نتایج جستجو برای: cyber bulling

تعداد نتایج: 16294  

2017
Christopher Cope John Austen Royal Holloway

Cyber attacks are frequently in the news, including the new phenomenon of cyber warfare. But how worried should we be? Whilst other investigations of this topic look at the means of attack, this paper explores the impact. Can cyber attacks really have a significant impact? This paper will be of interest to anyone who has an interest in the application of cyber power in international relations.a...

ژورنال: :مطالعات بین رشته ای در رسانه و فرهنگ 2013
مریم هنگامه موسوی ارفع سعید روحانی

با ورود به هزارۀ سوم، شاهد تغییرات سریع در فنّاوری‎ها و شدت پیچیدگی محیط هستیم. در چنین شرایطی، سازمان‎ها با توجه به محیط رقابتی و حفظ و بقای خویش، لازم می‎دانند که از تکنولوژی‎های جدید و تجهیزات مدرن با توجه به مزایایی که دربر دارد، برای افزایش کارایی و بهره‎وری هرچه بیشتر سازمان خود بهره‎مند گردند. اما، همچنان شاهد سوء‎استفاده‎هایی (سایبرلوفینگ) از این فنّاوری‎های جدید از جمله اینترنت هستیم که ...

2011
Matthieu Branlat Alexander Morison David Woods

In spite of the recognized challenge and importance of developing knowledge of the domain of cyber security, human-centered research to uncover and address the difficulties experienced by network defenders is to a large extent lacking. Such research is needed to influence the design of the joint systems facing cyber attacks. Network defense depends on the capacity to successfully identify, inve...

2002
Tomoko Itao Tetsuya Nakamura Masato Matsuo Tatsuya Suda Tomonori Aoyama

In this paper, we describe the Jack-in-the-Net (Ja-Net) architecture for adaptive services in a large scale, open network environment. Using biologically inspired concepts, Ja-Net achieves built-in capabilities to create/emerge services adaptively according to dynamically changing network conditions and user preferences. In Ja-Net, a service is implemented by a collection of autonomous system c...

2018
Rui Zhang Quanyan Zhu

Recently, with the growing number of cyber-attacks and the constant lack of effective and state-of-art defense methods, cyber risks become ubiquitous in enterprise networks, manufacturing plants, and government computer systems. Cyber-insurance has become one of the major ways to mitigate the risks as it can transfer the cyber-risks to insurance companies and improve the security status of the ...

Journal: :IJCWT 2011
Christian Czosseck Rain Ottis Anna-Maria Talihärm

At the time of the state-wide cyber attacks in 2007, Estonia was one of the most developed nations in Europe regarding the ubiquitous use of information and communication technology (ICT) in all aspects of the society. Relaying on the Internet for conducting a wide range of business transactions was and still is common practice. Some of the relevant indicators include: 99% of all banking done v...

2014
Ricardo G. Sanfelice

Cyber-physical systems combine digital and analog devices, interfaces, networks, computer systems, and the like with the natural and man-made physical world. The inherent interconnected and heterogeneous combination of behaviors in these systems makes their analysis and design a challenging task. Safety and reliability specifications imposed in cyber-physical applications, which are typically t...

2011
Faye Mishna Mona Khoury-Kassabri Tahany Gadalla Joanne Daciuk

The use of online technology is exploding worldwide and is fast becoming a preferred method of interacting. While most online interactions are neutral or positive the Internet provides a new means through which children and youth are bullied. The aim of this grounded theory approach was to explore technology, virtual relationships and cyber bullying from the perspectives of students. Seven focu...

2014
L. D. Sturm C. B. Williams J. A. Camelio

One of the key advantages of additive manufacturing (AM) is its digital thread, which allows for rapid communication, iteration, and sharing of a design model and its corresponding physical representation. While this enables a more efficient design process, it also presents opportunities for cyber-attacks to impact the physical word. In this paper the authors examine potential attack vectors al...

2015

The Department of Homeland Security's Office of Cyber and Infrastructure Analysis (DHS/OCIA) produces Infrastructure Risk Assessments to provide an assessment of emerging risks to critical infrastructure. As technology pervades into our everyday lives, once simple devices have become smarter and more interconnected to the world around us. This technology is transforming our cities into what are...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید