Results 41 to 50 of about 90,875 (224)
Model Pemantauan Keamanan Jaringan Melalui Aplikasi Telegram Dengan Snort
Network security is the main of the development of today's technology. The ease in accessing the internet also requires protection on users is required. The ease of accessing the internet by people can also cause the occurrence of cyber crime.
Natanael Christianto, Wiwin Sulistyo
doaj +1 more source
Land Use Transformation and Climate Resilience in Smart Cities: Role of ICT in Modern Urban Planning
ABSTRACT Modern urban planning is experiencing a transition from traditional planning to the integration of information technology, which defines the concept of a “smart city”. The study analyses the evolution of urban planning practices with an emphasis on the role of engineering and architecture in the process of urbanization, the transition to the ...
Dariusz Cichoń
wiley +1 more source
Governing cyber security through networks : an analysis of cyber security coordination in Belgium [PDF]
While governments develop formal and informal structures or 'networks' to promote collaboration between governmental departments and agencies, there remains uncertainty on how to set up and develop cyber security networks. The latter is demonstrated when
Rondelez, Rafaël
core +3 more sources
Collaborating in future states—Contextual instability, paradigmatic remaking, and public policy
Abstract Collaboration is ubiquitous in public policy life, with its presence and profile determined by prevailing governance conditions. Commitments to globalisation and marketisation in the latter part of the 20th century marked the onset of an era defined by collaboration, between and across tiers and spheres of government, with non‐state actors ...
Helen Sullivan
wiley +1 more source
Inthe rapidly evolving digital landscape, the proliferation of technology has brought about unprecedented opportunities for innovation and connectivity, but it has also given rise to new challenges and threats. Cyber law, as a field, has emerged to navigate the legal dimensions of this digital realm, addressing issues ranging from data privacy and ...
Dr.C.K GOMATHY +2 more
openaire +1 more source
Fear and perceived likelihood of victimization in the traditional and cyber settings [PDF]
This study considers the influence of perceived likelihood, demographics (gender and education) and personality on fear of victimization and cyber-victimization using a survey design (N=159).
Jeske, Debora, Maddison, Jessica
core +1 more source
The State Itself as a Vulnerable Subject? Existential Resilience under International Law
This paper proposes a new framework for analysis of the law governing State continuity, with particular reference to Small Island Developing States (SIDS) threatened with legal extinction as a result of rising sea‐levels. Prevailing wisdom suggests that if States were to lose their inhabitable land or permanently resident populations, their status ...
Alex Green (文浩航)
wiley +1 more source
Correlating Orphaned Windows Registry Data Structures
Recently, it has been shown that deleted entries of the Microsoft Windows registry (keys) may still reside in the system files once the entries have been deleted from the active database.
Damir Kahved, Tahar Kechadi
doaj
Human organ trafficking in the cyber space [PDF]
The accelerated growth of the information-communication technology use brought about cyber crime as a new form of crime connected with the misuse of computer network.
Vuletić Dejan
doaj +1 more source

