Results 111 to 120 of about 144,780 (287)

Cyber Attacks: Emerging Threats to the 21st Century Critical Information Infrastructures

open access: yesObrana a Strategie, 2012
The paper explores the notion of cyber attack as a concept for understanding modern conflicts. It starts by elaborating a conceptual theoretical framework, observing that when it comes to cyber attacks, cyber war and cyber defense there are no ...
Cezar Vasilescu
doaj  

Beyond Manoeuvre Theory for European Defence

open access: yesGlobal Policy, EarlyView.
ABSTRACT This article contributes to the debate about European defence in the light of the Russo‐Ukraine war and growing doubts about US commitment to Europe. It argues that Europeans need to fundamentally relearn the ability to imagine military strategy from a European viewpoint.
Lukas Mengelkamp, Sam Vincent
wiley   +1 more source

Western Balkans as the Frontline of Russian Hybrid Warfare

open access: yesGlobal Policy, EarlyView.
ABSTRACT Hybrid warfare (HW) scholarship acknowledges the phenomenon's contextual and temporal specificity, yet its dominant conceptual framing has generated a literature largely centred on identifying and categorising hybrid activities. This focus has left the contextual vulnerabilities that enable hybrid threats (HTs) and shape an adversary's ...
Vesna Bojicic‐Dzelilovic
wiley   +1 more source

Collaborating Across Boundaries: Toward an Integrated Cyber Risk Assessment by Internal Auditors and Cybersecurity Professionals Collaboration interprofessionnelle : vers une évaluation intégrée des cyberrisques par les auditeurs internes et les spécialistes en cybersécurité

open access: yesContemporary Accounting Research, EarlyView.
ABSTRACT Although cyber risk is widely recognized as a critical organizational threat, how firms configure internal roles and practices to address it remains poorly understood. This study offers insights into that question. In practice, two professional roles share the job of cyber risk assessment and assurance: cybersecurity specialists, who focus on ...
Sergeja Slapničar   +3 more
wiley   +1 more source

A Systematic Analysis of Enhancing Cyber Security Using Deep Learning for Cyber Physical Systems

open access: yesIEEE Access
In this current era, cyber-physical systems (CPSs) have gained concentrated consideration in various fields because of their emergent applications. Though the robust dependence on communication networks creates cyber-physical systems susceptible to ...
Shivani Gaba   +8 more
doaj   +1 more source

Exploring the Materiality of Data Breach Disclosures on the Australian Stock Exchange

open access: yesAbacus, EarlyView.
This study examines Australian Stock Exchange (ASX) data breach announcements to provide insights into the extent and nature of data breach disclosures, as well as the costs, particularly to stakeholder relationships. Using a dataset of all data breach‐related announcements on the ASX, we identify a lack of data breach disclosure and, where disclosures
Jane Andrew   +3 more
wiley   +1 more source

Cybersecurity at Sea: A Literature Review of Cyber-Attack Impacts and Defenses in Maritime Supply Chains

open access: yesInformation
The maritime industry is constantly evolving and posing new challenges, especially with increasing digitalization, which has raised concerns about cyber-attacks on maritime supply chain agents.
Maria Valentina Clavijo Mesa   +2 more
doaj   +1 more source

A Review on Cyber Security and Cyber Attacks

open access: yesJournal of Al-Qadisiyah for Computer Science and Mathematics
As technology has advanced, data protection has gotten more challenging. Information security now depends on cyber security. These days, protecting information is one of the biggest problems. Unquestionably, the Internet has created a new avenue for exploitation known as cybercrime because of the limitless amount of free websites.
Duaa Fadhel Najem, Suhad Muhajer Kareem
openaire   +1 more source

Cyber Attacks: Proportionality and Precautions in Attack

open access: yesSSRN Electronic Journal, 2012
Malicious cyber activities are becoming more and more commonplace, including between nations. This has caused great speculation as to the rules that govern military cyber operations, particularly during armed conflict. The upcoming publication of the Tallinn Manual on the International Law Applicable to Cyber Warfare is indicative of the importance of ...
openaire   +2 more sources

Home - About - Disclaimer - Privacy