نتایج جستجو برای: cyber risk

تعداد نتایج: 957999  

Journal: :Industrial Management and Data Systems 2022

Purpose This study aims to examine whether the cyber supply chain risk management (CSCRM) practices adopted by manufacturing firms contribute achieving (CSC) visibility. Studies have highlighted necessity of having visibility across interconnected chains. Thus, this examines extent CSCRM enabling CSC act as a mediator in performance. Design/methodology/approach A survey method was used obtain d...

2017
Riccardo Taormina Stefano Galelli Nils Ole Tippenhauer Elad Salomons Avi Ostfeld

This work contributes a modeling framework to characterize the effect of cyber-physical attacks (CPAs) on the hydraulic behavior of water distribution systems. The framework consists of an attack model and a MATLAB toolbox named epanetCPA. The former identifies the components of the cyber infrastructure (e.g., sensors or programmable logic controllers) that are potentially vulnerable to attacks...

Journal: :Management research review 2023

Purpose The purpose of this study is to examine how companies integrate cyber risk into their enterprise management practices. Data breaches have become commonplace, with thousands occurring each year, and some costing hundreds millions dollars. Consequently, has one the gravest risks facing organizations, attracted boardroom-level attention. On other hand, already manage many kinds difficult g...

2017
Lucy R. Betts Karin A. Spenser Sarah E. Gardner

Young people are spending increasing amounts of time using digital technology and, as such, are at great risk of being involved in cyber bullying as a victim, bully, or bully/victim. Despite cyber bullying typically occurring outside the school environment, the impact of being involved in cyber bullying is likely to spill over to school. Fully 285 11- to 15-year-olds (125 male and 160 female, M...

2010
Sonja Perren Julian Dooley Thérèse Shaw Donna Cross

BACKGROUND Cyber-bullying (i.e., bullying via electronic means) has emerged as a new form of bullying that presents unique challenges to those victimised. Recent studies have demonstrated that there is a significant conceptual and practical overlap between both types of bullying such that most young people who are cyber-bullied also tend to be bullied by more traditional methods. Despite the ov...

Journal: :CoRR 2017
Xiao Lu Dusit Niyato Hai Jiang Ping Wang H. Vincent Poor

Heterogeneous wireless networks (HWNs) composed of densely deployed base stations of different types with various radio access technologies have become a prevailing trend to accommodate ever-increasing traffic demand in enormous volume. Nowadays, users rely heavily on HWNs for ubiquitous network access that contains valuable and critical information such as financial transactions, e-health, and...

2013
Tianbo Lu Bing Xu Xiaobo Guo Lingling Zhao Feng Xie

Cyber-Physical System (CPS) is a system of system which integrates physical system with cyber capability in order to improve the physical performance. It is being widely used in areas closely related to national economy and people's livelihood, therefore CPS security problems have drawn a global attention and an appropriate risk assessment for CPS is in urgent need. In this paper, a security fr...

2010
Jason H. Li Xinming Ou Siva Raj Rajagopalan

© Uncertainty and Risk Management in Cyber Situational Awareness Jason Li, Xinming Ou, Raj Rajagopalan

Background and Objectives: Increasingly, cyberbullying has become a common phenomenon eroding the social media environment. The present study was conducted with the aim of determining the structural relationship pattern of cyber aggression based on self-control with the mediation of mobile phone addiction in adolescents. Materials and Methods: In this descriptive study, the statistical populat...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید