Understanding cyberbullying as an information security attack—life cycle modeling

被引:0
|
作者
Patricio Zambrano
Jenny Torres
Ángel Yánez
Alexandra Macas
Luis Tello-Oquendo
机构
[1] Escuela Politécnica Nacional,Department of Informatics Computer Science
[2] Universidad Nacional de Chimborazo,College of Engineering
来源
关键词
Cyberbullying; Pattern behavior; APT; Social engineering;
D O I
暂无
中图分类号
学科分类号
摘要
Nowadays, cyberbullying cases are more common due to free access to technological resources. Studies related to this phenomenon from the fields of computer science and computer security are still limited. Several factors such as the access to specific databases on cyberbullying, the unification of scientific criteria that assess the nature of the problem, or the absence of real proposals that prevent and mitigate this problem could motivate the lack of interest by researchers in the field of information security to generate significant contributions. This research proposes a cyberbullying life cycle model through topic modeling and conceptualizes the different stages of the attack considering criteria associated with computer attacks. This proposal is supported by a review of the specific literature and knowledge bases gained from experiences of victims of online harassment and tweets from attackers.
引用
收藏
页码:235 / 253
页数:18
相关论文
共 50 条
  • [1] Understanding cyberbullying as an information security attack-life cycle modeling
    Zambrano, Patricio
    Torres, Jenny
    Yanez, Angel
    Macas, Alexandra
    Tello-Oquendo, Luis
    [J]. ANNALS OF TELECOMMUNICATIONS, 2021, 76 (3-4) : 235 - 253
  • [2] An Information Security Policy Development Life Cycle
    Tuyikeze, T.
    Pottas, D.
    [J]. PROCEEDINGS OF THE SOUTH AFRICAN INFORMATION SECURITY MULTI-CONFERENCE, 2010, : 165 - 176
  • [3] Applications of bridge information modeling in bridges life cycle
    Marzouk, Mohamed M.
    Hisham, Mohamed
    Al-Gahtani, Khalid
    [J]. SMART STRUCTURES AND SYSTEMS, 2014, 13 (03) : 407 - 418
  • [4] Building Information Modeling Supported Project Life Cycle Information Management
    Liu, Rui
    [J]. 3RD INTERNATIONAL CONFERENCE ON CIVIL ENGINEERING, ARCHITECTURE AND SUSTAINABLE INFRASTRUCTURE, ICCEASI 2015, 2015, : 243 - 250
  • [5] Current Taxonomy of Information Security Threats in Software Development Life Cycle
    Barabanov, Alexander V.
    Markov, Alexey S.
    Grishin, Maksim I.
    Tsirlov, Valentin L.
    [J]. 2018 IEEE 12TH INTERNATIONAL CONFERENCE ON APPLICATION OF INFORMATION AND COMMUNICATION TECHNOLOGIES (AICT), 2018, : 196 - 201
  • [6] A Vulnerability Life Cycle-Based Security Modeling and Evaluation Approach
    Marconato, G. Vache
    Kaaniche, M.
    Nicomette, V.
    [J]. COMPUTER JOURNAL, 2013, 56 (04): : 422 - 439
  • [7] Modeling for joint operation information cognitive chain based on information life cycle
    Yang, M.
    Wang, M. L.
    Fang, M. Y.
    [J]. INFORMATION TECHNOLOGY AND COMPUTER APPLICATION ENGINEERING, 2014, : 101 - 104
  • [8] Application of Building Information Modeling in the project management life cycle
    Li, Zixuan
    Shi, Mingyu
    Si, Mingzhu
    [J]. INTERNATIONAL CONFERENCE ON SMART TRANSPORTATION AND CITY ENGINEERING 2021, 2021, 12050
  • [9] Life Cycle Approach for Facility Resilience Information Modeling (FRIM)
    Pan, Jing
    Su, Xing
    [J]. DEFINING THE FUTURE OF SUSTAINABILITY AND RESILIENCE IN DESIGN, ENGINEERING AND CONSTRUCTION, 2015, 118 : 28 - 36
  • [10] The Role of Modeling in Clinical Information System Development Life Cycle
    Peleg, M.
    [J]. METHODS OF INFORMATION IN MEDICINE, 2011, 50 (01) : 7 - 10