The psychological effects of cyber terrorism. [PDF]
Gross ML, Canetti D, Vashdi DR.
europepmc +1 more source
Secure My Data or Pay the Price: Consumer Remedy for the Negligent Enablement of Data Breach
Every time we swipe our debit cards, pay our bills online, or sign up for a service like Netflix, we are entrusting important identifying information to the companies with which we do business.
Fisher, John A.
core
Merging Datasets of CyberSecurity Incidents for Fun and Insight. [PDF]
Abbiati G +3 more
europepmc +1 more source
Algo-Mech: Algo(rhythms) and Mech(animisms) [PDF]
The concepts of the algorithmic and the mechanical express a set of common processual concerns whilst cutting idiosyncratically across ideal and material planes.
Roberts, Spencer
core
The Morality Behind Supporting Crowdfunding Campaigns for Eco-Hacktivists
Christie Tetreault, Kiran M. Sarma
openaire +1 more source
Open access: the changing face of scientific publishing. [PDF]
Chatterjee P, Biswas T, Mishra V.
europepmc +1 more source
Security Issues and Software Updates Management in the Industrial Internet of Things (IIoT) Era. [PDF]
Mugarza I, Flores JL, Montero JL.
europepmc +1 more source
Cybersecurity policy framework requirements for the establishment of highly interoperable and interconnected health data spaces. [PDF]
Luidold C, Jungbauer C.
europepmc +1 more source
Supervisor experience and cybersecurity response in aviation organizations using a two-wave exploratory design. [PDF]
Mizrak F, Mizrak KC, Elbir U.
europepmc +1 more source

