeepWebs-LibertyorAbuse................................................................................................ 82

Lev Topor, Bar Ilan University, Ramat Gan, Israel

Chapter 7AReviewonCyberattacks:SecurityThreatsandSolutionTechniquesforDifferentApplications.... 98

Gaganjot Kaur Saini, Charles Sturt University, AustraliaMalka N. Halgamuge, Charles Sturt University, AustraliaPallavi Sharma, Charles Sturt University, AustraliaJames Stephen Purkis, Charles Sturt University, Australia

Section 2Development and Design Methodologies

Chapter 8Cyber-PhysicalSystems:AnOverviewofDesignProcess,Applications,andSecurity.................... 128

Lydia Ray, Columbus State University, USA

Chapter 9DevelopingaMilitaryCyberMaturityModelforMulti-DomainBattleMissionResilienceandSuccess................................................................................................................................................ 151

David Ormrod, Australian Centre for Cyber-Security, University of New South Wales at the Australian Defence Force Academy, Canberra, Australia

Benjamin Turnbull, Australian Centre for Cyber-Security, University of New South Wales at the Australian Defence Force Academy, Canberra, Australia

Chapter 10AdvancesinDigitalForensicsFrameworksandTools:AComparativeInsightandRanking........... 165

Muhammad Abulaish, Department of Computer Science, South Asian University, New Delhi, India

Nur Al Hasan Haldar, Center of Excellence in Information Assurance (CoEIA), King Saud University, Riyadh, Saudi Arabia

Chapter 11SituationUnderstandingforOperationalArtinCyberOperations.................................................... 192

Tuija Kuusisto, Ministry of Finance and National Defence University, Helsinki, FinlandRauno Kuusisto, The Finnish Defence Research Agency, Riihimäki, Finland and National

Defence University, Helsinki, Finland and University of Jyväskylä, Jyväskylä, FinlandWolfgang Roehrig, European Defence Agency, Brussels, Belgium

Chapter 12ANewDynamicCyberDefenseFramework...................................................................................... 207

Jim Q. Chen, DoD National Defense University, Washington, D.C., USA

Chapter 13ACyberCrimeInvestigationModelBasedonCaseCharacteristics................................................. 218

Zhi Jun Liu, Hubei University of Police, Hubei, China

Chapter 14DeceptionDetectioninCyberConflicts:AUseCasefortheCybersecurityStrategyFormationFramework.......................................................................................................................................... 227

Jim Q. Chen, DoD National Defense University, Washington D.C., USA

Chapter 15UsinganOntologyforNetworkAttackPlanning............................................................................... 240

Renier van Heerden, Council for Scientific and Industrial Research (CSIR) and Nelson Mandela Metropolitan University, South Africa

Peter Chan, Council for Scientific and Industrial Research (CSIR), Pretoria, South AfricaLouise Leenen, Council for Scientific and Industrial Research (CSIR), Pretoria and Cape

Peninsula University of Technology, Cape Town, South AfricaJacques Theron, South African National Defence Force (SANDF), Pretoria, South Africa

Chapter 16ContrastModificationForensicsAlgorithmBasedonMergedWeightHistogramofRunLength... 255

Liang Yang, Nankai University, Tianjin, ChinaTiegang Gao, College of Software, Nankai University, Tianjin, ChinaYan Xuan, Nankai University, Tianjin, ChinaHang Gao, Nankai University, Tianjin, China

Chapter 17AFrameworkforDarkWebThreatIntelligenceAnalysis................................................................. 266

Xuan Zhang, Criminal Investigation Department of Shandong Police College, Jinan, ChinaKP Chow, Department of Computer Science University of Hong Kong, Hong Kong, China

Chapter 18AClassificationFrameworkforDataMiningApplicationsinCriminalScienceandInvestigations...................................................................................................................................... 277

Mahima Goyal, Ambedkar Institute of Advanced Communication Technologies and Research, India

Vishal Bhatnagar, Ambedkar Institute of Advanced Communication Technologies and Research, India

Arushi Jain, Ambedkar Institute of Advanced Communication Technologies and Research, India

Chapter 19TowardaModelforEthicalCybersecurityLeadership...................................................................... 294

Marisa Cleveland, Northeastern University, Boston, USATonia Spangler, Florida SouthWestern State College, Fort Myers, USA

Chapter 20AlgorithmforSecureHybridCloudDesignAgainstDDoSAttacks................................................. 303

Akashdeep Bhardwaj, University of Petroleum & Energy Studies, Dehradun, IndiaSam Goundar, Victoria University of Wellington, New Zealand

Chapter 21ModellingCyber-CrimeProtectionBehaviouramongComputerUsersintheContextofBangladesh.......................................................................................................................................... 321

Imran Mahmud, University Sains Malaysia, Malaysia & Daffodil International University, Bangladesh

T. Ramayah, University Sains Malaysia, Malaysia & International Business School, Universiti Teknologi Malaysia, Malaysia

Md. Mahedi Hasan Nayeem, Daffodil International University, BangladeshS. M. Muzahidul Islam, Daffodil International University, BangladeshPei Leng Gan, University Sains Malaysia, Malaysia

Chapter 22APrivacyProtectionApproachBasedonAndroidApplication’sRuntimeBehaviorMonitorandControl................................................................................................................................................ 342

Fan Wu, Beijing University of Posts and Telecommunications, Beijing, ChinaRan Sun, Beijing University of Posts and Telecommunications, Beijing, ChinaWenhao Fan, Beijing University of Posts and Telecommunications, Beijing, ChinaYuan’An Liu, Beijing University of Posts and Telecommunications, Beijing, ChinaFeng Liu, State Key Laboratory of Information Security, Institute of Information Engineering

and School of Cybersecurity University of Chinese Academy of Sciences, Chinese Academy of Sciences, Beijing, China

Hui Lu, Guangzhou University, Guangzhou, China

Chapter 23ASteganalyticSchemeBasedonClassifierSelectionUsingJointImageCharacteristics................. 362

Jie Zhu, State Key Laboratory of Information Security, Institute of Information Engineering, Chinese Academy of Sciences, Beijing, China & School of Cyber Security, University of Chinese Academy of Sciences, Beijing, China

Qingxiao Guan, State Key Laboratory of Information Security, Institute of Information Engineering, Chinese Academy of Sciences, Beijing, China & School of Cyber Security, University of Chinese Academy of Sciences, Beijing, China

Xianfeng Zhao, State Key Laboratory of Information Security, Institute of Information Engineering, Chinese Academy of Sciences, Beijing, China & School of Cyber Security, University of Chinese Academy of Sciences, Beijing, China

Yun Cao, State Key Laboratory of Information Security, Institute of Information Engineering, Chinese Academy of Sciences, Beijing, China & School of Cyber Security, University of Chinese Academy of Sciences, Beijing, China

Gong Chen, State Key Laboratory of Information Security, Institute of Information Engineering, Chinese Academy of Sciences, Beijing, China & School of Cyber Security, University of Chinese Academy of Sciences, Beijing, China

Chapter 24AttackDetectioninCloudNetworksBasedonArtificialIntelligenceApproaches........................... 377

Zuleyha Yiner, Siirt University, TurkeyNurefsan Sertbas, Istanbul University – Cerrahpaşa, TurkeySafak Durukan-Odabasi, Istanbul University – Cerrahpaşa, TurkeyDerya Yiltas-Kaplan, Istanbul University – Cerrahpaşa, Turkey

Chapter 25AnEconomicalMethodologytoRhetoricalIdentificationsinCloudVictimizationVirtualMachineSnapshots............................................................................................................................. 395

Neeraj Bhargava, School of Engineering and System Sciences, Department of Computer Science, MDS University, Ajmer, India

Srinivas Kumar Palvadi, SatyaSai University of Technology and Medical Sciences, Sehore, India

Abhishek Kumar, Aryabhatta College of Engineering and Research Center, Ajmer, IndiaPramod Singh Rathore, Aryabhatta College of Engineering and Research Center, Ajmer,

India

Section 3Tools and Technologies

Chapter 26Cyber-PhysicalSystemsinVehicularCommunications..................................................................... 411

Amjad Mehmood, Kohat University of Science and Technology, PakistanSyed Hassan Ahmed, Kyungpook National University, South KoreaMahasweta Sarkar, San Diego State University, USA

Chapter 27Technology-EnhancedLearninginCyber-PhysicalSystemsEmbeddingModelingandSimulation........................................................................................................................................... 432

Dietmar P. F. Möller, Clausthal University of Technology, Clausthal-Zellerfeld, Germany & University of Nebraska – Lincoln, Lincoln, USA

Hamid Vakilzadian, University of Nebraska – Lincoln, Lincoln, USA

Chapter 28SCADASystemsCyberSecurityforCriticalInfrastructures:CaseStudiesinMultipleSectors...... 446

Suhaila Ismail, School of Information Technology and Mathematical Sciences, University of South Australia, Adelaide, Australia

Elena Sitnikova, Australian Centre for Cyber Security (ACCS), University of New South Wales at ADFA, Canberra, Australia

Jill Slay, Australian Centre for Cyber Security (ACCS), University of New South Wales at ADFA, Canberra, Australia

Chapter 29QuantifyingDecisionMakingintheCriticalInfrastructureviatheAnalyticHierarchyProcess(AHP).................................................................................................................................................. 465

John S. Hurley, College of Information and Cyberspace (CIC), JPME and Cyber-L Department, National Defense University, iCollege, Washington, DC, USA & Information, Communications, Technology and Acquisition Department, National Defense University, Washington, DC, USA

Chapter 30SocialMediaandtheUseofDiscursiveMarkersofOnlineExtremismandRecruitment................ 478

Robyn Torok, Edith Cowan University, Australia

Chapter 31AnOverviewonPassiveImageForensicsTechnologyforAutomaticComputerForgery................ 509

Jie Zhao, School of Computer and Information Engineering, Tianjin Chengjian University, Tianjin, China

Qiuzi Wang, School of Electronic Information Engineering, Tianjin University, Tianjin, China

Jichang Guo, School of Electronic Information Engineering, Tianjin University, Tianjin, China

Lin Gao, College of Software, Nankai University, Tianjin, China & School of Computer and Information Engineering, Tianjin ChengJian University, Tianjin, China

Fusheng Yang, School of Computer and Information Engineering, Tianjin Chengjian University, Tianjin, China

Chapter 32SecureInteroperabilityinCyber-PhysicalSystems............................................................................ 521

Cristina Alcaraz, University of Malaga, SpainJavier Lopez, University of Malaga, Spain

Chapter 33AutonomicComputingArchitectureforSCADACyberSecurity...................................................... 543

Sajid Nazir, Firstco Ltd., London, UKShushma Patel, Faculty of Business, London South Bank University, London, UKDilip Patel, Faculty of Business, London South Bank University, London, UK

Volume II

Chapter 34BlindImageSourceDeviceIdentification:PracticalityandChallenges............................................ 558

Udaya Sameer Venkata, Department of Computer Science and Engineering, National Institute of Technology, Rourkela, India

Ruchira Naskar, Department of Computer Science and Engineering, National Institute of Technology, Rourkela, India

Chapter 35DigitalForensicandMachineLearning............................................................................................. 576

Poonkodi Mariappan, SRM University, IndiaPadhmavathi B., SRM University, IndiaTalluri Srinivasa Teja, SRM University, India

Chapter 36DisconnectsofSpecializedMobileDigitalForensicswithintheGeneralizedFieldofDigitalForensicScience................................................................................................................................. 593

Gregory H. Carlton, California State Polytechnic University, Pomona, USAGary C. Kessler, Embry-Riddle Aeronautical University, Daytona Beach, USA

Chapter 37AReliableDataProvenanceandPrivacyPreservationArchitectureforBusiness-DrivenCyber-PhysicalSystemsUsingBlockchain................................................................................................... 597

Xueping Liang, Institute of Information Engineering, Chinese Academy of Sciences, China & School of Cyber Security, University of Chinese Academy of Sciences, China & Old Dominion University, USA

Sachin Shetty, Old Dominion University, USADeepak K. Tosh, Department of Computer Science, University of Texas at El Paso, USAJuan Zhao, Tennessee State University, USADanyi Li, Institute of Information Engineering, Chinese Academy of Sciences, Beijing, ChinaJihong Liu, Institute of Information Engineering, Chinese Academy of Sciences, Beijing,

China

Chapter 38Cyber-SecurityforICS/SCADA:ASouthAfricanPerspective......................................................... 613

Barend Pretorius, Transnet and University of KwaZulu-Natal, Durban, South AfricaBrett van Niekerk, Transnet and University of KwaZulu-Natal, Durban, South Africa

Chapter 39TheCommunicatingandMarketingofRadicalism:ACaseStudyofISISandCyberRecruitment......................................................................................................................................... 631

David H. McElreath, University of Mississippi, Oxford, USADaniel Adrian Doss, University of West Alabama, Livingston, USALeisa McElreath, Mississippi Crime Stoppers Board, Jackson, USAAshley Lindsley, Southern Illinois University, Carbondale, USAGlenna Lusk, University of Mississippi, Oxford, USAJoseph Skinner, University of Mississippi, Oxford, USAAshley Wellman, Texas Christian University, Fort Worth, USA

Chapter 40OptimizationofOperationalLarge-Scale(Cyber)AttacksbyaCombinationalApproach............... 654

Éric Filiol, Operational Cryptology and Virology Laboratory, ESIEA, Laval, FranceCécilia Gallais, Operational Cryptology and Virology Laboratory, ESIEA, Laval, France

Chapter 41GPSPatentsandTheirEffectsonOurFutureandRights.................................................................. 671

Chloe S. Margulis, University of Minnesota Law School, Minneapolis, USABrian J. Galli, Assistant Professor and Graduate Program Director, Master of Science in

Engineering Management Industrial Engineering, Hofstra University, USA

Chapter 42DetectingSynchronizationSignalJammingAttacksforCybersecurityinCyber-PhysicalEnergyGridSystems....................................................................................................................................... 685

Danda B. Rawat, Howard University, USABrycent A. Chatfield, Georgia Southern University, USA

Chapter 43Slacktivism,Supervision,and#Selfies:IlluminatingSocialMediaCompositionthroughReceptionTheory................................................................................................................................ 696

Elisabeth H. Buck, University of Massachusetts Dartmouth, USA

Chapter 44AnImageForgeryDetectionApproachBasedonCamera’sIntrinsicNoiseProperties.................... 712

Shikha Gautam, GLA University, Mathura, IndiaAnand Singh Jalal, Institute of Engineering and Technology, GLA University, Mathura, India

Chapter 45OnMoreParadigmsofSteganalysis................................................................................................... 723

Xianfeng Zhao, State Key Laboratory of Information Security, Institute of Information Engineering, Chinese Academy of Sciences, Beijing, China

Jie Zhu, State Key Laboratory of Information Security, Institute of Information Engineering, Chinese Academy of Sciences, Beijing, China

Haibo Yu, State Key Laboratory of Information Security, Institute of Information Engineering, Chinese Academy of Sciences, Beijing, China

Chapter 46Copy-MoveForgeryDetectionUsingDyWT..................................................................................... 741

Choudhary Shyam Prakash, Indian Institute of Technology, Department of Computer Science and Engineering, Dhanbad, India

Sushila Maheshkar, Indian Institute of Technology, Department of Computer Science and Engineering, Dhanbad, India

Chapter 47DistributedSystemImplementationBasedon“AntsFeedingBirds”Algorithm:ElectronicsTransformationviaAnimalsandHuman............................................................................................ 751

Preeti Mulay, Symbiosis Institute of Technology, IndiaKrishnal Patel, Symbiosis Institute of Technology, IndiaHecto Gomez Gauchia, University of Madrid, Spain

Chapter 48ACyber-PhysicalPhotovoltaicArrayMonitoringandControlSystem............................................. 786

Gowtham Muniraju, SenSIP Center, Arizona State University, Tempe, USASunil Rao, SenSIP Center, Arizona State University, Tempe, USASameeksha Katoch, SenSIP Center, Arizona State University, Tempe, USAAndreas Spanias, SenSIP Center, Arizona State University, Tempe, USACihan Tepedelenlioglu, SenSIP Center, Arizona State University, Tempe, USAPavan Turaga, SenSIP Center, Arizona State University, Tempe, USAMahesh K Banavar, Clarkson Center for Complex Systems Science, Clarkson University,

Potsdam, USADevarajan Srinivasan, Poundra Inc, Tempe, USA

Chapter 49AdvancedThreatDetectionBasedonBigDataTechnologies........................................................... 808

Madhvaraj M. Shetty, Mangalore University, IndiaManjaiah D. H., Mangalore University, India

Chapter 50Possibilities,Impediments,andChallengesforNetworkSecurityinBigData.................................. 823

Anuj Kumar Dwivedi, Govt. Vijay Bhusan Singh Deo Girls Degree College, IndiaO. P. Vyas, Indian Institute of Information Technology Allahabad, India

Chapter 51BigDataAnalyticsPlatformsforElectricVehicleIntegrationinTransportOrientedSmartCities:ComputingPlatformsforPlatformsforElectricVehicleIntegrationinSmartCities........................ 833

Md Muzakkir Hussain, Aligarh Muslim University, Aligarh, IndiaM.M. Sufyan Beg, Aligarh Muslim University, Aligarh, IndiaMohammad Saad Alam, Aligarh Muslim University, Aligarh, IndiaShahedul Haque Laskar, NIT SILCHAR, Silchar, India

Chapter 52ComputerForensicInvestigationinCloudofThings......................................................................... 855

A. Surendar, Vignan’s Foundation for Science, Technology and Research (Deemed to be University), India

Chapter 53DistProv-DataProvenanceinDistributedCloudforSecureTransferofDigitalAssetswithEthereumBlockchainusingZKP........................................................................................................ 866

Navya Gouru, GITAM (Deemed to be University), Visakhapatnam, IndiaNagaLakshmi Vadlamani, GITAM (Deemed to be University), Visakhapatnam, India

Section 4Utilization and Applications

Chapter 54PunchingAboveTheirDigitalWeight:WhyIranisDevelopingCyberwarfareCapabilitiesFarBeyondExpectations........................................................................................................................... 892

Ralph Peter Martins, Harvard University, Cambridge, USA

Chapter 55Cyberattacks,CybercrimeandCyberterrorism.................................................................................. 909

Saurabh Ranjan Srivastava, Malviya National Institute of Technology, IndiaSachin Dube, Malviya National Institute of Technology, India

Chapter 56CyberSecurityVulnerabilityManagementinCBRNIndustrialControlSystems(ICS)................... 931

Roberto Mugavero, Department of Electronic Engineering – University of Rome “Tor Vergata”, Rome, Italy

Stanislav Abaimov, National Inter-Universitary Consortium for Telecommunications, ItalyFederico Benolli, OSDIFE - Observatory on Security and CBRNe Defence, Rome, ItalyValentina Sabato, OSDIFE - Observatory on Security and CBRNe Deefence, Rome, Italy

Chapter 57ACaseforUsingBlendedLearningandDevelopmentTechniquestoAidtheDeliveryofaUKCybersecurityCoreBodyofKnowledge............................................................................................ 964

David A Bird, Learning and Performance Institute, Coventry, UKJohn Curry, Bath Spa University, Bath, UK

Chapter 58ModernInformationTechnology,GlobalRisk,andtheChallengesofCrimeintheEraofLateModernity............................................................................................................................................ 985

Ajibade Ebenezer Jegede, Covenant University, Nigeria

Chapter 59TheNeedforHigherEducationinCyberSupplyChainSecurityandHardwareAssurance........... 1001

Brian Cohen, Institute for Defense Analyses, Alexandria, USAMichelle G. Albert, Institute for Defense Analyses, Alexandria, USAElizabeth A. McDaniel, Institute for Defense Analyses, Alexandria, USA

Chapter 60TowardApproachestoBigDataAnalysisforTerroristicBehaviorIdentification:ChildSoldiersinIllegalArmedGroupsDuringtheConflictintheDonbasRegion(EastUkraine)........................... 1016

Yuriy V. Kostyuchenko, Scientific Centre for Aerospace Research of the Earth, National Academy of Sciences of Ukraine, Kiev, Ukraine

Maxim Yuschenko, Scientific Centre for Aerospace Research of the Earth, National Academy of Sciences of Ukraine, Kiev, Ukraine

Chapter 61RussianActiveMeasuresandSeptember11,2001:NostradamusThemedDisinformation?.......... 1029

Michael Bennett Hotchkiss, Independent Researcher, USA

Chapter 62CounteringOnlineViolentExtremism:StateActionasStrategicCommunication......................... 1048

Damien D. Cheong, Nanyang Technological University, Singapore

Chapter 63AnExplorationoftheCybersecurityWorkforceShortage............................................................... 1072

Darrell Norman Burrell, The Florida Institute of Technology, Melbourne, USA

Chapter 64Bioterrorism,BioCrimesandPolitics:ACaseofChaosandComplexity...................................... 1082

Hakiimu Kawalya, Ankara University, Turkey

Chapter 65ManagingOrganizedCrime.............................................................................................................. 1093

Roberto Musotto, University of Messina, ItalyDavide Di Fatta, University of Messina, ItalyWalter Vesperi, University of Messina, ItalyGiacomo Morabito, University of Messina, ItalyVittorio D’Aleo, University of Messina, ItalySalvatore Lo Bue, University of Messina, Italy

Chapter 66CybercrimeasaThreattoZimbabwe’sPeaceandSecurity............................................................. 1107

Jeffrey Kurebwa, Bindura University of Science Education, ZimbabweJacqueline Rumbidzai Tanhara, Chinhoyi University of Technology, Zimbabwe

Volume III

Chapter 67WhyIsISISsoPsychologicallyAttractive?..................................................................................... 1123

Loo Seng Neo, Home Team Behavioural Sciences Centre, Ministry of Home Affairs, Singapore

Priscilla Shi, Home Team Behavioural Sciences Centre, Ministry of Home Affairs, SingaporeLeevia Dillon, Home Team Behavioural Sciences Centre, Ministry of Home Affairs,

SingaporeJethro Tan, Home Team Behavioural Sciences Centre, Ministry of Home Affairs, SingaporeYingmin Wang, Home Team Behavioural Sciences Centre, Ministry of Home Affairs,

SingaporeDanielle Gomes, Home Team Behavioural Sciences Centre, Ministry of Home Affairs,

Singapore

Chapter 68AssessmentofHoneypots:Issues,ChallengesandFutureDirections.............................................. 1142

B. B. Gupta, National Institute of Technology Kurukshtra, IndiaAlisha Gupta, National Institute of Technology Kurukshtra, India

Chapter 69DigitalForensicsintheContextoftheInternetofThings............................................................... 1178

Mariya Shafat Kirmani, University of Kashmir, IndiaMohammad Tariq Banday, University of Kashmir, India

Chapter 70ASocio-TechnicalPerspectiveonThreatIntelligenceInformedDigitalForensicReadiness.......... 1201

Nikolaos Serketzis, Aristotle University of Thessaloniki, Thessaloniki, GreeceVasilios Katos, Bournemouth University, Poole, UKChristos Ilioudis, Alexander Technological Educational Institute of Thessaloniki,

Thessaloniki, GreeceDimitrios Baltatzis, International Hellenic University, Thessaloniki, GreeceGeorge J Pangalos, Aristotle University of Thessaloniki, Thessaloniki, Greece

Section 5Organizational and Social Implications

Chapter 71AComparativeAnalysisoftheCyberattacksAgainstEstonia,theUnitedStates,andUkraine:ExemplifyingtheEvolutionofInternet-SupportedWarfare............................................................. 1214

Kenneth J. Boyte, Cabrillo College, Castroville, USA

Chapter 72EriksonianAnalysisofTerrorisminWestAfrica............................................................................. 1232

Chris Mensah-Ankrah, West Africa Centre for Counter Extremism, Accra, Ghana

Chapter 73Tourism,Terrorism,Morality,andMarketing:AStudyoftheRoleofReciprocityinTourismMarketing.......................................................................................................................................... 1251

Peter E. Tarlow, Texas A&M University, USA

Chapter 74TheRootsofTerror:TheLesserEvilDoctrineunderCriticism...................................................... 1265

Maximiliano Emanuel Korstanje, University of Palermo, Argentina

Chapter 75ISISRhetoricfortheCreationoftheUmmah.................................................................................. 1278

Amaryllis Maria Georges, TRENDS Research and Advisory, UAE

Chapter 76ExploringMythsinDigitalForensics:SeparatingScienceFromRitual.......................................... 1299

Gary C. Kessler, Embry-Riddle Aeronautical University, Daytona Beach, USAGregory H. Carlton, California State Polytechnic University, Pomona, USA

Chapter 77CyberHygieneinHealthCareDataBreaches.................................................................................. 1309

Jomin George, Namibia University of Science and Technology, Windhoek, NamibiaAroma Emmanuel, Namibia University of Science and Technology, Windhoek, Namibia

Chapter 78BuildingNationalResilienceintheDigitalEraofViolentExtremism:SystemsandPeople.......... 1322

Jethro Tan, Home Team Behavioural Sciences Centre, Ministry of Home Affairs, SingaporeYingmin Wang, Home Team Behavioural Sciences Centre, Ministry of Home Affairs,

SingaporeDanielle Gomes, Home Team Behavioural Sciences Centre, Ministry of Home Affairs,

Singapore

Chapter 79ARegionofAssociationandTurbulence......................................................................................... 1343

Meha Pant, Jawaharlal Nehru University, India

Chapter 80JusinBelloandtheActsofTerrorism:AStudy.............................................................................. 1363

Mohammad Saidul Islam, Department of Law, International Islamic University Chittagong, Chittagong, Bangladesh

Chapter 81Copy-MoveForgeryLocalizationUsingConvolutionalNeuralNetworksandCFAFeatures......... 1379

Lu Liu, Institute of Information Science, Beijing Jiaotong University, Beijing, ChinaYao Zhao, Institute of Information Science, Beijing Jiaotong University, Beijing, ChinaRongrong Ni, Institute of Information Science, Beijing Jiaotong University, Beijing, ChinaQi Tian, Department of Computer Science, University of Texas at San Antonio, San Antonio,

US

Chapter 82TheCyberethics,Cybersafety,andCybersecurityatSchools.......................................................... 1395

Irene L. Chen, University of Houston Downtown, Houston, USALibi Shen, University of Phoenix, Los Angeles, USA

Chapter 83FiltrationofTerrorism-RelatedTextsintheE-GovernmentEnvironment....................................... 1413

Rasim M. Alguliyev, Institute of Information Technology, Azerbaijan National Academy of Sciences, Baku, Azerbaijan

Ramiz M. Aliguliyev, Institute of Information Technology, Azerbaijan National Academy of Sciences, Baku, Azerbaijan

Gunay Y. Niftaliyeva, Institute of Information Technology, Azerbaijan National Academy of Sciences, Baku, Azerbaijan

Chapter 84TheEffectsofMoneyLaundering(ML)onGrowthApplicationtotheGulfCountries................. 1428

Fakhri Issaoui, University of Tunis, Faculty of Economics and Management, Tunis, TunisiaToumi Hassen, University of Sfax, Economics and Management, Sfax, TunisiaTouili Wassim, University of Tunis, Economics, Tunis, Tunisia

Chapter 85JihadistPropagandaonSocialMedia:AnExaminationofISISRelatedContentonTwitter.......... 1442

Ahmed Al-Rawi, Simon Fraser University, CanadaJacob Groshek, Boston University, USA

Chapter 86ManagingTerrorisminAfrica:AssessingPolicingIssues............................................................... 1458

Gerald Dapaah Gyamfi, University of Professional Studies, Accra, Ghana

Chapter 87CreditCardFraud:BehindtheScenes.............................................................................................. 1470

Dan DeFilippi, Independent Researcher, USAKatina Michael, University of Wollongong, Australia

