نتایج جستجو برای: cyber bulling
تعداد نتایج: 16294 فیلتر نتایج به سال:
Cyber attacks are frequently in the news, including the new phenomenon of cyber warfare. But how worried should we be? Whilst other investigations of this topic look at the means of attack, this paper explores the impact. Can cyber attacks really have a significant impact? This paper will be of interest to anyone who has an interest in the application of cyber power in international relations.a...
با ورود به هزارۀ سوم، شاهد تغییرات سریع در فنّاوریها و شدت پیچیدگی محیط هستیم. در چنین شرایطی، سازمانها با توجه به محیط رقابتی و حفظ و بقای خویش، لازم میدانند که از تکنولوژیهای جدید و تجهیزات مدرن با توجه به مزایایی که دربر دارد، برای افزایش کارایی و بهرهوری هرچه بیشتر سازمان خود بهرهمند گردند. اما، همچنان شاهد سوءاستفادههایی (سایبرلوفینگ) از این فنّاوریهای جدید از جمله اینترنت هستیم که ...
In spite of the recognized challenge and importance of developing knowledge of the domain of cyber security, human-centered research to uncover and address the difficulties experienced by network defenders is to a large extent lacking. Such research is needed to influence the design of the joint systems facing cyber attacks. Network defense depends on the capacity to successfully identify, inve...
In this paper, we describe the Jack-in-the-Net (Ja-Net) architecture for adaptive services in a large scale, open network environment. Using biologically inspired concepts, Ja-Net achieves built-in capabilities to create/emerge services adaptively according to dynamically changing network conditions and user preferences. In Ja-Net, a service is implemented by a collection of autonomous system c...
Recently, with the growing number of cyber-attacks and the constant lack of effective and state-of-art defense methods, cyber risks become ubiquitous in enterprise networks, manufacturing plants, and government computer systems. Cyber-insurance has become one of the major ways to mitigate the risks as it can transfer the cyber-risks to insurance companies and improve the security status of the ...
At the time of the state-wide cyber attacks in 2007, Estonia was one of the most developed nations in Europe regarding the ubiquitous use of information and communication technology (ICT) in all aspects of the society. Relaying on the Internet for conducting a wide range of business transactions was and still is common practice. Some of the relevant indicators include: 99% of all banking done v...
Cyber-physical systems combine digital and analog devices, interfaces, networks, computer systems, and the like with the natural and man-made physical world. The inherent interconnected and heterogeneous combination of behaviors in these systems makes their analysis and design a challenging task. Safety and reliability specifications imposed in cyber-physical applications, which are typically t...
The use of online technology is exploding worldwide and is fast becoming a preferred method of interacting. While most online interactions are neutral or positive the Internet provides a new means through which children and youth are bullied. The aim of this grounded theory approach was to explore technology, virtual relationships and cyber bullying from the perspectives of students. Seven focu...
One of the key advantages of additive manufacturing (AM) is its digital thread, which allows for rapid communication, iteration, and sharing of a design model and its corresponding physical representation. While this enables a more efficient design process, it also presents opportunities for cyber-attacks to impact the physical word. In this paper the authors examine potential attack vectors al...
The Department of Homeland Security's Office of Cyber and Infrastructure Analysis (DHS/OCIA) produces Infrastructure Risk Assessments to provide an assessment of emerging risks to critical infrastructure. As technology pervades into our everyday lives, once simple devices have become smarter and more interconnected to the world around us. This technology is transforming our cities into what are...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید