نتایج جستجو برای: سایبرلوفینگ cyber loafing

تعداد نتایج: 16469  

2015
Lidong Wang Cheryl Ann Alexander

Big Data can reduce the processing time of large volumes of data in the distributed computing environment using Hadoop. It also can predict potential cybersecurity breaches, help stop cyber attacks, and facilitate post-breach digital forensic analysis. This paper introduces Big Data applications in distributed analytics, general cybersecurity (general cyber threats, cyber attacks, and cyber sec...

2009
Rolf van Dick Patrick A. Tissington Guido Hertel

Purpose – The purpose of this paper is to challenge the assumption that process losses of individuals working in teams are unavoidable. The paper aims to challenge this assumption on the basis of social identity theory and recent research. Design/methodology/approach – The approach adopted in this paper is to review the mainstream literature providing strong evidence for motivation problems of ...

2011
Elfadil Sabeil Azizah Bt Abdul Manaf Zuraini Ismail Mohamed Abas

Cyber Forensics Investigations training or education is relatively new. The nature of Cyber Forensics is multidisciplinary, which enforces proliferations to diverse training programmes, from a handful of day's workshop to Masters Degree in Cyber Forensics. Thus, researchers found that the world lacks experts of Cyber Forensics due to some factors. Consequently, this paper focuses to analyze the...

The current Cyber-ethics in Western societies (and its followers in other societies) have been compiled based on secularist presupposition. This presupposition has different principles in comparison with the Islamic attitude which can lead one to take a different approach toward ethical problems. This paper is an attempt to propose principles of Islamic cyber-ethics upon which we can prepare an...

Journal: :IJCIP 2015
Adam Hahn Roshan K. Thomas Ivan Lozano Alvaro A. Cárdenas

This paper introduces a novel framework for understanding cyber attacks and the related risks to cyber-physical systems. The framework consists of two elements, a three-layered logical model and reference architecture for cyber-physical systems, and a meta-model of cyber-physical system attacks that is referred to as the cyber-physical system kill-chain. The layered reference architecture provi...

Journal: :I. J. Network Security 2016
Nurhashikin Mohd Salleh Siti Rahayu Selamat Robiah Yusof S. Shahrin

Nowadays, as the Internet user increased, the number of cyber threats is also increased. Internet has provided a medium for criminal to do the crime and become the target for cyber terrorist to spread their negative propaganda, and promote extreme activities. One of the crimes is cyber terrorism. Cyber terrorism became more sophisticated and it difficult to discover its activities. Hence, this ...

Journal: :IJCBPL 2013
Zheng Yan

Is the science of cyber behavior an emerging field or an emerged field? In other words, do we have little or substantial scientific knowledge of human behavior in the cyber space? For the majority of ordinary people and even some scientific researchers, they might hardly hear about the science of cyber behavior or even cyber behavior, thus it would not be a surprise that they might consider tha...

Journal: :IJCWT 2013
Tim J. Grant

Since 2008, several countries have published new national cyber security strategies that allow for the possibility of offensive cyber operations. Typically, national strategies call for the establishment of a cyber operations unit capable of computer network defence, exploitation, and, in some nations, attack. The cyber operations unit will be manned by professionals and operate under governmen...

2017

Synopsis: Cyber security refers to the ability to prepare for, react to and recover from incidents (i.e. attacks) initiated from an Internet-connected device against other devices or the information they contain. Recent developments in the cyber security field show an increasing number of industries becoming targets of cyber attacks. With vessels, terminals, ports and transport operators relyin...

2015
Sanjay Goel Yuan Hong

Cyber warfare has been simmering for a long time and has gradually morphed into a key strategic weapon in international conflicts. Doctrines of several countries consider cyber warfare capability as essential to gain strategic superiority or as a counterbalance to military inferiority. Countries are attempting to reach consensus on confidence building measures in cyber space while racing with e...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید