نتایج جستجو برای: cyber risk

تعداد نتایج: 957999  

Journal: :CoRR 2012
Ranjan Pal Pan Hui

In recent years, researchers have proposed cyberinsurance as a suitable risk-management technique for enhancing security in Internet-like distributed systems. However, amongst other factors, information asymmetry between the insurer and the insured, and the inter-dependent and correlated nature of cyber risks have contributed in a big way to the failure of cyberinsurance markets. Security exper...

2012
Michael Robinson

Crime has typically converged with aspects of warfare. This symbiotic relationship further complicates the broad battle-space understanding for early warning vigilance or defensive and offensive maneuvers against nebulous networks and masked relationships of convenience or ideology. The asymmetric cyber domain platform as an adversary’s tool to combat a foe unconventionally in a criminal, haras...

Journal: :Journal of youth and adolescence 2013
Kathryn L Modecki Bonnie L Barber Lynette Vernon

Technologically mediated contexts are social arenas in which adolescents can be both perpetrators and victims of aggression. Yet, there remains little understanding of the developmental etiology of cyber aggression, itself, as experienced by either perpetrators or victims. The current study examines 3-year latent within-person trajectories of known correlates of cyber-aggression: problem behavi...

2015
Pema Choejey Chun Che Fung Kok Wai Wong David Murray

The main goal of e-government implementation is to improve the effectiveness, efficiency and quality of public service delivery using Information and Communication Technologies (ICT). However, its success is dependent on the provision of information security goals such as confidentiality, integrity, availability and trust. Therefore, cybersecurity is vital for the successful adoption of e-gover...

2014
Ping Wang Jia-Chi Liu

Defenders have developed various threat risk analysis schemes to recognize the intruder attack profile, identify the system weakness, and implement the security safeguards to protect the information asset from cyber-attacks. Attack trees (AT) technique play an important role to investigate the threat analysis problem to known cyber-attacks for risk assessment. For example, protection trees and ...

Sharafi , Shahin, Amirzadeh, Vahid, Manzari Tavakoli , Alireza, Salajegheh, Sanjar,

Purpose: Cyber social networks and cyberspace are like a double-edged sword that brings favorable and unfavorable consequences. The advantages cannot prevent us from neglecting its dangerous disadvantages that disregard the ethical principles and community values. The present research has been carried out to explain the factors related to the implementation of cyber social network policies in I...

2011
Michael Bachmann

Issues concerning computer security have received considerable academic attention in recent years and cyber security has become a top priority for many governments, organizations, and industries. Unfortunately, the attention devoted to cyber crime issues has focused primarily on the technical dimension of computer crime. Today, our knowledge about the persons behind the keyboards remains fragme...

Journal: :Elektrotechnik und Informationstechnik 2015
Ivo Friedberg Florian Skopik Roman Fiedler

With a major change in the attack landscape, away from well known attack vectors towards unique and highly tailored attacks, limitations of common ruleand signature-based security systems become more and more obvious. Novel security mechanisms can provide the means to extend existing solutions in order to provide a more sophisticated security approach. As critical infrastructures get increasing...

,

Background: Given the appropriateness of cyberspace and its interconnectedness, each country is expected to minimize the possibility of harmful actions by securing and continuously monitoring the Internet and the virtual world. Of course, part of this goal will be achieved through the adoption of appropriate national laws and, in part, through proper education of citizens and the development of...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید