Results 71 to 80 of about 4,199 (192)

Information threats and international information security in the work of the United Nations and the OSCE

open access: yesСовременная наука и инновации
The purpose of this article is to comparatively analyze the work carried out by the leading countries in the UN and the SCO on international information security (IIS).
А. I. Bedaev, A. M. Nogmov
doaj   +1 more source

Radicalization and Counter-Radicalization on the Internet (Roles and Responsibilities of Stakeholders in Countering Cyber Terrorism) [PDF]

open access: yesE3S Web of Conferences
This article discusses how terrorists/terrorist organizations use the internet to carry out their actions; the roles and responsibilities of stakeholders in countering cyberterrorism.
Raharjo Agus   +4 more
doaj   +1 more source

Applying the Full Protection and Security Standard of International Investment Law to Digital Assets [PDF]

open access: yes, 2011
This article considers the possibility that digital assets of foreign investors such as websites and computer systems could be protected by the full protection and security (‘FPS’) standard common to many bilateral investment treaties.
Collins, D. A.
core   +1 more source

UN Cybercrime Convention: Implementing the Mutual Legal Assistance in the Digital Age

open access: yesJournal of Digital Technologies and Law
Objective: to explore the evolution and comparative effectiveness of mutual legal assistance as a practical alternative to universal jurisdiction in the context of countering transnational cybercrime based on the provisions of the UN Cybercrime ...
Ya. A. Abdelkarim
doaj   +1 more source

New Cybersecurity Challenges: Digital Transformation and the Political Implications of their Implementation

open access: yesJournal of Political Science: Bulletin of Yerevan University
The purpose of this article is to analyze modern challenges in the field of cybersecurity and mechanisms for countering cyber threats, assess the problems our country faces in this area, and identify possible solutions. To achieve this goal, the article
Anna Sisoyan
doaj   +1 more source

CYBERTERRORISM: THE LATEST CRIME AGAINST INTERNATIONAL PUBLIC ORDER [PDF]

open access: yesChallenges of the Knowledge Society, 2019
Cyberterrorism has become the latest global threat that highlights security leaks in the digital world and its outcomes. Nowadays economic and social context as well as the advances in the field of information technology facilitated individuals ...
Sandra Sophie-Elise OLĂNESCU   +1 more
doaj  

Improving Security for SCADA Sensor Networks with Reputation Systems and Self-Organizing Maps

open access: yesSensors, 2009
The reliable operation of modern infrastructures depends on computerized systems and Supervisory Control and Data Acquisition (SCADA) systems, which are also based on the data obtained from sensor networks.
Javier Blesa   +9 more
doaj   +1 more source

Cybersecurity as the basic for state and society security in the XXI venstury

open access: yesSafety & Defense, 2017
Cybersecurity is one of the most common security topics at present times. Society has enormous capabilities and possibilities in the cyberspace, which create opportunities and threats as well.
Bujek Małgorzata
doaj   +1 more source

The Police-ization of the Military [PDF]

open access: yes, 1999
This essay will briefly review the background of the use of the armed forces in a police capacity, discuss the growth of that role in the I980s and 1990s, and forecast an even greater expansion into that role in the near future due to the emerging threat
Dunlap, Charles J., Jr.
core   +1 more source

Cyberterror: Prospects and Implications

open access: yes, 1999
Much has been made of the threat of cyberterrorism since the report of the Marsh Commission in 1997. However, current analyses have merely identified the plethora of vulnerabilities in automated information systems (computers) and assumed that terrorist organizations would be willing to exploit these vulnerabilities.
Nelson, Bill   +4 more
openaire   +2 more sources

Home - About - Disclaimer - Privacy