Results for 'Cybersecurity'

50 found
Order:
  1.  15
    Cybersecurity in Health – Disentangling Value Tensions.Michele Loi, Markus Christen, Nadine Kleine & Karsten Weber - 2019 - Journal of Information, Communication and Ethics in Society 17 (2):229-245.
    Purpose Cybersecurity in healthcare has become an urgent matter in recent years due to various malicious attacks on hospitals and other parts of the healthcare infrastructure. The purpose of this paper is to provide an outline of how core values of the health systems, such as the principles of biomedical ethics, are in a supportive or conflicting relation to cybersecurity. Design/methodology/approach This paper claims that it is possible to map the desiderata relevant to cybersecurity onto the four (...)
    No categories
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark   1 citation  
  2. Trusting Artificial Intelligence in Cybersecurity is a Double-Edged Sword.Mariarosaria Taddeo, Tom McCutcheon & Luciano Floridi - 2019 - Philosophy and Technology 32:1-15.
    Applications of artificial intelligence (AI) for cybersecurity tasks are attracting greater attention from the private and the public sectors. Estimates indicate that the market for AI in cybersecurity will grow from US$1 billion in 2016 to a US$34.8 billion net worth by 2025. The latest national cybersecurity and defence strategies of several governments explicitly mention AI capabilities. At the same time, initiatives to define new standards and certification procedures to elicit users’ trust in AI are emerging on (...)
    No categories
    Direct download  
     
    Export citation  
     
    Bookmark   1 citation  
  3.  10
    Ethics of AI and Cybersecurity When Sovereignty is at Stake.Paul Timmers - 2019 - Minds and Machines 29 (4):635-645.
    Sovereignty and strategic autonomy are felt to be at risk today, being threatened by the forces of rising international tensions, disruptive digital transformations and explosive growth of cybersecurity incidents. The combination of AI and cybersecurity is at the sharp edge of this development and raises many ethical questions and dilemmas. In this commentary, I analyse how we can understand the ethics of AI and cybersecurity in relation to sovereignty and strategic autonomy. The analysis is followed by policy (...)
    Direct download (2 more)  
    Translate
     
     
    Export citation  
     
    Bookmark   1 citation  
  4.  3
    Making Digital Territory: Cybersecurity, Techno-Nationalism, and the Moral Boundaries of the State.Norma Möllers - 2021 - Science, Technology, and Human Values 46 (1):112-138.
    Drawing on an analysis of German national cybersecurity policy, this paper argues that cybersecurity has become a key site in which states mobilize science and technology to produce state power. Contributing to science and technology studies work on technoscience and statecraft, I develop the concepts of “territorialization projects” and “digital territory” to capture how the production of state power in the digital age increasingly relies on technoscientific expertise about information infrastructure, shifting tasks of government into the domain of (...)
    No categories
    Direct download  
     
    Export citation  
     
    Bookmark   1 citation  
  5.  8
    Ethics of AI and Cybersecurity When Sovereignty is at Stake.Paul Timmers - 2019 - Minds and Machines 29 (4):635-645.
    Sovereignty and strategic autonomy are felt to be at risk today, being threatened by the forces of rising international tensions, disruptive digital transformations and explosive growth of cybersecurity incidents. The combination of AI and cybersecurity is at the sharp edge of this development and raises many ethical questions and dilemmas. In this commentary, I analyse how we can understand the ethics of AI and cybersecurity in relation to sovereignty and strategic autonomy. The analysis is followed by policy (...)
    Direct download (2 more)  
    Translate
     
     
    Export citation  
     
    Bookmark   1 citation  
  6.  22
    Digital Medicine, Cybersecurity, and Ethics: An Uneasy Relationship.Karsten Weber, Michele Loi, Markus Christen & Nadine Kleine - 2018 - American Journal of Bioethics 18 (9):52-53.
    Direct download (4 more)  
     
    Export citation  
     
    Bookmark   1 citation  
  7.  5
    Ethics of AI and Cybersecurity When Sovereignty is at Stake.Paul Timmers - 2019 - Minds and Machines 29 (4):635-645.
    Sovereignty and strategic autonomy are felt to be at risk today, being threatened by the forces of rising international tensions, disruptive digital transformations and explosive growth of cybersecurity incidents. The combination of AI and cybersecurity is at the sharp edge of this development and raises many ethical questions and dilemmas. In this commentary, I analyse how we can understand the ethics of AI and cybersecurity in relation to sovereignty and strategic autonomy. The analysis is followed by policy (...)
    No categories
    Direct download (2 more)  
    Translate
     
     
    Export citation  
     
    Bookmark   1 citation  
  8.  6
    Cybersecurity and Authentication: The Marketplace Role in Rethinking Anonymity – Before Regulators Intervene.Clyde Wayne Crews - 2007 - Knowledge, Technology & Policy 20 (2):97-105.
    No categories
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark  
  9.  6
    The Future Cybersecurity Workforce: Going Beyond Technical Skills for Successful Cyber Performance.Jessica Dawson & Robert Thomson - 2018 - Frontiers in Psychology 9.
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark   2 citations  
  10.  19
    Cybersecurity, Bureaucratic Vitalism and European Emergency.Stephanie Simon & Marieke de Goede - 2015 - Theory, Culture and Society 32 (2):79-106.
    Securing the internet has arguably become paradigmatic for modern security practice, not only because modern life is considered to be impossible or valueless if disconnected, but also because emergent cyber-relations and their complex interconnections are refashioning traditional security logics. This paper analyses European modes of governing geared toward securing vital, emergent cyber-systems in the face of the interconnected emergency. It develops the concept of ‘bureaucratic vitalism’ to get at the tension between the hierarchical organization and reductive knowledge frames of security (...)
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark  
  11.  11
    The Cyberethics, Cybersafety, and Cybersecurity at Schools.Irene L. Chen & Libi Shen - 2016 - International Journal of Cyber Ethics in Education 4 (1):1-15.
    The 2006 Megan Meier case, where a teenage girl who was bullied on the Internet through e-mail and Myspace which was said to ultimately lead to her suicide, shed light on the cyber bullying issue in schools. This article uses a case study approach to describe how a number of school institutes were grappling with the loss of confidential information and protecting students on the WWW, each through a unique set of circumstances. It will reveal potential reactions of the institutions (...)
    No categories
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  12.  8
    Characterizing and Measuring Maliciousness for Cybersecurity Risk Assessment.Zoe M. King, Diane S. Henshel, Liberty Flora, Mariana G. Cains, Blaine Hoffman & Char Sample - 2018 - Frontiers in Psychology 9.
    Direct download (4 more)  
     
    Export citation  
     
    Bookmark   2 citations  
  13.  14
    Is Cybersecurity a Public Good?Mariarosaria Taddeo - 2019 - Minds and Machines 29 (3):349-354.
  14.  41
    Three Ethical Challenges of Applications of Artificial Intelligence in Cybersecurity.Mariarosaria Taddeo - 2019 - Minds and Machines 29 (2):187-191.
  15.  8
    Do Different Mental Models Influence Cybersecurity Behavior? Evaluations Via Statistical Reasoning Performance.Gary L. Brase, Eugene Y. Vasserman & William Hsu - 2017 - Frontiers in Psychology 8.
    Direct download (6 more)  
     
    Export citation  
     
    Bookmark   1 citation  
  16.  1
    Taking Risks With Cybersecurity: Using Knowledge and Personal Characteristics to Predict Self-Reported Cybersecurity Behaviors.Shelia M. Kennison & Eric Chan-Tin - 2020 - Frontiers in Psychology 11.
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  17.  17
    Human Factors in the Cybersecurity of Autonomous Vehicles: Trends in Current Research.Václav Linkov, Petr Zámečník, Darina Havlíčková & Chih-Wei Pai - 2019 - Frontiers in Psychology 10.
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  18.  4
    Cognitive Models in Cybersecurity: Learning From Expert Analysts and Predicting Attacker Behavior.Vladislav D. Veksler, Norbou Buchler, Claire G. LaFleur, Michael S. Yu, Christian Lebiere & Cleotilde Gonzalez - 2020 - Frontiers in Psychology 11.
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  19.  11
    Ethical Value-Centric Cybersecurity: A Methodology Based on a Value Graph.Josep Domingo-Ferrer & Alberto Blanco-Justicia - 2020 - Science and Engineering Ethics 26 (3):1267-1285.
    Our society is being shaped in a non-negligible way by the technological advances of recent years, especially in information and communications technologies. The pervasiveness and democratization of ICTs have allowed people from all backgrounds to access and use them, which has resulted in new information-based assets. At the same time, this phenomenon has brought a new class of problems, in the form of activists, criminals and state actors that target the new assets to achieve their goals, legitimate or not. (...) includes the research, tools and techniques to protect information assets. However, some cybersecurity measures may clash with the ethical values of citizens. We analyze the synergies and tensions between some of these values, namely security, privacy, fairness and autonomy. From this analysis, we derive a value graph, and then we set out to identify those paths in the graph that lead to satisfying all four aforementioned values in the cybersecurity setting, by taking advantage of their synergies and avoiding their tensions. We illustrate our conceptual discussion with examples of enabling technologies. We also sketch how our methodology can be generalized to any setting where several potentially conflicting values have to be satisfied. (shrink)
    Direct download (2 more)  
    Translate
     
     
    Export citation  
     
    Bookmark  
  20.  1
    War, Health and Ecosystem: Generative Metaphors in Cybersecurity Governance.Julia Slupska - 2020 - Philosophy and Technology 34 (3):463-482.
    Policy-makers involved in cybersecurity governance should pay close attention to the ‘generative metaphors’ they use to describe and understand new technologies. Generative metaphors structure our understanding of policy problems by imposing mental models of both the problem and possible solutions. As a result, they can also constrain ethical reasoning about new technologies, by uncritically carrying over assumptions about moral roles and obligations from an existing domain. The discussion of global governance of cybersecurity problems has to date been dominated (...)
    No categories
    Direct download (3 more)  
    Translate
     
     
    Export citation  
     
    Bookmark  
  21. Hacking Humans? Social Engineering and the Construction of the “Deficient User” in Cybersecurity Discourses.Alexander Wentland & Nina Klimburg-Witjes - 2021 - Science, Technology, and Human Values 46 (6):1316-1339.
    Today, social engineering techniques are the most common way of committing cybercrimes through the intrusion and infection of computer systems. Cybersecurity experts use the term “social engineering” to highlight the “human factor” in digitized systems, as social engineering attacks aim at manipulating people to reveal sensitive information. In this paper, we explore how discursive framings of individual versus collective security by cybersecurity experts redefine roles and responsibilities at the digitalized workplace. We will first show how the rhetorical figure (...)
    No categories
    Direct download  
     
    Export citation  
     
    Bookmark  
  22.  1
    Friction, Snake Oil, and Weird Countries: Cybersecurity Systems Could Deepen Global Inequality Through Regional Blocking.Jenna Burrell & Anne Jonas - 2019 - Big Data and Society 6 (1).
    In this moment of rising nationalism worldwide, governments, civil society groups, transnational companies, and web users all complain of increasing regional fragmentation online. While prior work in this area has primarily focused on issues of government censorship and regulatory compliance, we use an inductive and qualitative approach to examine targeted blocking by corporate entities of entire regions motivated by concerns about fraud, abuse, and theft. Through participant-observation at relevant events and intensive interviews with experts, we document the quest by professionals (...)
    No categories
    Direct download  
     
    Export citation  
     
    Bookmark  
  23.  9
    Board Gender Diversity and Corporate Response to Cyber Risk: Evidence From Cybersecurity Related Disclosure.Camélia Radu & Nadia Smaili - forthcoming - Journal of Business Ethics:1-24.
    Cyber risk has become one of the greatest threats to firms in recent years. Accordingly, boards of directors must be continually vigilant about this danger. They have a duty to ensure that the companies adopt appropriate cybersecurity measures to manage the risk of cyber fraud. Boards should also ensure that the firm disclose material cyber risk and breaches. We examine how the board’s gender composition can influence the extent of such disclosure, based on a sample of the companies listed (...)
    Direct download (2 more)  
    Translate
     
     
    Export citation  
     
    Bookmark  
  24. International Conference on Cyberlaw, Cybercrime & Cybersecurity.Pavan Duggal - 2016 - International Review of Information Ethics 25.
    This article reports from the International Conference on Cyberlaw, Cybercrime & Cybersecurity. The Conference was addressed by more than 150 speakers backed by more than 80 supporters. It was a wonderful opportunity to network with international thought leaders under one roof.
    No categories
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  25.  14
    Scoping the Ethical Principles of Cybersecurity Fear Appeals.Marc Dupuis & Karen Renaud - forthcoming - Ethics and Information Technology.
    Fear appeals are used in many domains. Cybersecurity researchers are also starting to experiment with fear appeals, many reporting positive outcomes. Yet there are ethical concerns related to the use of fear to motivate action. In this paper, we explore this aspect from the perspectives of cybersecurity fear appeal deployers and recipients. We commenced our investigation by considering fear appeals from three foundational ethical perspectives. We then consulted the two stakeholder groups to gain insights into the ethical concerns (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  26.  5
    Correction to: Board Gender Diversity and Corporate Response to Cyber Risk: Evidence from Cybersecurity Related Disclosure.Camélia Radu & Nadia Smaili - forthcoming - Journal of Business Ethics:1-1.
    The initial online publication incorrectly contained Supplementary Information.
    Direct download (2 more)  
    Translate
     
     
    Export citation  
     
    Bookmark  
  27.  16
    Advances in Complex Systems and Their Applications to Cybersecurity.Fernando Sánchez Lasheras, Danilo Comminiello & Alicja Krzemień - 2019 - Complexity 2019:1-2.
    No categories
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  28. Corrigendum: Technological Change in the Retirement Transition and the Implications for Cybersecurity Vulnerability in Older Adults.Benjamin A. Morrison, Lynne Coventry & Pam Briggs - 2020 - Frontiers in Psychology 11.
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  29.  6
    Technological Change in the Retirement Transition and the Implications for Cybersecurity Vulnerability in Older Adults.Benjamin A. Morrison, Lynne Coventry & Pam Briggs - 2020 - Frontiers in Psychology 11.
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  30.  18
    Toward a Human-Centric Approach to Cybersecurity.Ronald J. Deibert - 2018 - Ethics and International Affairs 32 (4):411-424.
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  31.  10
    Innovation Dynamics and Capability in Open Collaborative Cyber Communities: Implications for Cybersecurity.George Tovstiga, Ekaterina Tulugurova & Alexander Kozlov - 2010 - International Journal of Business Governance and Ethics 5 (1/2):76-86.
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  32. Privacy and Digital Ethics After the Pandemic.Carissa Véliz - 2021 - Nature Electronics 4:10-11.
    The increasingly prominent role of digital technologies during the coronavirus pandemic has been accompanied by concerning trends in privacy and digital ethics. But more robust protection of our rights in the digital realm is possible in the future. -/- After surveying some of the challenges we face, I argue for the importance of diplomacy. Democratic countries must try to come together and reach agreements on minimum standards and rules regarding cybersecurity, privacy and the governance of AI.
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  33.  52
    Anticipatory Ethics for a Future Internet: Analyzing Values During the Design of an Internet Infrastructure.Katie Shilton - 2015 - Science and Engineering Ethics 21 (1):1-18.
    The technical details of Internet architecture affect social debates about privacy and autonomy, intellectual property, cybersecurity, and the basic performance and reliability of Internet services. This paper explores one method for practicing anticipatory ethics in order to understand how a new infrastructure for the Internet might impact these social debates. This paper systematically examines values expressed by an Internet architecture engineering team—the Named Data Networking project—based on data gathered from publications and internal documents. Networking engineers making technical choices also (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark   4 citations  
  34.  14
    Out of the laboratory and into the classroom: the future of artificial intelligence in education.Daniel Schiff - 2021 - AI and Society 36 (1):331-348.
    Like previous educational technologies, artificial intelligence in education threatens to disrupt the status quo, with proponents highlighting the potential for efficiency and democratization, and skeptics warning of industrialization and alienation. However, unlike frequently discussed applications of AI in autonomous vehicles, military and cybersecurity concerns, and healthcare, AI’s impacts on education policy and practice have not yet captured the public’s attention. This paper, therefore, evaluates the status of AIEd, with special attention to intelligent tutoring systems and anthropomorphized artificial educational agents. (...)
    Direct download (2 more)  
    Translate
     
     
    Export citation  
     
    Bookmark   1 citation  
  35.  3
    On the Application of Compression-Based Metrics to Identifying Anomalous Behaviour in Web Traffic.Gonzalo de la Torre-Abaitua, Luis F. Lago-Fernández & David Arroyo - 2020 - Logic Journal of the IGPL 28 (4):546-557.
    In cybersecurity, there is a call for adaptive, accurate and efficient procedures to identifying performance shortcomings and security breaches. The increasing complexity of both Internet services and traffic determines a scenario that in many cases impedes the proper deployment of intrusion detection and prevention systems. Although it is a common practice to monitor network and applications activity, there is not a general methodology to codify and interpret the recorded events. Moreover, this lack of methodology somehow erodes the possibility of (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  36.  19
    Ethics and Phishing Experiments.David B. Resnik & Peter R. Finn - 2018 - Science and Engineering Ethics 24 (4):1241-1252.
    Phishing is a fraudulent form of email that solicits personal or financial information from the recipient, such as a password, username, or social security or bank account number. The scammer may use the illicitly obtained information to steal the victim’s money or identity or sell the information to another party. The direct costs of phishing on consumers are exceptionally high and have risen substantially over the past 12 years. Phishing experiments that simulate real world conditions can provide cybersecurity experts (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark   2 citations  
  37.  15
    Mining Community-Level Influence in Microblogging Network: A Case Study on Sina Weibo.Yufei Liu, Dechang Pi & Lin Cui - 2017 - Complexity:1-16.
    Social influence analysis is important for many social network applications, including recommendation and cybersecurity analysis. We observe that the influence of community including multiple users outweighs the individual influence. Existing models focus on the individual influence analysis, but few studies estimate the community influence that is ubiquitous in online social network. A major challenge lies in that researchers need to take into account many factors, such as user influence, social trust, and user relationship, to model community-level influence. In this (...)
    No categories
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark   1 citation  
  38.  14
    Multiclass Classification Procedure for Detecting Attacks on MQTT-IoT Protocol.Hector Alaiz-Moreton, Jose Aveleira-Mata, Jorge Ondicol-Garcia, Angel Luis Muñoz-Castañeda, Isaías García & Carmen Benavides - 2019 - Complexity 2019:1-11.
    The large number of sensors and actuators that make up the Internet of Things obliges these systems to use diverse technologies and protocols. This means that IoT networks are more heterogeneous than traditional networks. This gives rise to new challenges in cybersecurity to protect these systems and devices which are characterized by being connected continuously to the Internet. Intrusion detection systems are used to protect IoT systems from the various anomalies and attacks at the network level. Intrusion Detection Systems (...)
    No categories
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark   1 citation  
  39. Impact of Defending Strategy Decision on DDoS Attack.Chunming Zhang - 2021 - Complexity 2021:1-11.
    Distributed denial-of-service attack is a serious threat to cybersecurity. Many strategies used to defend against DDoS attacks have been proposed recently. To study the impact of defense strategy selection on DDoS attack behavior, the current study uses logistic function as basis to propose a dynamic model of DDoS attacks with defending strategy decisions. Thereafter, the attacked threshold of this model is calculated. The existence and stability of attack-free and attacked equilibria are proved. Lastly, some effective strategies to mitigate DDoS (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  40.  2
    Trust in Intrusion Detection Systems: An Investigation of Performance Analysis for Machine Learning and Deep Learning Models.Basim Mahbooba, Radhya Sahal, Martin Serrano & Wael Alosaimi - 2021 - Complexity 2021:1-23.
    To design and develop AI-based cybersecurity systems ), users can justifiably trust, one needs to evaluate the impact of trust using machine learning and deep learning technologies. To guide the design and implementation of trusted AI-based systems in IDS, this paper provides a comparison among machine learning and deep learning models to investigate the trust impact based on the accuracy of the trusted AI-based systems regarding the malicious data in IDs. The four machine learning techniques are decision tree, K (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  41.  11
    Protecting Critical Infrastructure: Implementing Integration and Expanding Education: First Prize: 2007 Schubmehl-Prein Essay Contest.David A. Martinez - 2008 - Acm Sigcas Computers and Society 38 (1):12-17.
    The tenuous network of interconnected data that supports our nation's critical infrastructure has been built up, computer by computer, over only the last few decades. From punch cards to the supercomputers constructed by pioneers in today's fields, computers have been controlling our nation's critical sectors nearly every step of the way. As designers of today's critical systems gravitate slowly towards systems that require less human oversight than ever before, the vulnerability of the networks that control our electricity systems, water supply, (...)
    Direct download (4 more)  
     
    Export citation  
     
    Bookmark  
  42. Black Boxes, Not Green: Mythologizing Artificial Intelligence and Omitting the Environment.Benedetta Brevini - 2020 - Big Data and Society 7 (2).
    We are repeatedly told that AI will help us to solve some of the world's biggest challenges, from treating chronic diseases and reducing fatality rates in traffic accidents to fighting climate change and anticipating cybersecurity threats. However, the article contends that public discourse on AI systematically avoids considering AI’s environmental costs. Artificial Intelligence- Brevini argues- runs on technology, machines, and infrastructures that deplete scarce resources in their production, consumption, and disposal, thus increasing the amounts of energy in their use, (...)
    No categories
    Direct download  
     
    Export citation  
     
    Bookmark  
  43. Cyber Law Terminology as a New Lexical Field in Legal Discourse.Sigita Rackevičienė & Liudmila Mockienė - 2020 - International Journal for the Semiotics of Law - Revue Internationale de Sémiotique Juridique 33 (3):673-687.
    The cyber domain is one of the newest and most rapidly evolving fields of knowledge which has led to the development of a new area of law—cyber law, that regulates the use of the Internet and activities performed over the Internet and other networks. The cyber domain is particularly dynamic: new concepts are constantly developed and need new terminological designations, which in turn need new counterparts in other languages. Formation of these designations and their counterparts often raises terminological issues that (...)
    Direct download (2 more)  
    Translate
     
     
    Export citation  
     
    Bookmark   1 citation  
  44.  32
    Examination of Cybercrime and its Effects on Corporate Stock Value.Katherine Taken Smith, Amie Jones, Leigh Johnson & Lawrence Murphy Smith - 2019 - Journal of Information, Communication and Ethics in Society 17 (1):42-60.
    Purpose Cybercrime is a prevalent and serious threat to publicly traded companies. Defending company information systems from cybercrime is one of the most important aspects of technology management. Cybercrime often not only results in stolen assets and lost business but also damages a company’s reputation, which in turn may affect the company’s stock market value. This is a serious concern to company managers, financial analysts, investors and creditors. This paper aims to examine the impact of cybercrime on stock prices of (...)
    No categories
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark  
  45.  10
    We Are Out of Balance.Gene Spafford - 2014 - Acm Sigcas Computers and Society 44 (4):9-12.
    This paper is a republication of an original blog post by Gene Spafford with a title of the same name. It includes comments on the general lack of women in the computing subfield of cybersecurity and advice for both men and women. The original blog posting can be found at https://www.cerias.purdue.edu/site/blog/post/were_out_of_balance/.
    No categories
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark  
  46. Maybe If We Turn It Off and Then Turn It Back On Again? Exploring Health Care Reform as a Means to Curb Cyber Attacks.Deborah R. Farringer - 2019 - Journal of Law, Medicine and Ethics 47 (S4):91-102.
    The health care industry has moved at a rapid pace away from paper records to an electronic platform across almost all sectors — much of it at the encouragement and insistence of the federal government. Such rapid expansion has increased exponentially the risk to individuals in the privacy of their data and, increasingly, to their physical well-being when medical records are inaccessible through ransomware attacks. Recognizing the unique and critical nature of medical records, the United States Congress established the Health (...)
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark  
  47.  10
    Effect of the Sampling of a Dataset in the Hyperparameter Optimization Phase Over the Efficiency of a Machine Learning Algorithm.Noemí DeCastro-García, Ángel Luis Muñoz Castañeda, David Escudero García & Miguel V. Carriegos - 2019 - Complexity 2019:1-16.
    Selecting the best configuration of hyperparameter values for a Machine Learning model yields directly in the performance of the model on the dataset. It is a laborious task that usually requires deep knowledge of the hyperparameter optimizations methods and the Machine Learning algorithms. Although there exist several automatic optimization techniques, these usually take significant resources, increasing the dynamic complexity in order to obtain a great accuracy. Since one of the most critical aspects in this computational consume is the available dataset, (...)
    No categories
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  48. Towards a Cognitive Theory of Cyber Deception.Edward A. Cranford, Cleotilde Gonzalez, Palvi Aggarwal, Milind Tambe, Sarah Cooney & Christian Lebiere - 2021 - Cognitive Science 45 (7):e13013.
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark  
  49. Arms Industry.Edmund Byrne - 2017 - Encyclopedia of Business and Professional Ethics.
    A summary assessment of the dimensions and concentrations of military equipment manufacture primarily in the United States and western Europe and the extent of availability of this equipment to buyers throughout the world. Treaty-based limitations are also listed.
    Direct download  
     
    Export citation  
     
    Bookmark  
  50.  18
    A Response to Responsibility of and Trust in ISPs by Raphael Cohen-Almagor.Michael R. Nelson - 2010 - Knowledge, Technology & Policy 23 (3):403-407.
    The Internet and Internet applications such as cloud computing continue to grow at an extraordinary rate, enabled by the Internet's open architecture and the vibrant lightly regulated Internet service provider market. Proposals to hold ISPs responsible for content and software shared by their customers would dramatically constrain the openness and innovation that has been the hallmark of the Internet to date. Rather than taking the kind of approach favored by Raphael Cohen-Almagor, government should enlist the assistance of other intermediaries such (...)
    Direct download (5 more)  
    Translate
     
     
    Export citation  
     
    Bookmark