نتایج جستجو برای: cyber spaces

تعداد نتایج: 145945  

Journal: :Computers & Security 2023

Cyber threat modeling is an analytical process that used for identifying the potential threats against a system and supporting selection of security requirements in early stages development life cycle. Thus, vital instrument realization secure-by-design principle. Despite being well-known practice software projects, its adaptation to cyber-physical systems still requires systematic elaboration....

Journal: :معماری و شهرسازی 0
هاشم هاشم نژاد دانشیار دانشکده معماری، دانشگاه علم و صنعت ایران سوران شنگه پور استادیار دانشکده معماری، دانشگاه ارومیه

along with the advent of recent communicative technologies, new cyber social networks have been emerged as the most influential line of interaction. this is a new world free from many of constraints and limitations of the physical world. it lacks weather, gravity, and geographical features; therefore it does not require addressing many of structures and necessities of the real world. in the vir...

Sharafi , Shahin, Amirzadeh, Vahid, Manzari Tavakoli , Alireza, Salajegheh, Sanjar,

Purpose: Cyber social networks and cyberspace are like a double-edged sword that brings favorable and unfavorable consequences. The advantages cannot prevent us from neglecting its dangerous disadvantages that disregard the ethical principles and community values. The present research has been carried out to explain the factors related to the implementation of cyber social network policies in I...

Journal: :The Electricity Journal 2021

The threat of high impact low probability (HILP) events on power distribution system is substantial but quite unpredictable. Enhancing the resilience grids against such requires solving combinatorial planning and operational problems in stochastic spaces, as well classifying conditions based high-dimensional input data. Since traditional mathematical solutions struggle with both uncertainty cur...

,

Background: Given the appropriateness of cyberspace and its interconnectedness, each country is expected to minimize the possibility of harmful actions by securing and continuously monitoring the Internet and the virtual world. Of course, part of this goal will be achieved through the adoption of appropriate national laws and, in part, through proper education of citizens and the development of...

Payab, Ehsan,

Today fast urban growth and personal vehicles in benefit of riders, causes serious drop of the quality of the urban environment and pedestrian spaces. Urban walking areas have vital role in citizen's public health. So different strategies used to their development. Observing traffic, environment, function problems in the renovated walkway of Eram of Hamadan, shows the problem of inadequate of t...

2009
Heum Park SunHo Cho Hyuk-Chul Kwon

We developed Cyber Forensics Ontology for the criminal investigation in cyber space. Cyber crime is classified into cyber terror and general cyber crime, and those two classes are connected with each other. The investigation of cyber terror requires high technology, system environment and experts, and general cyber crime is connected with general crime by evidence from digital data and cyber sp...

Journal: :Cyberpsychology, behavior and social networking 2012
Michelle F. Wright Yan Li

Using the general strain theory as a theoretical framework, the present longitudinal study investigated both face-to-face and cyber victimization in relation to cyber-displaced aggression. Longitudinal data were collected from 130 (70 women) young adults who completed measures assessing their victimization (face-to-face and cyber), cyber aggression, and both face-to-face and cyber-displaced agg...

ژورنال: رویش روانشناسی 2022

n this article, attempts to review with a developmental approach to cyberbullying, prevalence and risk and protective factors it. In the present narrative review article, which is done by the method of text research, articles about cyberbullying from 2010 to 2020 were published in the Google Scholar, ScienceDirect, Elsevier, Scopus, ProQuest, Springer, and PubMed databases were extracted and an...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید