نتایج جستجو برای: cyber risk
تعداد نتایج: 957999 فیلتر نتایج به سال:
In recent years, security researchers have well established the fact that technical security solutions alone will not result in a robust cyberspace due to several issues jointly related to the economics and technology of computer security. In this regard some of them proposed cyber-insurance as a suitable risk management technique that has the potential to jointly align with the various incenti...
Internet users such as individuals and organizations are subject to different types of epidemic risks such as worms, viruses, and botnets. To reduce the probability of risk, an Internet user generally invests in self-defense mechanisms like antivirus and antispam software. However, such software does not completely eliminate risk. Recent works have considered the problem of residual risk elimin...
Abstract Financial technology innovations (Fintech) are changing the provision of traditional financial services. Although they bring with them various benefits and opportunities, also have weaknesses pose potential threats to systems. The paper examines latest developments in area Fintech outlines associated risks. It highlights vital role monetary authorities context policies initiatives requ...
As nuclear facilities are introducing digital systems, the cyber security becomes an emerging topic to be analyzed and resolved. The domestic and other nation's regulatory bodies notice this topic and are preparing an appropriate guidance. The nuclear industry where new construction or upgrade of I&C systems is planned is analyzing and establishing a cyber security. A risk-based analysis for th...
We aim to review available literature related to the telemonitoring of maternal health care for a comprehensive understanding of the roles of Medical Cyber-Physical-Systems (MCPS) as cutting edge technology in maternal risk factor management, and for understanding the possible research gap in the domain. In this regard, we search literature through google scholar and PubMed databases for publis...
To analyze strategic interactions arising in the cyber-security context, we develop a new reputation game model which an attacker can pretend to be normal user and defender may have announce attack detection at certain point of time without knowing whether he has been attacked. We show existence uniqueness sequential equilibrium Markov strategies, explicitly characterize players' strategies. Us...
A literature review on fear of crime suggests perceived crime seriousness, perceived risk of victimization, and victimization experience as the three major predictors for fear of crime. In the present study I test these factors on cyber crimes as their relationships with fear of cyber crime are generally unexplored in the literature. Precisely, four cyber crimes are chosen, including online sca...
PURPOSE To examine whether traditional and cyber bullying victimization were associated with adolescent's mental health problems and suicidal ideation at two-year follow-up. Gender differences were explored to determine whether bullying affects boys and girls differently. METHODS A two-year longitudinal study was conducted among first-year secondary school students (N = 3181). Traditional and...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید