نتایج جستجو برای: سایبرلوفینگ cyber loafing

تعداد نتایج: 16469  

2014
Preety T. Gunjal Sunil G. Tamhankar

Cyber-Physical Systems (CPSs) are characterized by integrating computation and physical processes. The theories and applications of CPSs face the enormous challenges that are (1) general workflow of cyber physical systems, (2) identifying the unique properties of cyber-physical systems and (3) discussing security mechanisms applicable to cyber physical systems. In particular, we analyze and we ...

2013
Sridhar Neralla

Knowledge on cyber forensics is increasing on par with the cyber crime incidents. Cyber criminals’ uses sophisticated technological knowledge and always they plan to escape from the clutches of law. This paper elaborates e-mail forensics and categories of anti-forensics that can be applicable to the email forensics. This paper elucidates the process of identifying such anti-forensics applied in...

2012
David Naranjo-Gil Laura Gómez-Ruiz María Jesús

The objective of this paper is to explore how the application of neuroscience to management research can facilitate a better understanding of some issues concerning to people behaviour in organizations. In recent years, the ability of researchers to directly observe brain activity has increased tremendously. This paper presented extant neuroscientific findings and showed some examples on how th...

2016
Ahmed Mateen Qaiser Abbas

The objective of this research paper is to bring forth the new challenges faced by Pakistan regarding the Cyber Crime. In this arena of technology, Pakistan is in the danger zone of Cyber Crime. Storm of Cyber Crime is hitting almost every country with new power and challenges. Like whatever other nation of the world, Cyber Crime is on ascend in Pakistan. A year ago, digital violations brought ...

2014
Melissa Danforth Charles Lam

Cyber security education and outreach is a national priority. It is critical to encourage high school students to pursue studies in cyber security and related fields. High school outreach is a fundamental component of a cohesive cyber security education program. Most high school outreach programs in cyber security focus on short-term events such as a capture the flag contest or the CyberPatriot...

Journal: :Computers & Security 2013
Rossouw von Solms Johan Van Niekerk

The term cyber security is often used interchangeably with the term information security. This paper argues that, although there is a substantial overlap between cyber security and information security, these two concepts are not totally analogous. Moreover, the paper posits that cyber security goes beyond the boundaries of traditional information security to include not only the protection of ...

Journal: :IJCWT 2012
Christian Czosseck Karlis Podins

Throughout history, mankind has developed and employed novel weapons and countermeasures. Both offensive and defensive weapon systems are limited by the laws of nature. Consequently, military concepts and doctrines were designed by implicitly taking into account those limitations. The digital age has introduced a new class of weaponry that poses an initial challenge to the common understanding ...

2013
Lucas Kello

information age faces formidable challenges. Chief among these is to evaluate correctly the impact of cyberweapons on strategy: Does the new technology require a revolution in how scholars and policymakers think about force and conoict?1 Practitioners confront a predicament in addressing this question: the cyber revolution gives rise to novel threats and opportunities requiring immediate policy...

2014
Deborah J. Bodeau Richard D. Graubart Ellen R. Laderman

With the growing capability, expertise and intent of advanced cyber adversaries, it is no longer realistic to assume that one can successfully keep all adversaries out of a system infrastructure. Therefore, architecture and systems engineering must be based on the assumption that systems or components have been or can be compromised, and that missions and business functions must continue to ope...

Journal: :CoRR 2015
Selma Dilek Hüseyin Çakir Mustafa Aydin

With the advances in information technology (IT) criminals are using cyberspace to commit numerous cyber crimes. Cyber infrastructures are highly vulnerable to intrusions and other threats. Physical devices and human intervention are not sufficient for monitoring and protection of these infrastructures; hence, there is a need for more sophisticated cyber defense systems that need to be flexible...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید