scholarly journals Bibliometric Analysis of Cyber Threat and Cyber Attack Literature: Exploring the Higher Education Context

2021 ◽  
Author(s):  
Nazahah Rahim

In nearly all procedures involving students and faculty, higher education organizations make substantial use of computers and the internet. Little is known on the progress and development of literature on cyber threats and cyber attacks in this sector. This chapter fills this gap by examining the trends of literature on cyber threats and cyber attacks focusing on the higher education. Bibliometric analysis through Scopus database was employed to offer research ideas and trigger debates. Analyzed parameters include the number of document types, publications, authorship, citation, and subject areas, as well as the topographical dispersion of published research. The earliest publication could be seen in the year 2003, and since then 606 papers were published. The majority of publications were conference papers but merely 8.42% of those were open access. The results indicate that publications hit a plateau in 2018, with English becoming the main publication language. The most prominent country that has contributed to the literature is the United States. Nonetheless, the majority of the publications were contained by the subject area of Computer Science, hence it is relatively challenging to trace the progress in education context. This chapter presents a groundwork providing insights for others to probe into the topic further.


2019 ◽  
Vol 7 (1) ◽  
pp. 14-26
Author(s):  
Ruti Gafni ◽  
Tal Pavel

Small and Medium Businesses (SMB) use Internet and computer-based tools in their daily processes, sometimes without being aware to the cyber threats, or without knowing how to be prepared in case of a cyber-attack, although they are a major target for cyber-attacks. Specific information about cybersecurity needed by SMBs, in order to cope with cyber threats, is not always available or easily accessible. In this study, a vast search of different types of information about SMBs’ cybersecurity was performed, in order to find whether a hole of accessible information exists in this area. This exploratory research covered general mass communication media channels, technological and professional cybersecurity websites, and academic journals, and found that indeed very few studies, articles and news items were published in this matter. Leveraging knowledge and awareness, diminishing the shame for reporting cyber-attacks, and increasing mass communication media interest and public attention, may be activities to cover this “invisible hole”.



Author(s):  
Ana Kovacevic ◽  
Dragana Nikolic

We are facing the expansion of cyber incidents, and they are becoming more severe. This results in the necessity to improve security, especially in the vulnerable field of critical infrastructure. One of the problems in the security of critical infrastructures is the level of awareness related to the effect of cyberattacks. The threat to critical infrastructure is real, so it is necessary to be aware of it and anticipate, predict, and prepare against a cyber attack. The main reason for the escalation of cyberattacks in the field of Critical Infrastructure (CI) may be that most control systems used for CI do not utilise propriety protocols and software anymore; they instead utilise standard solutions. As a result, critical infrastructure systems are more than ever before becoming vulnerable and exposed to cyber threats. It is important to get an insight into what attack types occur, as this may help direct cyber security efforts. In this chapter, the authors present vulnerabilities of SCADA systems against cyber attack, analyse and classify existing cyber attacks, and give future directions to achieve better security of SCADA systems.



2021 ◽  
Author(s):  
Stuart Fowler ◽  
Keith Joiner ◽  
Elena Sitnikova

<div>Cyber-worthiness as it is termed in Australian Defence, or cyber-maturity more broadly, is a necessary feature of modern complex systems which are required to operate in a hostile cyber environment. To evaluate the cyber-worthiness of complex systems, an assessment methodology is required to examine a complex system’s or system-of-system’s vulnerability to and risk of cyber-attacks that can compromise such systems. This assessment methodology should address the cyber-attack surface and threat kill chains, including supply chains and supporting infrastructure. A cyber-worthiness capability assessment methodology has been developed based on model-based systems engineering concepts to analyse the cyber-worthiness of complex systems and present a risk assessment of various cyber threats to the complex system. This methodology incorporates modelling and simulation methods that provide organisations greater visibility and consistency across diverse systems, especially to drive cybersecurity controls, investment and operational decisions involving aggregated systems. In this paper, the developed methodology will be presented in detail and hypothesised outcomes will be discussed.</div>



Author(s):  
Ana Kovacevic ◽  
Dragana Nikolic

We are facing the expansion of cyber incidents, and they are becoming more severe. This results in the necessity to improve security, especially in the vulnerable field of critical infrastructure. One of the problems in the security of critical infrastructures is the level of awareness related to the effect of cyberattacks. The threat to critical infrastructure is real, so it is necessary to be aware of it and anticipate, predict, and prepare against a cyber attack. The main reason for the escalation of cyberattacks in the field of Critical Infrastructure (CI) may be that most control systems used for CI do not utilise propriety protocols and software anymore; they instead utilise standard solutions. As a result, critical infrastructure systems are more than ever before becoming vulnerable and exposed to cyber threats. It is important to get an insight into what attack types occur, as this may help direct cyber security efforts. In this chapter, the authors present vulnerabilities of SCADA systems against cyber attack, analyse and classify existing cyber attacks, and give future directions to achieve better security of SCADA systems.



Antibiotics ◽  
2018 ◽  
Vol 7 (4) ◽  
pp. 102 ◽  
Author(s):  
Howard Ramirez-Malule

Clavulanic acid (CA), a potent inhibitor of the β-lactam, ase enzyme, is frequently co-formulated with a broad spectrum of antibiotics to treat infections caused by β-lactamase-producing pathogens. In order to evaluate the impact and the progress of CA studies in the last four decades, a bibliometric analysis of the global scientific production of CA was carried out. A total of 39,758 records in the field of CA were indexed in the Scopus database for a 43-year period of study (1975–2017). The results indicated that CA studies have grown, showing three phases (1975–1999, 2000–2003 and 2004–2017) based on records of publications; the results showed a sigmoidal profile. Medicine was the main subject area for CA studies, whereas biochemistry, genetics and molecular biology were areas of research for CA production by Streptomyces clavuligerus (S. clavuligerus). Nevertheless, chemical engineering (as a subject area) had the highest increase in the percentage of publications related to CA production by S. clavuligerus. The United States, France, the United Kingdom, Spain and Brazil were the leading countries in the scientific production of studies on both CA and CA related to S. clavuligerus. This analysis allowed the identification of the area of knowledge with the highest impact on CA studies, the top researchers and their geographic distribution, and also helped to highlight the existence of antibiotic-resistant bacteria as an emergent area in CA research.



2020 ◽  
Vol 3 (1) ◽  
Author(s):  
Ivana Cesarec

States, organizations and individuals are becoming targets of both individual and state-sponsored cyber-attacks, by those who recognize the impact of disrupting security systems and effect to people and governments. The energy sector is seen as one of the main targets of cyber-attacks against critical infrastructure, but transport, public sector services, telecommunications and critical (manufacturing) industries are also very vulnerable. One of most used example of cyber-attack is the Ukraine power grid attack in 2015 that left 230,000 people without power for up to 6 hours. Another most high profile example of a cyber-attack against critical infrastructure is the Stuxnet computer virus (first used on Iranian nuclear facility) which could be adapted to attack the SCADA systems (industrial control systems) used by many critical infrastructures in Europe.Wide range of critical infrastructure sectors are reliant on industrial control systems for monitoring processes and controlling physical devices (sensors, pumps, etc.) and for that reason, physical connected devices that support industrial processes are becoming more vulnerable. Not all critical infrastructure operators in all sectors are adequately prepared to manage protection (and raise resilience) effectively across both cyber and physical environments. Additionally there are few challenges in implementation of protection measures, such as lack of collaboration between private and public sector and low levels of awareness on existence of national key legislation.From supranational aspect, in relation to this papers topic, the European Union has took first step in defense to cyber threats in 2016 with „Directive on security of network and information systems“ (NIS Directive) by prescribing member states to adopt more rigid cyber-security standards. The aim of directive is to improve the deterrent and increase the EU’s defenses and reactions to cyber attacks by expanding the cyber security capacity, increasing collaboration at an EU level and introducing measures to prevent risk and handle cyber incidents. There are lot of other „supporting tools“ for Member States countries, such as European Union Agency for Network and Information Security – ENISA (which organize regular cyber security exercises at an EU level, including a large and comprehensive exercise every two years, raising preparedness of EU states); Network of National Coordination Centers and the European Cybersecurity Industrial, Technology and Research Competence Centre; and Coordinated response to major cyber security incidents and crises (Blueprint) with aim to ensure a rapid and coordinated response to large-scale cyber attacks by setting out suitable processes within the EU.Yet, not all Member States share the same capacities for achieving the highest level of cyber-security. They need to continuously work on enhancing the capability of defense against cyber threats as increased risk to state institutions information and communication systems but also the critical infrastructure objects. In Southeast Europe there are few additional challenges – some countries even don't have designated critical infrastructures (lower level of protection; lack of „clear vision“ of criticality) and critical infrastructures are only perceived through physical prism; non-EU countries are not obligated to follow requirements of European Union and its legislation, and there are interdependencies and transboundary cross-sector effects that needs to be taken in consideration. Critical infrastructure Protection (CIP) is the primary area of action, and for some of SEE countries (like the Republic of Croatia) the implementation of cyber security provisions just complements comprehensive activities which are focused on physical protection.This paper will analyze few segments of how SEE countries cope with new security challenges and on which level are they prepared for cyber-attacks and threats: 1. Which security mechanisms they use; 2. The existing legislation (Acts, Strategies, Plan of Action, etc.) related to cyber threats in correlation with strategic critical infrastructure protection documents. Analysis will have two perspectives: from EU member states and from non-EU member states point of view. Additionally, for EU member states it will be analyzed if there were any cyber security legislation before NIS directive that meets same aims. The aim of research is to have an overall picture of efforts in region regarding cyber-security as possibility for improvement thorough cooperation, organizational measures, etc. providing also some recommendations to reduce the gap in the level of cyber-security development with other regions of EU.



