Journal Contents: International Journal of Cyber Research and Education (IJCRE)

View the International Journal of Cyber Research and Education (IJCRE) home page for complete details.
Volume 5 (2024)
Issue 1
Article 91
Science 4.0 as a Model of Scientific Activity in an Innovative Environment of Industry 4.0 (pages 1-17)
Shakir A. Mehdiyev (Insitute of Information Technology, Baku, Azerbaijan), Tahmasib Kh. Fataliyev (Institute of Information Technology, Baku, Azerbaijan)
Volume 4 (2022)
Issue 1
Article 86
Network Access Control for Government: An Analytical Study (pages 1-11)
Nathalie Ayala Santana (St. Mary's University, USA), Ayad Barsoum (St. Mary's University, USA)
Article 87
Address Cybersecurity Risks Due to COVID-19 in Small Business Environments (pages 1-13)
Justino Lourenço (Polytechnic Institute of Gaya, Portugal), Fernando Almeida (Polytechnic Institute of Gaya, Portugal)
Article 88
Traditional Public-Key Cryptosystems and Elliptic Curve Cryptography: A Comparative Study (pages 1-14)
Maria Isaura Lopez (St. Mary's University, USA), Ayad Barsoum (St. Mary's University, USA)
Article 89
Determinants of Consumer Online Purchasing Intention: An Empirical Study in Tunisia (pages 1-16)
Wadie Nasri (Université de Gabès, Tunisia)
Issue 2
Volume 3 (2021)
Issue 1
Article 1
Privacy Concern and Likelihood of Paying a Privacy Fee (pages 1-15)
Daniel M. Eveleth (University of Idaho, USA), Lori Baker-Eveleth (University of Idaho, USA), Norman M. Pendegraft (University of Idaho, USA), Mark M. Rounds (University of Idaho, USA)
Article 2
Cybercrime: An Emerging Threat to Economic Development in Nigeria (pages 16-27)
Henry Chima Ukwuoma (National Institute for Policy and Strategic Studies, Kuru, Nigeria)
Article 3
Exploring Personal Data Sensitivity: Evidence From UAE (pages 28-38)
Ali Alaimi (Al Falah University, Dubai, UAE), Malathi Govind (Al Falah University, Dubai, UAE), Mohanad Halaweh (Al Falah University, Dubai, UAE)
Article 4
Acquisition Issues in Cybersecurity: Adapting to Management Challenges (pages 39-47)
Quinn Lanzendorfer (Robert Morris University, USA)
Article 5
Government and Industry Relations in Cybersecurity: A Partnership for the Fifth Domain of Warfare (pages 48-57)
Quinn Lanzendorfer (Robert Morris University, USA)
Article 6
Organizational Cyber Data Breach Analysis of Facebook, Equifax, and Uber Cases (pages 58-64)
Young B. Choi (Regent University, USA)
Article 7
Identity Theft: A Review of Critical Issues (pages 65-77)
Susan Helser (Central Michigan University, USA), Mark I. Hwang (Central Michigan University, USA)
Issue 2
Article 1
Android Adware Detection Using Machine Learning (pages 1-19)
Sikha Bagui (University of West Florida, USA), Daniel Benson (University of West Florida, USA)
Article 2
Introducing the Common Attack Process Framework for Incident Mapping (pages 20-27)
Stephen Mancini (Robert Morris University, USA), Laurie Iacono (Robert Morris University, USA), Frank Hartle (Robert Morris University, USA), Megan Garfinkel (Robert Morris University, USA), Dana Horn (Robert Morris University, USA), Alison Sullivan (Robert Morris University, USA)
Article 3
A HIPAA Security and Privacy Compliance Audit and Risk Assessment Mitigation Approach (pages 28-45)
Young B. Choi (Regent University, USA), Christopher E. Williams (Regent University, USA)
Article 4
The Security Risks and Challenges of 5G Communications (pages 46-53)
Young B. Choi (Regent University, USA), Matthew E. Bunn (Regent University, USA)
Article 5
Addressing the Gender Gap in the Cybersecurity Workforce (pages 54-61)
Robert Beveridge (Robert Morris University, USA)
Volume 2 (2020)
Issue 1
Article 1
The Effectiveness of Cyber Security Frameworks in Combating Terrorism in Zimbabwe (pages 1-16)
Jeffrey Kurebwa (Peace and Governance, Bindura University of Science Education, Bindura, Zimbabwe), Eunice Magumise (Bindura University of Science Education, Bindura, Zimbabwe)
Article 2
Predicting the Writer's Gender Based on Electronic Discourse (pages 17-31)
Szde Yu (Wichita State University, Wichita, USA)
Article 3
Information Sharing Challenges in Government Cybersecurity Organizations (pages 32-39)
Quinn E. Lanzendorfer (Robert Morris University, Moon, USA)
Article 4
Effectiveness of Increasing Realism Into Cybersecurity Training (pages 40-54)
Robert Beveridge (Robert Morris University, Moon, USA)
Article 5
How to Educate to Build an Effective Cyber Resilient Society (pages 55-72)
Jorge Barbosa (Coimbra Polytechnic - ISEC, Coimbra, Portugal)
Issue 2
Article 1
Cyberstalking: An Analysis of Students' Online Activity (pages 1-8)
Karen Paullet (Robert Morris University, USA), Adnan Chawdhry (California University of Pennsylvania, USA)
Article 2
The Rise of Industrial Espionage and How to Prevent It (pages 9-16)
Young B. Choi (Regent University, USA), Teresa Wenner (Regent University, USA)
Article 3
Effective Security Assessments and Testing (pages 17-23)
David Culbreth (St. Mary's University, San Antonio, USA), Adan Guadarrama (St. Mary's University, San Antonio, USA), Ayad Barsoum (St. Mary's University, San Antonio, USA)
Article 4
Learning Culture and Knowledge Application: The Mediating Effect of Transformational Leadership (pages 24-37)
Benny Hutahayan (Brawijaya University, Indonesia)
Article 5
Research on Intrusion Detection Algorithm Based on Deep Learning and Semi-Supervised Clustering (pages 38-60)
Yong Zhong Li (School of Computer Science, Jiangsu University of Science and Technology, China), Shi Peng Zhang (School of Computer Science, Jiangsu University of Science and Technology, China), YI Li (School of Computer Science, Jiangsu University of Science and Technology, China), ShengZhu Wang (School of Computer Science, Jiangsu University of Science and Technology, China)
Volume 1 (2019)
Issue 1
Article 1
The Dark Web: Defined, Discovered, Exploited (pages 1-12)
Stephen Mancini (National Cyber-Forensics & Training Alliance, USA), Lawrence A. Tomei (Robert Morris University, USA)
Article 2
Analysis of a Training Package for Law Enforcement to Conduct Open Source Research (pages 13-26)
Joseph Williams (Canterbury Christ Church University, Canterbury, UK), Georgina Humphries (Canterbury Christ Church University, Canterbury, UK)
Article 3
Blockchain and Bitcoin: Concept, Functionality, and Security (pages 27-37)
Hayden Covington (Regent University, USA), Young B. Choi (Regent University, USA)
Article 4
Development of Secured Log Management System Over Blockchain Technology (pages 38-42)
Sagar Shankar Rajebhosale (SF's SITRC, Nashik, India), Mohan Chandrabhan Nikam (SF's SITRC, Nashik, India)
Article 5
Effectiveness of Cyber Bullying Sensitization Program (CBSP) to Reduce Cyber Bullying Behavior Among Middle School Children (pages 43-51)
Surabhi Negi (University of Mumbai, Mumbai, India), Sunita Magre (University of Mumbai, Mumbai, India)
Article 6
Implementation of Algorithms for Identity Based Encryption and Decryption (pages 52-62)
Kannan Balasubramanian (Mepco Schlenk Engineering College, Sivakasi, India), M. Rajakani (Mepco Schlenk Engineering College, Sivakasi, India)
Article 7
Blockchain and the Protection of Patient Information in Line with HIPAA (pages 63-68)
Colin DeLeon (Regent University, USA), Young B. Choi (Regent University, USA)
Article 8
The Cyber Awareness of Online Video Game Players: An Examination of Their Online Safety Practices and Exposure to Threats (pages 69-77)
Soonhwa Seok (Korea University, Seoul, South Korea), Boaventura DaCosta (Solers Research Group, FL, USA)
Issue 2
Article 1
A Common Description and Measures for Attitude in Information Security for Organizations (pages 1-11)
Nooredin Etezady (Nova Southeastern University, Fort Lauderdale, USA)
Article 2
A Review on Cyberattacks and Their Preventive Measures (pages 12-29)
Farhana Haque Sumi (University of Liberal Arts Bangladesh, Dhaka, Bangladesh), Lokesh Dutta (Maharshi Dayanand University, Rohtak, India), Farhana Sarker (University of Liberal Arts Bangladesh, Dhaka, Bangladesh)
Article 3
Machine Learning for Web Proxy Analytics (pages 30-41)
Mark Maldonado (St. Mary's University, San Antonio, USA), Ayad Barsoum (St. Mary's University, San Antonio, USA)
Article 4
Electronic Health Records: A Literature Review of Cyber Threats and Security Measures (pages 42-49)
Donna S. McDermott (Robert Morris University, Moon, USA), Jessica L. Kamerer (Robert Morris University, Moon, USA), Andrew T. Birk (Robert Morris University, Moon, USA)
Article 5
Trial by Social Media: How Do You Find the Jury, Guilty or Not Guilty? (pages 50-61)
Jacqui Taylor (Bournemouth University, Poole, UK), Gemma Tarrant (Bournemouth University, Poole, UK)
Article 6
Cyber Investigations, A Law Enforcement Needs Assessment (pages 62-77)
Frank X. Hartle III (Robert Morris University, Moon, USA), Christopher Wydra (California University of Pennsylvania, California, USA)