Filters








726 Hits in 3.7 sec

Toward a State-Centric Cyber Peace? Analyzing the Role of National Cybersecurity Strategies in Enhancing Global Cybersecurity

Scott Shackelford, Andraz Kastelic
2014 Social Science Research Network  
A related recent trend has been the adoption of longterm strategic plans to help deter, protect, and defend against cyber threats.  ...  These national cybersecurity strategies outline a nation's core values and goals in the realm of cybersecurity law and policy, from mitigating cybercrime and espionage to preparing for cyber warfare.  ...  and effective response to those threats  ... 
doi:10.2139/ssrn.2531733 fatcat:hoixzv5ag5hfndh4x4fujwhrpy

A Multivocal Literature Review on Growing Social Engineering Based Cyber-Attacks/ Threats During the COVID-19 Pandemic: Challenges and Prospective Solutions

Mohammad Hijji, Gulzar Alam
2021 IEEE Access  
attacks and threats.  ...  Social engineering-based cyber-attacks are based on the use of psychological and systematic techniques to manipulate the target.  ...  More specifically, to educate the remote employees on incident awareness and management to support their cybersecurity teams and improve response times during cyber-attacks/threats.  ... 
doi:10.1109/access.2020.3048839 pmid:34786300 pmcid:PMC8545234 fatcat:qxqws6kle5gzvdumx564p347yq

Inventory of Commission, European Council & Council of the European Union Crisis Capacities

Mark Rhinard, Sarah Backman
2017 Zenodo  
It responds to a central concern in the Transcrisis project: that the 'institutional capacities in the three institutions need to be better measured in terms of how they contribute to preparation, response  ...  While this report serves as a stand-alone deliverable with its own essential findings, it also provides the foundation for further exploration of effectiveness, legitimacy and leadership across Transcrisis  ...  , Critical Information Infrastructure Protection, Cyber risks and The Cyber Threat Landscape. • Promotes awareness raising of cyber threats, through initiatives such as the European Cyber Security Month  ... 
doi:10.5281/zenodo.2621308 fatcat:7mjyfgpr5zb77lysmiuk5kk4he

D1.1: HEIR innovations for healthcare systems

Apostolis Zarras
2021 Zenodo  
This deliverable sets the scene for the project's work to follow by identifying the role of security in the health domain and gaining insight into the parameters that drive the security, assurance, and  ...  Moreover, it performs a literature review (academic and technical) focusing on all relevant technologies and defines HEIR innovations against existing solutions.  ...  self-sovereign identification management.  ... 
doi:10.5281/zenodo.5749855 fatcat:bazdcvuxtzdtphqp4k5yu6hap4

Leveraging behavioral science to mitigate cyber security risk

Shari Lawrence Pfleeger, Deanna D. Caputo
2012 Computers & security  
in the effectiveness of cyber security.  ...  Problems of appropriate response to cyber incidents are exacerbated when security technology is perceived as an obstacle to the user.  ...  Scenario 2: Enhancing Situational Awareness During a "Cyber Event" Situational awareness is the degree to which a person or system knows about a threat in the environment.  ... 
doi:10.1016/j.cose.2011.12.010 fatcat:7tdz4tgofzey5ppnw6x4kdgw4e

Cyber terrorism and aviation—national and international responses

Ruwantissa Abeyratne
2011 Journal of Transportation Security  
Cyber crimes and cyber terrorism are becoming increasingly menacing and the latter has been identified as a distinct threat requiring attention.  ...  At the 21st Aviation Security Panel Meeting of ICAO (AVSECP/21, 22 to 26 March 2010)  ...  security awareness and training programme.  ... 
doi:10.1007/s12198-011-0074-3 fatcat:kwbrkaig7bep3enn7wqrn5slge

Electoral Cyber Interference, Self-Determination and the Principle of Non-Intervention in Cyberspace

Nicholas Tsagourias
2019 Social Science Research Network  
Electoral cyber interference, self-determination and the principle of non-intervention in cyberspace. SSRN.  ...  For this reason, it proceeds to contextualise and reconceptualise the meaning of intervention in cyberspace and then applies this new definition to electoral cyber interference such as the interference  ...  is not a new phenomenon, cyberspace increases the scalability, reach, and effects of such interference and poses a serious threat to a State's sovereign authority.  ... 
doi:10.2139/ssrn.3438567 fatcat:id5s2h2b2vhcnfnny5wt7rexoy

Defense Advanced Research Projects Agency (Darpa) Fiscal Year 2015 Budget Estimates

Department Of Defense Comptroller's Office
2014 Zenodo  
The budget request details the proposed investments $80 million to develop new sets of tools for imaging and analytics of neural and synaptic brain activities that will improve diagnosis and care of wounded  ...  Additionally, DARPA's investment would include the Prosthetic Hand Proprioception and Touch Interfaces (using Haptix sensors) to develop human implantable microsystems to give amputees the ability to have  ...  and threat network identification and analysis.  ... 
doi:10.5281/zenodo.1215345 fatcat:fjzhmynqjbaafk67q2ckcblj2m

Identifying, Understanding and Preventing Cyber Bullying

Ria Hanewald
2012 Literacy Information and Computer Education Journal  
Therefore, this paper aims to endow help reader with the necessary information to identify, understand and prevent cyber bullying.  ...  Approaches include the installation of Internet filters and blocks, new legislation to deter potential online predators and persecute offenders, and cyber safety programs to educate young people about  ...  to retract especially if the images have gone viral.  ... 
doi:10.20533/licej.2040.2589.2012.0107 fatcat:gibu5vazyngxjo7e6rassb7wwu

#nomakeupselfies: the Face of Hashtag Slacktivism

Claire Hampton
2015 Networking knowledge. Journal of the MeCCSA-PGN  
Mobilizing Foucault's concept of governmentality, which he used to contextualise the link between technologies of domination and his later postulations on technologies of the self, the article explores  ...  It also constitutes an auto-ethnographic response to the phenomenon from my nuanced position as a young, female, selfie-taking, feminist, academic, breast cancer survivor.  ...  'self-awareness' and implied emancipation.  ... 
doi:10.31165/nk.2015.86.406 fatcat:xl5au7lts5dxjit2yaofpbuo7e

The Heartbleed bug: Insecurity repackaged, rebranded and resold

James Banks
2015 Crime, Media, Culture: An International Journal  
specific cyber threats and fears.  ...  A simple, single (self) serving web page enabled Codenomicon to adroitly communicate the threat posed by the Heartbleed bug.  ... 
doi:10.1177/1741659015592792 fatcat:oadbezi5dzb5fphlkqnunbwy6e

Defense Advanced Research Projects Agency (Darpa) Fiscal Year 2016 Budget Estimates

Department Of Defense Comptroller's Office
2015 Zenodo  
The Defense Advanced Research Projects Agency (DARPA) FY2016 amounted to $2.868 billion in the President's request to support high-risk, high-reward research.  ...  and threat network identification and analysis.  ...  and threat network identification and analysis.  ... 
doi:10.5281/zenodo.1215366 fatcat:cqn5tyfixjanzp5x3tgfkpedri

Defense Advanced Research Projects Agency (Darpa) Fiscal Year 2019 Budget Estimates

Department Of Defense Comptroller's Office
2018 Zenodo  
To enable in-theater, continuousanalysis and treatment of warfighters, this project seeks to explore diagnostic andtherapeutic approaches, including the use of bacterial predators as therapeuticsagainst  ...  This PE supports basic research in medical-related information and technology leading tofundamental discoveries, tools, and applications critical to solving defense-related challenges.  ...  cyber situational awareness.  ... 
doi:10.5281/zenodo.1215599 fatcat:kxduvg6a5nflhf6iilkwnolobu

Halting Boko Haram / Islamic State's West Africa Province Propaganda in Cyberspace with Cybersecurity Technologies

Sunday Ogunlana
2019 Journal of Strategic Security  
Terrorists want to spread messages of hate and want their content to go viral to create fear and uncertainty.  ...  technologies to confront a series of cyber threats, especially terrorist propaganda.  ... 
doi:10.5038/1944-0472.12.1.1707 fatcat:hglppo35hjfp7ntvajzeqytcae

CYBER AGGRESSORS, THEIR MOTIVES, EMOTIONS AND BEHAVIOURAL TENDENCIES IN THE PROCESS OF CYBERBULLYING

VLADIMÍRA HLADÍKOVÁ, SABÍNA GÁLIKOVÁ TOLNAIOVÁ
2019 AD ALTA Journal of Interdisciplinary Research  
In conclusion, the authors emphasize the importance of prevention and elimination activities, as well as media and digital literacy, which would help to reduce negative phenomena in the digital environment  ...  The authors focused on the theoretical reflection of cyber aggressors, presenting number of definitional framework in the context of addressing issues of domestic and foreign authors.  ...  Sofia: STEF92 Technology, 2016, p. 463.16 Educations in the area of media competences and media literacy are a relevant preparation for effective self-realization in cyberspace.  ... 
doi:10.33543/09027176 fatcat:nn4kuff73bfupewrysqa2e2mbu
« Previous Showing results 1 — 15 out of 726 results