نتایج جستجو برای: cyber ethics

تعداد نتایج: 111166  

2016
Allan Cook Richard Smith Leandros A. Maglaras Helge Janicke

Allan Cook Cyber Security Centre, De Montfort University, Leicester, LE1 9BH, UK www.dmu.ac.uk allan.cook@ my365.dmu.ac.uk Richard Smith Cyber Security Centre, De Montfort University, Leicester, LE1 9BH, UK www.dmu.ac.uk [email protected] Leandros Maglaras Cyber Security Centre, De Montfort University, Leicester, LE1 9BH, UK www.dmu.ac.uk [email protected] Helge Janicke Cyber Security Cen...

2018
Ricardo G Lugo Kirsi Helkala Benjamin J Knox Øyvind Jøsok Natalie M Lande Stefan Sütterlin

Background Technical advancement in military cyber defense poses increased cognitive demands on cyber officers. In the cyber domain, the influence of emotion on decision-making is rarely investigated. The purpose of this study was to assess psychophysiological correlation with perseverative cognitions during emotionally intensive/stressful situations in cyber military personnel. In line with pa...

2013
Jinsoo Shin Hanseong Son Gyunyoung Heo

Extensive use of digital systems and networks is causing the problem of the cyber security to safety related industries like research reactors. The aim of cyber security study, in this article, is to develop a cyber-security risk analysis model based on activityquality & Instrumentation & Control (I&C) architecture for the safety of nuclear industry. Activity-quality is a qualitative number sho...

Journal: :Computers & Security 2015
Michael Robinson Kevin I. Jones Helge Janicke

The topic of cyber warfare is a vast one, with numerous sub topics receiving attention from the research community. We first examine the most basic question of what cyber warfare is, comparing existing definitions to find common ground or disagreements. We discover that there is no widely adopted definition and that the terms cyber war and cyber warfare are not well enough differentiated. To ad...

Journal: :IJCWT 2013
Tuija Kuusisto Rauno Kuusisto

The purpose of this paper is to outline a methodology for figuring out what types of information shall be shared via strategic level communication to support cyber-security. With this methodology the key development issues required to create relevant strategic messages can be sorted out. The paper follows the system modeling approach and considers the cyber world as a complex adaptive system. F...

Journal: :Sustainability 2021

The focus in this paper is placed on shared responsibility and ethics health policy, specific to Internet of Things (IoT) devices healthcare systems. article assesses how the introduction IoT brings risks security medical justification for research emerges from opportunities emerging digital technologies services, but also creating a range new cyber infrastructure. Such concerns are often not v...

Journal: :IEEE open journal of the Industrial Electronics Society 2022

How to build a sustainable society in view of industrial electronics has been discussed from energy, information and communication technologies, cyber-physical systems (CPSs), other viewpoints. This paper presents cross-disciplinary that integrates the fields human factors, professional education, electronic on chip, resilience security for applications, technology ethics society, standards. Af...

2015
Michelle F. Wright Ikuko Aoyama Shanmukh V. Kamble Zheng Li Shruti Soudi Li Lei Chang Shu Lucie Corcoran

Significant advancements have been made in cyber aggression literature, with many studies revealing the consequences associated with adolescents’ involvement in these behaviors. Few studies have focused on cyber aggression involvement in China, India, and Japan. The present study examined differences in cyber aggression perpetration and victimization among 1637 adolescents living in China, Indi...

Journal: :Journal of youth and adolescence 2013
Janine M Zweig Meredith Dank Jennifer Yahner Pamela Lachman

To date, little research has documented how teens might misuse technology to harass, control, and abuse their dating partners. This study examined the extent of cyber dating abuse-abuse via technology and new media-in youth relationships and how it relates to other forms of teen dating violence. A total of 5,647 youth from ten schools in three northeastern states participated in the survey, of ...

2016
Timothy M. Braje TIMOTHY M. BRAJE

In response to the growing number and variety of cyber threats, the government, military, and industry are widely employing network emulation environments for cyber capability testing and cyber warfare training. These “cyber ranges” have been increasing in size and complexity to model the high-volume network traffic and sophisticated attacks seen on the Internet today. For cyber ranges to opera...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید