نتایج جستجو برای: cyber space

تعداد نتایج: 509520  

With the development of information and communication technology, the need for the plaintiffs and the use of paper has decreased in the process of proceedings, but this type of trial has many legal and executive challenges. The present research in purpose view, applied and in terms of methodology is descriptive-analytic which seeks to analyze the legal and enforcement challenges of electronic j...

Mahdi Omrani, Masoud Shafiee, Siavash Khorsandi,

Cyber ​​threats have been extraordinary increased in recent years. Cyber ​​attackers, including government agencies or hackers, have made significant advances in the use of various tools for attacking target systems in some countries particularly on Islamic republic of Iran. The complexity of cyber threats and the devastating effects of them on critical systems highlights necessity of cyber thr...

Journal: :SA Journal of Information Management 2002

Journal: :Journal of Cybersecurity 2023

Abstract The purpose of the study is to determine main forms behavior participants political process in information space Ukraine and progressive informative countries world order achieve goals decisions that have a constructive or destructive function system, considering social, cultural, legal, ideological factors affect interaction during confrontation processes cyberspace. subject concept m...

2013
Renu Mary Daniel

Ensuring trust in cyber space has become an important and indispensable security challenge. Questions about trust in the physical space can be answered based on the factors namely closeness, time, analyzing actions and body language. But in the cyber space these factors are not readily available correctly to ensure and verify trust. Trust can also be established via a third party. But can we kn...

Journal: :حقوق خصوصی 0
جلیل قنواتی دانشیارگروه حقوق خصوصی، دانشکدة حقوق، پردیس فارابی، دانشگاه تهران حسین جاور استادیارگروه حقوق خصوصی، دانشگاه حضرت معصومه (س) علی تقی خانی دانشجوی دکتری حقوق خصوصی، پردیس فارابی دانشگاه تهران

application of ipr and the right of investigation about the claim of its infringement, need issuing some protective orders. mostly, this is for avoiding destruction of evidences which can be effective in proving the right of the plaintiff. the purpose of this study is to find out how can protect the third party’s right of privacy in the process of ipr enforcement. in common law, there are two i...

2012
Kwangjo Kim

Nuclear Power Plants (NPPs) become one of the most important infrastructures in providing efficient and non-interrupted electricity in a country using radioactive elements due to global warming and shortage of fossil resources. To provide the higher reliability and better performance with additional diagnostic capabilities in operating NPPs, digital Instrumentation and Control (I&C) systems hav...

2009
Byeong-Ho KANG

Ubiquitous Computing is considered an information technology that fuses real space and cyber space based on the networks among existing things in the real world. Advances in ubiquitous have been topics in so much researches. In this paper, we analyze security threats of mobile computing devices with an application of ubiquitous computing and we suggest their countermeasures in technical, manage...

2016
Leonardo Da Costa Santos Lenardo Chaves e Silva Ana Luisa Medeiros Hyggo Oliveira de Almeida Angelo Perkusich

Medical Cyber-Physical Systems (MCPS) integrate the cyber space and physical world elements for promoting support for health assurance activities. MCPS are life-critical systems, demanding a strong engineering effort to guarantee safety, what directly impacts on testing process. Testing MCPS using real patients is very expensive and complex, since their lives are involved. Thus, the use of pati...

2016
A. O. Isah J. K. Alhassan Sanjay Misra I. Idris Broderick Crawford Ricardo Soto

This research work is to bring to light, the danger posed by Cyber Crime in the world generally and Nigeria in particular with the hope that policy makers will work with the recommendations and practical combating framework design of this research work. In order to achieve this, the following approaches were adopted; survey of some common Cybercrime in Nigeria with the frequency of occurrence a...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید