نتایج جستجو برای: cyber ethics

تعداد نتایج: 111166  

Journal: :IJCIP 2015
Adam Hahn Roshan K. Thomas Ivan Lozano Alvaro A. Cárdenas

This paper introduces a novel framework for understanding cyber attacks and the related risks to cyber-physical systems. The framework consists of two elements, a three-layered logical model and reference architecture for cyber-physical systems, and a meta-model of cyber-physical system attacks that is referred to as the cyber-physical system kill-chain. The layered reference architecture provi...

Journal: :I. J. Network Security 2016
Nurhashikin Mohd Salleh Siti Rahayu Selamat Robiah Yusof S. Shahrin

Nowadays, as the Internet user increased, the number of cyber threats is also increased. Internet has provided a medium for criminal to do the crime and become the target for cyber terrorist to spread their negative propaganda, and promote extreme activities. One of the crimes is cyber terrorism. Cyber terrorism became more sophisticated and it difficult to discover its activities. Hence, this ...

Journal: :IJCBPL 2013
Zheng Yan

Is the science of cyber behavior an emerging field or an emerged field? In other words, do we have little or substantial scientific knowledge of human behavior in the cyber space? For the majority of ordinary people and even some scientific researchers, they might hardly hear about the science of cyber behavior or even cyber behavior, thus it would not be a surprise that they might consider tha...

Journal: :IJCWT 2013
Tim J. Grant

Since 2008, several countries have published new national cyber security strategies that allow for the possibility of offensive cyber operations. Typically, national strategies call for the establishment of a cyber operations unit capable of computer network defence, exploitation, and, in some nations, attack. The cyber operations unit will be manned by professionals and operate under governmen...

2017

Synopsis: Cyber security refers to the ability to prepare for, react to and recover from incidents (i.e. attacks) initiated from an Internet-connected device against other devices or the information they contain. Recent developments in the cyber security field show an increasing number of industries becoming targets of cyber attacks. With vessels, terminals, ports and transport operators relyin...

2015
Sanjay Goel Yuan Hong

Cyber warfare has been simmering for a long time and has gradually morphed into a key strategic weapon in international conflicts. Doctrines of several countries consider cyber warfare capability as essential to gain strategic superiority or as a counterbalance to military inferiority. Countries are attempting to reach consensus on confidence building measures in cyber space while racing with e...

2010
Peeter LORENTS

In recent years there have been a number of international conflicts that have been mirrored by a parallel campaign of hostile actions in cyberspace. This, in turn, has prompted various attempts to analyze the phenomenon and explain the threat to the wider public. Unfortunately, however, the reports and analysis are often confusing and can include rather arbitrary use of various cyber “buzz word...

Journal: :Journal of Information, Law and Technology 2009
Dejo Olowu

As the world marches deeper into the unknown passageway of digital revolution, it is becoming apparent that the tremendous benefits of the internet age are being challenged by the formidable menace of cyber-crime, not the least in the African region. While African States vary in the degree to which their economies and peoples are affected by cyber-crime, there is no gainsaying the fact that the...

Journal: :Fikrah: jurnal ilmu aqidah dan studi keagamaan 2021

<p><span lang="EN-US">The Covid-19 pandemic has accelerated the process of human migration from real world to virtual (cyber). One impacts is emergence phenomenon cyber religion. As one parties responsible for literacy its citizens in this regard, government, through role Ministry Communication and Information, then initiated National Digital Literacy Program, which based on four pi...

2016
Li Qiang Yang Ze - Ming Liu Bao - Xu Jiang Zheng - Wei

With the increasing complexity of cyberspace security, the cyber-attack attribution has become an important challenge of the security protection systems. The difficult points of cyber-attack attribution were forced on the problems of huge data handling and key data missing. According to this situation, this paper presented a reasoning method of cyber-attack attribution based on threat intellige...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید