Results for 'cyber-security'

1000+ found
Order:
  1. Cyber Security and Individual Rights, Striking the Right Balance.Mariarosaria Taddeo - 2013 - Philosophy and Technology 26 (4):353-356.
    In this article, I offer an outline of the papers comprising the special issue. I also provide a brief overview of its topic, namely, the friction between cyber security measures and individual rights. I consider such a friction to be a new and exacerbated version of what Mill called ‘the struggle between liberties and authorities,’ and I claim that the struggle arises because of the involvement of public authorities in the management of the cyber sphere, for technological (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark   14 citations  
  2. Impacts of Cyber Security and Supply Chain Risk on Digital Operations: Evidence from the Pharmaceutical Industry.Federico Del Giorgio Solfa - 2022 - International Journal of Technology Innovation and Management (Ijtim) 2 (2):18-32.
    Purpose: The research explored empirical evidence to assess the impact of cyber security and supply chain risk on digital operations in the UAE pharmaceutical industry. Methodology/Design/Approach: Based on responses from 243 personnel working at 14 pharmaceutical manufacturing companies in Dubai, data were examined for normality, instrument validity and regression analysis. Cyber security and SC risk on digital operations were explored by applying convenient sampling and descriptive and analytical research design. Findings: The findings validated the significant positive (...)
    Direct download (4 more)  
     
    Export citation  
     
    Bookmark  
  3.  50
    Breaking the Cyber-Security Dilemma: Aligning Security Needs and Removing Vulnerabilities.Myriam Dunn Cavelty - 2014 - Science and Engineering Ethics 20 (3):701-715.
    Current approaches to cyber-security are not working. Rather than producing more security, we seem to be facing less and less. The reason for this is a multi-dimensional and multi-faceted security dilemma that extends beyond the state and its interaction with other states. It will be shown how the focus on the state and “its” security crowds out consideration for the security of the individual citizen, with detrimental effects on the security of the whole (...)
    No categories
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark   3 citations  
  4.  10
    Cyber Security: Effects of Penalizing Defenders in Cyber-Security Games via Experimentation and Computational Modeling.Zahid Maqbool, Palvi Aggarwal, V. S. Chandrasekhar Pammi & Varun Dutt - 2020 - Frontiers in Psychology 11.
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark   1 citation  
  5.  13
    Cyber security threats: A never-ending challenge for e-commerce.Xiang Liu, Sayed Fayaz Ahmad, Muhammad Khalid Anser, Jingying Ke, Muhammad Irshad, Jabbar Ul-Haq & Shujaat Abbas - 2022 - Frontiers in Psychology 13.
    This study explores the challenge of cyber security threats that e-commerce technology and business are facing. Technology applications for e-commerce are attracting attention from both academia and industry. It has made what was not possible before for the business community and consumers. But it did not come all alone but has brought some challenges, and cyber security challenge is one of them. Cyber security concerns have many forms, but this study focuses on social engineering, (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  6. Cyber security norms in the Euro-Atlantic region: NATO and the EU as norm entrepreneurs and norm diffusers.Joe Burton - 2018 - In Artur Gruszczak & Pawel Frankowski (eds.), Technology, ethics and the protocols of modern war. New York, NY: Routledge/Taylor & Francis Group.
     
    Export citation  
     
    Bookmark  
  7.  12
    Cyber Security and Key Management Issues for Internet of Things: Techniques, Requirements, and Challenges.Mohammad Faisal, Ikram Ali, Muhammad Sajjad Khan, Junsu Kim & Su Min Kim - 2020 - Complexity 2020:1-9.
    Internet of Things-based environments pose various challenges due to their anytime/anywhere computing, and the efficient cryptographic based key management is one of the major challenges in Internet of Things. The key management life cycle consists of initialization, key generation, key registration, key backup, key update, key recovery, and key revocation. Our contribution in this paper is to summarize the state-of-the-art key management schemes and techniques in different scenarios, such as mobile ad hoc networks, wireless sensor networks, and the Internet of (...)
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark  
  8. Cyber-Security, Privacy and the Covid-19 Attenuation?”.Vincent Samar - 2021 - Notre Dame Journal of Legislation 47:1-38.
    Large-scale data brokers collect massive amounts of highly personal consumer information to be sold to whoever will pay their price, even at the expense of sacrificing individual privacy and autonomy in the process. In this Article, I will show how a proper understanding and justification for a right to privacy, in context to both protecting private acts and safeguarding information and states of affairs for the performance of such acts, provides a necessary background framework for imposing legal restrictions on such (...)
    No categories
     
    Export citation  
     
    Bookmark  
  9. Cyber Security and Dehumanisation.Marie Oldfield - 2021 - 5Th Digital Geographies Research Group Annual Symposium.
    Artificial Intelligence is becoming widespread and as we continue ask ‘can we implement this’ we neglect to ask ‘should we implement this’. There are various frameworks and conceptual journeys one should take to ensure a robust AI product; context is one of the vital parts of this. AI is now expected to make decisions, from deciding who gets a credit card to cancer diagnosis. These decisions affect most, if not all, of society. As developers if we do not understand or (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  10.  12
    Cyber Security in Young Democracies.Jakub Harašta - 2013 - Jurisprudencija: Mokslo darbu žurnalas 20 (4):1457-1472.
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark  
  11.  17
    Cyber Capacity without Cyber Security.Roseline Obada Moses-Òkè - 2012 - Journal of Philosophy, Science and Law 12:1-14.
    Prior to the year 2001, the phenomenon of Internet criminal fraud was not globally associated with Nigeria. Since then, however, the country had acquired a world-wide notoriety in criminal activities, especially financial scams, facilitated through the use of the Internet. This is not to say that computer-related crimes were alien to the country. It is, however, remarkable that the perpetration of cyber crimes involving Nigerians and traceable to Nigeria became so rampant that questions might be legitimately raised as to (...)
    No categories
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  12.  4
    4th National Cyber Security Workshop, 11-12 Nov 2016, Mumbai.Anthony Lobo - 2016 - International Review of Information Ethics 25.
    The 4th National Cyber Security Workshop organised by IEEE India Council was held in Mumbai at the sprawling Yantra Park, Thane Campus of Tata Consultancy Services on 11 & 12 November, 2016. This event follows two successful editions of the workshop in Ahmedabad and Bangalore.
    No categories
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  13.  15
    Ethics, Information Manipulation and Cyber Security in Social Media.Aynur Tekke & Aybala Lale - 2021 - Akademik İncelemeler Dergisi 16 (2):44-62.
    The aim of this study is to analyze the information in the social media which is being produced and included into the stream by mass media in the context of digital ethics and cyber security. The principles of digital ethics includes norms that takes individual’s privacy of life into consideration. In addition to being a concept related to cyberspace, computer, and computer networks, it also includes the whole human-made activities, for this reason manipulation techniques in cyberspace appear as (...)
    No categories
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark  
  14.  16
    Rogue people: on adversarial crowdsourcing in the context of cyber security.Mohammad Moradi & Qi Li - 2021 - Journal of Information, Communication and Ethics in Society 19 (1):87-103.
    Purpose Over the past decade, many research works in various disciplines have benefited from the endless ocean of people and their potentials as an effective problem-solving strategy and computational model. But nothing interesting is ever completely one-sided. Therefore, when it comes to leveraging people's power, as the dark side of crowdsourcing, there are some possible threats that have not been considered as should be, such as recruiting black hat crowdworkers for organizing targeted adversarial intentions. The purpose of this paper is (...)
    No categories
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark   1 citation  
  15.  98
    Simulations in Cyber-Security: A Review of Cognitive Modeling of Network Attackers, Defenders, and Users. [REVIEW]Vladislav D. Veksler, Norbou Buchler, Blaine E. Hoffman, Daniel N. Cassenti, Char Sample & Shridat Sugrim - 2018 - Frontiers in Psychology 9.
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark   2 citations  
  16.  58
    The regulatory intersections between artificial intelligence, data protection and cyber security: challenges and opportunities for the EU legal framework.Jozef Andraško, Matúš Mesarčík & Ondrej Hamuľák - forthcoming - AI and Society:1-14.
    The presented paper focuses on the analysis of strategic documents at the level of the European Union concerning the regulation of artificial intelligence as one of the so-called disruptive technologies. In the first part of the article, we outline the basic terminology. Subsequently, we focus on the summarizing and systemizing of the key documents adopted at the EU level in terms of artificial intelligence regulation. The focus of the paper is devoted to issues of personal data protection and cyber (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark   1 citation  
  17.  16
    When the future meets the past: Can safety and cyber security coexist in modern critical infrastructures?Awais Rashid, Sveta Milyaeva & Ola Michalec - 2022 - Big Data and Society 9 (1).
    Big data technologies are entering the world of ageing computer systems running critical infrastructures. These innovations promise to afford rapid Internet connectivity, remote operations or predictive maintenance. As legacy critical infrastructures were traditionally disconnected from the Internet, the prospect of their modernisation necessitates an inquiry into cyber security and how it intersects with traditional engineering requirements like safety, reliability or resilience. Looking at how the adoption of big data technologies in critical infrastructures shapes understandings of risk management, we (...)
    No categories
    Direct download  
     
    Export citation  
     
    Bookmark  
  18.  13
    Improving Student Engagement in the Study of Professional Ethics: Concepts and an Example in Cyber Security.John D. Bustard - 2018 - Science and Engineering Ethics 24 (2):683-698.
    In spite of the acknowledged importance of professional ethics, technical students often show little enthusiasm for studying the subject. This paper considers how such engagement might be improved. Four guiding principles for promoting engagement are identified: aligning teaching content with student interests; taking a pragmatic rather than a philosophical approach to issue resolution; addressing the full complexity of real-world case studies; and covering content in a way that students find entertaining. The use of these principles is then discussed with respect (...)
    Direct download (7 more)  
     
    Export citation  
     
    Bookmark   1 citation  
  19.  5
    Ai Development and the ‘Fuzzy Logic' of Chinese Cyber Security and Data Laws.Max Parasol - 2021 - Cambridge University Press.
    The book examines the extent to which Chinese cyber and network security laws and policies act as a constraint on the emergence of Chinese entrepreneurialism and innovation. Specifically, how the contradictions and tensions between data localisation laws affect innovation in artificial intelligence. The book surveys the globalised R&D networks, and how the increasing use of open-source platforms by leading Chinese AI firms during 2017–2020, exacerbated the apparent contradiction between Network Sovereignty and Chinese innovation. The drafting of the (...) Security Law did not anticipate the changing nature of globalised AI innovation. It is argued that the deliberate deployment of what the book refers to as 'fuzzy logic' in drafting the Cyber Security Law allowed regulators to subsequently interpret key terms regarding data in that Law in a fluid and flexible fashion to benefit Chinese innovation. (shrink)
    No categories
    Direct download  
     
    Export citation  
     
    Bookmark  
  20.  11
    Cyber Teaming and Role Specialization in a Cyber Security Defense Competition.Norbou Buchler, Claire Genevieve La Fleur, Blaine Hoffman, Prashanth Rajivan, Laura Marusich & Lewis Lightner - 2018 - Frontiers in Psychology 9.
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark   2 citations  
  21.  3
    An Exploratory Study Into the Negotiation of Cyber-Security Within the Family Home.Kate Muir & Adam Joinson - 2020 - Frontiers in Psychology 11.
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  22.  6
    Packets tokenization methods for web layer cyber security.Rafał Kozik, Michał Choraś & Witold Hołubowicz - 2017 - Logic Journal of the IGPL 25 (1):103-113.
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  23.  6
    Analysis of Impact of Industry 4.0 on Africa, Eastern Europe and US: A Case Study of Cyber-Security and Sociopolitical Dynamics of Nigeria, Russia and USA. [REVIEW]James Chike Nwankwo - 2022 - Bulletin of Science, Technology and Society 42 (1-2):3-10.
    This article explores the technological innovations associated with industry 4.0 and how it has altered virtually every aspect of the human life. Even though in the process of redefining technology, the insatiable and complex needs of man can be met quite considerably, there are various challenges observed with its usage by individuals, groups, business organizations and countries. Some of the consequences highlighted in this study include cyber-threat or attacks against businesses and individuals, political figures and government. Therefore the author (...)
    No categories
    Direct download  
     
    Export citation  
     
    Bookmark  
  24.  31
    Ethics and Cyber Warfare: The Quest for Responsible Security in the Age of Digital Warfare.George R. Lucas - 2016 - New York, US: Oxford University Press USA.
    From North Korea's recent attacks on Sony to perpetual news reports of successful hackings and criminal theft, cyber conflict has emerged as a major topic of public concern. Yet even as attacks on military, civilian, and commercial targets have escalated, there is not yet a clear set of ethical guidelines that apply to cyber warfare. Indeed, like terrorism, cyber warfare is commonly believed to be a war without rules. Given the prevalence cyber warfare, developing a practical (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark   2 citations  
  25. Ethics and Cyber Warfare: The Quest for Responsible Security in the Age of Digital Warfare, by George Lucas.Fritz Allhoff - 2017 - Journal of Military Ethics 16 (1-2):124-127.
    This book review responds to George Lucas's Ethics and Cyber Warfare: The Quest for Responsible Security in an Age of Digital Warfare, laying out the structure of the work as well as highlighting areas of strength.
    Direct download (5 more)  
     
    Export citation  
     
    Bookmark  
  26.  21
    The Ethics of Cyber Attack: Pursuing Legitimate Security and the Common Good in Contemporary Conflict Scenarios.David J. Lonsdale - 2020 - Journal of Military Ethics 19 (1):20-39.
    Cyber attack against Critical National Infrastructure is a developing capability in state arsenals. The onset of this new instrument in national security has implications for conflict thresholds an...
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark  
  27.  22
    Security-by-Experiment: Lessons from Responsible Deployment in Cyberspace.Wolter Pieters, Dina Hadžiosmanović & Francien Dechesne - 2016 - Science and Engineering Ethics 22 (3):831-850.
    Conceiving new technologies as social experiments is a means to discuss responsible deployment of technologies that may have unknown and potentially harmful side-effects. Thus far, the uncertain outcomes addressed in the paradigm of new technologies as social experiments have been mostly safety-related, meaning that potential harm is caused by the design plus accidental events in the environment. In some domains, such as cyberspace, adversarial agents may be at least as important when it comes to undesirable effects of deployed technologies. In (...)
    Direct download (12 more)  
     
    Export citation  
     
    Bookmark   1 citation  
  28. State Management Mechanisms for the Exchange of Information Regarding Cyberattacks, Cyber Incidents and Information Security Incidents.Myroslav Kryshtanovych, Igor Britchenko, Peter Lošonczi, Tetiana Baranovska & Ulyana Lukashevska - 2022 - IJCSNS International Journal of Computer Science and Network Security 22 (4):33-38.
    The main purpose of the study is to determine the key aspects of the mechanisms of state management of the exchange of information about cyberattacks, cyber incidents, and information security incidents. The methodology includes a set of theoretical methods. Modern government, on the one hand, must take into account the emergence of such a new weapon as cyber, which can break various information systems, can be used in hybrid wars, influence political events, pose a threat to the (...)
    No categories
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  29.  29
    Rethinking Cyber War.Daniel K. Rosenfield - 2009 - Critical Review: A Journal of Politics and Society 21 (1):77-90.
    ABSTRACT Cybernetic attacks have been wrongly perceived as weapons of physical destruction rather than of disruption. Because modern, post‐industrial societies have become critically dependent on computer networks to function on a day‐to‐day basis, disruption of those networks could have serious social and economic consequences. In order to better protect society, policymakers will have to re‐orient their approach toward cyber security so as to emphasize the genuine cybernetic threat, which is network disruption rather than physical destruction.
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark   1 citation  
  30.  47
    Cyber Attacks and Terrorism: A Twenty-First Century Conundrum.Marwan Albahar - 2019 - Science and Engineering Ethics 25 (4):993-1006.
    In the recent years, an alarming rise in the incidence of cyber attacks has made cyber security a major concern for nations across the globe. Given the current volatile socio-political environment and the massive increase in the incidence of terrorism, it is imperative that government agencies rapidly realize the possibility of cyber space exploitation by terrorist organizations and state players to disrupt the normal way of life. The threat level of cyber terrorism has never been (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark   1 citation  
  31.  27
    Ethics and Cyber Warfare: The Quest for Responsible Security in the Age of Digital Warfare, George Lucas , 208 pp., $36.95 cloth. [REVIEW]Ryan Jenkins - 2017 - Ethics and International Affairs 31 (4):515-518.
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  32.  50
    Cyber Force and the Role of Sovereign States in Informational Warfare.Ugo Pagallo - 2015 - Philosophy and Technology 28 (3):407-425.
    The use of cyber force can be as severe and disruptive as traditional armed attacks are. Cyber attacks may neither provoke physical injuries nor cause property damages and still, they can affect essential functions of today’s societies, such as governmental services, business processes or communication systems that progressively depend on information as a vital resource. Whereas several scholars claim that an international treaty, much as new forms of international cooperation, are necessary, a further challenge should be stressed: authors (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark   1 citation  
  33.  25
    Cyber Warfare Ethics.Michael Skerker & David Whetham (eds.) - 2021 - Howgate Publishing.
    Cyber technology gives states the ability to accomplish effects that once required kinetic action. These effects can now be achieved with cyber means in a manner that is covert, deniable, cheap, and technologically feasible for many governments. In some cases, cyber means are morally preferable to conventional military operations, but in other cases, cyber's unique qualities can lead to greater mischief than governments would have chanced using kinetic means. This volume addresses the applicability of traditional military (...)
    No categories
    Direct download  
     
    Export citation  
     
    Bookmark  
  34.  10
    IIoT and cyber-resilience.Sebastian Gajek, Michael Lees & Christoph Jansen - forthcoming - AI and Society:1-11.
    Contemporary business often encompasses or aspires towards the automated, networked production of industrial goods across transnational supply chains that have many digitalized interfaces. This allows competitive operations in time, costs, and quality, which have been widely discussed. On the downside, it entails cyber threats with significant risks for society in areas including business, environment, and health. Hence, to adequately manage these risks in the emerging digital world, there is a vital necessity to raise awareness, establish, maintain, and further develop (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  35.  82
    Where computer security meets national security.Helen Nissenbaum - 2005 - Ethics and Information Technology 7 (2):61-73.
    This paper identifies two conceptions of security in contemporary concerns over the vulnerability of computers and networks to hostile attack. One is derived from individual-focused conceptions of computer security developed in computer science and engineering. The other is informed by the concerns of national security agencies of government as well as those of corporate intellectual property owners. A comparative evaluation of these two conceptions utilizes the theoretical construct of “securitization,”developed by the Copenhagen School of International Relations.
    Direct download (4 more)  
     
    Export citation  
     
    Bookmark   4 citations  
  36.  3
    Validation of Cyber Test for Future Soldiers: A Test Battery for the Selection of Cyber Soldiers.Patrik Lif, Teodor Sommestad, Pär-Anders Albinsson, Christian Valassi & Daniel Eidenskog - 2022 - Frontiers in Psychology 13.
    To facilitate recruitment of conscript cyber soldiers in Sweden, the Cyber Test for Future Soldiers was developed as a complement to the existing generic enrolment test. Consisting of several parts, CTFS measures different aspects of computer-related knowledge and cognitive abilities that we believe are of particular relevance to cyber security. This article describes the evaluation regarding CTFS’s validity and reliability based on data from 62 conscripts that took the test and the 27 selected conscripts finishing the (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  37. Intentionally secure : teaching students to become responsible and ethical users.Judith Lewandowski - 2019 - In Ashley Blackburn, Irene Linlin Chen & Rebecca Pfeffer (eds.), Emerging trends in cyber ethics and education. Hershey, PA: Information Science Reference.
     
    Export citation  
     
    Bookmark   1 citation  
  38. The Transhuman Security Dilemma.Daniel McIntosh - 2010 - Journal of Evolution and Technology 21 (2):32-48.
    Developments in genetics, cyber-technology, nanotechnology, biotechnology, artificial intelligence, and other areas hold the promise – and the peril – of redefining what it means to be human. In addition to hedonism or a desire for self-improvement, the possibilities of these technologies plus the rational concern of falling behind a potential adversary produce a classic security dilemma. These competitive pressures among states, firms, and emerging “super-empowered individuals” encourage the development and dissemination of these technologies, and already the possibilities are (...)
     
    Export citation  
     
    Bookmark   4 citations  
  39.  12
    Toward Personalized Deceptive Signaling for Cyber Defense Using Cognitive Models.Edward A. Cranford, Cleotilde Gonzalez, Palvi Aggarwal, Sarah Cooney, Milind Tambe & Christian Lebiere - 2020 - Topics in Cognitive Science 12 (3):992-1011.
    The purpose of cognitive models is to make predictive simulations of human behaviour, but this is often done at the aggregate level. Cranford, Gonzalez, Aggarwal, Cooney, Tambe, and Lebiere show that they can automatically customize a model to a particular individual on‐the‐fly, and use it to make specific predictions about their next actions, in the context of a particular cybersecurity game.
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark   6 citations  
  40.  13
    Security Risk Analysis of Active Distribution Networks with Large-Scale Controllable Loads under Malicious Attacks.Jiaqi Liang, Yibei Wu, Jun’E. Li, Xiong Chen, Heqin Tong & Ming Ni - 2021 - Complexity 2021:1-12.
    With the development of distributed networks, the remote controllability of the distributed energy objects and the vulnerability of user-side information security protection measures make distributed energy objects extremely vulnerable to malicious control by attackers. Hence, the large-scale loads may produce abnormal operation performance, such as load casting/dropping synchronously or frequent and synchronous casting and dropping, and hence, it can threaten the security and stable operation of the distribution networks. First, we analyze the security threats faced by industrial (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  41.  12
    High-Order Observer-Based Sliding Mode Control for the Isolated Microgrid with Cyber Attacks and Physical Uncertainties.Hao Wang, He Jiang, Yan Zhao, Huanxin Guan, Bo Hu & Shunjiang Wang - 2020 - Complexity 2020:1-11.
    System security is essential for the operation of the island microgrid. However, the system security is generally threatened due to the presence of physical uncertainties and cyber attacks. In this article, a novel sliding mode load control strategy is proposed for the microgrid to mitigate cyber attacks and physical uncertainties. Firstly, a high-order disturbance observer is designed to estimate the unmeasurable factors in the microgrid. Secondly, a HODO-based sliding mode control strategy is proposed where the estimated (...)
    No categories
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  42.  18
    Economic language and economy change: with implications for cyber-physical systems.Alan Cottey - 2018 - AI and Society 33 (3):323-333.
    The implementation of cyber-physical and similar systems depends on prevailing social and economic conditions. It is here argued that, if the effect of these technologies is to be benign, the current neo-liberal economy must change to a radically more cooperative model. In this paper, economy change means a thorough change to a qualitatively different kind of economy. It is contrasted with economic change, which is the kind of minor change usually considered in mainstream discourse. The importance of language is (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  43.  13
    Towards a Cognitive Theory of Cyber Deception.Edward A. Cranford, Cleotilde Gonzalez, Palvi Aggarwal, Milind Tambe, Sarah Cooney & Christian Lebiere - 2021 - Cognitive Science 45 (7):e13013.
    This work is an initial step toward developing a cognitive theory of cyber deception. While widely studied, the psychology of deception has largely focused on physical cues of deception. Given that present‐day communication among humans is largely electronic, we focus on the cyber domain where physical cues are unavailable and for which there is less psychological research. To improve cyber defense, researchers have used signaling theory to extended algorithms developed for the optimal allocation of limited defense resources (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  44.  6
    Non-Traditional Security Threats and NATO’s Response in the Contemporary Security Environment.Albulena Halili - 2023 - Seeu Review 18 (2):148-165.
    This research paper emphasizes the importance of NATO’s adaptation to non-traditional threats in maintaining stability and security in the changing security environment. It highlights the need for NATO allies to prioritize the development of strategies and action plans that address emerging issues such as new technologies, energy security, climate change, hybrid threats, and cyber threats. The paper suggests that in order to effectively counter these non-traditional threats, NATO must remain current with the latest technological advancements. As (...)
    No categories
    Direct download  
     
    Export citation  
     
    Bookmark  
  45.  13
    Academic Information Security Researchers: Hackers or Specialists?Mehdi Dadkhah, Mohammad Lagzian & Glenn Borchardt - 2018 - Science and Engineering Ethics 24 (2):785-790.
    In this opinion piece, we present a synopsis of our findings from the last 2 years concerning cyber-attacks on web-based academia. We also present some of problems that we have faced and try to resolve any misunderstandings about our work. We are academic information security specialists, not hackers. Finally, we present a brief overview of our methods for detecting cyber fraud in an attempt to present general guidelines for researchers who would like to continue our work. We (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  46.  71
    A Novel Security Methodology for Smart Grids: A Case Study of Microcomputer-Based Encryption for PMU Devices.Metin Varan, Akif Akgul, Fatih Kurugollu, Ahmet Sansli & Kim Smith - 2021 - Complexity 2021:1-15.
    Coordination of a power system with the phasor measurement devices in real time on the load and generation sides is carried out within the context of smart grid studies. Power systems equipped with information systems in a smart grid pace with external security threats. Developing a smart grid which can resist against cyber threats is considered indispensable for the uninterrupted operation. In this study, a two-way secure communication methodology underpinned by a chaos-based encryption algorithm for PMU devices is (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  47.  9
    Research on data mining method of network security situation awareness based on cloud computing.Rajan Miglani, Abdullah M. Baqasah, Roobaea Alroobaea, Guodong Zhao & Ying Zhou - 2022 - Journal of Intelligent Systems 31 (1):520-531.
    Due to the complexity and versatility of network security alarm data, a cloud-based network security data extraction method is proposed to address the inability to effectively understand the network security situation. The information properties of the situation are generated by creating a set of spatial characteristics classification of network security knowledge, which is then used to analyze and optimize the processing of hybrid network security situation information using cloud computing technology and co-filtering technology. Knowledge and (...)
    Direct download  
     
    Export citation  
     
    Bookmark  
  48.  12
    Study on data mining method of network security situation perception based on cloud computing.Rahul Neware, Vishal Jagota, Arshpreet Kaur & Yan Zhang - 2022 - Journal of Intelligent Systems 31 (1):1074-1084.
    In recent years, the network has become more complex, and the attacker’s ability to attack is gradually increasing. How to properly understand the network security situation and improve network security has become a very important issue. In order to study the method of extracting information about the security situation of the network based on cloud computing, we recommend the technology of knowledge of the network security situation based on the data extraction technology. It converts each received (...)
    No categories
    Direct download  
     
    Export citation  
     
    Bookmark  
  49.  9
    Technology: COVID-19 and the ‘New-Normal’ Lifestyle vs. Security Challenges.Visar Shehu & Adrian Besimi - 2020 - Seeu Review 15 (1):71-85.
    In the last period, especially during the COVID-19 pandemics, individuals as well as institutions globally and in North Macedonia particularly, have failed to correctly respond to the new challenges related to cyber security, online attacks, and fake news. Being that in a state of isolation and quarantine most governmental institutions have heavily relied on online tools to communicate among each other and with the public, it is quite evident that they have not been well prepared to adopt new (...)
    No categories
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark  
  50.  22
    Apriori Algorithm for the Data Mining of Global Cyberspace Security Issues for Human Participatory Based on Association Rules.Zhi Li, Xuyu Li, Runhua Tang & Lin Zhang - 2021 - Frontiers in Psychology 11.
    This study explored the global cyberspace security issues, with the purpose of breaking the stereotype of people’s cognition of cyberspace problems, which reflects the relationship between interdependence and association. Based on the Apriori algorithm in association rules, a total of 181 strong rules were mined from 40 target websites and 56,096 web pages were associated with global cyberspace security. Moreover, this study analyzed support, confidence, promotion, leverage, and reliability to achieve comprehensive coverage of data. A total of 15,661 (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark   2 citations  
1 — 50 / 1000