Filters








85 Hits in 9.1 sec

A case study of a municipality phishing attack measures - towards a socio-technical incident management framework

Grethe Østby, Stewart James Kowalski
2021 International Workshop on Socio-Technical Perspective in IS Development  
In this work-in-progress paper, we have analyzed their decision in a combined socio-technical and crisis management context and suggest such framework to do analysis and make right decisions to prevent  ...  A decision made to prevent this overload of crisis, happened in Gjøvik municipality, where they closed their email-system and shut down macros in their applications to prevent an overload situation.  ...  in interviews in a hectically period of the Corona-crisis situation.  ... 
dblp:conf/stpis/OstbyK21 fatcat:pqtssezkgjdkzpu3d2tbt7ez4i

A Survey on Human and Personality Vulnerability Assessment in Cyber-security: Challenges, Approaches, and Open Issues [article]

Dimitra Papatsaroucha, Yannis Nikoloudakis, Ioannis Kefaloukos, Evangelos Pallis, Evangelos K. Markakis
2021 arXiv   pre-print
The human tendency to trust and help others, as well as personal, social, and cultural characteristics, are indicative of the level of susceptibility that one may exhibit towards certain attack types and  ...  Among them, Human Vulnerability Assessment has been included in various frameworks aiming to assess the cyber security capacity of organizations, but it concerns a one time assessment rather than a continuous  ...  Studies like the one mentioned above are called phishing studies and they investigate and elaborate victimization in phishing attacks.  ... 
arXiv:2106.09986v2 fatcat:rurgrvdkjbcljiqoiv3ztoov4u

Cybersecurity Policy Framework in Saudi Arabia: Literature Review

Nawaf Alhalafi, Prakash Veeraraghavan
2021 Frontiers in Computer Science  
Saudi Arabia has a goal of ensuring that it has at least two cities among the top 100 smart cities of the future.  ...  However, increasing connectivity and incorporation of smart solutions in cities still raises concerns over cyber security with threats arising daily including denial of services and phishing as some of  ...  Some of the crucial challenges are technical, socio-economic, and user acceptance. With advances in ICT research and, technical challenges are diminishing day by day.  ... 
doi:10.3389/fcomp.2021.736874 fatcat:ajbpvzbr55f5hgqsldb4cwcoee

Smart Cities, Cyber Warfare and Social Disorder [article]

Joe Burton, Simona Soare
2020 Zenodo  
Prolonged mass disruption of their infrastructure-as has been recently seen in the case of month-long disruption in public services as a result of cyber attacks against American municipalities (Robles  ...  to major cyber incidents, or indeed a multi-stakeholder and municipality information sharing and analysis centre.  ... 
doi:10.5281/zenodo.6143264 fatcat:5r3s4g7c7rhfrpykrymbuii3bu

Security-by-Experiment: Lessons from Responsible Deployment in Cyberspace

Wolter Pieters, Dina Hadžiosmanović, Francien Dechesne
2015 Science and Engineering Ethics  
In such cases, conditions for responsible experimentation may need to be implemented differently, as attackers behave strategically rather than probabilistically.  ...  Conceiving new technologies as social experiments is a means to discuss responsible deployment of technologies that may have unknown and potentially harmful side-effects.  ...  The research leading to these results has received funding from the European Union's Seventh Framework Programme (FP7/ 2007(FP7/ -2013 under grant agreement ICT-318003 (TRE S PASS).  ... 
doi:10.1007/s11948-015-9648-y pmid:25896029 pmcid:PMC4912578 fatcat:wi7pligdgraf5oa3tldlw2u7gq

Evaluating Criminal Transactional Methods in Cyberspace as Understood in an International Context

R.V. Gundur, Michael Levi, Volkan Topalli, Marie Ouellet, Maria Stolyarova, Lennon Yao-Chung Chang, Diego Domínguez Mejía
2021 CrimRxiv  
Acknowledgements This work was supported by the UK Home Office through a National Cyber Security Programme research grant. Research assistance was provided by Tessa Cole and David Flint.  ...  These studies drew on case studies of major hacking incidents (Décary-Hétu 2013), a crowdsourced dataset of DDOS attacks (de Mereuil et al. 2016), online attacks reported in news articles (Dupunt, Lavoie  ...  Moreover, carrying out certain attacks is becoming simpler due to their partial or full automation, as in the case of phishing attacks.  ... 
doi:10.21428/cb6ab371.5f335e6f fatcat:vmrt7shntreqbg2z5mgysr5anq

D8.1. Guidelines for Cybersecurity Training Programme across EU (Intermediate)

Gustavo González-Granadillo
2020 Zenodo  
common in most studied countries.  ...  As a result, although the PESTEL analysis indicates that most studied factors fall into the Positive (P) or Very Positive (+P) categories, factors such as global political conflicts, the EU current economic  ...  Technical: Measures based on the existence of technical institutions and framework dealing with cybersecurity. 3.  ... 
doi:10.5281/zenodo.5036573 fatcat:g2tfoqug6zge7mdwwopozda43m

Policies of Artificial Intelligence in the EU: Learning Curve from the UK and China?

Ms. Tanzeela Jameel, Dr. Adam Saud
2022 Journal of European studies  
Based on some recent events, this study also highlights the role of adversarial AI in promoting cybercrimes in the form of phishing and data breach attacks in the EU.  ...  More specifically, it takes a detailed look at the AI policies of the European Union (EU) and identifies different cyber-security loopholes.  ...  Bridges, "Automated Behavioral Analysis of Malware: A Case Study of Wannacry Ransomware," in 16th IEEE International Conference on Machine Learning and Applications, (2017), 454-460.  ... 
doi:10.56384/jes.v38i2.252 fatcat:yyl4nqp7ofhwhffrakgdz427ba

Critical Analysis of Strategies Towards Creating an Adequate Level of Awareness on Cybercrime among the Youth in Gauteng Province

Mmabatho P. Aphane, Jacob T. Mofokeng
2020 International Journal of Criminology and Sociology  
Based on the findings, five themes were explored in this study, including a lack of capacity, resources, and training to increase the technical skills amongst the SAPS members to work effectively on cybercrime-related  ...  A qualitative research method was applied using semi-structured interviews to find the views of participants, of measures if any, to create youths' awareness in the area of cybercrime.  ...  Cyber-attacks are increasing in quantity and Internet advancement has become a socio-technical system of systems (Laplante, Michael and Voas 2009, 63) .  ... 
doi:10.6000/1929-4409.2020.09.159 fatcat:3txr7f64mvgr3dk5latpertxre

Road Safety from the Perspective of European Union

2021 International Conference Safe and Secure Society  
As Marková (2007) mentions, According to her, we know two types of subsidies that are provided to municipalities:  ...  Thus, subsidies "to a decisive extent finance non-market activities of the state and individual articles of territorial self-governments." (Balko, 2007, p. 11.)  ...  identity theft and phishing attacks.  ... 
doi:10.36682/icsss_2021_5 fatcat:zya2p2j3uvepndomvdsp4zyoni

Doctrinal comprehension of cyber terrorism in the context of intensive development of information and communication technologies in the modern world

Dmitry V. Lobach, Alexey Y. Mamychev, Olga I. Miroshnichenko, Lidiia Moskvych
2021 Laplage em Revista  
The conclusion is substantiated that cyber terrorism is a conceptually relevant concept, which is perceived either as a method of committing a terrorist act (reduced understanding), or as any crimes of  ...  , computer systems and networks in critical segments of the state and in the private sector, which pose a risk of death, causing significant property damage or the onset of other socially dangerous consequences  ...  A generalization of relevant definitions of cyber terrorism takes place within the framework of the first approach, contributing to the disclosure of this phenomenon through unlawful attacks or threats  ... 
doi:10.24115/s2446-6220202172702p.201-208 fatcat:zk3r7iwgh5cobe5ausbpzk23py

Sweden in the digital transformation: Opportunities and challenges [chapter]

2018 OECD Reviews of Digital Transformation: Going Digital in Sweden  
As losses from digital security incidents have become more common, stakeholders' attention has shifted from the technical incidents such as denial of service attacks, ransomware, or personal data breaches  ...  Only 5% of municipalities had measured staff's digital security skills. A quarter of municipalities had adopted a framework for digital security training for staff, from one-fifth in 2012 (SKL).  ...  A clearer budgetary allocation, as discussed above, is therefore a prerequisite for the establishment of this co-ordination arrangement.  ... 
doi:10.1787/9789264302259-3-en fatcat:ezetcowaffaupcur76ksakj66y

Open Identity Summit 2021 - Complete Volume

2021 Open Identity Summit  
We propose tackling this information using identity management functions and perform a systematic gap analysis based on the FIDIS typology of identity management systems.  ...  While it has been noted in earlier work that data governance is central for the successful operation of a data lake, and that privacy is a central issue in such a setting as personal information may be  ...  A8 -Tamper with Resource Responses: The capabilities of A7, but this attacker can also tamper with responses from the resource servers (e.g., a compromised reverse proxy in front of the resource server  ... 
dblp:conf/openidentity/X21 fatcat:o54xtce6rneehgbbpsr3vasvvq

The level of mental load during a functional task is reflected in oculometrics [chapter]

Ramtin Zargari Marandi, Afshin Samani, Pascal Madeleine
2017 International Federation for Medical and Biological Engineering Proceedings  
using workplace interventions, technical measurements and larger epidemiological studies.  ...  Towards which "technical democracy" and working promesses ?  ... 
doi:10.1007/978-981-10-5122-7_15 fatcat:vaq2jz2o3zgofdi4tkkn2ksfje

Conference Program

2021 2021 International Conference on Innovation and Intelligence for Informatics, Computing, and Technologies (3ICT)  
His research experience falls within the areas of risk management, data mining, alternative contracting methods, preconstruction/construction cost estimating, asset management, and decision-making procedures  ...  He received his Ph.D. degree in Civil Engineering with an emphasis on Construction Management from Auburn University and an M.S. degree in Civil Engineering from The University of Tennessee at Chattanooga  ...  Lina is from Saudi Arabia and has been working as a faculty member within the College of Sciences and Human Studies at Prince Mohammad Bin Fahd University for more than 6 years.  ... 
doi:10.1109/3ict53449.2021.9581455 fatcat:zgaclsoapjbhbmjmki7bjltre4
« Previous Showing results 1 — 15 out of 85 results