2021 ◽  
pp. 84-94
Author(s):  
Mohammed. I. Alghamdi ◽  

The cyber security risks on Intellectual Property (IP) have unfortunately become the center of media attention quite recently. The cyber domain has risen to the front position of national security policy in the United States. This growth has created room for developing a lot of innovative technologies to prevent IP cyber-attacks. Usually, cyber-attacks target private data. But cyber-attacks have recently expanded their threat level to intellectual property. These threats affect companies, people, and even national security. Cyber threats to IP will be victimized by globalization. Hence, this article is aimed to explore existing innovative technologies used to prevent IP cyber-attacks and their future scope. To find out the existing technologies used in the prevention of cyber-attacks, secondary data will be used from recent reports by various public and government organizations, research papers, and news portals, and other relevant sources. Since cyber threats are increasing, a comprehensive, multinational strategy is needed for making better cyber security infrastructure. This strategy would improve international relations, protect international supply chains, innovation, and reduce financial losses.



Author(s):  
Rebecca J. Blankenship

In the wake of an increasingly divisive sociopolitical climate in the United States, there is a sense of immediate urgency among institutions of higher education to speak with a united voice in terms of maintaining the post-civil rights era principles of providing equitable access to educational opportunities for all students. Students, regardless of their race, ethnicity, gender, gender identity, religion, or socioeconomic status should be afforded equal access to sound educational opportunities. Thusly, the next generation of teachers must be not only instructionally competent in their grade or subject area but also be capable of adapting that instruction to meet the sociocultural and socioemotional needs of the students they serve. From this charge, a larger conversation emerges calling for a change in the existing narrative related to teaching marginalized populations away from political banter towards the release of silent voices that have the agentic potential to engage as voices of authentic change.



2018 ◽  
Vol 71 (5) ◽  
pp. 1025-1039 ◽  
Author(s):  
Odd Sveinung Hareide ◽  
Øyvind Jøsok ◽  
Mass Soldal Lund ◽  
Runar Ostnes ◽  
Kirsi Helkala

As technology continues to develop, information and communication technology and operational technology on board ships are increasingly being networked, and more frequently connected to the Internet. The introduction of cyber systems changes the work environment with the aim of decreasing the workload for the navigator, but at the same time introduces more complexity and vulnerabilities that in turn may alter the competencies needed to perform safe and efficient navigation. Contemporary examples of how cyber-attacks can distort situational awareness and interfere with operations are needed to enhance the navigator's competence through increased system awareness. This paper demonstrates some of the possible attack vectors that a cyber-attack can present to a ship, as well as discussing the plausibility and consequences of such attacks. In this study we provide a practical example to better understand how one can demystify cyber threats in order to enhance the navigators' competence.



2021 ◽  
Vol 6 (5) ◽  
pp. 78-86
Author(s):  
Abdelfatah S. Arman

In the present study, the author examines how perceived inclusion affects minority employees’ organizational satisfaction in higher education institutions in the United States. A quantitative exploratory approach was used for this study. The methodology involves measuring the relationship between minority status and job satisfaction for employees in higher education institutions in the U.S. if any, and the relationship between minority employees’ status and their perception of inclusion in their workgroups. Data was collected using an online panel survey of higher education employees in the United States using Amazon's Mechanical Turk (MTurk); a crowdsourcing platform. A sample size of (N = 1,898) subjects were sought to complete the online survey. The present study’s results illustrate a new finding which was that when comparing minority groups engaged in higher education organizations with their minority peers employed at a Historically Black College or University (HBCU) or other minority-serving institutions, minority individuals employed in higher education institutions felt less included and satisfied than the ones involved in HBCU or other minority catering organizations. Findings demonstrate there is a statistically significant positive correlation between inclusion and workplace satisfaction. The results also show there are differences in inclusion by demographic status, sexual orientation, disability status, religion, and type of workplace. The study’s results reveal that minority groups employed in higher education organizations have a low sense of belonging, which may result in dissatisfaction with the workplace and eventually force them to quit their jobs.



Sign in / Sign up

Export Citation Format

Share Document