Results 171 to 180 of about 196,474 (374)
Editorial: Cybersecurity (October 2014) [PDF]
Chris McPhee, Tony Bailetti
openalex +2 more sources
Controlling for Cybersecurity Risks of Medical Device Software [PDF]
Kevin Fu, James M. Blum
openalex +1 more source
The NCP cybersecurity challenges
The Next Computing Paradigm (NCP), with its numerous, interconnected and communicating elements, from servers and services to IoT, sensors and user interfaces, offers an immensely vast cyberattack surface. This must be addressed for the NCP to succeed.
Zendra, Olivier, Coppens, Bart
openaire +2 more sources
Technology for Whom and for What? A Global South View of Tech Diplomacy
ABSTRACT International politics is linked to its technical‐social character. Also, technology is socially constructed and thereby not entirely neutral or impartial. A tech‐driven geopolitical landscape has been a defining feature of contemporary world politics.
Eugenio V. Garcia
wiley +1 more source
Towards a Qatar Cybersecurity Capability Maturity Model with a Legislative Framework
In an age when cybersecurity vulnerabilities can be used as a pretext for a blockade, as in the case of Qatar prompted by a hack of the Qatar News Agency, it becomes incumbent upon states to consider legislating the capability maturity measurement and ...
رافاييل دين براون ج.د.
doaj
Healthcare Cybersecurity Risk Management: Keys To an Effective Plan [PDF]
Anthony J. Coronado+1 more
openalex +1 more source
Studying Tech Diplomacy—Introduction to the Special Issue on Tech Diplomacy
ABSTRACT This article serves as an introduction to the special issue on tech diplomacy, exploring its emergence and evolution as a distinct approach to global affairs in the era of the Fourth Industrial Revolution. Originating with Denmark's 2017 “TechPlomacy” initiative, tech diplomacy has gained global momentum, with over two dozen countries adopting
Corneliu Bjola, Markus Kornprobst
wiley +1 more source
Application research on network security operation automation practice based on RPA technology
The research focuses on the entire lifecycle of networks and information systems, aiming at the full-process scenarios of cybersecurity operations. It establishes a capability framework based on robotic process automation (RPA) technology and adaptive ...
ZHOU Ying
doaj +2 more sources
Cybersecurity activities for education and curriculum design: A survey
Cyber threats are one of the main concerns in this growing technology epoch. To tackle this issue, highly skilled and motivated cybersecurity professionals are increasingly in demand to prevent, detect, respond to, or even mitigate the effects of such ...
Muhusina Ismail+6 more
doaj