{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2022,6,1]],"date-time":"2022-06-01T20:40:21Z","timestamp":1654116021513},"reference-count":42,"publisher":"IGI Global","issue":"3","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2013,7,1]]},"abstract":"<p>The cyberspace has become an integral part of modern day life\u2014social, economic, political, religious, medical and other aspects. Without the availability of the Internet, many businesses, governments and society would not function properly. Presently, the Internet brings people together to share their ideas, and allow their voices to be heard. In its inception and ideally, cyberspace has no political, geographical or social boundaries; as a result it facilitates in globalization and the uniting of people all over the world by providing a means for communication. While the potential benefits of this interconnectivity are unlimited, this virtual world is also becoming hackers' playground, nation-states' battle ground, and a vehicle for propaganda and misinformation. In this article, the authors argue that with the growing threat of coordinated attacks, creation of complex malware and gradually diminished trust in freely-available information, the openness of the web and the global connectivity will no longer exist. If this trend continues, the Internet will be partitioned, users will rely on information and news through membership-based services, the information flow will be highly regulated by governments, online businesses and critical knowledge will only be shared among alliance of friendly nations.<\/p>","DOI":"10.4018\/ijcwt.2013070102","type":"journal-article","created":{"date-parts":[[2014,3,31]],"date-time":"2014-03-31T18:09:19Z","timestamp":1396289359000},"page":"19-31","source":"Crossref","is-referenced-by-count":0,"title":["Consequences of Diminishing Trust in Cyberspace"],"prefix":"10.4018","volume":"3","author":[{"given":"Dipankar","family":"Dasgupta","sequence":"first","affiliation":[{"name":"Center for Information Assurance (CAE-R), Department of Computer Science, University of Memphis, Memphis, TN, USA"}]},{"given":"Denise M.","family":"Ferebee","sequence":"additional","affiliation":[{"name":"Center for Information Assurance (CAE-R), Department of Computer Science, University of Memphis, Memphis, TN, USA"}]}],"member":"2432","reference":[{"key":"ijcwt.2013070102-0","unstructured":"Abrams, R. (2010). Should I rely on my ISP to keep me safe from malware attacks?"},{"key":"ijcwt.2013070102-1","doi-asserted-by":"crossref","unstructured":"Alcaraz, C., & Lopez, J. (2012). Analysis of requirements for critical control systems. International Journal of Critical Infrastructure Protection.","DOI":"10.1016\/j.ijcip.2012.08.003"},{"key":"ijcwt.2013070102-2","unstructured":"CAESS. (2011). Center for automotive embedded systems security. Retrieved November 29, 2013, from http:\/\/www.autosec.org\/index.html"},{"key":"ijcwt.2013070102-3","unstructured":"Choney, S. (2013). Hacker attempts to harass toddler through baby monitor. Retrieved November 29, 2013, from http:\/\/www.nbcnews.com\/technology\/hacker-attempts-harass-toddler-through-baby-monitor-6C10916536"},{"key":"ijcwt.2013070102-4","author":"R. A.Clarke","year":"2010","journal-title":"Cyber war: The next threat to national security and what to do about it"},{"key":"ijcwt.2013070102-5","unstructured":"Doherty, S., Gegeny, J., Spasojevic, B., & Baltazar, J. (2013). Hidden lynx - professional hackers for hire. (White Paper No. 1.0).Symantec."},{"key":"ijcwt.2013070102-6","unstructured":"Durkota, M. D., & Dormann, W. (2008). Recovering from a trojan horse or virus. (White Paper). United States Computer Emergency Readiness Team."},{"key":"ijcwt.2013070102-7","unstructured":"FireEye. (2012). Cyber attacks on government: How APT attacks are compromising federal agencies and how to stop them. (White Paper). FireEye."},{"key":"ijcwt.2013070102-8","unstructured":"Gartner. (2012). Gartner says IT supply chain integrity will be identified as a top three security-related concern by global 2000 IT leaders by 2017. Retrieved November 29, 2013, from http:\/\/www.gartner.com\/newsroom\/id\/2202715"},{"key":"ijcwt.2013070102-9","author":"J.Girard","year":"2013","journal-title":"There is malware in your smartphone and tablet future, but don't panic yet. (No. G00251801)"},{"key":"ijcwt.2013070102-10","unstructured":"Gladdis, K. (2012). Twitter sells years of everyone's old, vanished tweets to online marketing companies. Retrieved November 29, 2013, from http:\/\/www.dailymail.co.uk\/sciencetech\/article-2107693\/Twitter-sells-years-everyones-old-vanished-Tweets-online-marketing-companies.html"},{"key":"ijcwt.2013070102-11","unstructured":"Gross, G. (2012, August 3). US house to ITU: Hands off the internet. PC World, Hayden, M. (2013). Snowden -- facts, fictions and fears. CNN.com. Retrieved November 29, 2013, from http:\/\/www.cnn.com\/2013\/07\/24\/opinion\/hayden-snowden-reality"},{"key":"ijcwt.2013070102-12","article-title":"Cyberwarfare evolves faster than rules of engagement.","author":"E.Heichler","year":"2012","journal-title":"Computerworld"},{"key":"ijcwt.2013070102-13","unstructured":"Hurwitz, R. (2012). Depleted trust in the cyber commons. Strategic Studies, 21."},{"key":"ijcwt.2013070102-14","unstructured":"Jones, W. (2012, August 31). This week in cybercrime: Hackers say \u201cIf you can\u2019t beat \u2018Em, evade \u2018Em\u201d. IEE Spectrum."},{"key":"ijcwt.2013070102-15","unstructured":"Kitten, T. (2013). Top threats: The 2013 outlook. Retrieved November 28, 2013, from http:\/\/www.careersinfosecurity.com\/top-threats-2013-outlook-a-5388"},{"key":"ijcwt.2013070102-16","unstructured":"Levy, S. (2012). Google throws open doors to its top-secret data center. Retrieved November 28, 2013, from http:\/\/www.wired.com\/wiredenterprise\/2012\/10\/ff-inside-google-data-center\/all"},{"key":"ijcwt.2013070102-17","year":"2012","journal-title":"McAfee threats report: Third quarter"},{"key":"ijcwt.2013070102-18","unstructured":"McConnell, M., Chertoff, M., & Lynn, W. (2012, January 27). China's cyber thievery is national policy - and must be challenged. The Wall Street Journal."},{"key":"ijcwt.2013070102-19","unstructured":"Miller, C., & Valasek, C. (2013). Adventures in automotive networks and control units."},{"key":"ijcwt.2013070102-20","unstructured":"Mills, E. (2012). A who's who of mideast-targeted malware: What do stuxnet, duqu, gauss, mahdi, flame, wiper, and shamoon have in common?"},{"key":"ijcwt.2013070102-21","unstructured":"News, B. B. C. (2012). Malware inserted on PC production lines, says study. Retrieved November 29, 2013, from http:\/\/www.bbc.co.uk\/news\/technology-19585433"},{"key":"ijcwt.2013070102-22","doi-asserted-by":"crossref","unstructured":"Nighswander, T., Ledvina, B., Diamond, J., Brumley, R., & Brumley, D. (2012). GPS software attacks. In Proceedings of the 2012 ACM Conference on Computer and Communications Security (pp. 450-461).","DOI":"10.1145\/2382196.2382245"},{"key":"ijcwt.2013070102-23","unstructured":"Paul, I. (2012). DNSChanger malware set to knock thousands off internet on monday. Retrieved November 28, 2013, from http:\/\/www.pcworld.com\/article\/258796\/dnschanger_malware_set_to_knock_thousands_off_internet_on_monday.html"},{"key":"ijcwt.2013070102-24","unstructured":"PeopleFinders. (2013). Retrieved November 29, 2013, from http:\/\/www.peoplefinders.com\/"},{"key":"ijcwt.2013070102-25","unstructured":"Rossen, J., & Davis, J. (2013). Police admit they're 'stumped' by mystery car thefts. Retrieved November 29, 2013, from http:\/\/www.today.com\/news\/police-admit-theyre-stumped-mystery-car-thefts-6C10169993"},{"key":"ijcwt.2013070102-26","author":"F. B.Schneider","year":"1999","journal-title":"Trust in cyberspace"},{"key":"ijcwt.2013070102-27","unstructured":"Segal, A., Greenberg, M., & Waxman, M. (2011). Why a cybersecurity treaty is a pipe dream - council on foreign relations. Retrieved November 28, 2013, from http:\/\/www.cfr.org\/cybersecurity\/why-cybersecurity-treaty-pipe-dream\/p26325"},{"key":"ijcwt.2013070102-28","doi-asserted-by":"crossref","unstructured":"Shepard, D. P., Humphreys, T. E., & Fansler, A. A. (2012). Evaluation of the vulnerability of phasor measurement units to GPS spoofing attacks. International Journal of Critical Infrastructure Protection.","DOI":"10.1016\/j.ijcip.2012.09.003"},{"key":"ijcwt.2013070102-29","unstructured":"Sherry, J., & Kellermann, T. (2013). Continuous monitoring in a virtual environment. (White Paper No. 2013). Trend Micro."},{"key":"ijcwt.2013070102-30","unstructured":"Spokeo. (2013). Retrieved November 29, 2013, from http:\/\/www.spokeo.com\/"},{"key":"ijcwt.2013070102-31","unstructured":"St Sauver, J. (2008). Cyber war, cyber terrorism and cyber espionage. Retrieved November 28, 2013, from http:\/\/pages.uoregon.edu\/joe\/cyberwar\/cyberwar.pdf"},{"key":"ijcwt.2013070102-32","unstructured":"Swaine, J. (2008). Georgia: Russia 'conducting cyber war'. Retrieved November 28, 2013, from http:\/\/www.telegraph.co.uk\/news\/worldnews\/europe\/georgia\/2539157\/Georgia-Russia-conducting-cyber-war.html"},{"key":"ijcwt.2013070102-33","unstructured":"Symantec. (2012). Adaptive behavior-based malware protection, real-time protection against targeted attacks. (White Paper) Symantec."},{"key":"ijcwt.2013070102-34","unstructured":"Symantec. (2013a). Internet security threat report 2013. (White Paper No. 18) Symantec."},{"key":"ijcwt.2013070102-35","unstructured":"Symantec. (2013b). Internet security threat report appendix 2013. (White Paper No. 18) Symantec."},{"key":"ijcwt.2013070102-36","unstructured":"TODAY. (2013). Two experts demonstrate carjacking gone digital. Retrieved November 29, 2013, from http:\/\/www.today.com\/video\/today\/52609500#52609500"},{"key":"ijcwt.2013070102-37","unstructured":"Tompkins, P. (2003). Truth and trust in cyberspace. Retrieved from http:\/\/www.waccglobal.org\/en\/20032-science-it-and-society\/643-Truth-and-trust-in-cyberspace.html"},{"key":"ijcwt.2013070102-38","unstructured":"Uscilowski, B. (2013). Mobile adware and malware analysis. (White Paper No. 1.0) Symantec."},{"key":"ijcwt.2013070102-39","article-title":"After Google-China dust-up, cyberwar emerges as a threat - computerworld.","author":"J.Vijayan","year":"2010","journal-title":"Computerworld"},{"key":"ijcwt.2013070102-40","article-title":"White house orders security review in wake of WikiLeaks disclosure.","author":"J.Vijayan","year":"2010","journal-title":"Computerworld"},{"key":"ijcwt.2013070102-41","unstructured":"Wawro, A. (2012, May 8). Protect yourself from DNSChanger. PCWorld."}],"container-title":["International Journal of Cyber Warfare and Terrorism"],"original-title":[],"language":"ng","link":[{"URL":"https:\/\/www.igi-global.com\/viewtitle.aspx?TitleId=104521","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,6,1]],"date-time":"2022-06-01T20:01:10Z","timestamp":1654113670000},"score":1,"resource":{"primary":{"URL":"https:\/\/services.igi-global.com\/resolvedoi\/resolve.aspx?doi=10.4018\/ijcwt.2013070102"}},"subtitle":[""],"short-title":[],"issued":{"date-parts":[[2013,7,1]]},"references-count":42,"journal-issue":{"issue":"3","published-print":{"date-parts":[[2013,7]]}},"URL":"https:\/\/doi.org\/10.4018\/ijcwt.2013070102","relation":{},"ISSN":["1947-3435","1947-3443"],"issn-type":[{"value":"1947-3435","type":"print"},{"value":"1947-3443","type":"electronic"}],"subject":[],"published":{"date-parts":[[2013,7,1]]}}}