نتایج جستجو برای: cyber risk

تعداد نتایج: 957999  

2015

The Department of Homeland Security's Office of Cyber and Infrastructure Analysis (DHS/OCIA) produces Infrastructure Risk Assessments to provide an assessment of emerging risks to critical infrastructure. As technology pervades into our everyday lives, once simple devices have become smarter and more interconnected to the world around us. This technology is transforming our cities into what are...

2016
Francisco Caravaca Sánchez María Falcón Romero Javier Navarro-Zaragoza Aurelio Luna Ruiz-Cabello Oriali Rodriges Frantzisko Aurelio Luna Maldonado

BACKGROUND Traditional bullying victimization and the growing number of cyber-teasing victims during the last decade is a major public health concern. The objective of this study was to examine the relationship between students' experiences of traditional bullying victimization and cyber-teasing and the sociodemographic characteristics of a sample composed of college students in Spain. METHOD...

2011
Ranjan Pal Leana Golubchik Konstantinos Psounis

Recent works on Internet risk management have proposed the idea of cyber-insurance to eliminate risks due to security threats, which cannot be tackled through traditional means such as by using antivirus and antivirus softwares. In reality, an Internet user faces risks due to security attacks as well as risks due to non-security related failures (e.g., reliability faults in the form of hardware...

Journal: :مطالعات و تحقیقات اجتماعی ایران 0
اسماعیل سعدی پور اسماعیل سعدی پور، دانشیار دانشگاه علامه طباطبایی

bullying is a kind of peers’ altercation which usually occurs in schools. it seems to be a universal phenomenon that can be observed almost in all classrooms. since the expansion of information and communication technologies, there have been social concerns related to negative effects of these networks, especially in adolescents. in this paper which documentary methodology by referring to execu...

2015
Vikram M. Rao

The objective of this paper is to conduct a critical review of cybersecurity procedures and practices in the water distribution sector. Specifically, this paper provides a characterization of the current state of cybersecurity practice and risk management in drinking water systems. This characterization is critically important due to the number of cyber attacks that have occurred against water ...

Journal: : 2021

The risk posed by terrorist use of cyber technology and terrorism have been great concern to politicians, decision makers, security officials. This article studies along with history cyber-terrorism. Moreover some concepts such as between cyber-crime, cyber-terrorism, cyber-warfare hactivism will be analysed. Furthermore, the challenges faced international organisations in tackling discussed; m...

Background and Objectives: The use of virtual networks has become a natural modern behavior, but the traumatic forms of their use have also received much attention in the last two decades. This study aimed at modelling structural relations of cyber-aggression based on perceived stress with the mediating role of virtual networks dependency in students of Mohaghegh Ardabili University in 2019. M...

Journal: :Frontiers in Bioengineering and Biotechnology 2019

Journal: :International Journal of Computer and Information Technology(2279-0764) 2021

Journal: :The North American Actuarial Journal 2022

Numerous industry studies discuss the economic effects of potentially extreme cyber incidents, with considerable variation in applied methodology and estimated costs. We implement a dynamic inoperability input–output model that allows consistent analysis comparison impacts resulting from six widely discussed risk scenarios. Our accounts for frequently omitted qualitative context scenarios to be...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید