Acceso abierto

Unprotected Data: Review of Internet Enabled Psychological and Information Warfare


Cite

Ahmed, S. R. (2004). Applications of data mining in retail business. International Conference on Information Technology: Coding and Computing. Proceedings. ITCC, Vol. 2, 455-459. IEEE.10.1109/ITCC.2004.1286695Search in Google Scholar

Aldrich, R. W. (1996). The international legal implications of information warfare (No. INSS-OP-9). Colorado: Air Force Academy Colorado Springs Co.Search in Google Scholar

Aura, T., Kuhn, T. A., & Roe, M. (2006). Scanning electronic documents for personally identifiable information. Proceedings of the 5th ACM workshop on Privacy in electronic society, 41-50, New York, USA: ACM.10.1145/1179601.1179608Search in Google Scholar

Boyd, D. M., & Ellison, N. B. (2007). Social network sites: Definition, history, and scholarship. Journal of Computer-Mediated Communication, Vol. 13, Issue 1, 210-230.10.1111/j.1083-6101.2007.00393.xSearch in Google Scholar

Chen, D., & Zhao, H. (2012). Data security and privacy protection issues in cloud computing. International Conference on Computer Science and Electronics Engineering, Vol. 1, 647-651, IEEE.10.1109/ICCSEE.2012.193Search in Google Scholar

Clifton, C., & Marks, D. (1996). Security and privacy implications of data mining. ACM SIGMOD Workshop on Research Issues on Data Mining and Knowledge Discovery, 15-19.Search in Google Scholar

Elbirt, A. J. (2003). Information Warfare: Are you at risk?. IEEE Technology and Society Magazine, Vol. 22, Issue 4, 13-19.10.1109/MTAS.2004.1251382Search in Google Scholar

Elmasri, R. (2008). Fundamentals of database systems. India: Pearson Education.Search in Google Scholar

Fussell, S. (2018). Facebook’s New Face Recognition Features: What We Do (and Don’t) Know [Updated], available at: https://gizmodo.com/facebooks-new-face-recognition-features-what-we-do-an-1823359911, accessed on 18 March 2019.Search in Google Scholar

Gajanayake, R., Iannella, R., & Sahama, T. (2011). Sharing with care: An information accountability perspective. IEEE Internet Computing, Vol. 15, Issue 4, 31-38.10.1109/MIC.2011.51Search in Google Scholar

Gantz, J., & Reinsel, D. (2011). Extracting value from chaos. IDC iview, 1142, 1-12.Search in Google Scholar

Gundecha, P., Barbier, G., & Liu, H. (2011). Exploiting vulnerability to secure user privacy on a social networking site. Proceedings of the 17th ACM SIGKDD international conference on Knowledge discovery and data mining, 511-519, New York, USA: Association for Computing Machinery.10.1145/2020408.2020489Search in Google Scholar

He, B., Patel, M., Zhang, Z., & Chang, K. C-C. (2007). Accessing the deep Web. Communications of the ACM, 50(5), 94-101.10.1145/1230819.1241670Search in Google Scholar

Headquarters Department of the Army (1979). Psychological Operations. Field Manual, No. 33-1, Washington: U.S. Government printing office.Search in Google Scholar

Kaushal, R., Saha, S., Bajaj, P., & Kumaraguru, P. (2016). KidsTube: Detection, characterization and analysis of child unsafe content & promoters on YouTube. 14th Annual Conference on Privacy, Security and Trust (PST), 157-164, IEEE.10.1109/PST.2016.7906950Search in Google Scholar

Krishnamurthy, B., & Wills, C. E. (2009). On the leakage of personally identifiable information via online social networks. Proceedings of the 2nd ACM workshop on Online social networks, 7-12, ACM.10.1145/1592665.1592668Search in Google Scholar

Lin, Z., Tong, L., Zhijie, M., & Zhen, L. (2017). Research on Cyber Crime Threats and Countermeasures about Tor Anonymous Network Based on Meek Confusion Plug-in. International Conference on Robots & Intelligent System (ICRIS), Vol. 1, 246-249, doi:10.1109/icris.2017.69.10.1109/icris.2017.69Open DOISearch in Google Scholar

O’Gorman, G., & McDonald, G. (2012). Ransomware: A Growing Menace, available at: http://www.symantec.com/content/en/us/enterprise/media/security_response/whitepapers/ransomware-a-growing-menace.pdf, accessed on 17 September 2019.Search in Google Scholar

Schawartau, W. (1997). What Exactly is Information Warfare? – Part 2, Journal Network Security, Issue 10, Amsterdam: Elsevier Science Publishers.10.1016/S1353-4858(97)85738-8Search in Google Scholar

Schneier, B. (2013). Carry On: Sound Advice from Schneier on Security, New Jersey, USA: John Wiley & Sons.Search in Google Scholar

Sinisi, J. P. (2007). U.S. Patent No. 7,313,759, Washington, DC: U.S. Patent and Trademark Office.Search in Google Scholar

Soma, J. T., Courson, J. Z., & Cadkin, J. (2009). Corporate Privacy Trend: The “Value” of Personally Identifiable Information (“PII”) Equals the “Value” of Financial Assets. Richmond Journal of Law & Technology, Vol. 15, Issue 4, 11.Search in Google Scholar

Stalder, F., & Hirsh, J. (2002). Open source intelligence. First Monday, Vol. 7, Issue 6, 1-8.10.5210/fm.v7i6.961Search in Google Scholar

Symantec Corporation. (n.d.). What Are Cookies?, available at: https://us.norton.com/internetsecurity-how-to-what-are-cookies.html, accessed on 07 July 2019.Search in Google Scholar

Tauber, A. (n.d.). Welcome to searx, available at: https://asciimoo.github.io/searx/, accessed on 03 December 2018.Search in Google Scholar

Tor Project. (n.d.). What is Tor Browser?, available at: https://www.torproject.org/projects/torbrowser.html.en, accessed on 03 December 2018.Search in Google Scholar

Wang, T., Cai, C., Nithyanand, R., Johnson, R., & Goldberg, I. (2014). Effective Attacks and Provable Defenses for Website Fingerprinting. The Proceedings of the 23rd USENIX Security Symposium, San Diego, CA.Search in Google Scholar

Wang, P., Dawson, M., & Williams, K. L. (2018). Improving Cyber Defense Education through National Standard Alignment: Case Studies. International Journal of Hyperconnectivity and the Internet of Things (IJHIoT), Vol. 2, Issue 1, 12-28.10.4018/IJHIoT.2018010102Search in Google Scholar

Wichers, D. (2013). The Open Web Application Security Project (OWASP) Top10-2013. OWASP Foundation.Search in Google Scholar