Filters








44 Hits in 9.0 sec

Is the responsibilization of the cyber security risk reasonable and judicious?

Karen Renaud, Stephen Flowerday, Merrill Warkentin, Paul Cockshott, Craig Orgeron
2018 Computers & security  
Whereas responsibilization is effective for some risks, the responsibilization of cyber security is, we believe, contributing to the global success of cyber attacks.  ...  We conclude with a concrete proposal for a risk regulation regime that would more effectively mitigate and ameliorate cyber risk.  ...  Acknowledgements This research commenced while the first author was a Fulbright Cyber Security Scholar at Mississippi State University.  ... 
doi:10.1016/j.cose.2018.06.006 fatcat:ivxlaaen4zhs7brncyqhpafdgi

Evaluation of Risks of Cyber Security of Information Systems of Objects of Critical Infrastructure
Оцінювання ризиків кібербезпеки інформаційних систем об'єктів критичної інфраструктури

V.V. Mokhor, G.E. Pukhov Institute for Modelling in Energy Engineering National Academy of Sciences of Ukraine, S.F. Honchar, G.E. Pukhov Institute for Modelling in Energy Engineering National Academy of Sciences of Ukraine
2019 Èlektronnoe modelirovanie  
R n u K S W n n Is the responsibilization of the cyber securi- ty risk reasonable and judicious?  ...  // Computers & Security 2018 78 p. 198-211. 5. set Valuation and Cyber Risk Management 2019 . 75-86. 6.  ... 
doi:10.15407/emodel.41.06.065 fatcat:6eg7zm5y3rcbznmqisyshdjbxi

Telecom Responsibilization: Internet Governance, Surveillance, and New Roles for Intermediaries

Mike Zajko
2016 Canadian Journal of Communication  
These include enrolling telecom service providers in law enforcement and national security-oriented surveillance programs, as well as strategies to responsibilize service providers as copyright enforcers  ...  This article elaborates responsibilization strategies implicating internet intermediaries, and the goals that these actors can be aligned toward.  ...  The failures of some recent responsibilization proposals clearly demonstrate the risks of the latter.  ... 
doi:10.22230/cjc.2016v41n1a2894 fatcat:kse5wtqxnvem7pn3csd4dspiqu

Telecom Responsibilization: Internet Governance, Surveillance, and New Roles for Intermediaries

Mike Zajko
2016 Canadian Journal of Communication  
These include enrolling telecom service providers in law enforcement and national security-oriented surveillance programs, as well as strategies to responsibilize service providers as copyright enforcers  ...  This article elaborates responsibilization strategies implicating internet intermediaries, and the goals that these actors can be aligned toward.  ...  The failures of some recent responsibilization proposals clearly demonstrate the risks of the latter.  ... 
doi:10.22230/cjc2016v41n1a2894 fatcat:zudptqnambfbxokkbg6mlcqyhm

Analysis of Cyberattacks in Public Organizations in Latin America

Segundo Moisés Toapanta Toapanta, José David López Cobeña, Luis Enrique Mafla Gallegos
2020 Advances in Science, Technology and Engineering Systems  
The problem is the cyberattack on information networks where there is interdependence between processes, people and devices within public organizations with the negative consequence of denial of services  ...  It was concluded that in order to maintain the continuity of services and activities of public organizations, secure platforms must be in place to monitor and minimize possible attacks; our proposal has  ...  Acknowledgment The authors thanks to Universidad Politécnica Salesiana del Ecuador, to the research group of the Guayaquil Headquarters "Computing, Security and Information Technology for a Globalized  ... 
doi:10.25046/aj050215 fatcat:igdljnopzvdktpvgyau3w5gme4

Securitizing Innovation to Protect Trade Secrets Between "the East" and "the West": A Neo-Schumpeterian Public Legal Reading

Riccardo Vecellio Segate
2020 UCLA Pacific Basin law journal  
For these reasons, the only way to protect trade secrets by law is through ensuring that their secrecy is reasonably safe by means of compulsory cybersecurity and cyber-hygiene standards to be complied  ...  may jeopardize states' economy and public security alike.  ...  Views from the United States of America Sharing information on possible cybersecurity risks among companies could increase their security and prevent a share of thefts, but it is not immune from risks,  ... 
doi:10.5070/p8371048804 fatcat:upica3fkxnfnfnhogv372afw24

Watching the Web: Thoughts on Expanding Police Surveillance Opportunities under the Cyber-Crime Convention

Laura Huey, Richard Rosenberg
2004 Canadian Journal of Criminology and Criminal Justice  
The coupling of the rhetoric of consumerism with strategies ofresponsibilization” leads to a central paradox for the public police (Huey, Ericson, and Haggerty 2004; Loader 1999).  ...  Convention on Cyber- crime’s requirements within the wider spectrum of contemporary sur- veillance and within the larger shift to policing beyond the state.  ... 
doi:10.3138/cjccj.46.5.597 fatcat:eas3wdgfhba6xgdd7mfuur4lai

Expression Through Socialising Media in India: Why Fixing the Existing Legal Dilemmas Is Critical?

Meera Mathew
2020 Legal Issues in the Digital Age  
The emergence of the social media and its virtual communication space has enabled people at large to interact and communicate from the conventional mode of one-to-one to many-tomany.  ...  It exploded onto the technology in the last decades for commercial and entertainment  ...  The risk of inciting speech is linked to that posed by the very crime in promoting speech.  ... 
doi:10.17323/2713-2749.2020.3.97.124 fatcat:wyykk6n25fchxnz27evfhh4ruq

The "Europeanization" of Financial Supervision in the Aftermath of the Crisis

Konstantina Panagiannaki
2015 eucrim – The European Criminal Law Associations Forum  
The lack of a specific and common provision on judicial authorization risks hampering the homogeneous application of the SSM in the EU.  ...  For this reason, a special pan-European body, the European Systemic Risk Board (ESRB), has now been entrusted with the task of continuously monitoring and assessing systemic risks, taking into account  ...  Protection of the financial Sector 160 | eucrim 4 / 2015 the publication is co-financed by the European Commission, European Anti-fraud Office (OlAf), brussels © Max Planck Institute for Foreign and International  ... 
doi:10.30709/eucrim-2015-023 fatcat:nnu4zncayjftxdwp2t4nugsrum

Emerging Trends in Management, IT and Education

Dr. P S Aithal, Shreepathy R Bhat
2019 Zenodo  
International Conference on Emerging Trends in Management, IT and Education  ...  Phishing & Network - Phishing is a kind of Cyber Security attack in this kind of cyber offence email play a big role for the attack.  ...  The mentioned syllabus includes Governance, Risk Management, and Compliance Core Courses for 45 Credit and Cyber Security Technology Core for 40 Credit.  ... 
doi:10.5281/zenodo.3492020 fatcat:wytrxibqsjegfi6oouvfjcoiia

Complete Issue

JCER | Journal of Contemporary European Research
2009 Journal of Contemporary European Research  
Security and Liberty in the European Union. Guest Edited by Juliet Lodge.  ...  It suggests that ESDP is becoming stronger, both politically and militarily and that in the mid-term the European Union will become a full global player owing to the rationalization of the institutions  ...  involved in ESDP through the Lisbon Treaty, The Lisbon Treaty and ESDP: Prodi and Howorth Compared The following images are taken from the 'State of the Art' exhibition.  ... 
doaj:b5e444547a354dc98d9f6716cbb2c282 fatcat:tb4qgaktgzdufcszykczx6sctm

The U.S. Practice of Collateral Damage Estimation and Mitigation

Gregory S. McNeal
2011 Social Science Research Network  
This Article is a comprehensive examination of the United States' practice of targeted killings. It is based in part on field research, interviews, and previously unexamined government documents.  ...  The Article (1) provides the first qualitative empirical accounting of the targeted killing process, beginning with the creation of kill lists and extending through the execution of targeted strikes, and  ...  policy objective of the United States and is important to national security.  ... 
doi:10.2139/ssrn.1819583 fatcat:gdsekkrmkbd7rbl3z7ipqqzilu

Global Health: Refugees and Caring for the Forgotten [chapter]

2018 Introduction to International Political Economy  
There is greater risk that states will misinterpret the military and cyber actions of adversaries.  ...  For the rst time we also focus on the growing importance of cyber weapons and cyber hacking as major security threats. ■ Chapter 10, "The Knowledge and Technology Structure," has a new discussion of "fake  ...  Greed is an obvious reason. Smugglers are willing to take risks because they want to make higher pro�ts than they could achieve through legal trade.  ... 
doi:10.4324/9781315463452-27 fatcat:7qlzfc5jafbapnh7blw7wujszq

Criminal Law and Sentencing: What Goes with Free Will?

R. George Wright
2012 Social Science Research Network  
Beginning with Clarence Darrow's closing argument in defense of Leopold and Loeb, and then discussing the work of contemporary legal scholars, scientists, and philosophers, as applied in various criminal  ...  Even if a culture views economic, structural, and institutional causes of crime with utmost seriousness, the more likely result of generally discounting free will and moral responsibility would involve  ...  dignity of the person, there seems to be no reason why scientific uncertainties should generally be resolved against a community's desire to reduce obvious risks to its physical security and in favor  ... 
doi:10.2139/ssrn.2011411 fatcat:jjv35o6ilrhlhlniknllbuaje4

De la fragmentación de las estructuras criminales a una proto-mafia: un análisis del Primeiro Comando da Capital (PCC) en Sudamérica

Carolina Sampó, Marcos Alan Ferreira
2020 Revista de Estudios de Seguridad Internacional  
This article examines how the Primeiro Comando da Capital (PCC) is structured as a particular model of criminal organization in South America, between what could be labelled as a third generation cartel  ...  The article examines if we are facing the emergence of a new generation of criminal structures, which perceive themselves as transnational companies and which adopt a different form than traditional cartels  ...  is adversely impacting public health, social welfare, the economy, and the national security of the United States.  ... 
doi:10.18847/1.12.6 fatcat:zra7ete3afgcxmgxid5q6pnhaa
« Previous Showing results 1 — 15 out of 44 results