نتایج جستجو برای: cyber insurance

تعداد نتایج: 67748  

2015
Sanjay Goel Yuan Hong

Cyber warfare has been simmering for a long time and has gradually morphed into a key strategic weapon in international conflicts. Doctrines of several countries consider cyber warfare capability as essential to gain strategic superiority or as a counterbalance to military inferiority. Countries are attempting to reach consensus on confidence building measures in cyber space while racing with e...

2010
Åsa Tjulin

.................................................................................................................. 1 SVENSK SAMMANFATTNING ................................................................................ 3 LIST OF PAPERS ........................................................................................................ 6 INTRODUCTION............................................

2014
Ajita Atreya Susana Ferreira Erwann Michel-Kerjan

Benefiting from access to detailed data on the federally run National Flood Insurance Program for the entire state of Georgia, USA, we analyze residential flood insurance purchasing behavior in that state over more than three decades (1978–2010). The demand for flood insurance on an extensive margin, based on take-up rates, is found to be relatively price inelastic. Aligned with the behavioral ...

Journal: :Computers in Human Behavior 2014
Christina F. Brown Michelle Kilpatrick Demaray Stephanie M. Secord

Cyber or electronic bullying is a growing problem among school-aged children and research on cyberbul-lying is still relatively young. The primary purposes of the current study were: (a) to investigate gender and grade level differences among cyber victims (b) to investigate the overlap between traditional victimization and cyber victimization and (c) to investigate the associations among cyber...

2002
András Belokosztolszki David Eyers

OASIS is a distributed RBAC implementation with many extensions. Sound policy design will permit OASIS to protect the distributed resources whose access privileges it controls. However, through operating in a distributed environment, the underlying OASIS infrastructure is open to a number of potential attacks. This paper identifies three main classes of such attack and introduces techniques to ...

Journal: :International Journal on Cyber Situational Awareness 2021

2015
Priya Singh Neeraj Saini Rajkumar Saini

Cyber Crimes are increasing day by day and are posing a great threat to internet users. This paper discusses the Cyber crime, its nature and types. Various tools and techniques used for cyber crime are evaluated in this paper. The paper also discusses cyber related laws under Indian Penal Code and their application to the cyber offences. With the discussion of cyber crimes, this paper proposes ...

2009
James S. Okolica J. Todd Gilbert L. Peterson Robert F. Mills Michael W. Haas

In both military and commercial settings, the awareness of Cyber attacks and the effect of those attacks on the mission space of an organization has become a targeted information goal for leaders and commanders at all levels. We present in this paper a defining framework to understand situational awareness (SA)—especially as it pertains to the Cyber domain—and propose a methodology for populati...

Journal: :Ekonomika ta deržava 2022

У статті уточнено теоретико-методичні основи щодо визначення змісту та витоків поняття "кіберризик", наведено авторську конструкцію тлумачення за обраними критеріями. Визначено зміст основні завдання кіберстрахування як ефективного інструменту фінансування втрат наслідками кіберризиків. Виявлено проаналізовано особливості розвитку в Україні розвинених країнах світу. Узагальнено структуровано ха...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید