نتایج جستجو برای: cyber ethics

تعداد نتایج: 111166  

2014
Shailesh Kumar Jha

Cyber Physical System (CPS) is collection of different computation component which collaborate with each other in order to control the physical entity. Cyber physical system has a far reaching effect in different area such as aerospace, automotive, chemical processes, civil infrastructure, energy, healthcare, manufacturing, transportation, entertainment, and consumer appliances. CPS in healthca...

2014
Robert S. Dewar

In the fi eld of cyber security, ill-defi ned concepts and inconsistently applied terminology are further complicating an already complex issue1. This causes diffi culties for policy-makers, strategists and academics. Using national cyber security strategies to support current literature, this paper undertakes three tasks with the goal of classifying and defi ning terms to begin the development...

ژورنال: ارگونومی 2020

Background and Aim: Nowadays, the healthcare and treatment sectorchr('39')s organizations are known as one of the most important pillars in the debate of public health. On the other, the psychological development of the experienced, knowledge-driven, competent, proactive and motivated, and empowered human resource taken into account as the most important competitive advantage for these organiza...

2014
Alexandru Stefanov Chen-Ching Liu

Electric power grids have been identified as critical infrastructures. They are increasingly dependent on Information and Communication Technologies (ICTs) for the operation and control of physical facilities. It can be envisioned that on top of the power infrastructure reside ICT layers that are coupled with the electric grids. As the ICT connectivity increases, so does the potential for cyber...

2015
Sven Herpig

With the public discussion mainly revolving around deterrence (either by denial or by punishment), there are actually a number of strategies which can be applied to cyber operations. A cyber strategy can be thought of as an umbrella for various individual cyber operations with the ultimate aim to achieve a strategic and / or political goal. Thus, cyber strategies can be defined as the developme...

2010
Mohammad Rasmi

Nowadays, cyber crimes are increasing and have affected large organizations with highly sensitive information. Consequently, the affected organizations spent more resources analyzing the cyber crimes rather than detecting and preventing these crimes. Network forensics plays an important role in investigating cyber crimes; it helps organizations resolve cyber crimes as soon as possible without i...

2003
Laura Tinnel O. Sami Saydjari Joshua W. Haines

The DARPA Cyber Panel program has funded research in defending mission-critical information systems from strategic coordinated attacks. This research spans many areas including novel sensors, alert correlation and reduction, visual correlation, mission impact assessment, and response. This paper describes the integration of Cyber Panel technologies from the different areas into an advanced cybe...

Journal: :فلسفه دین 0
فرح رامین دانشیار گروه فلسفۀ دانشکدۀ الهیات و معارف اسلامی، دانشگاه قم

this research is a new attempt in order to study the effect of evolution theory in the dimension of empirical ethics. in the contemporary area the evolutionary ethics is in the three branches: descriptive, prescriptive and meta-ethics. the descriptive evolutionary ethics tries to modify human’s ethical believes in the evolutionary aspect and achieves more share from two others part in this grou...

2016
Allan Cook Richard Smith Leandros A. Maglaras Helge Janicke

Allan Cook Cyber Security Centre, De Montfort University, Leicester, LE1 9BH, UK www.dmu.ac.uk allan.cook@ my365.dmu.ac.uk Richard Smith Cyber Security Centre, De Montfort University, Leicester, LE1 9BH, UK www.dmu.ac.uk [email protected] Leandros Maglaras Cyber Security Centre, De Montfort University, Leicester, LE1 9BH, UK www.dmu.ac.uk [email protected] Helge Janicke Cyber Security Cen...

2014
Szde Yu

A literature review on fear of crime suggests perceived crime seriousness, perceived risk of victimization, and victimization experience as the three major predictors for fear of crime. In the present study I test these factors on cyber crimes as their relationships with fear of cyber crime are generally unexplored in the literature. Precisely, four cyber crimes are chosen, including online sca...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید