نتایج جستجو برای: cyber insurance

تعداد نتایج: 67748  

Journal: :International Journal on Cyber Situational Awareness 2018

Journal: :Digital Investigation 2015
Amine Boukhtouta Djedjiga Mouheb Mourad Debbabi Omar Alfandi Farkhund Iqbal May El Barachi

In this paper, we investigate cyber-threats and the underlying infrastructures. More precisely, we detect and analyze cyber-threat infrastructures for the purpose of unveiling key players (owners, domains, IPs, organizations, malware families, etc.) and the relationships between these players. To this end, we propose metrics to measure the badness of different infrastructure elements using grap...

2017
Aniruddha Bagchi Tridib Bandyopadhyay

This article examines the role of espionage in defending against cyber-attacks on infrastructural firms. We analyze the problem using a game between a government, an infrastructural firm and an attacker. If the attacker successfully breaches the IT security defenses of the infrastructural firm, primary losses accrue to that firm while widespread collateral losses accrue to the rest of the econo...

2015
Stephen S. Yau Wei-Tek Tsai Kenji Takahashi Xiaoying Bai Helen D. Karatza

Today's world's societies are becoming more and more dependent on open networks such as the Internet where commercial activities, business transactions and government services are realized. This has led to the fast development of new cyber threats and numerous information security issues which are exploited by cyber criminals. The inability to provide trusted secure services in contemporary com...

Journal: :IJCWT 2012
Christian Czosseck Karlis Podins

Throughout history, mankind has developed and employed novel weapons and countermeasures. Both offensive and defensive weapon systems are limited by the laws of nature. Consequently, military concepts and doctrines were designed by implicitly taking into account those limitations. The digital age has introduced a new class of weaponry that poses an initial challenge to the common understanding ...

2011

By reading, you can know the knowledge and things more, not only about what you get from people to people. Book will be more trusted. As this cyber security cyber crime and cyber forensics applications and perspectives, it will really give you the good idea to be successful. It is not only for you to be success in certain life you can be successful in everything. The success can be started by k...

Journal: :I. J. Network Security 2016
Nurhashikin Mohd Salleh Siti Rahayu Selamat Robiah Yusof S. Shahrin

Nowadays, as the Internet user increased, the number of cyber threats is also increased. Internet has provided a medium for criminal to do the crime and become the target for cyber terrorist to spread their negative propaganda, and promote extreme activities. One of the crimes is cyber terrorism. Cyber terrorism became more sophisticated and it difficult to discover its activities. Hence, this ...

2008
Peter Fredriksson Martin Söderström

Do Unemployment Benefits Increase Unemployment? New Evidence on an Old Question We examine the relationship between unemployment benefits and unemployment using Swedish regional data. To estimate the effect of an increase in unemployment insurance (UI) on unemployment we exploit the ceiling on UI benefits. The benefit ceiling, coupled with the fact that there are regional wage differentials, im...

2016
K. Harald Gjermundrød Ioanna Dionysiou Marianne Baumberger Marc Pattinson

Cybersecurity has become an increasingly important aspect of public policy as Internet traffic increases and mounting cyber threats affect the operation of governments and businesses as well as the everyday life of citizens. Cybersecurity policy-making is at a turning point, becoming a national policy priority with explicit strategies in several countries. Even though the availability of high-l...

1996
Jonathan Gruber Laurie Bassi

Previous research on unemployment insurance (UI) has emphasized its disincentive effects for labor supply, but has largely ignored the insurance benefits provided by this public program. This paper directly assesses the consumption smoothing benefits of UI using two different sources of consumption data, the Panel Study of Income Dynamics (PSID) and the Consumer Expenditure Survey (CEX). The fo...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید