Academic literature on the topic 'Cyber border'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'Cyber border.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Journal articles on the topic "Cyber border"

1

Yongming, Zhou. "Living on the Cyber Border." Current Anthropology 46, no. 5 (2005): 779–803. http://dx.doi.org/10.1086/432453.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

OKA, Nobuto, and Shuichi IWATA. "Cyber Connection for Cross-border Collaboration." Joho Chishiki Gakkaishi 17, no. 1 (2007): 32–40. http://dx.doi.org/10.2964/jsik.17.32.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

DRAGOMIR, Andreea. "Cyber Diplomacy." International Journal of Information Security and Cybercrime 10, no. 2 (2021): 37–50. http://dx.doi.org/10.19107/ijisc.2021.02.05.

Full text
Abstract:
The article aims to highlight issues related to the risks to both the European Union and the Member States, but at the same time seeks to highlight current legislative and political approaches applicable in cyberspace. This set of tools used in cyber diplomacy includes the concepts of cooperation and diplomatic dialogue (common cyber network of EU states, common cyber defense unit) but also measures to prevent cyber-attacks (European Union Cyber Security Strategy), as well as sanctions. Throughout this presentation, the main idea is supported by the cross-border nature of cyberspace.
APA, Harvard, Vancouver, ISO, and other styles
4

Chatzis, Petros, and Eliana Stavrou. "Cyber-threat landscape of border control infrastructures." International Journal of Critical Infrastructure Protection 36 (March 2022): 100503. http://dx.doi.org/10.1016/j.ijcip.2021.100503.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Siva Krishna Jampani. "Cross-border cybersecurity collaboration-building a global framework for threat." World Journal of Advanced Engineering Technology and Sciences 14, no. 2 (2025): 001–10. https://doi.org/10.30574/wjaets.2025.14.2.0034.

Full text
Abstract:
This research paper aims at focusing on the concepts of cross-border cybersecurity cooperation because of compounding and diversifying international threats. In the modern world, it becomes increasingly important to understand that the problem of cyber threats requires international cooperation. The paper explores the nature and patterns of cybersecurity threats and cyber aggressive actions throughout the world, types of cyber warfare attacks and penetration, and their socio-political and economic implications. Special emphasis is made on such threats as artificial intelligence-based attackers
APA, Harvard, Vancouver, ISO, and other styles
6

Rizwan Iqbal, Nadia Mustaqim Ansari, Muhammad Ismail, Maqsood ur Rehman Awan, Hassam Gul, and Muhammad Mateen. "<b>Global Cyber Security in the Age of Cross-Border Threat Intelligence: Addressing Barriers, Leveraging AI, and Defining the Next Generation of Cyber Defense</b>." Annual Methodological Archive Research Review 3, no. 4 (2025): 369–90. https://doi.org/10.63075/wnvgq911.

Full text
Abstract:
The global cybersecurity environment demands rising importance on cross-border threat intelligence combined with artificial intelligence systems because these tools help organizations protect against modern cyber threats. The study explores international cyber collaboration barriers together with AI assessment in defense as well as it defines essential strategic aspects for next-generation cybersecurity frameworks. The researchers conducted quantitative research through the collection of surveys which gathered responses from multiple nations' cybersecurity professionals working across public a
APA, Harvard, Vancouver, ISO, and other styles
7

Li, Linqi, and Yanzhu Wang. "Cross-Border Data Flow Regulatory System under the Holistic View of National Security." International Journal of Education and Humanities 19, no. 1 (2025): 72–76. https://doi.org/10.54097/se3fsr09.

Full text
Abstract:
General Secretary Xi Jinping has repeatedly put forward the holistic view of national security and the construction of a Cyber power on multiple important occasions such as the 20th National Congress of the Communist Party of China. Improving the supervision of cross-border data flow is an inevitable measure to ensure national security and is also the inherent meaning of building a Cyber power. Under the strategic guidance of the overall national security concept, by reviewing the current practice of cross-border data flow in China and combining with foreign legislative experience, we can find
APA, Harvard, Vancouver, ISO, and other styles
8

COMAN, Iulian Marius. "Cross-Border Cyber-Attacks and Critical Infrastructure Protection." International Journal of Information Security and Cybercrime 6, no. 2 (2017): 47–52. http://dx.doi.org/10.19107/ijisc.2017.02.07.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Pandey, Arpit. "Cyber Security: Cyber Fraud on Carding: A Review." International Journal for Research in Applied Science and Engineering Technology 9, no. VII (2021): 2525–29. http://dx.doi.org/10.22214/ijraset.2021.36882.

Full text
Abstract:
This chapter provides one person case study of Mr. Dan DeFilippi who was arrested for master card fraud by the US u. s. SS in December 2004. The episode delves into the psychology of a cybercriminal and also the inside workings of master card fraud. A background context of master card fraud is presented to border the first interview. Slightly on the identification of issues and controversies with reference to carding is then given. Finally, the convicted cybercriminal turned key informant makes advice on how to reduce the growing prevalence of cybercrime. A giant finding is that master card fr
APA, Harvard, Vancouver, ISO, and other styles
10

-, Salmiati. "China's Foreign Policy Toward India's Internet Censorship In The Galwan Valley Conflict." Jurnal Ilmu Hubungan Internasional LINO 4, no. 2 (2025): 123–46. https://doi.org/10.31605/lino.v4i2.3582.

Full text
Abstract:
Nowadays, the need for the internet is increasing as seen from China and India as the countries with the world's largest population and the world's largest internet users. In this study, entitled "China's Foreign Policy Toward India's Internet Censorship In The Galwan Valley Conflict", the researcher aims to find out how China's foreign policy strategy responds to internet censorship by India. This study uses the concepts of foreign policy, cyber attack and cyber security. This research is a descriptive research that uses literature studies and utilizes primary and secondary data obtained thro
APA, Harvard, Vancouver, ISO, and other styles
More sources

Dissertations / Theses on the topic "Cyber border"

1

Carlberg, Kristin. "Suing a State for Cross-border Cyber Torts? : Overcoming the Immunity of the Hacking State." Thesis, Örebro universitet, Institutionen för juridik, psykologi och socialt arbete, 2017. http://urn.kb.se/resolve?urn=urn:nbn:se:oru:diva-61292.

Full text
APA, Harvard, Vancouver, ISO, and other styles

Books on the topic "Cyber border"

1

Woltag, Johann-Christoph. Cyber warfare: Military cross-border computer network operations under international law. Intersentia, 2014.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
2

Kawamoto, Kevin. On the borders of change: Digital communications in North America and the emergence of transnational "cyber-polities". Canadian Studies Center, The Henry M. Jackson School of International Studies, University of Washington, 1998.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
3

United, States Congress House Committee on Government Reform Subcommittee on Government Management Information and Technology. Computer security: Cyber attacks--war without borders : hearing before the Subcommittee on Government Management, Information, and Technology of the Committee on Government Reform, House of Representatives, 106th Congess, 2nd session, July 26, 2000. U.S. G.P.O., 2001.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
4

WOLTAG. Cyber Warfare: Military Cross-Border C. Intersentia Uitgevers N.V., 2014.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
5

Morganstein, Stanley. Double Edge Sword: Border Patrol, Navy Seals, and Cyber-terrorists. CreateSpace Independent Publishing Platform, 2015.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
6

(Editor), Anne Martinez-Saiz, and Nuit de Chine (Illustrator), eds. Handbook for Bloggers and Cyber-Dissidents. Reporters Without Borders, 2006.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
7

Emerson, Michael, and Denis Cenușa, eds. Deepening EU-Moldovan Relations. 3rd ed. Lexington Books, 2021. https://doi.org/10.5040/9798881810474.

Full text
Abstract:
For Moldova, the signing of the Association Agreement and the DCFTA with the European Union in 2014 was an act of strategic geopolitical significance. Of all the EU’s eastern neighbours, Moldova is objectively the most European on several counts, including sharing a common history, language, culture and border with EU member state Romania. These provide a positive foundation for a successful Agreement, notwithstanding the major political challenges that confront contemporary Moldova. The purpose of this Handbook is to make the complex political, economic and legal content of the Association Ag
APA, Harvard, Vancouver, ISO, and other styles
8

Chinese Industry 4.0: Designing High-Tech Solutions under the Cybersecurity Regime of the People’s Republic of China. SinopeerPress, 2021.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
9

Dominik, Brodowski. Part III Other Relevant International Regimes and Issues, 16 Transnational Organised Crime and Cybercrime. Oxford University Press, 2016. http://dx.doi.org/10.1093/law/9780198733737.003.0016.

