نتایج جستجو برای: cyber ethics

تعداد نتایج: 111166  

This study draws attention to the ubiquitous and borderless nature of cybercrime. It examines the prospect of introducing customized cyber insurance policy in the Nigerian market. As secondary data was not available, the study conducted a survey by administering three sets of questionnaire to purposively selected top executives in four Trade Groups that rely heavily on Internet transactions for...

Sharafi , Shahin, Amirzadeh, Vahid, Manzari Tavakoli , Alireza, Salajegheh, Sanjar,

Purpose: Cyber social networks and cyberspace are like a double-edged sword that brings favorable and unfavorable consequences. The advantages cannot prevent us from neglecting its dangerous disadvantages that disregard the ethical principles and community values. The present research has been carried out to explain the factors related to the implementation of cyber social network policies in I...

2000
Alexander Mürmann

We investigate the valuation of catastrophe insurance derivatives that are traded at the Chicago Board of Trade. By modeling the underlying index as a compound Poisson process we give a representation of no-arbitrage price processes using Fourier analysis. This characterization enables us to derive the inverse Fourier transform of prices in closed form for every fixed equivalent martingale meas...

Journal: :IACR Cryptology ePrint Archive 2011
Yuyin Yu Mingsheng Wang Yongqiang Li

It is observed that exchanging two values of a function over F2n , its differential uniformity and nonlinearity change only a little. Using this idea, we find permutations of differential 4-uniform over F26 whose number of the pairs of input and output differences with differential 4-uniform is 54, less than 63, which provides a solution for an open problem proposed by Berger et al. [1]. Moreov...

2009
Heum Park SunHo Cho Hyuk-Chul Kwon

We developed Cyber Forensics Ontology for the criminal investigation in cyber space. Cyber crime is classified into cyber terror and general cyber crime, and those two classes are connected with each other. The investigation of cyber terror requires high technology, system environment and experts, and general cyber crime is connected with general crime by evidence from digital data and cyber sp...

Journal: :Cyberpsychology, behavior and social networking 2012
Michelle F. Wright Yan Li

Using the general strain theory as a theoretical framework, the present longitudinal study investigated both face-to-face and cyber victimization in relation to cyber-displaced aggression. Longitudinal data were collected from 130 (70 women) young adults who completed measures assessing their victimization (face-to-face and cyber), cyber aggression, and both face-to-face and cyber-displaced agg...

ژورنال: رویش روانشناسی 2022

n this article, attempts to review with a developmental approach to cyberbullying, prevalence and risk and protective factors it. In the present narrative review article, which is done by the method of text research, articles about cyberbullying from 2010 to 2020 were published in the Google Scholar, ScienceDirect, Elsevier, Scopus, ProQuest, Springer, and PubMed databases were extracted and an...

2001
Tomoko Itao Tetsuya Nakamura Masato Matsuo Tatsuya Suda Tomonori Aoyama

In this paper, we describe Jack-in-the-Net (Ja-Net), a framework to achieve adaptive service composition in a large scale, open network environment. In Ja-Net, a service is implemented by a collection of cyber-entities and provided through cooperative interaction of cyber-entities. Cyber-entities communicate with each other using Ja-Net ACL (Agent Communication Language) and establish relations...

2015
Johanna Hänninen Tuure Tuunanen Tero Vartiainen

This paper focuses on value co-creation in the context of cyber-physical systems (CPSs). We investigate how value is co-created in the mining and construction industry, where the intelligent equipment are examples of CPSs. We take an interpretive research approach and study a global corporation, which manufactures tools and equipment for the mining and construction industry. The data collection...

2012
Nick Redfern

In this paper we analyse the editing of ITV news bulletins using robust statistics to describe the distribution of shot lengths and its editing structure. Commonly cited statistics of film style such as the mean and variance do not accurately describe the style of a motion picture and reflect the influence of a small number of extreme values. Analysis based on such statistics will inevitably le...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید