نتایج جستجو برای: cyber bulling

تعداد نتایج: 16294  

Journal: :CoRR 2014
G. Nikhita Reddy G. J. Ugander Reddy

Cyber Security plays an important role in the field of information technology .Securing the information have become one of the biggest challenges in the present day. When ever we think about the cyber security the first thing that comes to our mind is ‘cyber crimes’ which are increasing immensely day by day. Various Governments and companies are taking many measures in order to prevent these cy...

2012
Hemraj Saini Yerra Shankar Rao

In the current era of online processing, maximum of the information is online and prone to cyber threats. There are a huge number of cyber threats and their behavior is difficult to early understanding hence difficult to restrict in the early phases of the cyber attacks. Cyber attacks may have some motivation behind it or may be processed unknowingly. The attacks those are processed knowingly c...

ژورنال: :تحقیقات حقوقی 0
فاطمه کیهانلو استادیار دانشکده حقوق و علوم سیاسی دانشگاه آزاد اسلامی واحد کرج وحید رضادوست دانشجوی کارشناسی ارشد حقوق بین الملل دانشگاه شهید بهشتی

یکی از مسائل چالش­برانگیز حقوق بین­الملل در ادوار مختلف، تنظیم روابط دولت­های متخاصم و شیوه­ حل و فصل اختلافات آنها با یکدیگر بوده است. در این میان، تا مدت های مدید، اصلی­ترین راه حل اختلاف، جنگ و توسل به زور بود؛ هرچند به مرور نهادینه کردن حقوقیِ این امرِ مذموم با هدف کاهش و سپس حذف آن، وجهه همت جامعه بین­المللی قرار گرفت. از زمانی که اسناد بین­المللی، جنگ و حمله­ نظامی را به طور مطلق ممنوع کردن...

2011
Dino Schweitzer David Gibson David Bibighaus Jeff Boleng

Today’s students have grown up with computer-based technology and need to be prepared to enter a career in a digital world. This includes an understanding of the broader implications of technology such as the growing threat of cyber-crime and cyber-terrorism, cyber-ethics, the legal and social implications of technology, and the local and global impacts. At our institution, we have taken a broa...

2013
Amirudin Abdul Wahab

The cyber threat landscape has evolved in fairly dramatic ways. Cyber threats come in various different forms both technical and content related threats. Emerging threats have become sophisticated and a lot more disastrous involving state actors, state-sponsored actors, international organized criminals and Internet hacker activist groups. Today‘s cyber threats pose challenges to the Government...

Journal: :Computers in Human Behavior 2014
Christina F. Brown Michelle Kilpatrick Demaray Stephanie M. Secord

Cyber or electronic bullying is a growing problem among school-aged children and research on cyberbul-lying is still relatively young. The primary purposes of the current study were: (a) to investigate gender and grade level differences among cyber victims (b) to investigate the overlap between traditional victimization and cyber victimization and (c) to investigate the associations among cyber...

Journal: :CoRR 2017
Jonathan Z. Bakdash Steve Hutchinson Erin G. Zaroukian Laura Marusich Saravanan Thirumuruganathan Char Sample Blaine Hoffman Gautam Das

Cyber attacks endanger physical, economic, social, and political security. We use a Bayesian state space model to forecast the number of future cyber attacks. Cyber attacks were defined as malware detected by cyber analysts over seven years using cyber events (i.e., reports of malware attacks supported by evidence) at a large Computer Security Service Provider (CSSP). This CSSP protects a varie...

Abdullahi, Ahmad Rafie, Seyedzadeh Sani, Seyed Mehdi,

Background and Aim: Bullying is one of the most common problems among teenagers in many schools around the world, which is recently considered by researchers in the fields of psychology and even criminology as a traditional and cyber bullying. The purpose of this study is to investigate the rate of traditional and cyber bullying among male and female teenagers in the secondary schools of Herat...

2009
Ibrahim M. Baggili Ibrahim Baggili Marcus Rogers William Graziano Thomas Hacker Richard Mislan Gary R. Bertoline

Baggili, Ibrahim M. Ph.D. Purdue University, August 2009. Effects of anonymity, selfreported pre-employment integrity and self-reported antisocial behavior on self-reported cyber crime engagement: An exploratory study. Major Professor: Marcus Rogers. A key issue facing today’s society is the increase in cyber crimes. Cyber crimes pose threats to nations, organizations and individuals across the...

2012
Tridib Bandyopadhyay

Cyber insurance can be an effective instrument to transfer cyber risk and complement the benefits from technological controls that guard the IS (information and network) assets in organizations. This research attempts to identify the factors that could explain the proclivity of adoption of cyber insurance in managing cyber risk of an organization. Grounded on the context based TOE framework of ...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید