Matches in SemOpenAlex for { <https://semopenalex.org/work/W4360592079> ?p ?o ?g. }
- W4360592079 abstract "Abstract Wildlife trafficking is driving many species to extinction and is overwhelming law enforcement efforts to stop it. At least a 2-fold increase in the number of traffickers who are put out of business is needed to help avoid these extinctions. A cybersecurity-based solution described in this article consists of a large international confederation of criminal investigators collecting intelligence on persons involved in wildlife trafficking, analyzing it, and then recommending to law enforcement (a) cybercriminals to detain, (b) cybercriminals to surveil, and (c) where and when to intercept cybercriminal-initiated wire transfers and shipments of wildlife products. Wildlife traffickers nowadays often use the internet to commit their cybercrimes. Prosecuting such crimes is challenging. Indeed, one of the top five challenges in cybersecurity is to develop methods for pursuing cybercriminals and bringing them to justice through the acquisition of digital evidence that links specific individuals to specific illegal acts. The proposed confederation finds two lists of wildlife cybercriminals to remove. The first is found by computing centrality measures on the statistically estimated (reconstructed) current social network of wildlife cybercriminals to identify those criminals whose removal would, according to social network theory, maximally disrupt the syndicate’s operations. This list contains criminals identified as kingpins, and/or information brokers. The second list consists of those m criminals whose removal results in the largest simulator-computed drop in poaching of the trafficked species over the next year. Database access control is a form of information security (InfoSec), or data security—a chief component of cybersecurity. Here, a distributed form of information security is developed for keeping a confederation’s criminal intelligence database secure from unauthorized access and insider threats. This procedure uses only peer-to-peer transactions. The illegal trade in rhino horn is used to illustrate how this confederation would use criminal intelligence from several countries to first build a simulation of the political–ecological system that contains the trafficking operation, and then use this statistically fitted simulator to identify those traffickers to remove, wire transfers to block, and wildlife product shipments to seize. All software to implement this federated database and its access control procedure is freely available." @default.
- W4360592079 created "2023-03-24" @default.
- W4360592079 creator A5011075461 @default.
- W4360592079 date "2023-01-01" @default.
- W4360592079 modified "2023-09-30" @default.
- W4360592079 title "Adapting cybersecurity practice to reduce wildlife cybercrime" @default.
- W4360592079 cites W1743282167 @default.
- W4360592079 cites W1975057588 @default.
- W4360592079 cites W1986497354 @default.
- W4360592079 cites W1988183975 @default.
- W4360592079 cites W2000675941 @default.
- W4360592079 cites W2105591913 @default.
- W4360592079 cites W2115297747 @default.
- W4360592079 cites W2131233558 @default.
- W4360592079 cites W2131492273 @default.
- W4360592079 cites W2132202037 @default.
- W4360592079 cites W2144947002 @default.
- W4360592079 cites W2148019918 @default.
- W4360592079 cites W2156279557 @default.
- W4360592079 cites W2158941428 @default.
- W4360592079 cites W2175423925 @default.
- W4360592079 cites W2756389349 @default.
- W4360592079 cites W2772657597 @default.
- W4360592079 cites W2903621374 @default.
- W4360592079 cites W2914849785 @default.
- W4360592079 cites W2922435284 @default.
- W4360592079 cites W2933861489 @default.
- W4360592079 cites W2962933337 @default.
- W4360592079 cites W3002629079 @default.
- W4360592079 cites W3022456161 @default.
- W4360592079 cites W3025139368 @default.
- W4360592079 cites W3042505432 @default.
- W4360592079 cites W3107645160 @default.
- W4360592079 cites W3131419516 @default.
- W4360592079 cites W3134899709 @default.
- W4360592079 cites W3162936577 @default.
- W4360592079 cites W3188284974 @default.
- W4360592079 cites W3201926317 @default.
- W4360592079 cites W4200585619 @default.
- W4360592079 cites W4210283038 @default.
- W4360592079 cites W4210305918 @default.
- W4360592079 cites W4241978262 @default.
- W4360592079 cites W4308625497 @default.
- W4360592079 cites W633316256 @default.
- W4360592079 doi "https://doi.org/10.1093/cybsec/tyad004" @default.
- W4360592079 hasPublicationYear "2023" @default.
- W4360592079 type Work @default.
- W4360592079 citedByCount "0" @default.
- W4360592079 crossrefType "journal-article" @default.
- W4360592079 hasAuthorship W4360592079A5011075461 @default.
- W4360592079 hasBestOaLocation W43605920791 @default.
- W4360592079 hasConcept C108827166 @default.
- W4360592079 hasConcept C110875604 @default.
- W4360592079 hasConcept C125620115 @default.
- W4360592079 hasConcept C136764020 @default.
- W4360592079 hasConcept C144024400 @default.
- W4360592079 hasConcept C144133560 @default.
- W4360592079 hasConcept C153180980 @default.
- W4360592079 hasConcept C17744445 @default.
- W4360592079 hasConcept C18903297 @default.
- W4360592079 hasConcept C199539241 @default.
- W4360592079 hasConcept C205649164 @default.
- W4360592079 hasConcept C2776217272 @default.
- W4360592079 hasConcept C2777989319 @default.
- W4360592079 hasConcept C2779390178 @default.
- W4360592079 hasConcept C2780262971 @default.
- W4360592079 hasConcept C2781198186 @default.
- W4360592079 hasConcept C29376679 @default.
- W4360592079 hasConcept C38652104 @default.
- W4360592079 hasConcept C40700 @default.
- W4360592079 hasConcept C41008148 @default.
- W4360592079 hasConcept C541664917 @default.
- W4360592079 hasConcept C73484699 @default.
- W4360592079 hasConcept C77088390 @default.
- W4360592079 hasConcept C86803240 @default.
- W4360592079 hasConcept C97137747 @default.
- W4360592079 hasConceptScore W4360592079C108827166 @default.
- W4360592079 hasConceptScore W4360592079C110875604 @default.
- W4360592079 hasConceptScore W4360592079C125620115 @default.
- W4360592079 hasConceptScore W4360592079C136764020 @default.
- W4360592079 hasConceptScore W4360592079C144024400 @default.
- W4360592079 hasConceptScore W4360592079C144133560 @default.
- W4360592079 hasConceptScore W4360592079C153180980 @default.
- W4360592079 hasConceptScore W4360592079C17744445 @default.
- W4360592079 hasConceptScore W4360592079C18903297 @default.
- W4360592079 hasConceptScore W4360592079C199539241 @default.
- W4360592079 hasConceptScore W4360592079C205649164 @default.
- W4360592079 hasConceptScore W4360592079C2776217272 @default.
- W4360592079 hasConceptScore W4360592079C2777989319 @default.
- W4360592079 hasConceptScore W4360592079C2779390178 @default.
- W4360592079 hasConceptScore W4360592079C2780262971 @default.
- W4360592079 hasConceptScore W4360592079C2781198186 @default.
- W4360592079 hasConceptScore W4360592079C29376679 @default.
- W4360592079 hasConceptScore W4360592079C38652104 @default.
- W4360592079 hasConceptScore W4360592079C40700 @default.
- W4360592079 hasConceptScore W4360592079C41008148 @default.
- W4360592079 hasConceptScore W4360592079C541664917 @default.
- W4360592079 hasConceptScore W4360592079C73484699 @default.
- W4360592079 hasConceptScore W4360592079C77088390 @default.
- W4360592079 hasConceptScore W4360592079C86803240 @default.