Results 1 to 10 of about 79,039 (285)
Introduction. This paper examines the cybersecurity of AIR in Indonesia by analyzing the security aspect focusing on the security protocols involving network called TLS (Transport Layer Security) and SSL (Secure Socket Layer), which has functions to ...
Irhamni Ali
doaj +3 more sources
Social Aspects of New Technologies - the CCTV and Biometric (Framing Privacy and Data Protection) in the Case of Poland [PDF]
The purpose of this paper is to review the institution responsible for the protection of personal data within the European Union and national example - Polish as a country representing the new Member States.
Zofia Wysokinska, Radosław Dziuba
doaj +3 more sources
The rise of cyber power in Brazil
The advent of cyber power in inter-state competition is frequently addressed in academic literature skewed towards global powers, commonly overlooking regional powers.
Joe Devanny +2 more
doaj +1 more source
Counter Cyber Terrorism Governance In Indonesia
Information and communication technology has a significant impact on various aspects. Its developments affect daily life, and also give a new color to the political-security dynamics, especially in Indonesia.
Arlan Siddha, Renaldo Benarrivo
doaj +1 more source
Features of New Institutions in The Digital Economy
Digital trust and, simultaneously, global distrust became a topical issue in the context of modern trends in the socioeconomic systems development: informatization, internetization, networkization, digitalization. A.
Tamara N. Yudina +2 more
doaj +1 more source
The Legal Mechanisms for Information Security in the context of Digitalization [PDF]
As a result of the introduction of digital technologies in all spheres of society, various latest technologically conditioned risks and threats have become various. It requires the formation and implementation of a legal mechanism for further development
Svitlana Bondarenko +5 more
doaj +1 more source
CYBER SECURITY STRATEGIES FOR HIGHER EDUCATION INSTITUTIONS
Due to the large volume of data they manage, Higher Education Institutions (HEIs) are perfect targets for cyber attackers. University networks are open in design, decentralized and multi-user, making them vulnerable to cyber-attacks. The purpose of this research paper was to identify which is the recommended cyber security strategy and how ...
openaire +2 more sources
Institutions for Cyber Security: International Responses and Global Imperatives [PDF]
Almost everyone recognizes the salience of cyberspace as a fact of daily life. Given its ubiquity, scale, and scope, cyberspace has become a fundamental feature of the world we live in and has created a new reality for almost everyone in the developed world and increasingly for people in the developing world.
Choucri, Nazli +2 more
openaire +3 more sources
Кибербезопасность в образовательных сетях [PDF]
The paper discusses the possible impact of digital space on a human, as well as human-related directions in cyber-security analysis in the education: levels of cyber-security, social engineering role in cyber-security of education, “cognitive vaccination”
Burov, Oleksandr +7 more
core +1 more source
“Norm Subsidiarity” or “Norm Diffusion”?
Cybercrime has been a contentious issue among security actors, vis-à-vis the extent to which international cooperation may be fostered to respond to the accelerating incidence of cyber-attacks.
Hanan Mohamed Ali
doaj +1 more source

