نتایج جستجو برای: سایبرلوفینگ cyber loafing

تعداد نتایج: 16469  

Journal: :Computers in Human Behavior 2014
Christina F. Brown Michelle Kilpatrick Demaray Stephanie M. Secord

Cyber or electronic bullying is a growing problem among school-aged children and research on cyberbul-lying is still relatively young. The primary purposes of the current study were: (a) to investigate gender and grade level differences among cyber victims (b) to investigate the overlap between traditional victimization and cyber victimization and (c) to investigate the associations among cyber...

Journal: :DEStech Transactions on Social Science, Education and Human Science 2018

Journal: :CoRR 2017
Jonathan Z. Bakdash Steve Hutchinson Erin G. Zaroukian Laura Marusich Saravanan Thirumuruganathan Char Sample Blaine Hoffman Gautam Das

Cyber attacks endanger physical, economic, social, and political security. We use a Bayesian state space model to forecast the number of future cyber attacks. Cyber attacks were defined as malware detected by cyber analysts over seven years using cyber events (i.e., reports of malware attacks supported by evidence) at a large Computer Security Service Provider (CSSP). This CSSP protects a varie...

Abdullahi, Ahmad Rafie, Seyedzadeh Sani, Seyed Mehdi,

Background and Aim: Bullying is one of the most common problems among teenagers in many schools around the world, which is recently considered by researchers in the fields of psychology and even criminology as a traditional and cyber bullying. The purpose of this study is to investigate the rate of traditional and cyber bullying among male and female teenagers in the secondary schools of Herat...

2009
Ibrahim M. Baggili Ibrahim Baggili Marcus Rogers William Graziano Thomas Hacker Richard Mislan Gary R. Bertoline

Baggili, Ibrahim M. Ph.D. Purdue University, August 2009. Effects of anonymity, selfreported pre-employment integrity and self-reported antisocial behavior on self-reported cyber crime engagement: An exploratory study. Major Professor: Marcus Rogers. A key issue facing today’s society is the increase in cyber crimes. Cyber crimes pose threats to nations, organizations and individuals across the...

2012
Tridib Bandyopadhyay

Cyber insurance can be an effective instrument to transfer cyber risk and complement the benefits from technological controls that guard the IS (information and network) assets in organizations. This research attempts to identify the factors that could explain the proclivity of adoption of cyber insurance in managing cyber risk of an organization. Grounded on the context based TOE framework of ...

2014
Jamal Raiyn

Homeland security field deals with diverse subjects, audio processing, video surveillance, image detection, geolocation determination, and cyber attack detection. Audio processing and video surveillance area are significant for public places safety and land border area. However the big threat for homeland security is cyber attacks. Cyber terror attacks and cyber crime attacks may move over virt...

2017
Peyton Price Nicholas Leyba Mark Gondree Zachary Staples Thomas Parker

The concept of a common operational picture has been utilized by the military for situational awareness in warfare domains for many years. With the emergence of cyberspace as a domain, there is a necessity to develop doctrine and tools to enable situational awareness for key-decision makers. Our study analyzes key elements that define cyber situational awareness to develop a methodology to iden...

2017
Bruce McMillin Mo-Yuen Chow Jie Duan

1. Project Goals ● Develop a resilient cyber-physical control strategy for FREEDM system to secure the energy scheduling and physical operation: ○ Extending to cyber-physical security: Explore possible attacks on both energy scheduling and physical operation, analyze the impacts in terms of economic benefit and system stability. ○ Interaction between cyber/physical layer detection: Investigate ...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید