Results 71 to 80 of about 4,199 (192)
The purpose of this article is to comparatively analyze the work carried out by the leading countries in the UN and the SCO on international information security (IIS).
А. I. Bedaev, A. M. Nogmov
doaj +1 more source
Radicalization and Counter-Radicalization on the Internet (Roles and Responsibilities of Stakeholders in Countering Cyber Terrorism) [PDF]
This article discusses how terrorists/terrorist organizations use the internet to carry out their actions; the roles and responsibilities of stakeholders in countering cyberterrorism.
Raharjo Agus +4 more
doaj +1 more source
Applying the Full Protection and Security Standard of International Investment Law to Digital Assets [PDF]
This article considers the possibility that digital assets of foreign investors such as websites and computer systems could be protected by the full protection and security (‘FPS’) standard common to many bilateral investment treaties.
Collins, D. A.
core +1 more source
UN Cybercrime Convention: Implementing the Mutual Legal Assistance in the Digital Age
Objective: to explore the evolution and comparative effectiveness of mutual legal assistance as a practical alternative to universal jurisdiction in the context of countering transnational cybercrime based on the provisions of the UN Cybercrime ...
Ya. A. Abdelkarim
doaj +1 more source
The purpose of this article is to analyze modern challenges in the field of cybersecurity and mechanisms for countering cyber threats, assess the problems our country faces in this area, and identify possible solutions. To achieve this goal, the article
Anna Sisoyan
doaj +1 more source
CYBERTERRORISM: THE LATEST CRIME AGAINST INTERNATIONAL PUBLIC ORDER [PDF]
Cyberterrorism has become the latest global threat that highlights security leaks in the digital world and its outcomes. Nowadays economic and social context as well as the advances in the field of information technology facilitated individuals ...
Sandra Sophie-Elise OLĂNESCU +1 more
doaj
Improving Security for SCADA Sensor Networks with Reputation Systems and Self-Organizing Maps
The reliable operation of modern infrastructures depends on computerized systems and Supervisory Control and Data Acquisition (SCADA) systems, which are also based on the data obtained from sensor networks.
Javier Blesa +9 more
doaj +1 more source
Cybersecurity as the basic for state and society security in the XXI venstury
Cybersecurity is one of the most common security topics at present times. Society has enormous capabilities and possibilities in the cyberspace, which create opportunities and threats as well.
Bujek Małgorzata
doaj +1 more source
The Police-ization of the Military [PDF]
This essay will briefly review the background of the use of the armed forces in a police capacity, discuss the growth of that role in the I980s and 1990s, and forecast an even greater expansion into that role in the near future due to the emerging threat
Dunlap, Charles J., Jr.
core +1 more source
Cyberterror: Prospects and Implications
Much has been made of the threat of cyberterrorism since the report of the Marsh Commission in 1997. However, current analyses have merely identified the plethora of vulnerabilities in automated information systems (computers) and assumed that terrorist organizations would be willing to exploit these vulnerabilities.
Nelson, Bill +4 more
openaire +2 more sources

