نتایج جستجو برای: cyber risk
تعداد نتایج: 957999 فیلتر نتایج به سال:
The Department of Homeland Security's Office of Cyber and Infrastructure Analysis (DHS/OCIA) produces Infrastructure Risk Assessments to provide an assessment of emerging risks to critical infrastructure. As technology pervades into our everyday lives, once simple devices have become smarter and more interconnected to the world around us. This technology is transforming our cities into what are...
BACKGROUND Traditional bullying victimization and the growing number of cyber-teasing victims during the last decade is a major public health concern. The objective of this study was to examine the relationship between students' experiences of traditional bullying victimization and cyber-teasing and the sociodemographic characteristics of a sample composed of college students in Spain. METHOD...
Recent works on Internet risk management have proposed the idea of cyber-insurance to eliminate risks due to security threats, which cannot be tackled through traditional means such as by using antivirus and antivirus softwares. In reality, an Internet user faces risks due to security attacks as well as risks due to non-security related failures (e.g., reliability faults in the form of hardware...
bullying is a kind of peers’ altercation which usually occurs in schools. it seems to be a universal phenomenon that can be observed almost in all classrooms. since the expansion of information and communication technologies, there have been social concerns related to negative effects of these networks, especially in adolescents. in this paper which documentary methodology by referring to execu...
The objective of this paper is to conduct a critical review of cybersecurity procedures and practices in the water distribution sector. Specifically, this paper provides a characterization of the current state of cybersecurity practice and risk management in drinking water systems. This characterization is critically important due to the number of cyber attacks that have occurred against water ...
The risk posed by terrorist use of cyber technology and terrorism have been great concern to politicians, decision makers, security officials. This article studies along with history cyber-terrorism. Moreover some concepts such as between cyber-crime, cyber-terrorism, cyber-warfare hactivism will be analysed. Furthermore, the challenges faced international organisations in tackling discussed; m...
Background and Objectives: The use of virtual networks has become a natural modern behavior, but the traumatic forms of their use have also received much attention in the last two decades. This study aimed at modelling structural relations of cyber-aggression based on perceived stress with the mediating role of virtual networks dependency in students of Mohaghegh Ardabili University in 2019. M...
Numerous industry studies discuss the economic effects of potentially extreme cyber incidents, with considerable variation in applied methodology and estimated costs. We implement a dynamic inoperability input–output model that allows consistent analysis comparison impacts resulting from six widely discussed risk scenarios. Our accounts for frequently omitted qualitative context scenarios to be...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید