نتایج جستجو برای: cyber spaces

تعداد نتایج: 145945  

Journal: :IJCBPL 2015
Michelle F. Wright

The present study examined coping strategies for cyber victimization among 270 (130 women) emerging adults, and how these strategies related to cyber aggression one year later (Time 2). The most frequently utilized coping strategies among emerging adults were telling one’s friends and ignoring the aggressor. The coping strategies of telling no one, getting revenge against the aggressor, pretend...

2016
Anjila Tamrakar

Insecure cyber behavior of end users may expose their computers to cyber-attack. A first step to improve their cyber behavior is to identify their tendency toward insecure cyber behavior. Unfortunately, not much work has been done in this area. In particular, the relationship between end users cyber behavior and their personality traits is much less explored [27]. This paper presents a comprehe...

Introduction: Along with the transition from the digital era to the era of cyber-technology, medical professionals have been forced to use different conceptual systems to meet their informational and communicational needs. These emerging scientific concepts each have specific meaning which should be redefined in their own context so that they could be utilized in the conceptual systems of speci...

Journal: :Frontiers in Energy Research 2021

Cyber-Physical Systems (CPS) is the amalgamation of highly sophisticated sensors with physical spaces. These close conjunctions communication infrastructure intrinsically linking to society’s Critical Infrastructures (C.I.) are being witnessed more often in context Smart Grid (SG). As a backbone C.I., demonstrates ability precisely monitor large scale energy systems and designed order achieve c...

Journal: :Computers & Security 2014
Monica Lagazio Nazneen Sherif Mike Cushman

This paper puts forward a multi-level model, based on system dynamics methodology, to understand the impact of cyber crime on the financial sector. Consistent with recent findings, our results show that strong dynamic relationships, amongst tangible and intangible factors, affect cyber crime cost and occur at different levels of society and value network. Specifically, shifts in financial compa...

پایان نامه :وزارت علوم، تحقیقات و فناوری - دانشگاه شهید باهنر کرمان - دانشکده ریاضی و کامپیوتر 1389

in this thesis, at first we investigate the bounded inverse theorem on fuzzy normed linear spaces and study the set of all compact operators on these spaces. then we introduce the notions of fuzzy boundedness and investigate a new norm operators and the relationship between continuity and boundedness. and, we show that the space of all fuzzy bounded operators is complete. finally, we define...

2009
Peter M. Bednar Vasilios Katos

This paper is built upon the need that digital forensic investigators are required in many cases to investigate, understand and report on all kind of cyber-crime including novel security breaches which have not been performed in the past. When an investigator is faced with the challenge to explore a new threat, we argue that the inquiry dynamics do not differ from an organisational employee cha...

2008
Tridib Bandyopadhyay Vijay S Mookerjee Ram C Rao

[email protected][email protected][email protected] Abstract Firms often manage cyber risks first by investing in security technologies and then by purchasing cyber insurance to cover for residual risk. However, despite the increasing dependence of firms on information assets, a mature market for cyber insurance is yet to emerge. Lack of actuarial data, market inexperience and account...

Journal: :Computers in Human Behavior 2014
Jon-Chao Hong Lin Chien-Hou Ming-Yueh Hwang Ru-Ping Hu Yi-Ling Chen

Online cyber-bullying has become a frequent occurrence in organizations. To understand individual dispositions and the organizational factors that effect online cyber-bullying, the present study investigates the relationship among positive affect, the perceived organizational innovation climate, and psychological responses to cyber-bullying. The research samples for this study are staff members...

2016
Allan Cook Richard Smith Leandros A. Maglaras Helge Janicke

Allan Cook Cyber Security Centre, De Montfort University, Leicester, LE1 9BH, UK www.dmu.ac.uk allan.cook@ my365.dmu.ac.uk Richard Smith Cyber Security Centre, De Montfort University, Leicester, LE1 9BH, UK www.dmu.ac.uk [email protected] Leandros Maglaras Cyber Security Centre, De Montfort University, Leicester, LE1 9BH, UK www.dmu.ac.uk [email protected] Helge Janicke Cyber Security Cen...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید