以2000—2023年“Web of Science核心合集”中111篇与战争旅游研究高度相关的论文为基础,对战争旅游研究现状及成果进行系统性总结和梳理。研究发现:按照文献发表数量,战争旅游的发展可分为萌芽期(2000—2009年)、缓慢增长期(2010—2015...以2000—2023年“Web of Science核心合集”中111篇与战争旅游研究高度相关的论文为基础,对战争旅游研究现状及成果进行系统性总结和梳理。研究发现:按照文献发表数量,战争旅游的发展可分为萌芽期(2000—2009年)、缓慢增长期(2010—2015年)和快速增长期(2016年至今)3个阶段;战争旅游研究的方法主要采用定性研究,但定量研究和混合研究方法也逐渐受到研究者的重视;战争旅游的相关研究内容主要集中在战争旅游概念界定、战争旅游体验、战争旅游动机、战争旅游游客类别、战争旅游的功能、战争旅游目的地管理6个方面。最后,结合国外的研究经验,立足于中国的实际情况,就中国战争旅游地的实践发展提出建议,并对该领域的未来研究进行展望。展开更多
In recent years, web security has been viewed in the context of securing the web application layer from attacks by unauthorized users. The vulnerabilities existing in the web application layer have been attributed eit...In recent years, web security has been viewed in the context of securing the web application layer from attacks by unauthorized users. The vulnerabilities existing in the web application layer have been attributed either to using an inappropriate software development model to guide the development process, or the use of a software development model that does not consider security as a key factor. Therefore, this systematic literature review is conducted to investigate the various security vulnerabilities used to secure the web application layer, the security approaches or techniques used in the process, the stages in the software development in which the approaches or techniques are emphasized, and the tools and mechanisms used to detect vulnerabilities. The study extracted 519 publications from respectable scientific sources, i.e. the IEEE Computer Society, ACM Digital Library, Science Direct, Springer Link. After detailed review process, only 56 key primary studies were considered for this review based on defined inclusion and exclusion criteria. From the review, it appears that no one software is referred to as a standard or preferred software product for web application development. In our SLR, we have performed a deep analysis on web application security vulnerabilities detection methods which help us to identify the scope of SLR for comprehensively investigation in the future research. Further in this SLR considering OWASP Top 10 web application vulnerabilities discovered in 2012, we will attempt to categories the accessible vulnerabilities. OWASP is major source to construct and validate web security processes and standards.展开更多
文摘以2000—2023年“Web of Science核心合集”中111篇与战争旅游研究高度相关的论文为基础,对战争旅游研究现状及成果进行系统性总结和梳理。研究发现:按照文献发表数量,战争旅游的发展可分为萌芽期(2000—2009年)、缓慢增长期(2010—2015年)和快速增长期(2016年至今)3个阶段;战争旅游研究的方法主要采用定性研究,但定量研究和混合研究方法也逐渐受到研究者的重视;战争旅游的相关研究内容主要集中在战争旅游概念界定、战争旅游体验、战争旅游动机、战争旅游游客类别、战争旅游的功能、战争旅游目的地管理6个方面。最后,结合国外的研究经验,立足于中国的实际情况,就中国战争旅游地的实践发展提出建议,并对该领域的未来研究进行展望。
文摘In recent years, web security has been viewed in the context of securing the web application layer from attacks by unauthorized users. The vulnerabilities existing in the web application layer have been attributed either to using an inappropriate software development model to guide the development process, or the use of a software development model that does not consider security as a key factor. Therefore, this systematic literature review is conducted to investigate the various security vulnerabilities used to secure the web application layer, the security approaches or techniques used in the process, the stages in the software development in which the approaches or techniques are emphasized, and the tools and mechanisms used to detect vulnerabilities. The study extracted 519 publications from respectable scientific sources, i.e. the IEEE Computer Society, ACM Digital Library, Science Direct, Springer Link. After detailed review process, only 56 key primary studies were considered for this review based on defined inclusion and exclusion criteria. From the review, it appears that no one software is referred to as a standard or preferred software product for web application development. In our SLR, we have performed a deep analysis on web application security vulnerabilities detection methods which help us to identify the scope of SLR for comprehensively investigation in the future research. Further in this SLR considering OWASP Top 10 web application vulnerabilities discovered in 2012, we will attempt to categories the accessible vulnerabilities. OWASP is major source to construct and validate web security processes and standards.