نتایج جستجو برای: cyber bulling

تعداد نتایج: 16294  

2013
Martin R. Stytz Sheila B. Banks

ccurate simulation of cyber warfare can prepare decision-makers for its challenges. With cyber warfare, it is possible to control an adversaries’ information, target the portions of cyber space used for situational awareness and decision-making, lead the adversary to make desired decisions, and strike directly at the opposition’s mind. A cyber attack diminishes individual and group situational ...

2015
Arniyati Ahmad Christopher Johnson Timothy Storer

Abstract—Cyber exercises used to assess the preparedness of a community against cyber crises, technology failures and Critical Information Infrastructure (CII) incidents. The cyber exercises also called cyber crisis exercise or cyber drill, involved partnerships or collaboration of public and private agencies from several sectors. This study investigates Organisation Cyber Resilience (OCR) of p...

Journal: :حقوق اسلامی 0
امیرحسین جلالی فراهانی کارشناس ارشد حقوق کیفری و جرم‎شناسی، پژوهشگر در حقوق کیفری سایبری

0

2011
P. Danquah

The Space Transition Theory (Jaishankar 2008) presupposes that people behave differently in the cyber world from the physical world amongst other postulates that seek to explain cyber criminal behavioural patterns. (Wall 2001) categorized cyber crime into the four main types of cyber trespass, cyber deception and theft, cyber pornography and cyber violence. This research sought test the postula...

Amir Nik-Azin, Mohammad Reza Naenian, Mohammad Reza Shairi,

Introduction: The purpose of the present study was to examine the validity and reliability of the Health Related Quality of Life Questionnaire (KIDSCREEN-52) in a sample of Iranian students. Materials and Method: Using Multistage Sampling, 551 students from middle and high school, studying in Yazd city were selected as a sample. In this study” KIDSCREEN-52 HRQOL questionnaire”, and some other ...

2011
N. Sridhar D. Lalitha Bhaskari P. S. Avadhani

As threats against digital assets have risen and there is necessitate exposing and eliminating hidden risks and threats. The ability of exposing is called “cyber forensics.” Cyber Penetrators have adopted more sophistical tools and tactics that endanger the operations of the global phenomena. These attackers are also using anti-forensic techniques to hide evidence of a cyber crime. Cyber forens...

2011
Yong-Dal Shin

In this paper, we presented a new model for cyber crime investigation procedure which is as follows: readiness phase, consulting with profiler, cyber crime classification and investigation priority decision, damaged cyber crime scene investigation, analysis by crime profiler, suspects tracking, injurer cyber crime scene investigation, suspect summon, cyber crime logical reconstruction, writing ...

2014

Background: The Cyber Preparedness Continuum CNA’s Safety and Security Division conducted a Cyber Preparedness Workshop on April 25, 2013, at CNA’s headquarters in Alexandria, Virginia. The workshop brought together emergency management and cybersecurity stakeholders, drawn from both the public and private sectors, to discuss cyber preparedness. Discussions during the workshop centered around t...

2015
Steven Noel Jackson Ludwig Prem Jain Dale Johnson Roshan K. Thomas Jenny McFarland Ben King Seth Webster Brady Tello

This paper describes AMICA (Analyzing Mission Impacts of Cyber Actions), an integrated approach for understanding mission impacts of cyber attacks. AMICA combines process modeling, discrete-event simulation, graph-based dependency modeling, and dynamic visualizations. This is a novel convergence of two lines of research: process modeling/simulation and attack graphs. AMICA captures process flow...

2015
Tarun Yadav Arvind Mallari Rao

Recent trends in targeted cyber-attacks has increased the interest of research in the field of cyber security. Such attacks have massive disruptive effects on organizations, enterprises and governments. Cyber kill chain is a model to describe cyber-attacks so as to develop incident response and analysis capabilities. Cyber kill chain in simple terms is an attack chain, the path that an intruder...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید