Results 171 to 180 of about 196,474 (374)

The NCP cybersecurity challenges

open access: yes
The Next Computing Paradigm (NCP), with its numerous, interconnected and communicating elements, from servers and services to IoT, sensors and user interfaces, offers an immensely vast cyberattack surface. This must be addressed for the NCP to succeed.
Zendra, Olivier, Coppens, Bart
openaire   +2 more sources

Technology for Whom and for What? A Global South View of Tech Diplomacy

open access: yesGlobal Policy, EarlyView.
ABSTRACT International politics is linked to its technical‐social character. Also, technology is socially constructed and thereby not entirely neutral or impartial. A tech‐driven geopolitical landscape has been a defining feature of contemporary world politics.
Eugenio V. Garcia
wiley   +1 more source

Towards a Qatar Cybersecurity Capability Maturity Model with a Legislative Framework

open access: yesInternational Review of Law, 2019
In an age when cybersecurity vulnerabilities can be used as a pretext for a blockade, as in the case of Qatar prompted by a hack of the Qatar News Agency, it becomes incumbent upon states to consider legislating the capability maturity measurement and ...
رافاييل دين براون ج.د.
doaj  

Studying Tech Diplomacy—Introduction to the Special Issue on Tech Diplomacy

open access: yesGlobal Policy, EarlyView.
ABSTRACT This article serves as an introduction to the special issue on tech diplomacy, exploring its emergence and evolution as a distinct approach to global affairs in the era of the Fourth Industrial Revolution. Originating with Denmark's 2017 “TechPlomacy” initiative, tech diplomacy has gained global momentum, with over two dozen countries adopting
Corneliu Bjola, Markus Kornprobst
wiley   +1 more source

Application research on network security operation automation practice based on RPA technology

open access: yesDianxin kexue
The research focuses on the entire lifecycle of networks and information systems, aiming at the full-process scenarios of cybersecurity operations. It establishes a capability framework based on robotic process automation (RPA) technology and adaptive ...
ZHOU Ying
doaj   +2 more sources

Cybersecurity activities for education and curriculum design: A survey

open access: yesComputers in Human Behavior Reports
Cyber threats are one of the main concerns in this growing technology epoch. To tackle this issue, highly skilled and motivated cybersecurity professionals are increasingly in demand to prevent, detect, respond to, or even mitigate the effects of such ...
Muhusina Ismail   +6 more
doaj  

Least Effort Strategies for Cybersecurity

open access: green, 2003
Sean P. Gorman   +3 more
openalex   +2 more sources

Home - About - Disclaimer - Privacy