Results 41 to 50 of about 2,097 (152)

A Survey on Internet of Medical Things (IoMT): Enabling Technologies, Security and Explainability Issues, Challenges, and Future Directions

open access: yesExpert Systems, Volume 42, Issue 5, May 2025.
ABSTRACT Internet of Medical Things (IoMT) paradigm refers to the process of collection, transmission and analysis of healthcare data using communication and information systems over the internet. IoMT consist of medical devices that can link to the internet or other networks, including wearables, sensors, monitoring tools and other medical appliances.
Mert Melih Ozcelik   +2 more
wiley   +1 more source

Mirroring the videos of Anonymous:cloud activism, living networks, and political mimesis [PDF]

open access: yes, 2016
Mirrors describe the multiplication of data across a network. In this article, I examine the politics of mirroring as practiced on videos by the hacktivist network Anonymous.
Fish, Adam Richard
core   +1 more source

Antagonistic symbiosis: The social construction of China's foreign policy

open access: yesAsia Pacific Viewpoint, Volume 65, Issue 1, Page 123-129, April 2024.
China is often considered as motivated by a desire to challenge the international status quo, a challenge the West is trying to mitigate. Social constructivists account for this challenge via a norm of nationalistic assertiveness in Chinese foreign policy; a norm constructed in the synergetic relationship between China's Communist Party and its ...
Lewis Eves
wiley   +1 more source

Comprehensive Risk Identification Model for SCADA Systems

open access: yesSecurity and Communication Networks, Volume 2019, Issue 1, 2019., 2019
The world is experiencing exponential growth in the use of SCADA systems in many industrial fields. The increased and considerable growth in information and communication technology has been forcing SCADA organizations to shift their SCADA systems from proprietary technology and protocol‐based systems into internet‐based ones.
Abdelghafar M. Elhady   +3 more
wiley   +1 more source

Groups Online: Hacktivism and Social Protest [PDF]

open access: yes, 2018
Featuring coverage on a broad range of topics, such as behavioral analysis, cyberpsychology, and online privacy, this book is geared towards IT specialists, administrators, business managers, researchers, and students interested in online ..
McAlaney, John, Thackray, Helen
core  

Digital resilience framework for managing crisis: A qualitative study in the higher education and research sector

open access: yesJournal of Contingencies and Crisis Management, Volume 32, Issue 1, March 2024.
Abstract Australia's Higher Education and Research Sector (HERS) must adopt digital resilience strategies to tackle cybersecurity challenges and manage major crises effectively. In this study, we have developed a digital resilience framework to mitigate these cybersecurity issues.
Samreen Mahmood   +2 more
wiley   +1 more source

Cybercrimes: A Proposed Taxonomy and Challenges

open access: yesJournal of Computer Networks and Communications, Volume 2018, Issue 1, 2018., 2018
Cybersecurity is one of the most important concepts of cyberworld which provides protection to the cyberspace from various types of cybercrimes. This paper provides an updated survey of cybersecurity. We conduct the survey of security of recent prominent researches and categorize the recent incidents in context to various fundamental principles of ...
Harmandeep Singh Brar   +2 more
wiley   +1 more source

Half-Lives of Hackers and the Shelf Life of Hacks [PDF]

open access: yes, 2017
What is the speed of hacking? Luca Follis and Adam Fish explore the temporality of hacking and leaking in the cases of Snowden, the DNC leaks and the Lauri Love ...
Fish, Adam Richard, Follis, Luca
core   +1 more source

Contention For the Right to Information: Hacktivism as A Social Movement

open access: yesYeni Medya
Social movements have evolved significantly over time, adapting to historical developments and conditions. Initially perceived as aggressive and aimless, they have transformed into more organised forms, particularly in response to industrialisation. Post-
Elif Kara
doaj   +1 more source

The social psychology of cybersecurity [PDF]

open access: yes, 2016
Cybersecurity incidents may seem very technological in nature, but ultimately the hackers and the organisations they target are people, with their own goals, influences and beliefs.
McAlaney, John   +2 more
core  

Home - About - Disclaimer - Privacy