Results 41 to 50 of about 2,097 (152)
ABSTRACT Internet of Medical Things (IoMT) paradigm refers to the process of collection, transmission and analysis of healthcare data using communication and information systems over the internet. IoMT consist of medical devices that can link to the internet or other networks, including wearables, sensors, monitoring tools and other medical appliances.
Mert Melih Ozcelik +2 more
wiley +1 more source
Mirroring the videos of Anonymous:cloud activism, living networks, and political mimesis [PDF]
Mirrors describe the multiplication of data across a network. In this article, I examine the politics of mirroring as practiced on videos by the hacktivist network Anonymous.
Fish, Adam Richard
core +1 more source
Antagonistic symbiosis: The social construction of China's foreign policy
China is often considered as motivated by a desire to challenge the international status quo, a challenge the West is trying to mitigate. Social constructivists account for this challenge via a norm of nationalistic assertiveness in Chinese foreign policy; a norm constructed in the synergetic relationship between China's Communist Party and its ...
Lewis Eves
wiley +1 more source
Comprehensive Risk Identification Model for SCADA Systems
The world is experiencing exponential growth in the use of SCADA systems in many industrial fields. The increased and considerable growth in information and communication technology has been forcing SCADA organizations to shift their SCADA systems from proprietary technology and protocol‐based systems into internet‐based ones.
Abdelghafar M. Elhady +3 more
wiley +1 more source
Groups Online: Hacktivism and Social Protest [PDF]
Featuring coverage on a broad range of topics, such as behavioral analysis, cyberpsychology, and online privacy, this book is geared towards IT specialists, administrators, business managers, researchers, and students interested in online ..
McAlaney, John, Thackray, Helen
core
Abstract Australia's Higher Education and Research Sector (HERS) must adopt digital resilience strategies to tackle cybersecurity challenges and manage major crises effectively. In this study, we have developed a digital resilience framework to mitigate these cybersecurity issues.
Samreen Mahmood +2 more
wiley +1 more source
Cybercrimes: A Proposed Taxonomy and Challenges
Cybersecurity is one of the most important concepts of cyberworld which provides protection to the cyberspace from various types of cybercrimes. This paper provides an updated survey of cybersecurity. We conduct the survey of security of recent prominent researches and categorize the recent incidents in context to various fundamental principles of ...
Harmandeep Singh Brar +2 more
wiley +1 more source
Half-Lives of Hackers and the Shelf Life of Hacks [PDF]
What is the speed of hacking? Luca Follis and Adam Fish explore the temporality of hacking and leaking in the cases of Snowden, the DNC leaks and the Lauri Love ...
Fish, Adam Richard, Follis, Luca
core +1 more source
Contention For the Right to Information: Hacktivism as A Social Movement
Social movements have evolved significantly over time, adapting to historical developments and conditions. Initially perceived as aggressive and aimless, they have transformed into more organised forms, particularly in response to industrialisation. Post-
Elif Kara
doaj +1 more source
The social psychology of cybersecurity [PDF]
Cybersecurity incidents may seem very technological in nature, but ultimately the hackers and the organisations they target are people, with their own goals, influences and beliefs.
McAlaney, John +2 more
core

