Results 51 to 60 of about 5,305 (181)
Approaches to cyber weapons classification problem
Article focuses on the problem of classification of modern and prospective cyber weapons. Suggested complex of characteristics, based on analytical approach allows for type determination for existing and future cyber weapons.
V. V. Kabernik
doaj +1 more source
Resilience quantification model for cyber‐physical power systems
A novel resilience model and quantification framework are proposed. The model is based on a resilience trapezoid that depicts the different phases of the cyber and physical domains during severe natural or anthropogenic events. Abstract As power grids develop, their structure becomes more complex, multi‐dimensional, and digitalised—hence, it is ...
Mohammad AlMuhaini
wiley +1 more source
The Tension Between Privacy and Security [PDF]
A Review of President’s Review Group on Intelligence and Communications Technologies, Liberty and Security in a Changing World, 2013 and United Nations Office of the High Commissioner, Report of the Special Rapporteur on the Right to Privacy, Joseph A ...
De Baets, Antoon, Maret, Susan
core +2 more sources
Abstract Artificial intelligence (AI) has become a part of the mainstream public discourse beyond expert communities about its risks, benefits, and need for regulation. In particular, since 2014, the news media have intensified their coverage of this emerging technology and its potential impact on most domains of society.
Andreas Schwarz +1 more
wiley +1 more source
Estados Unidos, poder cibernético e a “guerra cibernética
Inserted in the context of an emerging theme in international relations, cyber conflicts, this article aims to show how the United States, in the Bush (son) and Barack Obama governments, have used the cyberpower, specifically "cyberwar" and cyber ...
Bernardo Wahl Gonçalves de Araújo Jorge
doaj
Exegetic Cyberwar: Religious Dialectics In New Media
This study concern the role of the media in creating dialectics of religious interpretation in cyberspace. The focus is mainly on the influence of the content of lecturers on YouTube on religious debates among netizens.
Muhammad Muhammad, Mohamad Yusup
doaj +1 more source
Meeting the Challenge of Cyberterrorism: Defining the Military Role in a Democracy [PDF]
Denna forskningskonsumtion strävar efter att utifrån två frågeställningar undersöka dels var det deliberativa samtalets möjligheter och begränsningar ligger, dels undersöka hur det deliberativa samtalet påverkar lärarrollen i klassrummet.
Dunlap, Charles J., Jr.
core +1 more source
Abstract This paper aims to explore how children's achieving privacy is interwoven with parental recognition of their agency, by providing empirical accounts of family lives in Türkiye. Building on a relational understanding of agency and privacy, it debates both concepts as social constructs that can be distinctively understood in western and Turkish ...
Hamide Elif Üzümcü
wiley +1 more source
Just cyber war?: Casus belli, information ethics, and the human perspective [PDF]
Does the advent of cyber-war require us to abandon the traditional ethical framework for thinking about the morality of warfare - just war theory - and develop principles specific to the unique nature of cyber-attacks?
Arquilla +11 more
core +1 more source
Abstract Gatekeepers, including prerogative elites and institutions, possess multifaceted tools for controlling information. Historically, these gatekeepers have systematically instrumentalized visual information to shape audience perceptions in alignment with specific agendas.
Khalid Durani +4 more
wiley +1 more source

