To see the other types of publications on this topic, follow the link: Cyber deal.

Journal articles on the topic 'Cyber deal'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the top 50 journal articles for your research on the topic 'Cyber deal.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.

1

Kohrs, Jens. "XM Cyber: Sanas Cyber-Deal mit Schwarz Digits." kma - Klinik Management aktuell 30, no. 02/03 (2025): 72–73. https://doi.org/10.1055/a-2547-7046.

Full text
Abstract:
Es geht um über 20 000 Endpunkte vom Laptop bis zum virtuellen Server in mehr als 50 Kliniken und an mehr als 80 Orten. Konzernweit führt Sana eine Cybersecurity-Lösung der Lidl-Schwester Schwarz Digits ein. Was sich CISO Sascha Fröhlich davon verspricht.
APA, Harvard, Vancouver, ISO, and other styles
2

Seleman, Yasser. "Cyber security Crimes, weaknesses, and modern practical applications in solution." International Journal of Computers and Informatics 4, no. 2 (2025): 21–39. https://doi.org/10.59992/ijci.2025.v4n2p2.

Full text
Abstract:
The research deals with a group of problems and breakthroughs in the previous period and the largest attacks in history that caused failures in technical systems around the world. The research discussed cyber-attacks and disruptions and how to deal with them, better understand the difference, and enhance cyber security. Through the research, many examples of malfunctions, hacks, and cyber-attacks on modern global systems are discussed. The research aims to identify the basic causes, weaknesses, and methods that contribute to finding solutions security and the challenges of espionage and electr
APA, Harvard, Vancouver, ISO, and other styles
3

Straub, PhD, Jeremy. "Cyber-mitigation: Cybersecurity emergency management." Journal of Emergency Management 18, no. 6 (2020): 463–73. http://dx.doi.org/10.5055/jem.2020.0517.

Full text
Abstract:
Cybersecurity is within the realm of emergency management, as cyber-attacks can generate both virtual and real world issues that emergency responders may be called upon to deal with. However, it has a skillset and other characteristics that are distinct from the types of emergency management that most practitioners commonly—and are prepared—to deal with. This paper compares the two disciplines, discusses areas where cybersecurity professionals and researchers can learn from the emergency management discipline and proposes new research directions within the emergency management domain.
APA, Harvard, Vancouver, ISO, and other styles
4

Gasm Elseid, Mohamed Osman Mohamed Gasm Elseid. "Technical and Procedural Measures to Protect Against Modern Cyber Breaches and Attacks." East Journal of Applied Science 1, no. 3 (2025): 16–22. https://doi.org/10.63496/ejas.vol1.iss3.95.

Full text
Abstract:
The research deals with a group of problems and breakthroughs in the previous period and the largest attacks in history that caused failures in technical systems around the world. The research discussed cyber-attacks and disruptions and how to deal with them, better understand the difference, and enhance cyber security. Through the research, many examples of malfunctions, hacks, and cyber-attacks on modern global systems are discussed. The research aims to identify the basic causes, weaknesses, and methods that contribute to finding solutions security and the challenges of espionage and electr
APA, Harvard, Vancouver, ISO, and other styles
5

Aslam, Sibtain Bin, Moazzam Ali Malik, and Muhammad Arif Khan. "Gender and Cyber Communication: A Systematic Literature Review of Challenges Faced by Women in Pakistan." Global Language Review VIII, no. I (2023): 174–83. http://dx.doi.org/10.31703/glr.2023(viii-i).17.

Full text
Abstract:
Cyber communication and gender issues have been subjects of sociolinguistic discussions among researchers in recent years. Online gender harassment has become a common phenomenon in the internet era. This harassment is aggravated when sufferers face more persecution due to delay, denial, and in some cases, unavailability of justice from the country's criminal justice system. Though third-world countries have categorized laws dealing with cyber-harassment to deal with cyber- criminals, the same system paves the way for secondary persecution. Past studies show that law enforcement agencies trivi
APA, Harvard, Vancouver, ISO, and other styles
6

Putra, Tommy Mandala, I. Wayan Midhio, and Deni D.A.R. "The Challenges of Civil-Military Cooperation in The Face of Cyber Threats in Indonesia." International Journal of Research and Innovation in Social Science 06, no. 02 (2022): 471–74. http://dx.doi.org/10.47772/ijriss.2022.6221.

Full text
Abstract:
Non-military threats in the era of globalization are so complex, cybercrime is a threat that must be considered by all groups, including the government, military and society. The existence of cyber threats requires strengthening civil-military cooperation to deal with them. In this research, the writer wants to knowwhat are the challenges ahead for civil-military cooperation in dealing with cyber threats in Indonesia. Methods of data collection using literature review. The results of the research are cyber threats at the civilian level. The government has regulated matters relating to activiti
APA, Harvard, Vancouver, ISO, and other styles
7

Gao, Chungang, Yongjie Wang, and Xinli Xiong. "A Cyber Deception Defense Method Based on Signal Game to Deal with Network Intrusion." Security and Communication Networks 2022 (March 18, 2022): 1–17. http://dx.doi.org/10.1155/2022/3949292.

Full text
Abstract:
Increasingly, cyber security personnel are using cyber deception defense techniques to deal with network intrusions. However, traditional cyber deception techniques (such as honeypots and honeynets) are easily detected by attackers, thus leading to failure. Therefore, we propose a cyber deception defense method based on the signal game to improve the effectiveness of the defense. More specifically, first, we propose a moving target defense (MTD) enhanced cyber deception defense mechanism. Then, on the basis of the in-depth analysis of network attack and defense scenarios, a signal game model i
APA, Harvard, Vancouver, ISO, and other styles
8

Lefèvre, Claude, Muhsin Tamturk, Sergey Utev, and Marco Carenzo. "Cyber Risk in Insurance: A Quantum Modeling." Risks 12, no. 5 (2024): 83. http://dx.doi.org/10.3390/risks12050083.

Full text
Abstract:
In this research, we consider cyber risk in insurance using a quantum approach, with a focus on the differences between reported cyber claims and the number of cyber attacks that caused them. Unlike the traditional probabilistic approach, quantum modeling makes it possible to deal with non-commutative event paths. We investigate the classification of cyber claims according to different cyber risk behaviors to enable more precise analysis and management of cyber risks. Additionally, we examine how historical cyber claims can be utilized through the application of copula functions for dependent
APA, Harvard, Vancouver, ISO, and other styles
9

Jaipal. "A STUDY ABOUT GROWING TREND OF CYBER-CRIME AND VARIOUS STRATEGIES TO DEAL WITH IT IN INDIAN PERSPECTIVE." International Journal of Current Research and Modern Education (IJCRME) 7, no. 2 (2022): 51–53. https://doi.org/10.5281/zenodo.8073660.

Full text
Abstract:
This research paper examines the growing trends, challenges, and strategies for the investigation of cyber-crimes in India. The paper discusses the current landscape of cyber-crimes in the country, the legal framework for addressing these crimes, and the challenges faced by law enforcement agencies in investigating and prosecuting cyber criminals. Furthermore, the paper proposes strategies to overcome these challenges and enhance the effectiveness of cyber-crime investigations in India.
APA, Harvard, Vancouver, ISO, and other styles
10

Grabosky, Peter. "Requirements of prosecution services to deal with cyber crime." Crime, Law and Social Change 47, no. 4-5 (2007): 201–23. http://dx.doi.org/10.1007/s10611-007-9069-1.

Full text
APA, Harvard, Vancouver, ISO, and other styles
11

Dewi, Maharani Chandra. "Cyber Espionage in National and Global Perspective: How Indonesia Deal with this issue?" International Law Discourse in Southeast Asia 1, no. 1 (2022): 1–22. http://dx.doi.org/10.15294/ildisea.v1i1.56874.

Full text
Abstract:
Cyber Crime is the most frightening crime in today's technological developments. Attacks that do not know the target and time for a particular purpose. The privacy of a person or institution can be threatened by cyber crime. Mobile technology and supported by adequate communication network facilities turn a positive image into a dilemma. Someone should in dealing with it keep thinking positive. Increasing self-awareness and acting ethically will not result in something fatal. Any excessive action can backfire. Increasing knowledge in the use of technology is very necessary. Mobilization that i
APA, Harvard, Vancouver, ISO, and other styles
12

Awan, Jawad Hussain, Shahzad Memon, and Fateh Muhammad Burfat. "Role of Cyber Law and Mitigation Strategies in Perspective of Pakistan to Cope Cyber Threats." International Journal of Cyber Warfare and Terrorism 9, no. 2 (2019): 29–38. http://dx.doi.org/10.4018/ijcwt.2019040103.

Full text
Abstract:
In this digital world, innovations and advancement have increased the number of users and the user ratio continues to double, triple and so-on. Unfortunately, the increase of crime, malware activities, has also increased. Thus, the privacy and security of systems and services is a prominent challenge for organizations, and countries. In this connection, each and every developed or developing country is practicing to design policies, strategies, cyber laws to deal with illegal activities, taken place via the internet. Pakistan is also one of those developing countries who have no any legislativ
APA, Harvard, Vancouver, ISO, and other styles
13

Wibowo, Antonius PS. "Cyber Bullying Among Law Student: How They Deal With It, Understand and Apply The Law." SHS Web of Conferences 54 (2018): 07005. http://dx.doi.org/10.1051/shsconf/20185407005.

Full text
Abstract:
The phenomenon of cyber bullying may be a lot happening among students but the law is less functioned by them. It is interesting to research. The aim of this manuscript are to research cyberbullying among the law student, to know the level of understanding of the student about related law and the factors that affect students to apply the law. This research apply sampling survey method and respondent is sampel of Law Student of Atma Jaya Catholic University. Respondent answered mixed questioner (open question and closed question). Sampel of respondent is selected based upon purposive sampling.
APA, Harvard, Vancouver, ISO, and other styles
14

Juneja, Sapna, Mamta Gahlan, Gaurav Dhiman, and Sandeep Kautish. "Futuristic Cyber-Twin Architecture for 6G Technology to Support Internet of Everything." Scientific Programming 2021 (October 6, 2021): 1–7. http://dx.doi.org/10.1155/2021/9101782.

Full text
Abstract:
With the rapid growth of Internet of Everything, there is a huge rise in the transportable Internet traffic due to which its associated resources have exceptional obstacles which include reliability, security, expandability, security, and portability which the current available network architectures are unable to deal with. In this paper, an IoT centric cyber-physical twin architecture has been proposed for 6G Technology. The cyber-twin technology helps out in serving stronger communication and also contains several features that help out in assisting communication like maintaining a log recor
APA, Harvard, Vancouver, ISO, and other styles
15

Marotta, A., F. Martinelli, S. Nanni, A. Orlando, and A. Yautsiukhin. "Cyber-Insurance Survey." Computer Science Review 24, May 2017 (2017): 35–61. https://doi.org/10.1016/j.cosrev.2017.01.001.

Full text
Abstract:
Cyber insurance is a rapidly developing area which draws more and more attention of practitioners and researchers. Insurance, an alternative way to deal with residual risks, was only recently applied to the cyber world. The immature cyber insurance market faces a number of unique challenges on the way of its development. In this paper we summarise the basic knowledge about cyber insurance available so far from both market and scientifc perspectives. We provide a common background explaining basic terms and formalisation of the area. We discuss the issues which make this type of insurance uniqu
APA, Harvard, Vancouver, ISO, and other styles
16

Kurebwa, Jeffrey. "Understanding Cyber Security." International Journal of Systems and Service-Oriented Engineering 11, no. 1 (2021): 43–55. http://dx.doi.org/10.4018/ijssoe.2021010104.

Full text
Abstract:
This study provides an understanding of cyber security and further analyses the Cyber Security and Data Protection Bill of Zimbabwe. The internet and other technological developments have provided a variety of platforms for increased and sometimes unrestricted exercise of freedom of expression, association, online transactions, and access to information rights. Zimbabwe has faced increased threats from cyber activities. This has necessitated the country to enact the Cyber Security and Data Protection Bill. The purpose of the Cyber Security and Data Protection Bill is to increase cyber security
APA, Harvard, Vancouver, ISO, and other styles
17

Chen, Jian, Mohamed A. Mohamed, Udaya Dampage, et al. "A Multi-Layer Security Scheme for Mitigating Smart Grid Vulnerability against Faults and Cyber-Attacks." Applied Sciences 11, no. 21 (2021): 9972. http://dx.doi.org/10.3390/app11219972.

Full text
Abstract:
To comply with electric power grid automation strategies, new cyber-security protocols and protection are required. What we now experience is a new type of protection against new disturbances namely cyber-attacks. In the same vein, the impact of disturbances arising from faults or cyber-attacks should be surveyed by network vulnerability criteria alone. It is clear that the diagnosis of vulnerable points protects the power grid against disturbances that would inhibit outages such as blackouts. So, the first step is determining the network vulnerable points, and then proposing a support method
APA, Harvard, Vancouver, ISO, and other styles
18

Saputri, Dessy Permatasari, Surryanto D. W., and Helda Risman. "The Indonesian Cyber Diplomacy: ASEAN-Japan Online Cyber Exercise." Technium Social Sciences Journal 9 (June 12, 2020): 453–64. http://dx.doi.org/10.47577/tssj.v9i1.911.

Full text
Abstract:
The development of information and communication technology is growing both globally and regionally making it easier for everyone to access all information and communicate without knowing the limits even though many benefits can be obtained. The reality, in turn, gives a negative impact such as personal crime, theft, and data falsification to attack systems or forms of state infrastructure. Cyber threats that occur in Indonesia include racial riots in 1998 which Indonesia had to fight with hackers from China and Taiwan. Besides, the Indonesian government must also face espionage that done by A
APA, Harvard, Vancouver, ISO, and other styles
19

Wardana, Achmad, Gunaryo Gunaryo, and Y. H. Yogaswara. "Development of Cyber Weapons to Improve Indonesia's Cyber Security." Journal of Sosial Science 3, no. 3 (2022): 453–59. http://dx.doi.org/10.46799/jss.v3i3.334.

Full text
Abstract:
It is indisputable that technical advancements have an impact on a country's military capability and security. This is inextricably linked to the deployment of numerous technologies and new discoveries aimed at boosting the military's defense system. As a result of this predicament, all governments are attempting to modernize their defense systems in order to deal with dangers posed by technological advancements. This is both a challenge and an opportunity for Indonesia's existing defense system. The goal of this study is to look into the development of cyber weapons and how they may help Indo
APA, Harvard, Vancouver, ISO, and other styles
20

Kashyap, Anil K., and Anne Wetherilt. "Some Principles for Regulating Cyber Risk." AEA Papers and Proceedings 109 (May 1, 2019): 482–87. http://dx.doi.org/10.1257/pandp.20191058.

Full text
Abstract:
We explain why cyber risk differs from other operational risks in the financial sector. The form of cyber shocks differs because of their intent, probability of success, possibility of a hidden phase, and evolving form of the risks. The impact differs because problems can spread quickly and because uncertainty over the possibility of a hidden phase can impact responses. We explain why private incentives to attend to these risks may differ from societies' preferences and develop six (micro- and macroprudential) regulatory principles to deal with cyber risk.
APA, Harvard, Vancouver, ISO, and other styles
21

Ajitha, P., Malemarpuram Chaitanya Sai, Dheeraj, and A. Sivasangari. "A Joint Optimization Approach to Security- and Insurance Management System on Cloud." Journal of Computational and Theoretical Nanoscience 17, no. 11 (2020): 4944–48. http://dx.doi.org/10.1166/jctn.2020.9245.

Full text
Abstract:
The fundamental point of this undertaking is to joined way to deal with protection and cyber insurance provisioning in the cloud based assets. Right now have introduced a joint way to deal with security and cyber insurance provisioning in the cloud. Utilizing a stochastic improvement, introduced a technique for ideally provisioning the two administrations despite vulnerability in regards to future valuing, approaching traffic and digital assaults. Hence, an application may make preparations for assaults by provisioning security administrations from suppliers, for example, Vast and Trend Micro.
APA, Harvard, Vancouver, ISO, and other styles
22

Errakot, Saran, and Rahoof VK. "Cyber bullying: A Need for Separate Provision in Indian Law Saran." GLS Law Journal 5, no. 1 (2023): 38–45. http://dx.doi.org/10.69974/glslawjournal.v5i1.81.

Full text
Abstract:
The Internet has become an essential component of our daily lives. It has opened the door to many opportunities and new social media culture. The Internet has made connecting and communicating with people more accessible than ever. The use of the Internet cannot be overemphasized as much as its inherent peril could not be underestimated. A few relevant ones are (but are not limited to) online harassment, voyeurism, identity theft, phishing, internet fraud, etc. The Internet has also become a medium for character assassination. Online abuse is severe and pervasive. It is severe because it cause
APA, Harvard, Vancouver, ISO, and other styles
23

Saenko, M. I., E. A. Savela, and Y. Y. Topolyansky. "International experience against cyber crime and cyber crime." Uzhhorod National University Herald. Series: Law, no. 64 (August 14, 2021): 386–91. http://dx.doi.org/10.24144/2307-3322.2021.64.71.

Full text
Abstract:
The article considers the concept of cybercrime, mechanisms for combating it at the international level (in the UN system), analyzes international legal acts governing the process of combating cybercrime. It is noted that today a large-scale problem of the world community is cybercrime, the number of which is growing every year. Despite the active growth of the IT industry and information space, businesses are still not fully aware of the importance of cybersecurity. Both the population and state (non-state) organizations become potential victims of criminal en-croachments.Cybersecurity means
APA, Harvard, Vancouver, ISO, and other styles
24

Kim, Jin-Hee. "Reviewing the New Deal Cultural Policy: Focusing on the Federal One." Korea Association of World History and Culture 61 (December 30, 2021): 257–81. http://dx.doi.org/10.32961/jwhc.2021.12.61.257.

Full text
Abstract:
This paper examines the implications of the New Deal cultural policy for the overall vision and goals of the New Deal. Existing studies mainly evaluded the New Deal through economic and political performance, and as a result, it was difficult to clearly understand the direction and vision of the New Deal. Therefore, this paper intends to clarify the vision and the civil rights that the New Dealers aimed at by examining the New Deal Federal One. This papers comes to a conclusion in the minds of the New Deal cultural advocates, American citizenship included enrichment of the life through the “Ar
APA, Harvard, Vancouver, ISO, and other styles
25

Weyns, Danny, Jesper Andersson, Mauro Caporuscio, Francesco Flammini, Andreas Kerren, and Welf Löwe. "A Research Agenda for Smarter Cyber-Physical Systems." Journal of Integrated Design and Process Science 25, no. 2 (2022): 27–47. http://dx.doi.org/10.3233/jid210010.

Full text
Abstract:
With the advancing digitisation of society and industry we observe a progressing blending of computational, physical, and social processes. The trustworthiness and sustainability of these systems will be vital for our society. However, engineering modern computing systems is complex as they have to: i) operate in uncertain and continuously changing environments, ii) deal with huge amounts of data, and iii) require seamless interaction with human operators. To that end, we argue that both systems and the way we engineer them must become smarter. With smarter we mean that systems and engineering
APA, Harvard, Vancouver, ISO, and other styles
26

Dixit, Ms Keerti. "Attack Taxonomy for Cyber-Physical System." International Journal for Research in Applied Science and Engineering Technology 10, no. 1 (2022): 194–200. http://dx.doi.org/10.22214/ijraset.2022.39734.

Full text
Abstract:
Abstract: Cyber-physical systems are the systems that combine the physical world with the world of information processing. CPS involves interaction between heterogeneous components that include electronic chips, software systems, sensors and actuators. It makes the CPS vulnerable to attacks. How to deal with the attacks in CPSs has become a research hotspot. In this paper we have study the Architecture of CPS and various security threats at each layer of the archicture of CPS. We have also developed attack taxonomy for CPS. Keywords: Cyber Physical System, Threat, Attack
APA, Harvard, Vancouver, ISO, and other styles
27

Magliulo, Antonio. "Cyber Security and Tourism Competitiveness." European Journal of Tourism, Hospitality and Recreation 7, no. 2 (2016): 128–34. http://dx.doi.org/10.1515/ejthr-2016-0015.

Full text
Abstract:
AbstractUntil a few years ago, markets were basically physical spaces, more or less large, where sellers and buyers could meet. The exchanges happened through physical contacts at the local as well as the international level. Security meant, basically, to protect people against tangible threats (frauds, thefts etc.). Nowadays, we are facing a new challenge. Markets are mainly becoming a cyberspace where sellers, dealers and buyers can meet without the need for physical contact. Security also has to mean protecting people against cyber threats (internet frauds, identity thefts etc.). In this pa
APA, Harvard, Vancouver, ISO, and other styles
28

Mahboob, Syed Mohaddas, Syed Shair Abbas, and Iftikhar Ahmed Shaheen. "ADAPTING TO CYBERSECURITY CHALLENGES: ASSESSING THE EFFECTIVENESS OF INTERNATIONAL LAW AGAINST CYBER TERRORISM." Journal of Social Research Development 4, no. 4 (2023): 669–85. http://dx.doi.org/10.53664/jsrd/04-04-2023-02-669-685.

Full text
Abstract:
The study critically examines current condition of global rule in resolving the developing hazard of cyber terrorism. The research dives right into the complexities and problems posed by cyber terrorism as well as reviews the effectiveness of existing lawful platforms in responding to this progressing threat. Employing a diverse series of academic jobs, the study investigates the requirements for brand-new global lawful frameworks, developments in cybercrime inspection as well as digital forensics, as well as the function of surfacing modern technologies in rule administration. Also, the repor
APA, Harvard, Vancouver, ISO, and other styles
29

Pranav, Choudhary. "AI-BASED CYBER CRIMES AND CYBER REGULATIONS: ISSUES AND CHALLENGES." Indian Journal of Law and Society I, no. 8 (2024): 92–110. https://doi.org/10.5281/zenodo.10644601.

Full text
Abstract:
<strong>ABSTRACT</strong> <em>Artificial intelligence (AI) is the science and engineering of creating intelligent machines, particularly computer programs. It has the potential to play a role in criminal acts known as AI-crimes (AIC), which pose threats to cybersecurity, such as stealing sensitive data, hacking and weaponizing autonomous weaponry, social engineering attacks, and political disruption. Currently, there is no regulatory framework targeting AI crimes, and the legal texts do not address the contentious issue of criminal liability for AI. Traditionally, AI has been regulated through
APA, Harvard, Vancouver, ISO, and other styles
30

Törngren, Martin, and Paul Grogan. "How to Deal with the Complexity of Future Cyber-Physical Systems?" Designs 2, no. 4 (2018): 40. http://dx.doi.org/10.3390/designs2040040.

Full text
Abstract:
Cyber-Physical Systems (CPS) integrate computation, networking and physical processes to produce products that are autonomous, intelligent, connected and collaborative. Resulting Cyber-Physical Systems of Systems (CPSoS) have unprecedented capabilities but also unprecedented corresponding technological complexity. This paper aims to improve understanding, awareness and methods to deal with the increasing complexity by calling for the establishment of new foundations, knowledge and methodologies. We describe causes and effects of complexity, both in general and specific to CPS, consider the evo
APA, Harvard, Vancouver, ISO, and other styles
31

Sangsoo Lim. "How to deal with Cyber-bullying in terms of Moral Education." Journal of Ethics 1, no. 81 (2011): 291–316. http://dx.doi.org/10.15801/je.1.81.201106.291.

Full text
APA, Harvard, Vancouver, ISO, and other styles
32

Dwi Hastri, Evi. "Cyber Espionage Sebagai Ancaman Terhadap Pertahanan Dan Keamanan Negara Indonesia." Law & Justice Review Journal 1, no. 1 (2021): 12–25. http://dx.doi.org/10.11594/lrjj.01.01.03.

Full text
Abstract:
This research aims to analyze the norms that have a blur (Vague Norm) against Cyber Espionage related to Indonesia's legal ability to accommodate Cyber Espionage attacks. In addition, this study also aims to analyze Indonesia's efforts to overcome the Cyber Espionage attack that could threaten the stability of national defense and security. The type of research in the legal research method used is normative juridical with three problem approaches, namely the Statute Approach, Conceptual Approach, and Comparative Approach. Primary and secondary legal materials that have been collected will be p
APA, Harvard, Vancouver, ISO, and other styles
33

Aththaariq Rizki. "UTILIZATION OF THE SEMESTA DEFENSE CONCEPT IN FACING SIBER ATTACKS DURING THE COVID-19 PANDEMIC IN INDONESIA." Edukasi IPS 5, no. 2 (2021): 18–26. http://dx.doi.org/10.21009/eips.005.02.03.

Full text
Abstract:
This study argues that currently the threat of cyber attacks has become a real threat that has the potential to grow during the Covid-19 pandemic. The concept of a universal defense system can be used as strategy to deal with cyber threats. This research using a qualitative method with a literature review approach that focuses on the threat of cyber attacks in Indonesia during the Covid-19 pandemic. The purpose of this study is to find out how the threat of cyber attacks in Indonesia during the Covid-19 pandemic is, and how the concept of a universal defense system can handle it. The theory us
APA, Harvard, Vancouver, ISO, and other styles
34

Khalaf, Meaad Ali, and Amani Steiti. "Artificial Intelligence Predictions in Cyber Security: Analysis and Early Detection of Cyber Attacks." Babylonian Journal of Machine Learning 2024 (May 9, 2024): 63–68. http://dx.doi.org/10.58496/bjml/2024/006.

Full text
Abstract:
The landscape of cyber-attacks has changed due, to the upward push of digitalization and interconnected structures. This necessitates the need for revolutionary techniques to emerge as aware of and mitigate these threats at a degree. This studies delves into the correlation amongst cyber security and artificial intelligence (AI) with a focus on how AI can decorate detection of cyber-attacks via assessment, prediction and different strategies. By harnessing machine mastering, neural networks and records analytics predictive models driven with the useful resource of AI have emerged as an approac
APA, Harvard, Vancouver, ISO, and other styles
35

Warren, Matthew, and Shona Leitch. "Protection of Australia in the Cyber Age." International Journal of Cyber Warfare and Terrorism 1, no. 1 (2011): 35–40. http://dx.doi.org/10.4018/ijcwt.2011010104.

Full text
Abstract:
Australia has developed sophisticated national security policies and physical security agencies to protect against current and future security threats associated with critical infrastructure protection and cyber warfare protection. In this paper, the authors examine some common security risks that face Australia and how government policies and strategies have been developed and changed over time, for example, the proposed Australian Homeland Security department. This paper discusses the different steps that Australia has undertaken in relation to developing national policies to deal with criti
APA, Harvard, Vancouver, ISO, and other styles
36

Saputra, Rodhi Agung, Rinaldy Amrullah, Agus Triono, and Bonifa Refsi. "Management of Improvement of Cyber Crime at the Time of the COVID-19 Pandemic Happening Restorative Justice." Scholars International Journal of Law, Crime and Justice 5, no. 7 (2022): 286–93. http://dx.doi.org/10.36348/sijlcj.2022.v05i07.006.

Full text
Abstract:
The purpose of this study is to find out and understand the problems of overcoming the increase in Cyber Crime during the Covid-19 pandemic. The existence of Internet media that is so large and easy if not used wisely will give birth to crime in cyberspace or known as Cyber Crime. The problems that will be discussed in this study are how are the problems of overcoming the increase in Cyber Crime during the Covid-19 pandemic and what is the role of the Prosecutor in providing legal policies against Cyber Crime perpetrators, especially children. The findings of this study are that during the Cov
APA, Harvard, Vancouver, ISO, and other styles
37

Al moussawi, Zainab Abad Alrada. "The Role of Cybersecurity in Facing Technological Challenges in Tourism Companies in Baghdad." International journal of tourism and hospitality management 04, no. 01 (2024): 17–36. http://dx.doi.org/10.55640/ijthm-04-01-01.

Full text
Abstract:
Tourism agencies are among the business organizations that use e-commerce. In light of the increasing risks of technological challenges and cyber threats, focusing on cyber security requirements has become essential. From this standpoint, the study aimed to define the concept of cyber security and its importance, identify its dimensions and requirements, and demonstrate the impact of cyber security in Addressing technological challenges in tourism agencies. The study relied on the descriptive analytical approach and used a questionnaire to collect study data from a random sample of workers in
APA, Harvard, Vancouver, ISO, and other styles
38

Leenen, Louise, and Thomas Meyer. "Semantic Technologies and Big Data Analytics for Cyber Defence." International Journal of Cyber Warfare and Terrorism 6, no. 3 (2016): 53–64. http://dx.doi.org/10.4018/ijcwt.2016070105.

Full text
Abstract:
The Governments, military forces and other organisations responsible for cybersecurity deal with vast amounts of data that has to be understood in order to lead to intelligent decision making. Due to the vast amounts of information pertinent to cybersecurity, automation is required for processing and decision making, specifically to present advance warning of possible threats. The ability to detect patterns in vast data sets, and being able to understanding the significance of detected patterns are essential in the cyber defence domain. Big data technologies supported by semantic technologies
APA, Harvard, Vancouver, ISO, and other styles
39

Sianturi, Samuel Mangara. "Indonesian Defense Diplomacy in Achieving Cyber Security Through ADMM-Plus 2014-2019." LITERATUS 3, no. 2 (2021): 152–58. http://dx.doi.org/10.37010/lit.v3i2.300.

