نتایج جستجو برای: cyber bulling
تعداد نتایج: 16294 فیلتر نتایج به سال:
It is an urgent, imminent and present danger that we have to focus on the traditional terrorists, who are transforming ICT into the modern attacking tools that can devastate the metropolitan areas with the deconstruction of critical infrastructures via the computer network using state-of-the-art hacking and cracking technologies. The cyber terrorists could inflict catastrophic loss or damage on...
Cyber security is an important aspect of National Security and the safekeeping of a Nation's constituency and resources. In South Africa, the focus on cyber security is especially prominent since many geographical regions are incorporated into the global village in an attempt to bridge the digital divide. This article reflects on current research and implementation done in South Africa with reg...
Cyber security breaches inflict costs to consumers and businesses. The possibility also exists that a cyber security breach may shut down an entire critical infrastructure industry, putting a nation’s whole economy and national defense at risk. Hence, the issue of cyber security investment has risen to the top of the agenda of business and government executives. This paper examines how the exis...
BACKGROUND Cyber-bullying (i.e., bullying via electronic means) has emerged as a new form of bullying that presents unique challenges to those victimised. Recent studies have demonstrated that there is a significant conceptual and practical overlap between both types of bullying such that most young people who are cyber-bullied also tend to be bullied by more traditional methods. Despite the ov...
Cyber attacks have significantly increased over the last few years, where the attackers are highly skilled, more organized and supported by other powerful actors to devise attacks towards specific targets. To aid the development of a strategic plan to defend against emerging attacks, we present a high-level taxonomy along with a cyber defense model to address the interaction and relationships b...
AN EXAMINATION OF THE PRIMARY AND SECONDARY EFFECTS OF CYBER-BULLYING: DEVELOPMENT AND TESTING OF A CYBER-BULLYINGMODERATOR/MEDIATOR MODELby CRYSTAL LIN JOHNSONMay 2011 Advisor: Dr. Terry KinneyMajor: Communication StudiesDegree: Doctor of PhilosophyThis study examined cyber-bullying as a social transgression and the potentially negativeeffects it has on indi...
Heterogeneous wireless networks (HWNs) composed of densely deployed base stations of different types with various radio access technologies have become a prevailing trend to accommodate ever-increasing traffic demand in enormous volume. Nowadays, users rely heavily on HWNs for ubiquitous network access that contains valuable and critical information such as financial transactions, e-health, and...
It is no surprise that research on cyber behavior has increasingly gained the attention of various stakeholders ranging from legislative policy makers to school administers, from teachers to parents, from mass media to communities, and from researchers to professional practitioners such as counselors, social workers, and school psychologists (Zheng, Burrow-Sanchez, Donnelly, Call, & Drew, 2010)...
It is no surprise that research on cyber behavior has increasingly gained the attention of various stakeholders ranging from legislative policy makers to school administers, from teachers to parents, from mass media to communities, and from researchers to professional practitioners such as counselors, social workers, and school psychologists (Zheng, Burrow-Sanchez, Donnelly, Call, & Drew, 2010)...
Game Theoretic Solutions to Cyber Attack and Network Defense Problems There are increasing needs for research in the area of cyber situational awareness. The protection and defense against cyber attacks to computer network is becoming inadequate as the hacker knowledge sophisticates and as the network and each computer system become more complex. Current methods for alert correlation to detect ...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید