منابع مشابه
Cyber Risk Exposure and Prospects for Cyber Insurance
This study draws attention to the ubiquitous and borderless nature of cybercrime. It examines the prospect of introducing customized cyber insurance policy in the Nigerian market. As secondary data was not available, the study conducted a survey by administering three sets of questionnaire to purposively selected top executives in four Trade Groups that rely heavily on Internet transactions for...
متن کاملcyber risk exposure and prospects for cyber insurance
this study draws attention to the ubiquitous and borderless nature of cybercrime. it examines the prospect of introducing customized cyber insurance policy in the nigerian market. as secondary data was not available, the study conducted a survey by administering three sets of questionnaire to purposively selected top executives in four trade groups that rely heavily on internet transactions for...
متن کاملRisk Management for Medical Devices
Medical devices developed for human application are used for diagnostic or treatment purposes. They may either be an instrument, an apparatus or a material. Moreover, these devices can be used for daily patient care as well as for medical scientific purposes. Risk management involves the identification, understanding, control, and prevention of failures when the medical devices are connected to...
متن کاملA System-Fault-Risk Framework for cyber attack classification
Computer and network systems fall victim to many cyber attacks of different forms. To reduce the risks of cyber attacks, an organization needs to understand and assess them, make decisions about what types of barriers or protection mechanisms are necessary to defend against them, and decide where to place such mechanisms. Understanding cyber attack characteristics (threats, attack activities, s...
متن کاملA Low-Energy Fast Cyber Foraging Mechanism for Mobile Devices
The ever increasing demands for using resource-constrained mobile devices for running more resource intensive applications nowadays has initiated the development of cyber foraging solutions that offloadparts or whole computational intensive tasks to more powerful surrogate stationary computers and run them on behalf of mobile devices as required. The choice of proper mix of mobile devices and s...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: Science
سال: 2015
ISSN: 0036-8075,1095-9203
DOI: 10.1126/science.347.6228.1323-b