Full text
Abstract:
Cybercrime has not only become a new form of organised crime, in which a network of independent perpetrators cooperate on a case-by-case basis without an enduring, hierarchical structure, but is also gaining increasing attention from traditional organised crime groups. With cybercrime easily crossing geographical borders, a closer look at the international law framework on the fight against cybercrime is warranted, including but not limited to the Council of Europe Convention on Cybercrime. This chapter focuses on cyber-related aspects of substantive criminal law, criminal procedure, and juris
APA, Harvard, Vancouver, ISO, and other styles
10

Pierre, Thielbörger. Part IV Transnational Organised Crime as Matter of Certain Branches of International Law, 17 The International Law of the Use of Force and Transnational Organised Crime. Oxford University Press, 2016. http://dx.doi.org/10.1093/law/9780198733737.003.0017.

Full text
Abstract:
Cybercrime has not only become a new form of organised crime, in which a network of independent perpetrators cooperate on a case-by-case basis without an enduring, hierarchical structure, but is also gaining increasing attention from traditional organised crime groups. With cybercrime easily crossing geographical borders, a closer look at the international law framework on the fight against cybercrime is warranted, including but not limited to the Council of Europe Convention on Cybercrime. This chapter focuses on cyber-related aspects of substantive criminal law, criminal procedure, and juris
APA, Harvard, Vancouver, ISO, and other styles
More sources

Book chapters on the topic "Cyber border"

1

Bhatele, Kirti Raj, Devanshu Tiwari, and Anand Singh Bisen. "Border surveillance." In Artificial Intelligence for Cyber Security and Industry 4.0. CRC Press, 2025. https://doi.org/10.1201/9781032657264-6.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Xie, Zhengjun. "Logistics Distribution Optimization System of Cross-Border e-Commerce Platform Based on Bayes-BP Algorithm." In Cyber Security Intelligence and Analytics. Springer Nature Switzerland, 2023. http://dx.doi.org/10.1007/978-3-031-31775-0_4.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Yu, Jiang. "AHP-Based Small Cross-Border e-Commerce Export Trade Logistics Model Selection and Application Analysis." In Cyber Security Intelligence and Analytics. Springer International Publishing, 2022. http://dx.doi.org/10.1007/978-3-030-96908-0_72.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Huang, Jingxian. "Training Mode of Cross-Border E-commerce Japanese Translators Based on Neural Network." In Data Processing Techniques and Applications for Cyber-Physical Systems (DPTA 2019). Springer Singapore, 2020. http://dx.doi.org/10.1007/978-981-15-1468-5_227.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Jin, Kayi. "Impact Model of the Brand Cross-Border Cooperation from the Perspective of the Big Data." In Data Processing Techniques and Applications for Cyber-Physical Systems (DPTA 2019). Springer Singapore, 2020. http://dx.doi.org/10.1007/978-981-15-1468-5_191.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Lin, Rui. "Risk Analysis and Development Research of Cross-Border E-commerce Payment Under the Background of Internet Finance." In 2021 International Conference on Applications and Techniques in Cyber Intelligence. Springer International Publishing, 2021. http://dx.doi.org/10.1007/978-3-030-79200-8_10.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Giunta, Gabriele, Carmen Stira, Jolanda Modic, et al. "Improved Resilience of Critical Infrastructures Against Large-Scale Transnational and Systemic Risks." In Security Informatics and Law Enforcement. Springer Nature Switzerland, 2024. http://dx.doi.org/10.1007/978-3-031-62083-6_14.

Full text
Abstract:
AbstractThe integrity and resilience of Critical Infrastructures (CIs) are fundamental to the security, well-being and economic prosperity of Europe. However, the increasing complexity and interconnectedness of CIs pose new challenges, as disruptions in one CI can have cascading effects across multiple sectors and countries. ATLANTIS addresses these challenges by evaluating and addressing systemic risks against major natural hazards and complex attacks that could disrupt vital functions of European society. The project focuses on improving the resilience of interconnected CIs exposed to large-
APA, Harvard, Vancouver, ISO, and other styles
8

Japaridze, Tinatin. "Cyber Sovereignty: Should Cyber Borders Replicate Territorial Borders?" In The Implications of Emerging Technologies in the Euro-Atlantic Space. Springer International Publishing, 2023. http://dx.doi.org/10.1007/978-3-031-24673-9_13.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Huang, Dan, and Jian Zhou. "Dilemma and Breakthrough of School-Enterprise Integration in Cultivating Applied Cross-Border E-commerce Talents Under the Background of Internet." In 2021 International Conference on Big Data Analytics for Cyber-Physical System in Smart City. Springer Singapore, 2022. http://dx.doi.org/10.1007/978-981-16-7469-3_90.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Layton, Peter, and John Blaxland. "Australia." In The Military and Society. Springer Nature Switzerland, 2025. https://doi.org/10.1007/978-3-031-86741-5_5.

Full text
Abstract:
Abstract The Australian Defence Force (ADF) has a long history of deploying domestically in various roles and is often called upon to assist in natural disasters like bushfires, floods, and cyclones. This chapter examines the ADF's extensive domestic deployments during the COVID-19 pandemic and which built on its history of disaster response. Operation COVID-19 Assist was unprecedented in scope and immediately followed significant bushfire relief efforts. Under the Defence Assistance to the Civil Community (DACC) framework, the ADF, engaged in a wide array of non-traditional tasks, including s
APA, Harvard, Vancouver, ISO, and other styles

Conference papers on the topic "Cyber border"

1

Li, Xudong, Yang Chen, and Hongpeng Wang. "Design of Border Patrol Robot System Based on ROS." In 2024 IEEE 14th International Conference on CYBER Technology in Automation, Control, and Intelligent Systems (CYBER). IEEE, 2024. http://dx.doi.org/10.1109/cyber63482.2024.10748993.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Zururi, Achmad, Fitra Putri Oganda, Sondang Visiana Sihotang, Untung Rahardja, and Po Abas Sunarya. "Opportunities and Challenges of Distributed Ledger Technology in Cross-Border Financial Transactions." In 2024 12th International Conference on Cyber and IT Service Management (CITSM). IEEE, 2024. https://doi.org/10.1109/citsm64103.2024.10775896.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Liu, Chuande, Shu Fang, Jiao Li, and Bingtuan Gao. "An Adaptive Dual-Docking Force Control of Ship-Borne Manipulators for UAV-Assisted Perching." In 2024 IEEE 14th International Conference on CYBER Technology in Automation, Control, and Intelligent Systems (CYBER). IEEE, 2024. http://dx.doi.org/10.1109/cyber63482.2024.10749252.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Malone, Matt. "Weaponizing Cross-Border Data Flows: An Opportunity for NATO?" In 2023 15th International Conference on Cyber Conflict: Meeting Reality (CyCon). IEEE, 2023. http://dx.doi.org/10.23919/cycon58705.2023.10181730.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Schufrin, Marija, Hendrik Lucke-Tieke, and Jorn Kohlhammer. "Visual Firewall Log Analysis - At the Border Between Analytical and Appealing." In 2022 IEEE Symposium on Visualization for Cyber Security (VizSec). IEEE, 2022. http://dx.doi.org/10.1109/vizsec56996.2022.9941462.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

BĂDIȚĂ, Aurelian-Gabriel. "Security of Romanian Electronic Passports: The Protection of Personal Data in the Digital Age." In International Conference on Cybersecurity and Cybercrime. Romanian Association for Information Security Assurance, 2024. http://dx.doi.org/10.19107/cybercon.2024.14.

Full text
Abstract:
Highlighting the evolution and importance of electronic passports in Romania, respectively the security risk associated with cyber attacks against the system for issuing these documents, represents a first pillar in the development of strategies to protect national security. Adopting a proactive approach in managing cyber risks in ensuring the security of the electronic passport issuance system, respectively the security of citizens' personal data, is necessary to provide an optimal climate of trust, both for the national/European/international order and security structures, and for the well-b
APA, Harvard, Vancouver, ISO, and other styles
7

Douzet, Frederick, Louis Petiniaud, Loqman Salamatian, Kevin Limonier, Kave Salamatian, and Thibaut Alchus. "Measuring the Fragmentation of the Internet: The Case of the Border Gateway Protocol (BGP) During the Ukrainian Crisis." In 2020 12th International Conference on Cyber Conflict (CyCon). IEEE, 2020. http://dx.doi.org/10.23919/cycon49761.2020.9131726.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Rajamäki, Jyri, and Juha Knuuttila. "Cyber Security and Trust - Tools for Multi-agency Cooperation between Public Authorities." In Special Session on Information Sharing Environments to Foster Cross-Sectorial and Cross-Border Collaboration between Public Authorities. SCITEPRESS - Science and and Technology Publications, 2015. http://dx.doi.org/10.5220/0005628803970404.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Qin, Zhiai, Jia Zhao, and Peng Ge. "An Empirical Model Analysis of the Typical Cross-border Scenarios of Automotive Data." In CSAIDE 2024: 2024 3rd International Conference on Cyber Security, Artificial Intelligence and Digital Economy. ACM, 2024. http://dx.doi.org/10.1145/3672919.3673020.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Yang, Yingyu, Bingze Li, Jiamei Wang, et al. "Analysis and Countermeasure Research about Sensitive Information of Complex Cyber Psychology of Cross-border Multi-ethnic Language." In 2016 International Conference on Computer Engineering, Information Science & Application Technology (ICCIA 2016). Atlantis Press, 2016. http://dx.doi.org/10.2991/iccia-16.2016.33.

Full text
APA, Harvard, Vancouver, ISO, and other styles

Reports on the topic "Cyber border"

1

Jamilov, Rustam, Hélène Rey, and Ahmed Tahoun. The Anatomy of Cyber Risk. Institute for New Economic Thinking Working Paper Series, 2023. http://dx.doi.org/10.36687/inetwp206.

Full text
Abstract:
This paper employs computational linguistics to introduce a novel text-based measure of firm-level cyber risk exposure based on quarterly earnings conference calls of listed firms. Our quarterly measures are available for more than 13,000 firms from 85 countries over 2002-2021. We document that cyber risk exposure predicts cyber attacks, affects stock returns and profits, and is priced in the equity option market. The cost of option protection against price, variance, and tail risks is greater for more cyber-exposed firms. Cyber risks spill over across firms and persist at the sectoral level.
APA, Harvard, Vancouver, ISO, and other styles
2

Malone, Matt. Will Canada’s Bill C-8 Impact the Future of EU-Canada Cross-border Data Flows? Balsillie School of International Affairs, 2025. https://doi.org/10.51644/bap74.

Full text
Abstract:
Canada’s proposed cyber security for critical infrastructure bill, Bill C-8, which reintroduces Bill C-26 from the previous Parliament (with minor tweaks), could lead to a re-evaluation of the European Commission’s adequacy decision concerning Canada’s data protection laws. As such, the bill could push Canada to the brink of a disruption in the framework governing cross-border data flows between the two jurisdictions. Such a scenario would create tremendous uncertainty for actors in the digital economy who routinely process Europeans’ personal data, such as airlines, financial institutions, in
APA, Harvard, Vancouver, ISO, and other styles
3

Soramäki, Kimmo. Financial Cartography. FNA, 2019. http://dx.doi.org/10.69701/ertx8007.

Full text
Abstract:
Geographic maps have been of military and economic importance throughout the ages. Rulers have commissioned maps to control the financial, economic, political, and military aspects of their sovereign entities. Large scale projects like the Ordnance Survey in the UK in the late 18th century, and the Lewis and Clark Expedition a few decades later to map the American West, are early examples of trailblazing efforts to create accurate modern maps of high strategic importance. Digitalization, globalization, and a larger urban and educated workforce necessitate a new understanding of the world, beyo
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!