نتایج جستجو برای: cyber ethics

تعداد نتایج: 111166  

2009
Christopher Beggs Matthew Warren

Terrorist groups are currently using information and communication technologies (ICTs) to orchestrate their conventional physical attacks. More recently, terrorists have been developing a new form of capability within the cyber-arena to coordinate cyber-based attacks. This paper identifies that cyber-terrorism capabilities are an integral, imperative, yet under-researched component in establish...

Journal: :PsychNology Journal 2011
Frank J. Stech Kristin E. Heckman Phil Hilliard Janice Redington Ballo

The concepts of deception, counter-deception, and deception detection in the cyber-space domain have been the subject of little systematic analysis. Our objective was to conduct scientometric analyses of these concepts in the cyber-space domain. We observed the following: Although various deceptive tactics are addressed in the cyber-security literature, it appears they are characterized more fr...

2016
JingMing Wang

At present, a rather big challenge to model cyber-physical systems is to stand for the interactions between physical level and cyber level. Researchers are faced with the trouble in the analysis of information security property of noninterference in cyber-physical systems because of the physical components and behavior appended to cyber components and systems. A new method is put forward with P...

2015
Janine S. Hiller Roberta S. Russell

Cybersecurity was a major topic of discussion at the 2015 World Economic Forum in Davos the Sony attack; huge data breaches at Target and Adobe; a 91% increase in targeted cyber-attacks; annual losses of over $400 billion; the exposure of 904 million personal data records; cyber-attacks on a Finnish bank, a South Korean credit bureau, a German factory’s industrial controls, and the Ukrainian go...

Journal: :Cyberpsychology, behavior and social networking 2013
Michelle F. Wright

Anonymity is considered a key motivator for cyber aggression, but few investigations have focused on the connection between anonymity and the subsequent engagement in aggression through the cyber context. The present longitudinal study utilized structural equation modeling to reveal indirect associations between two types of anonymity (i.e., punishment by authority figures and retaliation from ...

2000
Hyun Seung Yang Hyun-jin Park Yong-Jin Cho

A cyber-character is a kind of artificial life inhabiting a virtual world. To be a life form in the virtual world, cyber characters need sensors and control systems. The sensor system enables the cyber character to recognize not only the virtual world but also the real world in such a manner that it can respond to user's commands. The control system provides the cyber character with life-like b...

Journal: :Future Internet 2012
Dorothy E. Denning

This paper considers the impact of Stuxnet on cyber-attacks and cyber-defense. It first reviews trends in cyber-weapons and how Stuxnet fits into these trends. Because Stuxnet targeted an industrial control system in order to wreak physical damage, the focus is on weapons that target systems of that type and produce physical effects. The paper then examines the impact of Stuxnet on various doma...

Journal: :Educational Technology & Society 2012
Zi-Gang Ge

This study aims to compare the single cyber asynchronous learning approach with the blended cyber learning approach in distance English education. Two classes of 70 students participated in this study, which lasted one semester of about four months, with one class using the blended approach for their English study and the other only using the cyber asynchronous approach. Students’ final scores ...

2015
Christopher Beggs Matthew Warren

Terrorist groups are currently using information and communication technologies (ICTs) to orchestrate their conventional attacks. More recently, terrorists have been developing a new form of capability within the cyber-arena to coordinate cyber-based attacks. This chapter identifies that cyber-terrorism capabilities are an integral, imperative, yet under-researched component in establishing, an...

2014
Emilio Iasiello

In cyberspace attackers enjoy an advantage over defenders, which has popularized the concept of “active cyber defense”— offensive actions intended to punish or deter the adversary. This article argues active cyber defense is not a practical course of action to obtain tactical and strategic objectives. Instead, “aggressive cyber defense,” a proactive security solution, is a more appropriate opti...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید