Results 21 to 30 of about 79,039 (285)

Legal support for information security of legal entities under Lithuanian and Ukrainian legislation

open access: yesLaw and Safety, 2023
In the rapidly evolving digital landscape, the safeguarding of information security for legal entities has emerged as a critical concern. This article investigates and compares the legal frameworks governing information security for legal entities in ...
M. Pleskach, I. Tumasoniene
doaj   +1 more source

Institutional, technological, and financial drivers of national cyber resilience under armed conflict and post-conflict recovery [PDF]

open access: yesProblems and Perspectives in Management
Type of the article: Research Article Abstract Military and economic turbulence transform the relationships between factors shaping national cyber resilience.
Inna Shkolnyk   +4 more
doaj   +1 more source

Kurumsal Siber Güvenliğe Yönelik Tehditler ve Önlemleri

open access: yesDüzce Üniversitesi Bilim ve Teknoloji Dergisi, 2015
Günümüzde bilgi ve iletişim teknolojilerinde çeşitli uygulamaların artarak kişilerin günlük yaşantılarının vazgeçilmez bir parçası haline gelmesiyle birlikte gerek kamu gerekte özel sektörde birçok kurum hizmet sunumlarını siber ortamda ...
Hüseyin ÇAKIR, Hakan YAŞAR
doaj   +6 more sources

EU cybersecurity capacity building in the Mediterranean and the Middle East [PDF]

open access: yes, 2020
Cyberthreats on the Rise The 2008 Report on the implementation of the European Security Strategy included “cybersecurity” for the first time among the priorities of the EU’s external action, stating that: “modern economies are heavily reliant on critical
Lannon, Erwoan
core  

Trustee: A Trust Management System for Fog-enabled Cyber Physical Systems [PDF]

open access: yes, 2019
In this paper, we propose a lightweight trust management system (TMS) for fog-enabled cyber physical systems (Fog-CPS). Trust computation is based on multi-factor and multi-dimensional parameters, and formulated as a statistical regression problem which ...
Chowdhry, B. S.   +3 more
core   +1 more source

Features requirement elicitation process for designing a chatbot application

open access: yesIET Networks, EarlyView., 2022
This article seeks to assist the chatbot community by outlining the characteristics that a chatbot needs to possess and explaining how to create a chatbot for a bank. In order to determine which capabilities are most crucial to ending users, a study of a small sample of chatbot users was conducted.
Nurul Muizzah Johari   +4 more
wiley   +1 more source

Artificial Intelligence in Pakistan’s Cyberspace: Governance Gaps, Dual-Use Dilemmas, and Strategic Vulnerabilities

open access: yesObrana a Strategie
This article examines Pakistan’s evolving cyber governance as a critical case of how artificial intelligence (AI) intersects with dual-use security and fragile institutional design.
Sajjad Ahmed   +2 more
doaj   +1 more source

Governance in Overcoming Gender-Based Cyber Violence: Case Study Bosnia and Herzegovina

open access: yesWIMAYA, 2023
This study aims to analyze the governance of the Government of Bosnia and Herzegovina in overcoming gender-based cyber violence. Good governance in policy frameworks and institutional institutions is needed to meet cybersecurity needs in an inclusive and
Anggi Kunjaini
doaj   +1 more source

NATIONAL SECURITY IN THE ERA OF DIGITAL THREATS: A CASE STUDY OF THE NIGERIAN ARMY CYBERWARFARE COMMAND

open access: yesInternational Studies Journal
Research Problem: Nigeria faces escalating cyber threats with direct implications for national security, yet its cyber defence architecture remains underdeveloped.
IFEANYI ANAENUGWU JUSTIN
doaj   +1 more source

Is the responsibilization of the cyber security risk reasonable and judicious? [PDF]

open access: yes, 2018
Cyber criminals appear to be plying their trade without much hindrance. Home computer users are particularly vulnerable to attack by an increasingly sophisticated and globally dispersed hacker group.
Cockshott, Paul   +4 more
core   +3 more sources

Home - About - Disclaimer - Privacy