Results 1 to 10 of about 79,039 (285)

Examining cyber security implementation through TLS/SSL on academic institutional repository in Indonesia

open access: yesBerkala Ilmu Perpustakaan dan Informasi, 2021
Introduction. This paper examines the cybersecurity of AIR in Indonesia by analyzing the security aspect focusing on the security protocols involving network called TLS (Transport Layer Security) and SSL (Secure Socket Layer), which has functions to ...
Irhamni Ali
doaj   +3 more sources

Social Aspects of New Technologies - the CCTV and Biometric (Framing Privacy and Data Protection) in the Case of Poland [PDF]

open access: yesComparative Economic Research, 2011
The purpose of this paper is to review the institution responsible for the protection of personal data within the European Union and national example - Polish as a country representing the new Member States.
Zofia Wysokinska, Radosław Dziuba
doaj   +3 more sources

The rise of cyber power in Brazil

open access: yesRevista Brasileira de Política Internacional, 2022
The advent of cyber power in inter-state competition is frequently addressed in academic literature skewed towards global powers, commonly overlooking regional powers.
Joe Devanny   +2 more
doaj   +1 more source

Counter Cyber Terrorism Governance In Indonesia

open access: yesKhazanah Sosial, 2023
Information and communication technology has a significant impact on various aspects. Its developments affect daily life, and also give a new color to the political-security dynamics, especially in Indonesia.
Arlan Siddha, Renaldo Benarrivo
doaj   +1 more source

Features of New Institutions in The Digital Economy

open access: yesЖурнал институциональных исследований, 2022
Digital trust and, simultaneously, global distrust became a topical issue in the context of modern trends in the socioeconomic systems development: informatization, internetization, networkization, digitalization. A.
Tamara N. Yudina   +2 more
doaj   +1 more source

The Legal Mechanisms for Information Security in the context of Digitalization [PDF]

open access: yesJournal of Information Technology Management, 2022
As a result of the introduction of digital technologies in all spheres of society, various latest technologically conditioned risks and threats have become various. It requires the formation and implementation of a legal mechanism for further development
Svitlana Bondarenko   +5 more
doaj   +1 more source

CYBER SECURITY STRATEGIES FOR HIGHER EDUCATION INSTITUTIONS

open access: yesJournal of Engineering Science, 2021
Due to the large volume of data they manage, Higher Education Institutions (HEIs) are perfect targets for cyber attackers. University networks are open in design, decentralized and multi-user, making them vulnerable to cyber-attacks. The purpose of this research paper was to identify which is the recommended cyber security strategy and how ...
openaire   +2 more sources

Institutions for Cyber Security: International Responses and Global Imperatives [PDF]

open access: yesInformation Technology for Development, 2013
Almost everyone recognizes the salience of cyberspace as a fact of daily life. Given its ubiquity, scale, and scope, cyberspace has become a fundamental feature of the world we live in and has created a new reality for almost everyone in the developed world and increasingly for people in the developing world.
Choucri, Nazli   +2 more
openaire   +3 more sources

Кибербезопасность в образовательных сетях [PDF]

open access: yes, 2020
The paper discusses the possible impact of digital space on a human, as well as human-related directions in cyber-security analysis in the education: levels of cyber-security, social engineering role in cyber-security of education, “cognitive vaccination”
Burov, Oleksandr   +7 more
core   +1 more source

“Norm Subsidiarity” or “Norm Diffusion”?

open access: yesThe Journal of Intelligence, Conflict and Warfare, 2021
Cybercrime has been a contentious issue among security actors, vis-à-vis the extent to which international cooperation may be fostered to respond to the accelerating incidence of cyber-attacks.
Hanan Mohamed Ali
doaj   +1 more source

Home - About - Disclaimer - Privacy