Results 41 to 50 of about 90,875 (224)

Model Pemantauan Keamanan Jaringan Melalui Aplikasi Telegram Dengan Snort

open access: yesJuTISI (Jurnal Teknik Informatika dan Sistem Informasi), 2021
Network security is the main of the development of today's technology. The ease in accessing the internet also requires protection on users is required. The ease of accessing the internet by people can also cause the occurrence of cyber crime.
Natanael Christianto, Wiwin Sulistyo
doaj   +1 more source

Land Use Transformation and Climate Resilience in Smart Cities: Role of ICT in Modern Urban Planning

open access: yesLand Degradation &Development, EarlyView.
ABSTRACT Modern urban planning is experiencing a transition from traditional planning to the integration of information technology, which defines the concept of a “smart city”. The study analyses the evolution of urban planning practices with an emphasis on the role of engineering and architecture in the process of urbanization, the transition to the ...
Dariusz Cichoń
wiley   +1 more source

Governing cyber security through networks : an analysis of cyber security coordination in Belgium [PDF]

open access: yes, 2015
While governments develop formal and informal structures or 'networks' to promote collaboration between governmental departments and agencies, there remains uncertainty on how to set up and develop cyber security networks. The latter is demonstrated when
Rondelez, Rafaël
core   +3 more sources

Collaborating in future states—Contextual instability, paradigmatic remaking, and public policy

open access: yesAustralian Journal of Public Administration, EarlyView.
Abstract Collaboration is ubiquitous in public policy life, with its presence and profile determined by prevailing governance conditions. Commitments to globalisation and marketisation in the latter part of the 20th century marked the onset of an era defined by collaboration, between and across tiers and spheres of government, with non‐state actors ...
Helen Sullivan
wiley   +1 more source

CYBER LAW AND CYBER CRIME

open access: yesINTERANTIONAL JOURNAL OF SCIENTIFIC RESEARCH IN ENGINEERING AND MANAGEMENT
Inthe rapidly evolving digital landscape, the proliferation of technology has brought about unprecedented opportunities for innovation and connectivity, but it has also given rise to new challenges and threats. Cyber law, as a field, has emerged to navigate the legal dimensions of this digital realm, addressing issues ranging from data privacy and ...
Dr.C.K GOMATHY   +2 more
openaire   +1 more source

Fear and perceived likelihood of victimization in the traditional and cyber settings [PDF]

open access: yes, 2014
This study considers the influence of perceived likelihood, demographics (gender and education) and personality on fear of victimization and cyber-victimization using a survey design (N=159).
Jeske, Debora, Maddison, Jessica
core   +1 more source

The State Itself as a Vulnerable Subject? Existential Resilience under International Law

open access: yesThe Modern Law Review, EarlyView.
This paper proposes a new framework for analysis of the law governing State continuity, with particular reference to Small Island Developing States (SIDS) threatened with legal extinction as a result of rising sea‐levels. Prevailing wisdom suggests that if States were to lose their inhabitable land or permanently resident populations, their status ...
Alex Green (文浩航)
wiley   +1 more source

Correlating Orphaned Windows Registry Data Structures

open access: yesJournal of Digital Forensics, Security and Law, 2009
Recently, it has been shown that deleted entries of the Microsoft Windows registry (keys) may still reside in the system files once the entries have been deleted from the active database.
Damir Kahved, Tahar Kechadi
doaj  

Human organ trafficking in the cyber space [PDF]

open access: yesTemida, 2009
The accelerated growth of the information-communication technology use brought about cyber crime as a new form of crime connected with the misuse of computer network.
Vuletić Dejan
doaj   +1 more source

Home - About - Disclaimer - Privacy