نتایج جستجو برای: سایبرلوفینگ cyber loafing
تعداد نتایج: 16469 فیلتر نتایج به سال:
The DARPA Cyber Panel program has funded research in defending mission-critical information systems from strategic coordinated attacks. This research spans many areas including novel sensors, alert correlation and reduction, visual correlation, mission impact assessment, and response. This paper describes the integration of Cyber Panel technologies from the different areas into an advanced cybe...
Allan Cook Cyber Security Centre, De Montfort University, Leicester, LE1 9BH, UK www.dmu.ac.uk allan.cook@ my365.dmu.ac.uk Richard Smith Cyber Security Centre, De Montfort University, Leicester, LE1 9BH, UK www.dmu.ac.uk [email protected] Leandros Maglaras Cyber Security Centre, De Montfort University, Leicester, LE1 9BH, UK www.dmu.ac.uk [email protected] Helge Janicke Cyber Security Cen...
A literature review on fear of crime suggests perceived crime seriousness, perceived risk of victimization, and victimization experience as the three major predictors for fear of crime. In the present study I test these factors on cyber crimes as their relationships with fear of cyber crime are generally unexplored in the literature. Precisely, four cyber crimes are chosen, including online sca...
The present study examined coping strategies for cyber victimization among 270 (130 women) emerging adults, and how these strategies related to cyber aggression one year later (Time 2). The most frequently utilized coping strategies among emerging adults were telling one’s friends and ignoring the aggressor. The coping strategies of telling no one, getting revenge against the aggressor, pretend...
Insecure cyber behavior of end users may expose their computers to cyber-attack. A first step to improve their cyber behavior is to identify their tendency toward insecure cyber behavior. Unfortunately, not much work has been done in this area. In particular, the relationship between end users cyber behavior and their personality traits is much less explored [27]. This paper presents a comprehe...
Introduction: Along with the transition from the digital era to the era of cyber-technology, medical professionals have been forced to use different conceptual systems to meet their informational and communicational needs. These emerging scientific concepts each have specific meaning which should be redefined in their own context so that they could be utilized in the conceptual systems of speci...
This paper puts forward a multi-level model, based on system dynamics methodology, to understand the impact of cyber crime on the financial sector. Consistent with recent findings, our results show that strong dynamic relationships, amongst tangible and intangible factors, affect cyber crime cost and occur at different levels of society and value network. Specifically, shifts in financial compa...
Background: Learning losses does not mean forgetting only curricular learning but slipping back of fundamental abilities that learner would have acquired during schooling. School closures in India severely disrupted processes children resulting and social gaps academic outcomes. Though school closure is a global phenomenon, its adverse effects on outcomes are unevenly distributed the society.Pu...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید