نتایج جستجو برای: cyber ethics

تعداد نتایج: 111166  

2016
Marshall Kuypers Elisabeth Patè-Cornell

Organizations often record cyber security incidents to track employee workload, satisfy auditors, fulfil reporting requirements, or to analyze cyber risk. While security incident databases are often neglected, they contain invaluable information that can be leveraged to assess the threats, vulnerabilities, and impacts of cyber attacks, providing a detailed view of cyber risk in an organization....

2016
Kyriaki Fousiani Panagiota Dimitropoulou Michalis P Michaelides Stijn Van Petegem

Due to the progress in information technology, cyber-bullying is becoming one of the most common forms of interpersonal harm, especially among teenagers. The present study (N = 548) aimed to investigate the relation between perceived parenting style (in terms of autonomy support and psychological control) and cyber-bullying in adolescence. Thereby, the study tested for the intervening role of a...

2009
Qiu-Hong Wang Seung-Hyun Kim

Information security issues are characterized with interdependence. Particularly, cyber criminals can easily cross national boundaries and exploit jurisdictional limitations between countries. Thus, whether cyber attacks are spatially autocorrelated is a strategic issue for government authorities and a tactic issue for insurance companies. Through an empirical study of cyber attacks across 62 c...

Journal: :Future Internet 2016
Alexander Kosenkov

In this paper, an attempt is made to analyze the potential threats and consequences of cyber conflicts and, in particular, the risks of a global cyber conflict. The material is based on a comprehensive analysis of the nature of cyber conflict and its elements from both technical and societal points of view. The approach used in the paper considers the societal component as an essential part of ...

2016
Jingming Wang

At present, a rather big challenge to model cyber-physical systems is to stand for the interactions between physical level and cyber level. Researchers are faced with the trouble in the analysis of information security property of noninterference in cyber-physical systems because of the physical components and behavior appended to cyber components and systems. A new method is put forward with P...

2015
Surender Kumar M K Soni D K Jain

Cyber security has become a critical priority for electric utilities. With the increase in the use of intelligent measuring devices like PMUs and more advanced communications and information technology in smart grid, the overall attack surface has increased. Cyber attacks against synchrophasor system critical infrastructure are detrimental to the functioning of the society as a whole. This pape...

2015

This document outlines the benefits of a trusted cyber incident data repository that enterprise risk owners and insurers could use to anonymously share sensitive cyber incident data and is the first in a series of white papers. This paper outlines the potential benefits of a trusted cyber incident data repository that enterprise risk owners and insurers could use to anonymously share, store, ag...

2010
Yuan Hui Tsai Sheng-Wuu Joe

The issue of cyber trust has been scattered in several different fields, including computer science, information science and some social sciences. Although social informatics has been a subject of systematic analytical and critical research for more than three decades, previous research has rarely noted the importance of social informatics on cyber trust. Therefore, it is essential to establish...

2009
Norman Lee Johnson Tim Williams

How does the current planning and response to cyber threats compare to biological threats planning and response? How do the resources of each compare? Biothreats have been a concern for millennia, and humans systems have had significant time and funding to develop a mature response. In this paper we observe that by comparison, cyber response is still in a relatively immature stage, possibly com...

Journal: :CoRR 2015
Alexander Kott

Terms like "Science of Cyber" or "Cyber Science" have been appearing in literature with growing frequency, and influential organizations initiated research initiatives toward developing such a science even though it is not clearly defined. We propose to define the domain of the science of cyber security by noting the most salient artifact within cyber security -malicious software -and defining ...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید