نتایج جستجو برای: cyber bulling

تعداد نتایج: 16294  

Journal: :J. UCS 2009
Hai-Cheng Chu Der-Jiunn Deng Han-Chieh Chao Yueh-Min Huang

It is an urgent, imminent and present danger that we have to focus on the traditional terrorists, who are transforming ICT into the modern attacking tools that can devastate the metropolitan areas with the deconstruction of critical infrastructures via the computer network using state-of-the-art hacking and cracking technologies. The cyber terrorists could inflict catastrophic loss or damage on...

2012
Marthie Grobler Joey Jansen van Vuuren Louise Leenen

Cyber security is an important aspect of National Security and the safekeeping of a Nation's constituency and resources. In South Africa, the focus on cyber security is especially prominent since many geographical regions are incorporated into the global village in an attempt to bridge the digital divide. This article reflects on current research and implementation done in South Africa with reg...

2015
Lawrence A. Gordon Martin P. Loeb William Lucyshyn Lei Zhou

Cyber security breaches inflict costs to consumers and businesses. The possibility also exists that a cyber security breach may shut down an entire critical infrastructure industry, putting a nation’s whole economy and national defense at risk. Hence, the issue of cyber security investment has risen to the top of the agenda of business and government executives. This paper examines how the exis...

2010
Sonja Perren Julian Dooley Thérèse Shaw Donna Cross

BACKGROUND Cyber-bullying (i.e., bullying via electronic means) has emerged as a new form of bullying that presents unique challenges to those victimised. Recent studies have demonstrated that there is a significant conceptual and practical overlap between both types of bullying such that most young people who are cyber-bullied also tend to be bullied by more traditional methods. Despite the ov...

2015
Farzan Kolini Lech J. Janczewski

Cyber attacks have significantly increased over the last few years, where the attackers are highly skilled, more organized and supported by other powerful actors to devise attacks towards specific targets. To aid the development of a strategic plan to defend against emerging attacks, we present a high-level taxonomy along with a cyber defense model to address the interaction and relationships b...

2016
Crystal Lin Johnson LIN JOHNSON CRYSTAL JOHNSON Terry Kinney

AN EXAMINATION OF THE PRIMARY AND SECONDARY EFFECTS OF CYBER-BULLYING: DEVELOPMENT AND TESTING OF A CYBER-BULLYINGMODERATOR/MEDIATOR MODELby CRYSTAL LIN JOHNSONMay 2011 Advisor: Dr. Terry KinneyMajor: Communication StudiesDegree: Doctor of PhilosophyThis study examined cyber-bullying as a social transgression and the potentially negativeeffects it has on indi...

Journal: :CoRR 2017
Xiao Lu Dusit Niyato Hai Jiang Ping Wang H. Vincent Poor

Heterogeneous wireless networks (HWNs) composed of densely deployed base stations of different types with various radio access technologies have become a prevailing trend to accommodate ever-increasing traffic demand in enormous volume. Nowadays, users rely heavily on HWNs for ubiquitous network access that contains valuable and critical information such as financial transactions, e-health, and...

2013

It is no surprise that research on cyber behavior has increasingly gained the attention of various stakeholders ranging from legislative policy makers to school administers, from teachers to parents, from mass media to communities, and from researchers to professional practitioners such as counselors, social workers, and school psychologists (Zheng, Burrow-Sanchez, Donnelly, Call, & Drew, 2010)...

2013

It is no surprise that research on cyber behavior has increasingly gained the attention of various stakeholders ranging from legislative policy makers to school administers, from teachers to parents, from mass media to communities, and from researchers to professional practitioners such as counselors, social workers, and school psychologists (Zheng, Burrow-Sanchez, Donnelly, Call, & Drew, 2010)...

2007
Dan Shen

Game Theoretic Solutions to Cyber Attack and Network Defense Problems There are increasing needs for research in the area of cyber situational awareness. The protection and defense against cyber attacks to computer network is becoming inadequate as the hacker knowledge sophisticates and as the network and each computer system become more complex. Current methods for alert correlation to detect ...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید