Journal of Information

Published by: Conscientia Beam
Online ISSN: 2520-7652
Print ISSN: Pending
Total Citations: 4
Quick Submission    Login/Submit/Track

No. 2

Big Data in Homeland Security

Pages: 59-70
Find References

Finding References


Big Data in Homeland Security

Search :
Google Scholor
Search :
Microsoft Academic Search
Cite

DOI: 10.18488/journal.104/2015.1.2/104.2.59.70

Lidong Wang , Cheryl Ann Alexander

Export to    BibTeX   |   EndNote   |   RIS

  1. H. C. Chen, R. H. L. Chiang, and V. C. Storey, "Business intelligence and analytics: From big data to big impact," MIS Quarterly, vol. 36, pp. 1165-1188, 2012.
  2. K. M. Deitz, "Critical infrastructure protection," Journal of Healthcare Protection Management, vol. 28, pp. 101-113, 2012.
  3. M. M. Neag, "Critical infrastructure protection-the foundation of national security 2," Buletin Stiintific, vol. 19, pp. 126-132, 2014.
  4. A. P?trascu and E. Simion, "Critical infrastructures cyber protection using kernel based supervised learning techniques," MTA Review, Military Technical Academy (MTA) Publishing House, vol. 24, pp. 59-66, 2014.
  5. B. Thomas, S. Fernandez, and T. Wilbanks, "Perspectives on improving resilience for critical infrastructures," The Global Forum on Urban and Regional Resilience at Virginia Tech: New Perspectives on Resilience, Blacksburg, Virginia, USA, October 12-14, 2014.
  6. G. H. Kim, S. Trimi, and J. H. Chung, "Big-Data applications in the government sector," Communications of the ACM, vol. 57, pp. 78-85, 2014.
  7. L. D. Wang, "Enhanced homeland security based on biometrics and RFID," International Journal of Computer Applications in Technology, vol. 44, pp. 37-45, 2012.
  8. C. Blundo, E. D. Cristofaro, and P. Gasti, "Espresso: Efficient privacy-preserving evaluation of sample set similarity," Journal of Computer Security, vol. 22, pp. 355–381, 2014.
  9. R. Karl and B. Chris, "Facial Analytics: From Big Data to Law Enforcement, IEEE COMPUTER, Sept. 2012, at 95; see also Evgeny Morozov, Requiem for Our Wonderfully Inefficient World, SLATE, Apr. 26, 2013." Available http://www.slate.com/articles/technology/future_tense/2013/04/senor_based_dynamic_pricing_may_be_efficient_but_it_could_create_inequality.html, 2012.
  10. W. Jeberson and L. Sharma, "Survey on big data for counter terrorism," International Journal of Innovations & Advancement in Computer Science, vol. 4, pp. 197-205, 2015.
  11. Z. U. H. Usmani, "Predictive modeling to counter terrorist attacks," Brown Journal of World Affairs, vol. 20, pp. 277-284, 2014.
  12. J. Bartlett and C. Miller, "The state of the art: A literature review of social media intelligence capabilities for counter-terrorism," Demos, Technical Report, London, UK, 2013.
  13. S. R. Srinivasan and S. R. M. Chandrasekeran, "Big data on terrorist attacks: An analysis using the ensemble classifier approach," presented at the International Conference on Inter Disciplinary Research in Engineering and Technology, New Delhi, India, 2015.
  14. D. Verton, "How data will revolutionize aviation security," Homeland Security Today Magazine,vol. 5, pp. 30-33, 2013.
  15. M. Hilbert, "Big data for development: From information- to knowledge societies (January 15, 2013)." Available http://ssrn.com/abstract=2205145 or http://dx.doi.org/10.2139/ssrn.2205145 [Accessed October 30, 2014], 2013.
  16. K. Grolinger, E. Mezghani, M. A. M. Capretz, and E. Exposito, "Knowledge as a service framework for disaster data management," Electrical and Computer Engineering Publications, vol. 25, pp. 1-6, 2013.
  17. M. Chen, S. W. Mao, and Y. H. Liu, "Big data: A survey," Mobile Netw Appl., vol. 19, pp. 171–209, 2014.
  18. D. Grinshpan, "Live streaming: Powering continuous monitoring through big data - A candid survey of federal employees," Research Report, Government Business Council, Brocade Networking Solutions, 2013.
  19. Ponemon Institute, "Big data analytics in cyber defense," Research Report, EB-7499 02.13, 2013.
  20. A. A. Cárdenas, P. K. Manadhata, and S. P. Rajan, "Big data analytics for security," IEEE Security & Privacy, vol. 11, pp. 74-76, 2013.
  21. T. A. Baklanoff and A. A. Padath, "Usability, security and healthcare systems: Design, challenges and perspectives," Journal of Information Assurance and Security, vol. 7, pp. 366-376, 2012.
  22. U.S. Department of Defense, Strategy for operating in cyberspace. Washington, DC, USA: Department of Defense, 2011.
  23. A. Flowers and S. Zeadally, "US policy on active cyber defense," Homeland Security & Emergency Management, vol. 11, pp. 289–308, 2014.
  24. D. E. O’Leary, "Artificial intelligence and big data," IEEE Intelligent Systems, vol. 28, pp. 96-99, 2013.
  25. C. Q. Ji, Y. Li, W. M. Qiu, U. Awada, and K. Q. Li, "Big data processing in cloud computing environments," presented at the 2012 International Symposium on Pervasive Systems, Algorithms and Networks, San Marcos, Texas, USA, December 13-15, 2012.
  26. V. Gadepally, B. Hancock, B. Kaiser, J. Kepner, P. Michaleas, M. Varia, and A. Yerukhimovich, "Computing on masked data to improve the security of big data," presented at the The 2015 IEEE Symposium on Technologies for Homeland Security (HST’15), Greater Boston, Massachusetts, 2015.
  27. Y. A. Younis, M. Merabti, and K. Kifayat, "Secure cloud computing for critical infrastructure: A survey," presented at the The 14th Annual PostGraduate Symposium on The Convergence of Telecommunications, Networking and Broadcasting (PGNet 2013), Liverpool, UK, July 24-25, 2013.
Lidong Wang , Cheryl Ann Alexander (2015). Big Data in Homeland Security. Journal of Information, 1(2): 59-70. DOI: 10.18488/journal.104/2015.1.2/104.2.59.70
Big Data predicts outcomes and has great impacts on knowledge discovery and value creation. It can be used to fight against terrorism and enhance Homeland Security by providing accurate predictions and patterns of terrorist activities. This paper introduces some methods and technologies used in Homeland Security. They are: biometrics, radio frequency identification (RFID), data mining, cloud computing, and Big Data. Big Data applications in Homeland Security are presented. These applications include Big Data in general security and public safety, crime prediction and aviation security, disasters, and cybersecurity and cyber defense. Big Data challenges in security are also discussed.
Contribution/ Originality
This study contributes in the existing literature and presents technology progress and applications of Big Data in Homeland Security, especially in cybersecurity and cyber defense.

Security Issues with Contactless Bank Cards

Pages: 53-58
Find References

Finding References


Security Issues with Contactless Bank Cards

Search :
Google Scholor
Search :
Microsoft Academic Search
Cite

DOI: 10.18488/journal.104/2015.1.2/104.2.53.58

Citation: 1

Brendan McBride , Nigel McKelvey , Kevin Curran

Export to    BibTeX   |   EndNote   |   RIS

  1. Atmel, "Understanding the requirements of ISO/IEC 14443 for type B proximity contactless identification cards." Available: http://www.atmel.com/images/doc2056.pdf, 2005.
  2. A. Alqhtani, H. Elmiligi, F. Gebali, and M. S. Yasein, "NFC security analysis and vulnerabilities in healthcare applications," presented at the Communications, Computers and Signal Processing (PACRIM), 2013 IEEE Pacific Rim Conference, 2013.
  3. C. Stamford, "Gartner says worldwide mobile payment transaction value to surpass $235 billion in 2013." Available http://www.gartner.com/newsroom/id/2504915, 2013.
  4. G. Kulkarni, R. Shelke, R. Sutar, and S. Mohite, "RFID security issues & challenges," presented at the Electronics and Communication Systems ICECS. IEEE Xplore, 2014.
  5. B. Ellery, "How 30million 'wi-fi' credit cards can be plundered by cyber identity thieves exploiting contactless payment technology read more. Daily Mail." Available http://www.dailymail.co.uk/news/article-2334468/How-30million-wi-fi-credit-cards-plundered-cyber-identity-thieves-exploiting-contactless-payment-technology.html, 2013.
  6. R. Burke, "Central bank kicks off €1m campaign for cashless society, Independent." Available http://www.independent.ie/business/irish/central-bank-kicks-off-1m-campaign-for-cashless-society-30033110.html, 2014.
  7. Department of Finance, "Launch of media campaign for e-day by minister of state at the department of finance Mr. Simon Harris, T.D." Available: http://www.finance.gov.ie/news-centre/press-releases/launch-media-campaign-e-day-minister-state-department-finance-mr-simon, 2014.
  8. Data Protection Commissioner, "A guide to your rights." Available: http://www.dataprotection.ie/docs/a-guide-to-your-rights-plain-english-version/858.htm, 2013.
Brendan McBride , Nigel McKelvey , Kevin Curran (2015). Security Issues with Contactless Bank Cards. Journal of Information, 1(2): 53-58. DOI: 10.18488/journal.104/2015.1.2/104.2.53.58
Contactless bank cards have been issued steadily to banking customers over the past four years and this trend has continued to grow rapidly more recently. We want to highlight a list of security issues as well as privacy threats to be concerned with when using such contactless bank cards. Further advances in smartphone technology applications can lead to new threats in relation to contactless bank cards. This study contributes to the literature as it highlights data protection issues in Ireland and also highlights the major push by authorities to adopt a cashless banking society which could potentially lead to further data protection problems in Ireland. 
Contribution/ Originality
This study is one of very few studies which have investigated the potential security issues facing customers in Ireland who use contactless bank cards. The study documents many security concerns and offers definitions and examples of relatively new terms.