Results 61 to 70 of about 4,917 (184)

The Tension Between Privacy and Security [PDF]

open access: yes, 2016
A Review of President’s Review Group on Intelligence and Communications Technologies, Liberty and Security in a Changing World, 2013 and United Nations Office of the High Commissioner, Report of the Special Rapporteur on the Right to Privacy, Joseph A ...
De Baets, Antoon, Maret, Susan
core   +2 more sources

Lessons from Stuxnet [PDF]

open access: yes, 2011
Malware such as Stuxnet can affect critical physical infra-structures that are controlled by software, which implies that threats might extend to real ...
Abu-Nimeh, S., Chen, T.
core   +1 more source

The digital augmentation of extremism: Reviewing and guiding online extremism research from a sociotechnical perspective

open access: yesInformation Systems Journal, Volume 34, Issue 3, Page 931-963, May 2024.
Abstract Online extremism remains a persistent problem despite the best efforts of governments, tech companies and civil society. Digital technologies can induce group polarization to promote extremism and cause substantial changes to extremism (e.g., create new forms of extremism, types of threats or radicalization approaches).
Marten Risius   +3 more
wiley   +1 more source

Ciberespacio y el Crimen Organizado. Los nuevos desafíos del siglo XXI [PDF]

open access: yesRevista Enfoques, 2012
The Occidental Societies are becoming more vulnerable by the possible cybernetic attacks because of their large dependency on Computer and Electronics Systems and fraud in the network. Moreover, Internet is an easily accessible, where any person, keeping
Gema Sánchez Medero
doaj  

Britain's emerging cyber-strategy [PDF]

open access: yes, 2016
© RUSI JOURNAL AUGUST/SEPTEMBER 2016. In recent years, cyber-power has attracted a great deal of attention in government strategy and security reviews. This has been matched by regular increases in budget and the establishment of new organisations to co ...
Lonsdale, David J.
core   +1 more source

Illusions of textuality: The semiotics of literary memes in contemporary media

open access: yesLiterature Compass, Volume 21, Issue 4-6, April-June 2024.
Abstract This article seeks to account for the phenomenon where cultural productions are able to transcend different chronotopes and masquerade in myriad forms while sustaining an illusion of itself as a text. Using the Barthian distinction between work and Text as its framework, the article argues that multimodal semiotics offers a theoretically ...
Tong King Lee
wiley   +1 more source

Cyberwarfare and the Use of Force Giving Rise to the Right of Self-Defense [PDF]

open access: yes, 2009
Cyberwarfare represents a novel weapon that has the potential to alter the way state and non-state actors conduct modern war. The unique nature of the threat and the ability for cyberwar practioners to inflict injury, death, and physical destruction via ...
Hoisington, Matthew
core  

The Effect of User Behavior in Online Banking on Cybersecurity Knowledge

open access: yesInternational Journal of Intelligent Systems, Volume 2024, Issue 1, 2024.
The expanding importance of technology, particularly mobile banking, in the financial industry, is examined in this literature review, as well as the crucial role that cybersecurity knowledge plays in protecting online transactions. Users now have the flexibility to conduct payments whenever and wherever they wish thanks to the advent of mobile banking.
Hamza Alrababah   +3 more
wiley   +1 more source

An assessment of threats to the American power grid

open access: yesEnergy, Sustainability and Society, 2019
Concern has been raised that the electrical grid of this nation is vulnerable to prolonged collapse. The postulated mechanisms are geomagnetic storms, electromagnetic pulse attacks (EMP) via a high altitude nuclear detonation, cyberattacks, and kinetic ...
Matthew Weiss, Martin Weiss
doaj   +1 more source

An assessment of the contemporary threat posed by network worm malware [PDF]

open access: yes, 2014
The cost of a zero-day network worm outbreak has been estimated to be up to US$2.6 billion. Additionally zeroday network worm outbreaks have been observed that spread at a significant pace across the global Internet, with an observed infection level of ...
Ahmad, Muhammad Aminu   +3 more
core  

Home - About - Disclaimer - Privacy