Results 91 to 100 of about 4,199 (192)

The intersection of AI, cyberterrorism and hybrid warfare: a new paradigm in global security [PDF]

open access: yesAnte Portas
This article explores the relationship between cyberterrorism, artificial intelligence (AI), and hybrid warfare, with a particular emphasis on how AI-driven technologies are changing how modern combat is conducted.
Levan Kalatozishvili
doaj  

Cybersecurity: mapping the ethical terrain [PDF]

open access: yes
This edited collection examines the ethical trade-offs involved in cybersecurity: between security and privacy; individual rights and the good of a society; and between the types of burdens placed on particular groups in order to protect others ...
Adam C. Gastineau   +5 more
core  

Hacking as a social phenomenon [PDF]

open access: yes, 2015
У науковій статті подано інформацію про роль хакерства у соціальній сфері. Розглянуто деякі питання про місце хакерства у сучасному світі, його розвиток та діяльність. Проведено аналіз щодо принципів хакерської етики.
Yesina, O.   +2 more
core  

Carnivore: Will It Devour Your Privacy? [PDF]

open access: yes, 2001
Perhaps you have written an e-mail that looks something like ...
Goodman, Joseph   +3 more
core   +1 more source

Cyberterrorism

open access: yes, 2000
In 1996, a computer hacker allegedly associated with the White Supremacist movement temporarily disabled a Massachusetts Internet Service Provider and damaged part of the ISP=s record keeping system. The ISP had attempted to stop the hacker from sending out worldwide racist messages under the ISP=s name. The hacker signed off with the threat, “you have
openaire   +1 more source

Cyberterrorism: suatu Tantangan Komunikasi Asimetris Bagi Ketahanan Nasional [PDF]

open access: yes, 2017
Cyberterrorism merupakan aktivitas dan/atau metode yang digunakan oleh sejumlah jaringan atau kelompok teroris. Tidak dapat dipungkiri bahwa dunia maya dan kemajuan teknologi mudah menjadi wadah bagi mereka dalam melakukan aksinya.
A.S, Aa Bambang, Fitriana, I. (Idealisa)
core  

Nota de prensa [PDF]

open access: yes, 2013
Un estudio publicado por la Cátedra de Economía del Terrorismo revela que las bombas de Boston tuvieron un impacto significativo sobre las bolsas mundiales.
Baumert, Thomas   +2 more
core   +1 more source

La nueva estrategia comunicativa de los grupos terroristas

open access: yesRevista Enfoques, 2010
Many terrorist groups are seeing tremendously benefited from technological advances. For example, the Internet has increased communication skills and propaganda of terrorist groups, since until then the only way to get publicity was to the attention of ...
Gema Sánchez
doaj  

An experimental study of countermeasures against threats: real-world effects meet treatment effects. [PDF]

open access: yesQual Quant, 2022
Chytilek R   +6 more
europepmc   +1 more source

Home - About - Disclaimer - Privacy