Civilians as Lawful Objects of Attack on Cyberspace

نویسندگان

چکیده

برای دانلود باید عضویت طلایی داشته باشید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

the effect of teaching reading as whole text task and paragraph task on efl learners speaking

abstract the present study was conducted to investigate the effectiveness of a rather newly developed method in language teaching that is the use of paragraph reading task and whole reading task and their effects on improving efl learner’s speaking ability. to fulfill the purpose of the study, first 90 participants studying their course at sa eedi high school in tehran were chosen by means of ...

15 صفحه اول

Reflections on Cyberspace as the New "Wired World of Education"

Developments in Information Technologies (ITs) like the Internet have transformed information exchange. Moreover, since information exchange and analysis are key aspects of the learning experience, these developments have had an important impact on education. Within this context, the important question concerns the sort of educational relationships that exist (or fail to exist) when information...

متن کامل

Re-visualizing Cyberspace: Using Quasi Objects for Spatial Definitions

The definition and visualization of cyberspace are an ambiguity. The creator of cyberspace defined cyberspace properties as being a space and a non-space and to appear as a ‘consensual hallucination’. Most understandings of the Cyberspace tend to begin with a particular physical space centrist viewpoint that applies physical space models and expectations of one space to another (physical space ...

متن کامل

Repetition Pattern Attack on Multi-word-containing SecureString 2.0 Objects

Cloud computing appeals to private individuals and particularly enterprises at a progressive rate, but a noticeable percentage of them refuse it due to mistrust or missing commitment to security. The cryptosystem SecureString 2.0 was designed to outweigh these deficits through the support of blind computations on character strings. Repetition pattern attacks count among the most hazardous enemi...

متن کامل

Towards Compliance Checking between Business Process Models and Lawful States of Objects

We address the existing gap between business process models and lawful states of business objects. This gap hinders compliance of business process models with internally and externally imposed regulations. Existing modelling methods such as BPMN and ArchiMate lack an explicitly declarative approach for capturing flow of business objects, their states and laws of state transitions. Such deficien...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: Institute for Legal Studies Chonnam National University

سال: 2017

ISSN: 1738-6233

DOI: 10.38133/cnulawreview.2017.37.1.297