Frontiers of Advanced Sciences and Technologies: Results
Frontiers of Advanced Sciences and Technologies: Results. Challenges and Perspectives. Engineered Science. This volume aims to provide an advanced forum
Advanced Sciences and Technologies LLC
Advanced Sciences and Technologies LLC. AUTHORIZED FEDERAL SUPPLY SERVICE. PROFESSIONAL ENGINEERING SERVICES SCHEDULE PRICELIST. SPECIAL ITEM NO.
Frontiers of Advanced Sciences and Technologies: Results
Frontiers of Advanced Sciences and Technologies: Results understanding and interpretation of the science
Advanced Sciences and Technologies for Security Applications
Advanced Sciences and Technologies for Security Applications. Series editor. Anthony J. Masys University of Leicester
Advanced Sciences and Technologies for Security Applications
Advanced Sciences and Technologies for Security Applications. Series Editor. Anthony J. Masys Associate Professor
Advanced Sciences and Technologies for Security Applications
Advanced Sciences and Technologies for Security Applications. Series Editor. Anthony J. Masys Associate Professor
Risk identification for the introduction of advanced science and
The hydrogen energy system (HES) is one of the technologies expected to be introduced for environmental benefit and energy efficiency. This advanced science
Babak Akhgar Andrew Staniforth David Waddington Editors
Advanced Sciences and Technologies for Security Applications Communications Technologies Emerging Trends in ICT Security (with Hamid.
Applications Systems and Methods in Smart Home Technology: A
International Journal of Advanced Science and Technology. Vol. 15 February
1 ISSN: 2617-2070 (Print) ; 2617-2070 (Online) Journal of Advanced
Journal of Advanced Sciences and Engineering Technologies available online at: http://www.jaset.isnra.org. Aziz I. Abdulla2. Ammar S. Khazaal3.
Advanced Sciences and Technologies
for Security ApplicationsSeries Editor
Anthony J. Masys, Associate Professor, Director of Global Disaster Management, Humanitarian Assistance and Homeland Security, University of South Florida,Tampa, USA
Advisory Editors
Gisela Bichler, California State University, San Bernardino, CA, USA Thirimachos Bourlai, Lane Department of Computer Science and Electrical Engineering, Multispectral Imagery Lab (MILab), West Virginia University,Morgantown, WV, USA
Chris Johnson, University of Glasgow, Glasgow, UK
Panagiotis Karampelas, Hellenic Air Force Academy, Attica, Greece Christian Leuprecht, Royal Military College of Canada, Kingston, ON, Canada Edward C. Morse, University of California, Berkeley, CA, USA David Skillicorn, Queen"s University, Kingston, ON, Canada Yoshiki Yamagata, National Institute for Environmental Studies, Tsukuba, Ibaraki, JapanIndexed by SCOPUS
The series Advanced Sciences and Technologies for Security Applications comprises interdisciplinary research covering the theory, foundations and domain-specific topics pertaining to security. Publications within the series are peer-reviewed monographs and edited works in the areas of: - biological and chemical threat recognition and detection (e.g., biosensors, aerosols, forensics) - crisis and disaster management - terrorism - cyber security and secure information systems (e.g., encryption, optical and photonic systems) - traditional and non-traditional security - energy, food and resource security - economic security and securitization (including associated infrastructures) - transnational crime - human security and health security - social, political and psychological aspects of security - recognition and identification (e.g., optical imaging, biometrics, authentication and verification) - smart surveillance systems - applications of theoretical frameworks and methodologies (e.g., grounded the- ory, complexity, network sciences, modelling and simulation) Together, the high-quality contributions to this series provide a cross-disciplinary overview of forefront research endeavours aiming to make the world a safer place. The editors encourage prospective authors to correspond with them in advance of submitting a manuscript. Submission of manuscripts should be made to theEditor-in-Chief or one of the Editors.
More information about this series athttp://www.springer.com/series/5540Hamid Jahankhani·Arshad Jamal·Shaun Lawson
Editors
Cybersecurity, Privacy
and Freedom Protection in the Connected WorldProceedings of the 13th International
Conference on Global Security, Safety
and Sustainability, London, January 2021Editors
Hamid Jahankhani
London Campus
Northumbria University
London, UK
Shaun Lawson
Department of Computer and Information
Sciences
Northumbria University
Newcastle upon Tyne, UKArshad Jamal
Northumbria University
London, UK
ISSN 1613-5113 ISSN 2363-9466 (electronic)
Advanced Sciences and Technologies for Security Applications ISBN 978-3-030-68533-1 ISBN 978-3-030-68534-8 (eBook) © The Editor(s) (if applicable) and The Author(s), under exclusive license to Springer NatureSwitzerland AG 2021
This work is subject to copyright. All rights are solely and exclusively licensed by the Publisher, whether
the whole or part of the material is concerned, specifically the rights of translation, reprinting, reuse
of illustrations, recitation, broadcasting, reproduction on microfilms or in any other physical way, and
transmission or information storage and retrieval, electronic adaptation, computer software, or by similar
or dissimilar methodology now known or hereafter developed.does not imply, even in the absence of a specific statement, that such names are exempt from the relevant
protective laws and regulations and therefore free for general use.The publisher, the authors and the editors are safe to assume that the advice and information in this book
are believed to be true and accurate at the date of publication. Neither the publisher nor the authors or
the editors give a warranty, expressed or implied, with respect to the material contained herein or for any
errors or omissions that may have been made. The publisher remains neutral with regard to jurisdictional
claims in published maps and institutional affiliations. This Springer imprint is published by the registered company Springer Nature Switzerland AG The registered company address is: Gewerbestrasse 11, 6330 Cham, SwitzerlandCommittee
General Chair:
Prof. Hamid Jahankhani, UK
hamid.jahankhani@northumbria.ac.ukSteering Committee
Prof. Babak Akhgar, Director of CENTRIC, Sheffield Hallam University, UKProf. Giovanni Bottazzi, Luiss University, Italy
Dr. Brij Bhooshan Gupta, National Institute of Technology Kurukshetra, IndiaMrs. Sukhvinder Hara, Middlesex University, UK
Prof. Ali Hessami, Director Vega Systems, UK
Dr. Amin Hosseinian-Far, University of Northampton, UK Dr. Nilakshi Jain, Shah and Anchor Kutchhi Engineering College, Mumbai, India Dr. Arshad Jamal, QAHE and Northumbria University London, UKProf. Gianluigi Me, Luiss University, Italy
Dr. John McCarthy, Director, Oxford Systems, UK
Dr. Ian Mitchell, Middlesex University, UK
Dr. Reza Montasari, University of Huddersfield, UK Dr. Sina Pournouri, Sheffield Hallam University, UK Prof. Bobby Tait, University of South Africa, South Africa Prof. Willy Susilo, DirectorInstitute of Cybersecurity and Cryptology, Univer- sity of Wollongong, Australia Dr. Guomin Yang, University of Wollongong, AustraliaProf. Shaun Lawson, Northumbria University, UK
Dr. Neil Eliot, Northumbria University, UK
Kudrat-E-Khuda (Babu), Department of Law, Daffodil International University,Bangladesh
Prof. Sergio Tenreiro de Magalhaes, Chair of Cyber Security, Champlain CollegeOnline, USA
v viCommitteeProgramme Committee
Dr. Fiona Carroll, Cardiff Metropolitan University, UK Dr. Christos Douligeris, University of Piraeus, Greece Dr. Omar S. Arabiat, Balqa Applied University, Jordan Mr. Konstantinos Kardaras, Technical Consultant, Greece Dr. Chafika Benzaid, Computer Security Division, CERIST, University of Sciences and Technology Houari Boumediene, Algeria Prof. Bobby Tait, University of South Africa, South AfricaDr. Fouad Khelifi, Northumbria University, UK
Dr. Kenneth Revett, University of Maryland College Park, Massachusetts, USA Dr. Ken Dick, Nebraska University Centre for Information Assurance, USA Dr. Elias Pimenidis, University of West of England, UK Prof. Henrique M. D. Santos, University of Minho, Portugal Prof. Alexander Sideridis, Agricultural University of Athens, Greece Mr. Ray Brown, QAHE and Northumbria University, UK Prof. Murdoch Watney, University of Johannesburg, South Africa Dr. Mamoun Alazab, Macquarie University, Australia Dr. Gregory Epiphaniou, Commercial Director, Wolverhampton Cyber ResearchInstitute (WCRI), University of Wolverhampton, UK
sity of Wolverhampton, UKDr. Carlisle George, Middlesex University, UK
Prof. Gianluigi Me, University of Rome LUISS Guido Carli", Italy Prof. Antonio Mauro, Head of Security and Compliance Assurance, OctoTelematics S.p.A., Italy
Dr. John McCarthy, Director, Oxford Systems, UK
Dr. Ameer Al-Nemrat, University of East London, UKMrs. Sukhvinder Hara, Middlesex University, UK
Dr. Ian Mitchell, Middlesex University, UK
Prof. Ahmed Bouridane, Northumbria University, UK
Dr. Amin Hosseinian-Far, University of Northampton, UK Dr. Reza Montasari, Birmingham City University, UK Mr. Ayman El Hajjar, QAHE and Northumbria University, UKDr. George Weir, University of Strathclyde, UK
Dr. Sufian Yousef, Anglia Ruskin University, UK
Dr. Alireza Daneshkhah, Coventry University, UK
Dr. Maryam Farsi, Cranfield University, UK
Mr. Usman Javed Butt, QAHE and Northumbria University, UK Asim Majeed, QAHE and University of Roehampton, UK Dr. Rose Fong, QAHE and Northumbria University London, UK Dr. Athar Nouman, QAHE and Northumbria University London, UK Mr. Umair B. Chaudhry, Queen Mary College, University of London, UKMr. Nishan Chelvachandran, Cyberreu, Finland
Mr. Stefan Kendzierskyj, Cyfortis, UK
13th International Conference on Security,
Safety and Sustainability, ICGS3-21
Cybersecurity Privacy and Freedom Protection
in the Connected World 14th and 15th January 21About the Conference
Following the successful 12th ICGS3, we have much pleasure in announcing the13th International Conference on Global Security, Safety & Sustainability.
Year 2020 will be remembered as a year of COVID-19 pandemic year with a profound impact on our lives and challenging times for governments around the world with technology as a backbone of tools to assist us to work remotely while in self-isolation and in total lockdown. Every individual and organisation are faced with the challenges of the adoption of technological change and understand that nothing will be the same for some time after and even when normality resumes. AI, blockchain, machine learning, IoT, IoMT, IIoT all are tested and applied at a very rapid turnaround as we go through the pandemic day after day. However, all these transformations can bring many associated risks regarding data, such as privacy, transparency, exploitation and ownership. Since the COVID-19 pandemic in January 2020, governments and organisations; small or large have seen an increase in cyber-attacks. Hackers, through recon- naissance and some network intrusions, targeting nation states medical research facilities, healthcare organisations conducting research into the virus, financial sectors and so on. Early in April 2020, the UK and the US security agencies sound COVID-19 threat alert ...Cybersecurity Infrastructure and Security Agency issued a joint warning that hacking groups associated with nation-state governments are exploiting the COVID-19 pandemic as part of their cyber operations...". The advancement of Artificial Intelligence (AI), coupled with the prolificacy of The expansion of Big Data and volumetric metadata generated and collated by these mechanisms not only give greater depth of understanding but as change is coming at an unprecedented pace COVID-19 driving the cultural changes and the public sector innovations to a new height of responsibilities. vii viii 13th International Conference on Security, Safety and Sustainability, ... Further development and analysis of defence tactics and countermeasures are needed fast to understand security vulnerabilities which will be exploited by the cybercriminals by identifying newer technologies that can aid in protecting and securing data with a range of supporting processes to provide a higher level of cyber resilience. The ethical implications of connecting the physical and digital worlds, and presenting the reality of a truly interconnected society, presents the realisation of the concept of smart societies in reality. safety and sustainability issues can be examined from several global perspectives through dialogue between academics, students, government representatives, chief executives, security professionals and research scientists from the United Kingdom and from around the globe. The TWO-day Virtual conference will focus on the challenges of complexity, the rapid pace of change and risk/opportunity issues associated with the twenty-first- century lifestyle, systems and infrastructures.Prof. Hamid Jahankhani
General Chair of the ConferenceOctober 2020
Contents
Artificial Intelligence and the International Information and Psychological Security......................................... 1Konstantin A. Pantserev and Konstantin A. Golubev
Blockchain Medicine Administration Records (BMAR): Reflections and Modelling Blockchain with UML..................... 9Ian Mitchell
An Investigation into an Approach to Updating the Governance of Satellite Communications to Enhance Cyber Security.............. 23Lesley-Anne Turner and Hamid Jahankhani
Enhancing Smart Home Threat Detection with Artificial Intelligence....................................................... 35 Jaime Ibarra, Usman Javed Butt, Ahmed Bouridane, Neil Eliot, and Hamid Jahankhani Cybercrime Predicting in the Light of Police Statistics................ 55Jerzy Kosi´nski and Grzegorz Krasnod˛ebski
Prediction of Cyber Attacks During Coronavirus Pandemic by Classification Techniques and Open Source Intelligence............ 67Shannon Wass, Sina Pournouri, and Gregg Ibbotson
Missed Opportunities in Digital Investigation........................ 101Pat Thompson and Mark Manning
