نتایج جستجو برای: سایبرلوفینگ cyber loafing

تعداد نتایج: 16469  

Journal: :IJCWT 2013
Martti Lehto

Threats in cyberspace can be classified in many ways. This is evident when you look at cyber security on a multinational level. One of the most common models is a threefold classification based on motivational factors. Most nations use this model as a foundation when creating a strategy to handle cyber security threats as it pertains to them. This paper will use the five level model: cyber acti...

Journal: :The Proceedings of the Annual Convention of the Japanese Psychological Association 2018

2013
Martin R. Stytz Sheila B. Banks

ccurate simulation of cyber warfare can prepare decision-makers for its challenges. With cyber warfare, it is possible to control an adversaries’ information, target the portions of cyber space used for situational awareness and decision-making, lead the adversary to make desired decisions, and strike directly at the opposition’s mind. A cyber attack diminishes individual and group situational ...

2015
Arniyati Ahmad Christopher Johnson Timothy Storer

Abstract—Cyber exercises used to assess the preparedness of a community against cyber crises, technology failures and Critical Information Infrastructure (CII) incidents. The cyber exercises also called cyber crisis exercise or cyber drill, involved partnerships or collaboration of public and private agencies from several sectors. This study investigates Organisation Cyber Resilience (OCR) of p...

Journal: :حقوق اسلامی 0
امیرحسین جلالی فراهانی کارشناس ارشد حقوق کیفری و جرم‎شناسی، پژوهشگر در حقوق کیفری سایبری

0

2011
P. Danquah

The Space Transition Theory (Jaishankar 2008) presupposes that people behave differently in the cyber world from the physical world amongst other postulates that seek to explain cyber criminal behavioural patterns. (Wall 2001) categorized cyber crime into the four main types of cyber trespass, cyber deception and theft, cyber pornography and cyber violence. This research sought test the postula...

2008
M. E. Corrigan E. R. Loe M. J. Quinn

One hundred eighty-one Boer-sired goat kids from dams of predominantly Spanish breeding (17.6 ± 2.34 kg initial BW; 177 wethers, 4 doelings) were used to determine optimum inclusion level of concentrate in diets fed to goats in confinement. Effects of elevated loafing areas on performance were also examined. Goats were blocked by weight (2 blocks per treatment) and randomly assigned to 1 of 12 ...

Journal: :International Journal of Electrical and Computer Engineering (IJECE) 2015

2011
N. Sridhar D. Lalitha Bhaskari P. S. Avadhani

As threats against digital assets have risen and there is necessitate exposing and eliminating hidden risks and threats. The ability of exposing is called “cyber forensics.” Cyber Penetrators have adopted more sophistical tools and tactics that endanger the operations of the global phenomena. These attackers are also using anti-forensic techniques to hide evidence of a cyber crime. Cyber forens...

2011
Yong-Dal Shin

In this paper, we presented a new model for cyber crime investigation procedure which is as follows: readiness phase, consulting with profiler, cyber crime classification and investigation priority decision, damaged cyber crime scene investigation, analysis by crime profiler, suspects tracking, injurer cyber crime scene investigation, suspect summon, cyber crime logical reconstruction, writing ...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید