Results 51 to 60 of about 5,305 (181)

Approaches to cyber weapons classification problem

open access: yesVestnik MGIMO-Universiteta, 2013
Article focuses on the problem of classification of modern and prospective cyber weapons. Suggested complex of characteristics, based on analytical approach allows for type determination for existing and future cyber weapons.
V. V. Kabernik
doaj   +1 more source

Resilience quantification model for cyber‐physical power systems

open access: yesIET Cyber-Physical Systems: Theory &Applications, Volume 9, Issue 4, Page 454-462, December 2024.
A novel resilience model and quantification framework are proposed. The model is based on a resilience trapezoid that depicts the different phases of the cyber and physical domains during severe natural or anthropogenic events. Abstract As power grids develop, their structure becomes more complex, multi‐dimensional, and digitalised—hence, it is ...
Mohammad AlMuhaini
wiley   +1 more source

The Tension Between Privacy and Security [PDF]

open access: yes, 2016
A Review of President’s Review Group on Intelligence and Communications Technologies, Liberty and Security in a Changing World, 2013 and United Nations Office of the High Commissioner, Report of the Special Rapporteur on the Right to Privacy, Joseph A ...
De Baets, Antoon, Maret, Susan
core   +2 more sources

Rage against the machine? Framing societal threat and efficacy in YouTube videos about artificial intelligence

open access: yesRisk Analysis, Volume 44, Issue 10, Page 2377-2395, October 2024.
Abstract Artificial intelligence (AI) has become a part of the mainstream public discourse beyond expert communities about its risks, benefits, and need for regulation. In particular, since 2014, the news media have intensified their coverage of this emerging technology and its potential impact on most domains of society.
Andreas Schwarz   +1 more
wiley   +1 more source

Estados Unidos, poder cibernético e a “guerra cibernética

open access: yesMeridiano 47, 2017
Inserted in the context of an emerging theme in international relations, cyber conflicts, this article aims to show how the United States, in the Bush (son) and Barack Obama governments, have used the cyberpower, specifically "cyberwar" and cyber ...
Bernardo Wahl Gonçalves de Araújo Jorge
doaj  

Exegetic Cyberwar: Religious Dialectics In New Media

open access: yesEsensia: Jurnal Ilmu-Ilmu Ushuluddin, 2019
This study concern the role of the media in creating dialectics of religious interpretation in cyberspace. The focus is mainly on the influence of the content of lecturers on YouTube on religious debates among netizens.
Muhammad Muhammad, Mohamad Yusup
doaj   +1 more source

Meeting the Challenge of Cyberterrorism: Defining the Military Role in a Democracy [PDF]

open access: yes, 2002
Denna forskningskonsumtion strävar efter att utifrån två frågeställningar undersöka dels var det deliberativa samtalets möjligheter och begränsningar ligger, dels undersöka hur det deliberativa samtalet påverkar lärarrollen i klassrummet.
Dunlap, Charles J., Jr.
core   +1 more source

Children's personal lives in the family: Achieving relational agency and individual privacy in intrafamilial relationships in Türkiye

open access: yesChildren &Society, Volume 38, Issue 4, Page 1130-1146, July 2024.
Abstract This paper aims to explore how children's achieving privacy is interwoven with parental recognition of their agency, by providing empirical accounts of family lives in Türkiye. Building on a relational understanding of agency and privacy, it debates both concepts as social constructs that can be distinctively understood in western and Turkish ...
Hamide Elif Üzümcü
wiley   +1 more source

Just cyber war?: Casus belli, information ethics, and the human perspective [PDF]

open access: yes, 2017
Does the advent of cyber-war require us to abandon the traditional ethical framework for thinking about the morality of warfare - just war theory - and develop principles specific to the unique nature of cyber-attacks?
Arquilla   +11 more
core   +1 more source

Visual audience gatekeeping on social media platforms: A critical investigation on visual information diffusion before and during the Russo–Ukrainian War

open access: yesInformation Systems Journal, Volume 34, Issue 2, Page 415-468, March 2024.
Abstract Gatekeepers, including prerogative elites and institutions, possess multifaceted tools for controlling information. Historically, these gatekeepers have systematically instrumentalized visual information to shape audience perceptions in alignment with specific agendas.
Khalid Durani   +4 more
wiley   +1 more source

Home - About - Disclaimer - Privacy