Full text
Abstract:
Cyber ??security issues began to emerge along with advances in the field of information technology and the rapid increase in internet use. However, the greater the need for the internet in the daily activities of the world community, the more potential international security threats arise from activities within the cyber scope. Given the "borderless" nature of cybercrime, it is necessary to deal with other countries. Indonesia's participation in ADMM-Plus illustrates Indonesia's efforts to achieve national interests, namely cyber security through the external environment. This study aims to di
APA, Harvard, Vancouver, ISO, and other styles
40

Li, Xingan. "A Review of Motivations of Illegal Cyber Activities." Kriminologija & socijalna integracija 25, no. 1 (2017): 110–26. http://dx.doi.org/10.31299/ksi.25.1.4.

Full text
Abstract:
Illegal cyber activities have been developing in past three decades with the mounting number of users of the computer and mobile networks. Potential perpetrators obtained more opportunities to instigate cyber attacks at different targets, at different scales, and from different motives. The existence of motivated attackers is one of an underlying trinity (together with the potential victims and weak guardianship) that leads to illegal activities (Cohen and Felson, 1979). In order to deal with illegal cyber activities, it is indispensable to have a better understanding of motivations of those p
APA, Harvard, Vancouver, ISO, and other styles
41

R. Asokan. "Role of Cyber Twin Mobile Networks in Digital Communication." December 2022 4, no. 4 (2023): 277–87. http://dx.doi.org/10.36548/jsws.2022.4.006.

Full text
Abstract:
Due to the unprecedented increase in the utilization of Internet of Things (IoT) technology, there is a huge increase in network/internet traffic due to which the existing network architectures are facing number of challenges in terms of reliability, availability, scalability, portability and expandability. In order to deal with the challenges, the cyber-twin technology has been recently proposed to assist in establishing a strong communication network in terms of digital asset management, network data maintenance etc. Recently, cyber-twin has become a well-established environment for real-wor
APA, Harvard, Vancouver, ISO, and other styles
42

Ogîgău-Neamțiu, Florin, and Horațiu Moga. "A Cyber Threat Model of a Nation Cyber Infrastructure Based on Goel-Okumoto Port Approach." Land Forces Academy Review 23, no. 1 (2018): 75–87. http://dx.doi.org/10.2478/raft-2018-0010.

Full text
Abstract:
Abstract Information assurance plays a critical role in modern countries around the globe and IT systems are key elements in this environment. Enabling or disabling such capabilities are strategic goals which dramatically influence a nation capacity to perform thus drawing considerate attention of stakeholders. This research defines a method to deal with cyber threats focused on attacker by using the game theory approach and canonic strategies specific to informational war. The cyber threats corresponding risks are treated through the bimatrix game theory and the strategies for Defender and Ch
APA, Harvard, Vancouver, ISO, and other styles
43

Ramadhianto, Rizky, Tahan Samuel Lumban Toruan, Susaningtyas Nefo Handayani Kertopati, and Hikmat Zakky Almubaroq. "Analysis of presidential regulations concerning cyber security to bolster defense policy management." Defense and Security Studies 4 (October 4, 2023): 84–93. http://dx.doi.org/10.37868/dss.v4.id244.

Full text
Abstract:
As a developing country, Indonesia must effectively manage its national defense by implementing defense policies which can be interpreted as management activities that transform into defense policy management entities. The objective is to protect against various dangerous threats resulting from the dynamics of the current strategic environment, which continues to undergo rapid and significant changes. Cyber threats pose a potentially dangerous threat that has a multidimensional impact. Therefore, this article analyzes one of the Indonesian government's efforts to deal with cyber threats, which
APA, Harvard, Vancouver, ISO, and other styles
44

Rosyidah, Fifti Imro’atur, Susilo Purwati, and Nurul Muzayyanah. "Improving Adolescent knowledge to Prevent Cyber Bullying through Psychoeducation." International Journal of Research and Innovation in Social Science VII, no. XI (2023): 399–408. http://dx.doi.org/10.47772/ijriss.2023.7011031.

Full text
Abstract:
In Indonesia, the number of teenagers who experience cyber bullying is reported 80 percent, and almost every day cyber bullying happens to the teenagers. Cyber bullying is violence that occurs through social media, when a child or teenager is ridiculed, humiliated, or intimidated by another child or youth through internet media, digital technology or cell phones. The negative effects of bullying and cyber bullying in childhood will have an impact on emotional disorders, poor psychosocial adaptation disorders and pathological behavioral disorders. The aim of psycho education at SMP 1 Kasembon i
APA, Harvard, Vancouver, ISO, and other styles
45

Firkhan Ali Hamid Ali, Mohd Khairul Amin Mohd Sukri, Mohd Zalisham Jali, Muhammad Al-Fatih, and Mohd Azhari Mohd Yusof. "Web-Based Reporting Vulnerabilities System for Cyber Security Maintenance." Journal of Advanced Research in Applied Sciences and Engineering Technology 29, no. 3 (2023): 198–205. http://dx.doi.org/10.37934/araset.29.3.198205.

Full text
Abstract:
To maintain secure web services and IT infrastructure, this has proposed the prototype of a vulnerability reporting system. Among these reporting systems developed to deal with problems of maintenance and analysis report management system which not yet been implemented in the cyber security scanning tool, Nessus. The system, which was designed to manage and analyze cyber security maintenance by focusing on vulnerability reports, was based on web-based technology. To ensure that the prototyping system could be used quickly, the development process employed the prototyping-rapid application deve
APA, Harvard, Vancouver, ISO, and other styles
46

Spencer, Angela D. "Cyber Science: Revolutionizing Computer Science in the Digital Age." Cybersecurity and Innovative Technology Journal 3, no. 1 (2025): 18–29. https://doi.org/10.53889/citj.v3i1.645.

Full text
Abstract:
The growing demand for cybersecurity specialists motivates employers to find job candidates with relevant expertise and practical cybersecurity experience. Educational institutions can develop successful cybersecurity professionals through complete cyber science programs that merge theoretical knowledge with practical training. This trained workforce stream helps organizations develop professionals who deal professionally with digital landscape challenges that shift over time. Through excellent cyber education, computer science graduates secure better career prospects. The teaching profession
APA, Harvard, Vancouver, ISO, and other styles
47

Wrede, Dirk, Tino Stegen, and Johann-Matthias Graf von der Schulenburg. "Affirmative and silent cyber coverage in traditional insurance policies: Qualitative content analysis of selected insurance products from the German insurance market." Geneva Papers on Risk and Insurance - Issues and Practice 45, no. 4 (2020): 657–89. http://dx.doi.org/10.1057/s41288-020-00183-6.

Full text
Abstract:
Abstract This paper examines the design of affirmative and silent coverage in view of the cyber risks in traditional insurance policies for select product lines on the German market. Given the novelty and complexity of the topic and the insufficient coverage in the literature, we use two different sources. We analysed the general insurance terms and conditions of different traditional insurance lines using Mayring’s qualitative content analysis. Also, we conducted interviews with experts from the German insurance industry to evaluate how insurers understand their silent cyber exposures, and wh
APA, Harvard, Vancouver, ISO, and other styles
48

Rajeyyagari, Sivaram, and Abdullah S. Alotaibi. "A study on cyber-crimes, threats, security and its emerging trends on latest technologies: influence on the Kingdom of Saudi Arabia." International Journal of Engineering & Technology 7, no. 2.3 (2018): 54. http://dx.doi.org/10.14419/ijet.v7i2.3.9969.

Full text
Abstract:
Now a day the human life penetrated with the technology, like in every moment of life such as shopping or financial transactions and more are using technology in its cyber space. At the same time, it has become very difficult to safe guard the information. The online crime or cybercrime increased along with the heavy usage and development of social media. In case of Saudi Arabia, the cyber-attacks increased because of regional conflicts and low-level awareness about cyber security, and also the perception of Saudi Arabia being extremely wealthy. This paper identifies the importance and impact
APA, Harvard, Vancouver, ISO, and other styles
49

Li, Guangjun, Preetpal Sharma, Lei Pan, Sutharshan Rajasegarar, Chandan Karmakar, and Nicholas Patterson. "Deep learning algorithms for cyber security applications: A survey." Journal of Computer Security 29, no. 5 (2021): 447–71. http://dx.doi.org/10.3233/jcs-200095.

Full text
Abstract:
With the development of information technology, thousands of devices are connected to the Internet, various types of data are accessed and transmitted through the network, which pose huge security threats while bringing convenience to people. In order to deal with security issues, many effective solutions have been given based on traditional machine learning. However, due to the characteristics of big data in cyber security, there exists a bottleneck for methods of traditional machine learning in improving security. Owning to the advantages of processing big data and high-dimensional data, new
APA, Harvard, Vancouver, ISO, and other styles
50

Crovini, Chiara, and Pier Luigi Marchini. "Managing cyber risk in the financial sector: Insights from a case study." FINANCIAL REPORTING, no. 1 (July 2023): 97–125. http://dx.doi.org/10.3280/fr2023-001004.

Full text
Abstract:
Purpose: This article focuses on cyber risk as an emerging issue within the risk management process and the internal control system in the financial sector. It in-vestigates whether cyber risk management (CRM) is (dis)integrated into traditional enterprise risk management (ERM) and analyzes the external dynamics affecting the CRM design. Design/methodology/approach: This article draws upon institutional theory and the concept of boundary objects. The research examines a listed Italian bank and gathers the data from semi-structured interviews, direct observations, meet-ings, and archival source
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!