Building Community of Good Practice in Cybersecurity

A special issue of Journal of Cybersecurity and Privacy (ISSN 2624-800X). This special issue belongs to the section "Security Engineering & Applications".

Deadline for manuscript submissions: 25 January 2025 | Viewed by 3409

Special Issue Editors


E-Mail Website
Guest Editor
Department of Electrical Engineering and Computer Science, University of Stavanger, Stavanger, Norway
Interests: computer networking; cloud computing; network security
Special Issues, Collections and Topics in MDPI journals

E-Mail Website
Guest Editor
J.E. Cairnes School of Business and Economics, University of Galway, H91 YK8V Galway, Ireland
Interests: digital business; business analytics; big data; fintech; cloud computing; blockchain

E-Mail Website
Guest Editor
Computer Science Department, Faculty of Computer and Information Sciences, Ain Shams University, Cairo 11566, Egypt
Interests: cyber security; intrusion detection systems; artificial intelligence; machine learning; IoT security

E-Mail Website
Guest Editor
Department of Criminal Justice, Temple University, Philadelphia, PA 19122, USA
Interests: social engineering; adversarial behavior, decision-making and group dynamics; critical infrastructure; ransomware; cybersecurity education

Special Issue Information

Dear Colleagues,

Cybersecurity has arguably an important impact on different parts of society. Recent events such as the ransomware attack on the UK National Health Service (NHS), power outages in Ukraine due to cyber attacks, and disruptions to world logistics networks due to unauthorized access to computer networks have reminded us of the central role that cybersecurity plays in our lives.

This Special Issue intends to advance the principles, methods, and applications of cybersecurity, situational awareness, and social media. The purpose of a community of good practice in cybersecurity is to build bridges between academia and industry, and to encourage the interplay of different cultures. We invite researchers and industry practitioners to submit original papers that encompass principles, analysis, design, methods, and applications.

Suggested topics include, but are not limited to, the following:

  • Cyber Situational Awareness;
  • Security in Artificial Intelligence and Robotics;
  • Human Factor Cognition and Security;
  • Security in Blockchain Technologies;
  • STEM and Cyber Security Education;
  • Social Media, Wearable, and Web Analytics Security;
  • Cyber Security;
  • Application Container Platform Security;
  • Cyber Incident Response.

Prof. Dr. Martin Gilje Jaatun
Dr. Pierangelo Rosati
Dr. Hanan Hindy
Dr. Aunshul Rege
Guest Editors

Manuscript Submission Information

Manuscripts should be submitted online at www.mdpi.com by registering and logging in to this website. Once you are registered, click here to go to the submission form. Manuscripts can be submitted until the deadline. All submissions that pass pre-check are peer-reviewed. Accepted papers will be published continuously in the journal (as soon as accepted) and will be listed together on the special issue website. Research articles, review articles as well as short communications are invited. For planned papers, a title and short abstract (about 100 words) can be sent to the Editorial Office for announcement on this website.

Submitted manuscripts should not have been published previously, nor be under consideration for publication elsewhere (except conference proceedings papers). All manuscripts are thoroughly refereed through a single-blind peer-review process. A guide for authors and other relevant information for submission of manuscripts is available on the Instructions for Authors page. Journal of Cybersecurity and Privacy is an international peer-reviewed open access quarterly journal published by MDPI.

Please visit the Instructions for Authors page before submitting a manuscript. The Article Processing Charge (APC) for publication in this open access journal is 1000 CHF (Swiss Francs). Submitted papers should be well formatted and use good English. Authors may use MDPI's English editing service prior to publication or during author revisions.

Keywords

  • cyber situational awareness
  • security in artificial intelligence and robotics
  • human factor cognition and security
  • security in blockchain technologies
  • STEM and cyber security education
  • social media, wearable, and web analytics security
  • cyber security
  • application container platform security
  • cyber incident response

Benefits of Publishing in a Special Issue

  • Ease of navigation: Grouping papers by topic helps scholars navigate broad scope journals more efficiently.
  • Greater discoverability: Special Issues support the reach and impact of scientific research. Articles in Special Issues are more discoverable and cited more frequently.
  • Expansion of research network: Special Issues facilitate connections among authors, fostering scientific collaborations.
  • External promotion: Articles in Special Issues are often promoted through the journal's social media, increasing their visibility.
  • e-Book format: Special Issues with more than 10 articles can be published as dedicated e-books, ensuring wide and rapid dissemination.

Further information on MDPI's Special Issue polices can be found here.

Published Papers (3 papers)

Order results
Result details
Select all
Export citation of selected articles as:

Research

22 pages, 3553 KiB  
Article
Use and Abuse of Personal Information, Part I: Design of a Scalable OSINT Collection Engine
by Elliott Rheault, Mary Nerayo, Jaden Leonard, Jack Kolenbrander, Christopher Henshaw, Madison Boswell and Alan J. Michaels
J. Cybersecur. Priv. 2024, 4(3), 572-593; https://doi.org/10.3390/jcp4030027 - 13 Aug 2024
Viewed by 427
Abstract
In most open-source intelligence (OSINT) research efforts, the collection of information is performed in an entirely passive manner as an observer to third-party communication streams. This paper describes ongoing work that seeks to insert itself into that communication loop, fusing openly available data [...] Read more.
In most open-source intelligence (OSINT) research efforts, the collection of information is performed in an entirely passive manner as an observer to third-party communication streams. This paper describes ongoing work that seeks to insert itself into that communication loop, fusing openly available data with requested content that is representative of what is sent to second parties. The mechanism for performing this is based on the sharing of falsified personal information through one-time online transactions that facilitate signup for newsletters, establish online accounts, or otherwise interact with resources on the Internet. The work has resulted in the real-time Use and Abuse of Personal Information OSINT collection engine that can ingest email, SMS text, and voicemail content at an enterprise scale. Foundations of this OSINT collection infrastructure are also laid to incorporate an artificial intelligence (AI)-driven interaction engine that shifts collection from a passive process to one that can effectively engage with different classes of content for improved real-world privacy experimentation and quantitative social science research. Full article
(This article belongs to the Special Issue Building Community of Good Practice in Cybersecurity)
Show Figures

Figure 1

26 pages, 3408 KiB  
Article
Use & Abuse of Personal Information, Part II: Robust Generation of Fake IDs for Privacy Experimentation
by Jack Kolenbrander, Ethan Husmann, Christopher Henshaw, Elliott Rheault, Madison Boswell and Alan J. Michaels
J. Cybersecur. Priv. 2024, 4(3), 546-571; https://doi.org/10.3390/jcp4030026 - 11 Aug 2024
Cited by 1 | Viewed by 788
Abstract
When personal information is shared across the Internet, we have limited confidence that the designated second party will safeguard it as we would prefer. Privacy policies offer insight into the best practices and intent of the organization, yet most are written so loosely [...] Read more.
When personal information is shared across the Internet, we have limited confidence that the designated second party will safeguard it as we would prefer. Privacy policies offer insight into the best practices and intent of the organization, yet most are written so loosely that sharing with undefined third parties is to be anticipated. Tracking these sharing behaviors and identifying the source of unwanted content is exceedingly difficult when personal information is shared with multiple such second parties. This paper formulates a model for realistic fake identities, constructs a robust fake identity generator, and outlines management methods targeted towards online transactions (email, phone, text) that pass both cursory machine and human examination for use in personal privacy experimentation. This fake ID generator, combined with a custom account signup engine, are the core front-end components of our larger Use and Abuse of Personal Information system that performs one-time transactions that, similar to a cryptographic one-time pad, ensure that we can attribute the sharing back to the single one-time transaction and/or specific second party. The flexibility and richness of the fake IDs also serve as a foundational set of control variables for a wide range of social science research questions revolving around personal information. Collectively, these fake identity models address multiple inter-disciplinary areas of common interest and serve as a foundation for eliciting and quantifying personal information-sharing behaviors. Full article
(This article belongs to the Special Issue Building Community of Good Practice in Cybersecurity)
Show Figures

Figure 1

24 pages, 884 KiB  
Article
Data Privacy and Ethical Considerations in Database Management
by Eduardo Pina, José Ramos, Henrique Jorge, Paulo Váz, José Silva, Cristina Wanzeller, Maryam Abbasi and Pedro Martins
J. Cybersecur. Priv. 2024, 4(3), 494-517; https://doi.org/10.3390/jcp4030024 - 29 Jul 2024
Viewed by 824
Abstract
Data privacy and ethical considerations ensure the security of databases by respecting individual rights while upholding ethical considerations when collecting, managing, and using information. Nowadays, despite having regulations that help to protect citizens and organizations, we have been presented with thousands of instances [...] Read more.
Data privacy and ethical considerations ensure the security of databases by respecting individual rights while upholding ethical considerations when collecting, managing, and using information. Nowadays, despite having regulations that help to protect citizens and organizations, we have been presented with thousands of instances of data breaches, unauthorized access, and misuse of data related to such individuals and organizations. In this paper, we propose ethical considerations and best practices associated with critical data and the role of the database administrator who helps protect data. First, we suggest best practices for database administrators regarding data minimization, anonymization, pseudonymization and encryption, access controls, data retention guidelines, and stakeholder communication. Then, we present a case study that illustrates the application of these ethical implementations and best practices in a real-world scenario, showing the approach in action and the benefits of privacy. Finally, the study highlights the importance of a comprehensive approach to deal with data protection challenges and provides valuable insights for future research and developments in this field. Full article
(This article belongs to the Special Issue Building Community of Good Practice in Cybersecurity)
Show Figures

Figure 1

Back to TopTop