نتایج جستجو برای: cyber ethics

تعداد نتایج: 111166  

Journal: :IJCIP 2012
Mike Burmester Emmanouil Magkos Vassilios Chrissikopoulos

This paper describes a framework for modeling the security of a cyber–physical system in which the behavior of the adversary is controlled by a threat model that captures – in a unified manner – the cyber aspects (with discrete values) and the physical aspects (with continuous values) of the cyber–physical system. In particular, the framework addresses combined (dependent) vector attacks and sy...

2015
Priya Singh Neeraj Saini Rajkumar Saini

Cyber Crimes are increasing day by day and are posing a great threat to internet users. This paper discusses the Cyber crime, its nature and types. Various tools and techniques used for cyber crime are evaluated in this paper. The paper also discusses cyber related laws under Indian Penal Code and their application to the cyber offences. With the discussion of cyber crimes, this paper proposes ...

Journal: :International review of information ethics 2022


 Informatics is the innovation driver of our time. From social media and artificial intelligence to autonomous cyber-physical systems: informatics-driven, digital products services permeate society in significant ways. Computer scientists, whether researchers or software developers, are shaping tomorrow's society. As a consequence, ethical, societal, practical reasons demand that students...

Journal: :Korean Journal of Sport Science 2023

PURPOSE The purpose of this study was to explore violence in the Korean sports world and examine reality past present by reflecting voices field academia through an in-depth analysis.METHODS First, a systematic literature analysis, essential problems that have been discussed were explored. Next, based on this, perception explored applying multi-case method analysis opinions experts field. Final...

2010
JALALUDDIN ABDUL MALEK

Informative Global Community Development Index (IGC) is an analysis method that looks at the development of the community currently residing in a intelligent city. From the understanding method, the development of intelligent cities based on a deontological ethics, the process of developing an intelligent city has to return maximum interest to the majority of the residing community in terms of ...

Journal: :International journal of multidisciplinary research and analysis 2022

Modern civilisation is characterised with unprecedented technological innovations that have led to major cultural shifts. Religion remains one of the primary phenomena has been impacted most by current digital revolution. Da’wah, being central tenets Islam, no exception this global cyberculture. In order remain relevant and address needs Muslim community, da’wah adapt dynamics digitization soci...

Journal: :IJCWT 2013
Martti Lehto

Threats in cyberspace can be classified in many ways. This is evident when you look at cyber security on a multinational level. One of the most common models is a threefold classification based on motivational factors. Most nations use this model as a foundation when creating a strategy to handle cyber security threats as it pertains to them. This paper will use the five level model: cyber acti...

2013
Martin R. Stytz Sheila B. Banks

ccurate simulation of cyber warfare can prepare decision-makers for its challenges. With cyber warfare, it is possible to control an adversaries’ information, target the portions of cyber space used for situational awareness and decision-making, lead the adversary to make desired decisions, and strike directly at the opposition’s mind. A cyber attack diminishes individual and group situational ...

2004
Peter Koslowski PETER KOSLOWSKI

Two concepts of virtual reality are competing in the cyber world, virtual reality as total adaptability and virtual reality as the simulation of possible worlds. Virtuality as adaptability in industrial production leads to a closer consideration of individual consumer demand and to de-massified production. It implies a stronger reference of production to the reality of consumer needs. The aesth...

2015
Arniyati Ahmad Christopher Johnson Timothy Storer

Abstract—Cyber exercises used to assess the preparedness of a community against cyber crises, technology failures and Critical Information Infrastructure (CII) incidents. The cyber exercises also called cyber crisis exercise or cyber drill, involved partnerships or collaboration of public and private agencies from several sectors. This study investigates Organisation Cyber Resilience (OCR) of p...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید