نتایج جستجو برای: سایبرلوفینگ cyber loafing

تعداد نتایج: 16469  

2008
Tridib Bandyopadhyay Vijay S Mookerjee Ram C Rao

[email protected][email protected][email protected] Abstract Firms often manage cyber risks first by investing in security technologies and then by purchasing cyber insurance to cover for residual risk. However, despite the increasing dependence of firms on information assets, a mature market for cyber insurance is yet to emerge. Lack of actuarial data, market inexperience and account...

Journal: :Computers in Human Behavior 2014
Jon-Chao Hong Lin Chien-Hou Ming-Yueh Hwang Ru-Ping Hu Yi-Ling Chen

Online cyber-bullying has become a frequent occurrence in organizations. To understand individual dispositions and the organizational factors that effect online cyber-bullying, the present study investigates the relationship among positive affect, the perceived organizational innovation climate, and psychological responses to cyber-bullying. The research samples for this study are staff members...

2016
Allan Cook Richard Smith Leandros A. Maglaras Helge Janicke

Allan Cook Cyber Security Centre, De Montfort University, Leicester, LE1 9BH, UK www.dmu.ac.uk allan.cook@ my365.dmu.ac.uk Richard Smith Cyber Security Centre, De Montfort University, Leicester, LE1 9BH, UK www.dmu.ac.uk [email protected] Leandros Maglaras Cyber Security Centre, De Montfort University, Leicester, LE1 9BH, UK www.dmu.ac.uk [email protected] Helge Janicke Cyber Security Cen...

2018
Ricardo G Lugo Kirsi Helkala Benjamin J Knox Øyvind Jøsok Natalie M Lande Stefan Sütterlin

Background Technical advancement in military cyber defense poses increased cognitive demands on cyber officers. In the cyber domain, the influence of emotion on decision-making is rarely investigated. The purpose of this study was to assess psychophysiological correlation with perseverative cognitions during emotionally intensive/stressful situations in cyber military personnel. In line with pa...

2013
Jinsoo Shin Hanseong Son Gyunyoung Heo

Extensive use of digital systems and networks is causing the problem of the cyber security to safety related industries like research reactors. The aim of cyber security study, in this article, is to develop a cyber-security risk analysis model based on activityquality & Instrumentation & Control (I&C) architecture for the safety of nuclear industry. Activity-quality is a qualitative number sho...

Journal: :Computers & Security 2015
Michael Robinson Kevin I. Jones Helge Janicke

The topic of cyber warfare is a vast one, with numerous sub topics receiving attention from the research community. We first examine the most basic question of what cyber warfare is, comparing existing definitions to find common ground or disagreements. We discover that there is no widely adopted definition and that the terms cyber war and cyber warfare are not well enough differentiated. To ad...

Journal: :IJCWT 2013
Tuija Kuusisto Rauno Kuusisto

The purpose of this paper is to outline a methodology for figuring out what types of information shall be shared via strategic level communication to support cyber-security. With this methodology the key development issues required to create relevant strategic messages can be sorted out. The paper follows the system modeling approach and considers the cyber world as a complex adaptive system. F...

2015
Michelle F. Wright Ikuko Aoyama Shanmukh V. Kamble Zheng Li Shruti Soudi Li Lei Chang Shu Lucie Corcoran

Significant advancements have been made in cyber aggression literature, with many studies revealing the consequences associated with adolescents’ involvement in these behaviors. Few studies have focused on cyber aggression involvement in China, India, and Japan. The present study examined differences in cyber aggression perpetration and victimization among 1637 adolescents living in China, Indi...

Journal: :Journal of youth and adolescence 2013
Janine M Zweig Meredith Dank Jennifer Yahner Pamela Lachman

To date, little research has documented how teens might misuse technology to harass, control, and abuse their dating partners. This study examined the extent of cyber dating abuse-abuse via technology and new media-in youth relationships and how it relates to other forms of teen dating violence. A total of 5,647 youth from ten schools in three northeastern states participated in the survey, of ...

2016
Timothy M. Braje TIMOTHY M. BRAJE

In response to the growing number and variety of cyber threats, the government, military, and industry are widely employing network emulation environments for cyber capability testing and cyber warfare training. These “cyber ranges” have been increasing in size and complexity to model the high-volume network traffic and sophisticated attacks seen on the Internet today. For cyber ranges to opera...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید