Results 1 to 10 of about 104,319 (136)
A Survey on Cyber Security for Smart Grid Communications [PDF]
A smart grid is a new form of electricity network with high fidelity power-flow control, self-healing, and energy reliability and energy security using digital communications and control technology. To upgrade an existing power grid into a smart grid, it
Yi Qian, Hamid Sharif, David Tipper
exaly +3 more sources
Cyber security education is as essential as "the three R's". [PDF]
Smartphones have diffused rapidly across South African society and constitute the most dominant information and communication technologies in everyday use.
Venter IM +3 more
europepmc +5 more sources
"Cyber security has become a critical concern for individuals, businesses, and governments around the world. With the increasing reliance on technology and the internet, cyber attacks and data breaches have become more frequent and sophisticated. In this article, we examine the current state of cyber security and the most common types of cyber threats,
Vinisha Bhagwani, Sakina Balasinorwala
+5 more sources
This book offers a multifaceted exploration of cybersecurity through the lenses of policy, ethics, and advanced technology. It examines the complex interplay of law, diplomacy, and geopolitics in the digital age, emphasizing the protection of critical infrastructure and the impact of international conflict on global security.
Lehto Martti, Neittaanmäki Pekka
+9 more sources
Governing cyber security through networks : an analysis of cyber security coordination in Belgium [PDF]
While governments develop formal and informal structures or 'networks' to promote collaboration between governmental departments and agencies, there remains uncertainty on how to set up and develop cyber security networks. The latter is demonstrated when
Rondelez, Rafaël
core +3 more sources
European Cyber Security System [PDF]
Nowadays computer networks are widely spread in all spheres of human life. That is why the problem of cyber security of mankind is of great importance. Today, the European Union makes efforts to guarantee network safety in Europe by means of increase ...
Kolodiy, Yegor +2 more
core +2 more sources
Cyber security fear appeals:unexpectedly complicated [PDF]
Cyber security researchers are starting to experiment with fear appeals, with a wide variety of designs and reported efficaciousness. This makes it hard to derive recommendations for designing and deploying these interventions. We thus reviewed the wider
Albayram Y. +39 more
core +2 more sources
Cyber security and the Leviathan
Dedicated cyber-security functions are common in commercial businesses, who are confronted by evolving and pervasive threats of data breaches and other perilous security events. Such businesses are enmeshed with the wider societies in which they operate.
openaire +2 more sources
Collective monograph highlights the results of systematic scientific research devoted to the problems of economic cyber security as a component of the financial security of the state, and contains practical recommendations on measures to strengthen the security of the state, in particular strategically important enterprises, in the presence of modern ...
Victor Krasnobayev +26 more
openaire +3 more sources
How does intellectual capital align with cyber security? [PDF]
Purpose – To position the preservation and protection of intellectual capital as a cyber security concern. We outline the security requirements of intellectual capital to help Boards of Directors and executive management teams to understand their ...
Renaud, Karen +2 more
core +3 more sources

