نتایج جستجو برای: سایبرلوفینگ cyber loafing
تعداد نتایج: 16469 فیلتر نتایج به سال:
Cyber or electronic bullying is a growing problem among school-aged children and research on cyberbul-lying is still relatively young. The primary purposes of the current study were: (a) to investigate gender and grade level differences among cyber victims (b) to investigate the overlap between traditional victimization and cyber victimization and (c) to investigate the associations among cyber...
Cyber attacks endanger physical, economic, social, and political security. We use a Bayesian state space model to forecast the number of future cyber attacks. Cyber attacks were defined as malware detected by cyber analysts over seven years using cyber events (i.e., reports of malware attacks supported by evidence) at a large Computer Security Service Provider (CSSP). This CSSP protects a varie...
Background and Aim: Bullying is one of the most common problems among teenagers in many schools around the world, which is recently considered by researchers in the fields of psychology and even criminology as a traditional and cyber bullying. The purpose of this study is to investigate the rate of traditional and cyber bullying among male and female teenagers in the secondary schools of Herat...
Baggili, Ibrahim M. Ph.D. Purdue University, August 2009. Effects of anonymity, selfreported pre-employment integrity and self-reported antisocial behavior on self-reported cyber crime engagement: An exploratory study. Major Professor: Marcus Rogers. A key issue facing today’s society is the increase in cyber crimes. Cyber crimes pose threats to nations, organizations and individuals across the...
Cyber insurance can be an effective instrument to transfer cyber risk and complement the benefits from technological controls that guard the IS (information and network) assets in organizations. This research attempts to identify the factors that could explain the proclivity of adoption of cyber insurance in managing cyber risk of an organization. Grounded on the context based TOE framework of ...
Homeland security field deals with diverse subjects, audio processing, video surveillance, image detection, geolocation determination, and cyber attack detection. Audio processing and video surveillance area are significant for public places safety and land border area. However the big threat for homeland security is cyber attacks. Cyber terror attacks and cyber crime attacks may move over virt...
The concept of a common operational picture has been utilized by the military for situational awareness in warfare domains for many years. With the emergence of cyberspace as a domain, there is a necessity to develop doctrine and tools to enable situational awareness for key-decision makers. Our study analyzes key elements that define cyber situational awareness to develop a methodology to iden...
1. Project Goals ● Develop a resilient cyber-physical control strategy for FREEDM system to secure the energy scheduling and physical operation: ○ Extending to cyber-physical security: Explore possible attacks on both energy scheduling and physical operation, analyze the impacts in terms of economic benefit and system stability. ○ Interaction between cyber/physical layer detection: Investigate ...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید