Page 110 - Read Online
P. 110

Chen. J Surveill Secur Saf 2020;1:102-5  I  http://dx.doi.org/10.20517/jsss.2020.26                                                               Page 103

               JOURNAL OF SURVEILLANCE, SECURITY AND SAFETY: WHY A NEW JOURNAL?
               While related Special Sections of existing journals have appeared regularly, research results in the fields
               of surveillance, security, and safety have been published in many different journals, creating a somewhat
               dispersed audience. In response, the Journal of Surveillance, Security and Safety (JSSS) has been badly
               needed as a platform for publishing research results in the foundations, methods, and mechanisms, with
               surveillance, security, and safety tending to have been to be treated separately.

               Surveillance involves relevant observation methods that aim at preventing or detecting crime behavior.
               Security, with its classic foundations in cryptography, involves issues related to data and privacy protection,
               intrusion detection, authentication, protocols, and reliable transaction, as well as other security-related
               fields. Safety is primarily defined as including the means designed to prevent inadvertent or hazardous
               operation. I am also certain that this publication will be of interest to everyone working in the general area
               of surveillance, security, and safety.


               The journal is the result of the dedication of many individuals who are selflessly willing to put in long hours
               of work in an attempt to give back to the community. We owe thanks to those who completed the initial
               work and those who will follow through in the next few years.


               WHAT IS SPECIAL IN THE FIRST ISSUE?
               The journal has an impressive opening in the first issue. These papers illustrate various studies that can
               advance our understanding of surveillance, security, and safety when considered in a forum.

                          [1]
               Shmidt et al.  in “Learning and unlearning from disasters: an analysis of the Virginia Tech, USA shooting
               and the Lion Air 610 Airline crash” provide an analysis about organizational learning and theories of
               learning from failures. This work attempts to stimulate organizational learning and improve organizational
               processes to mitigate disasters from happening again. I expect this work to continue and extend the
               proposed methodology to other cases in the fields of surveillance, security, and safety.

                       [2]
               Xu et al. ’s “Big data analytics of crime prevention and control based on image processing upon cloud
               computing” presents a cloud computing-based image processing technology to identify individual crimes
               and subject segmentation, which uses statistical methods to collect the characteristics of criminal behavior,
               addressing the issues of non-real-time observation of criminal behavior.

               In “A survey of domain name system vulnerabilities and attacks”, Kim and Reeves  efficiently analyzed the
                                                                                     [3]
               vulnerabilities of DNS and four categories of representative DNS attacks. I expect the defense mechanisms
               introduced in this paper will motivate greater participation in this effort.

                                                                                                        [4]
               “Stereo storage structure assisted one-way anonymous auditing protocol in e-health system” by Jiang et al.
               examines the challenges of the design of the storage structure in the cloud and the data integrity verification
               in the medical environment with clients’ privacy protection. A novel stereo storage structure-assisted one-
               way anonymous auditing protocol in the e-health system is proposed, which can implement the storage and
               fast search of medical data.

                                [5]
               Salmani and Barker ’s “Leakless Privacy-Preserving Multi-keyword Ranked Search over Encrypted Cloud
               Data” presents an efficient encrypted cloud data search service that employs the secure inner product
               similarity and chaining encryption notion and addresses the problem of leakless privacy-preserving multi-
               keyword ranked search over encrypted cloud data.


               Future issues will contain additional papers solicited for the first issues and the latest solicited papers of the
               journal. These papers will continue this trend, that is the first issue begins with high hope.
   105   106   107   108   109   110   111   112   113   114   115