Cyber-Disability Hate Cases in the UK: The Documentation by the Police and Potential Barriers to Reporting..................... 123 Zhraa A. Alhaboby, Haider M. Al-Khateeb, James Barnes, Hamid Jahankhani, Melanie Pitchford, Liesl Conradie, and Emma Short Smart Secure USB SSU-256........................................ 135 Muhammad Ehsan ul Haq, Zeeshan Ali, Muhammad Taimoor Ali,Ruqiya Fazal, Waseem Iqbal, and Mehreen Afzal
ix xContents The Application of Technology in Combating Human Trafficking...... 149Reza Montasari and Hamid Jahankhani
Countering Adversarial Inference Evasion Attacks Towards ML-Based Smart Lock in Cyber-Physical System Context............. 157 Software License Audit and Security Implications.................... 171Wee Kiat Yang, Amin Hosseinian-Far, Luai Jraisat,
and Easwaramoorthy Rangaswamy The Deployment of Autonomous Drones During the COVID-19 Pandemic......................................................... 183 Usman Javed Butt, William Richardson, Maysam Abbod,Haiiel-Marie Agbo, and Caleb Eghan
Effective Splicing Localization Based on Image Local Statistics........ 221P. N. R. L. Chandra Sekhar and T. N. Shankar
Applying Big Data Analytics in DDos Forensics: Challenges and Opportunities................................................. 235 Augusto Gonzaga Sarmento, Kheng Cher Yeo, Sami Azam, Asif Karim, Abdullah Al Mamun, and Bharanidharan Shanmugam Cyber Security in the Global Village and Challenges for Bangladesh: An Overview on Legal Context...................... 253Kudrat-E-Khuda (Babu)
Reasons Behind Poor Cybersecurity Readiness of Singapore's Small Organizations: Reveal by Case Studies......................... 269 Nam Chie Sia, Amin Hosseinian-Far, and Teoh Teik Toe Cloud and Its Security Impacts on Managing a Workforce Remotely: A Reflection to Cover Remote Working Challenges......... 285 Usman Javed Butt, William Richardson, Athar Nouman,Haiiel-Marie Agbo, Caleb Eghan, and Faisal Hashmi
The Magic Quadrant: Assessing Ethical Maturity for Artificial Intelligence....................................................... 313 Andi Zhobe, Hamid Jahankhani, Rose Fong, Paul Elevique, and Hassan Baajour A Systematic Literature Review of the Role of Ethics in Big Data...... 327Jade Roche and Arshad Jamal
Transforming Higher Education Systems Architectures Through Adoption of Secure Overlay Blockchain Technologies................. 343Foysal Miah, Samuel Onalo, and Eckhard Pfluegel
Centralised IT Structure and Cyber Risk Management............... 357 Kamran Abbasi, Nick Petford, and Amin Hosseinian-FarContentsxi
Blockchain and Artificial Intelligence Managing a Secure and Sustainable Supply Chain...................................... 367 Elias Pimenidis, John Patsavellas, and Michael Tonkin Does the GDPR Protect UK Consumers from Third Parties Processing Their Personal Data for Secondary Purposes? A Systematic Literature Review..................................... 379David Sinclair and Arshad Jamal
Identification of Critical Business Processes: A Proposed Novel Approach......................................................... 395 Yousuf Alblooshi, Amin Hosseinian-Far, and Dilshad Sarwar A Critical Overview of Food Supply Chain Risk Management......... 413 Maryam Azizsafaei, Dilshad Sarwar, Liam Fassam, Rasoul Khandan, and Amin Hosseinian-Far Knowledge Sharing and Internal Social Marketing in Improving Cyber Security Practice............................................ 431 Hiep Cong Pham, Mathews Nkhoma, and Minh Nhat NguyenTransformation of Cybersecurity Posture in IT
Telecommunication: A Case Study of a Telecom Operator............. 441 Ahmed Adel, Dilshad Sarwar, and Amin Hosseinian-Far Cloud Computing Security Challenges: A Review.................... 459 Iqra Kanwal, Hina Shafi, Shahzad Memon, and Mahmood Hussain Shahquotesdbs_dbs48.pdfusesText_48[PDF] advantages and disadvantages of e-commerce pdf
[PDF] adventure in english unit 7
[PDF] advertising esl lesson plan
[PDF] advertising lesson plans
[PDF] aec financé par emploi quebec
[PDF] aefe amerique du nord
[PDF] aeroport casablanca boutiques
[PDF] aeroport casablanca train
[PDF] aeroport mohamed 5 terminal 1
[PDF] aeroport mohamed 5 terminal 2
[PDF] aeroport mohamed 5 terminal 3
[PDF] aes clermont ferrand
[PDF] aesh 2017 macron
[PDF] aesh 2017 salaire