Chapter 88TheThreatofCyberWarfareintheSADCRegion:TheCaseofZimbabwe.................................. 1485

Jeffrey Kurebwa, Bindura University of Science Education, ZimbabweKundai Lillian Matenga, Bindura University of Science Education, Zimbabwe

Chapter 89IslamicExtremistsinAfrica:SecuritySpotlightonKenyaandNigeria.......................................... 1506

Maurice Dawson, Illinois Institute of Technology, USAWale Adeboje, South Wesleyan University, USA

Chapter 90CloudRiskResilience:InvestigationofAuditPracticesandTechnologyAdvances-ATechnicalReport................................................................................................................................................ 1518

Akhilesh Mahesh, University at Buffalo School of Management, Amherst, USANiranjali Suresh, Pricewaterhouse Coopers, Atlanta, USAManish Gupta, University at Buffalo School of Management, Amherst, USARaj Sharman, University at Buffalo School of Management, Amherst, USA

Section 6Managerial Impact

Chapter 91ManagementApproachofRiskAnalysisinInformationSecurity................................................... 1550

Anca Gabriela Petrescu, Valahia University, Targoviste, Romania

Chapter 92CybersecurityBestPracticesandCulturalChangeinGlobalBusiness:SomePerspectivesfromtheEuropeanUnion.......................................................................................................................... 1566

José Manuel Saiz-Alvarez, Tecnológico de Monterrey, MexicoGuillermo Calleja Leal, Royal Academy of History, Spain

Section 7Critical Issues and Challenges

Chapter 93ResearchonDigitalForensicsBasedonUyghurWebTextClassification...................................... 1586

Yasen Aizezi, Xinjiang Police college, Urumqi, ChinaAnwar Jamal, Xinjiang Police College, Urumqi, ChinaRuxianguli Abudurexiti, Xinjiang Police College, Urumqi, ChinaMutalipu Muming, Xinjiang Police College, Urumqi, China

Chapter 94DeterminantsofTerrorisminSouthAsia:InsightsFromaDynamicPanelDataAnalysis............. 1598

Ramesh Chandra Das, Katwa College, Burdwan, IndiaSovik Mukherjee, St. Xavier’s University, Kolkata, India

Chapter 95WhatWeKnowandWhatElseWeNeedtoDotoAddresstheProblemofViolentExtremismOnline:ConcludingChapter............................................................................................................. 1618

Majeed Khader, Home Team Behavioural Sciences Centre, Ministry of Home Affairs, Singapore

Chapter 96EthosConstruction,Identification,andAuthenticityintheDiscoursesofAWSA:TheArabWomen’sSolidarityAssociationInternational................................................................................. 1629

Samaa Gamie, Lincoln University, USA

Chapter 97OnExperienceofSocialNetworksExplorationforComparativeAnalysisofNarrativesofForeignMembersofArmedGroups:ISandL/DPRinSyriaandUkrainein2015-2016............................. 1656

Yuriy V. Kostyuchenko, Scientific Centre for Aerospace Research of the Earth, National Academy of Sciences of Ukraine, Kiev, Ukraine

Maxim Yuschenko, Scientific Centre for Aerospace Research of the Earth, National Academy of Sciences of Ukraine, Kiev, Ukraine

Igor Artemenko, Scientific Centre for Aerospace Research of the Earth, National Academy of Sciences of Ukraine, Kiev, Ukraine

Chapter 98AWhiteHatStudyofaNation’sPubliclyAccessibleCriticalDigitalInfrastructureandaWayForward............................................................................................................................................. 1672

Timo Kiravuo, Aalto University, Helsinki, FinlandSeppo Tiilikainen, Aalto University, Helsinki, FinlandMikko Särelä, Aalto University, Helsinki, FinlandJukka Manner, Aalto University, Helsinki, Finland

Section 8Emerging Trends

Chapter 99TheNextGenerationofScientific-BasedRiskMetrics:MeasuringCyberMaturity....................... 1687

Lanier Watkins, Johns Hopkins University Information Security Institution, Baltimore, USAJohn S. Hurley, National Defense University, Washington D.C., USA

Index.................................................................................................................................................. xxxi