To see the other types of publications on this topic, follow the link: Cyber exercises.

Journal articles on the topic 'Cyber exercises'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the top 50 journal articles for your research on the topic 'Cyber exercises.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.

1

Aoyama, Tomomi, Toshihiko Nakano, Ichiro Koshijima, Yoshihiro Hashimoto, and Kenji Watanabe. "On the Complexity of Cybersecurity Exercises Proportional to Preparedness." Journal of Disaster Research 12, no. 5 (2017): 1081–90. http://dx.doi.org/10.20965/jdr.2017.p1081.

Full text
Abstract:
The purpose of this study is to illustrate how exercises can play the role of a driving power to improve an organization’s cyber security preparedness. The degree of cyber security preparedness varies significantly among organizations. This implies that training and exercises must be tailored to specific capabilities. In this paper, we review the National Institute of Standards and Technology (NIST) cybersecurity framework that formalizes the concept of tier, which measures the degree of preparedness. Subsequently, we examine the types of exercises available in the literature and propose guide
APA, Harvard, Vancouver, ISO, and other styles
2

Roşu, Livia, and Georgiana Subaşu. "Digital Forensics in Cyber Security Exercises." Journal of Military Technology 1, no. 1 (2018): 13–18. http://dx.doi.org/10.32754/jmt.2018.1.02.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Hallaq, Bil, Andrew Nicholson, Richard Smith, et al. "A Novel Hybrid Cyber Range for Security Exercises on Cyber-Physical Systems." International Journal of Smart Security Technologies 8, no. 1 (2021): 16–34. http://dx.doi.org/10.4018/ijsst.2021010102.

Full text
Abstract:
Incident response teams cannot prepare for every situation or predict every crisis, especially when they involve cyber-physical systems. As a result, training activities need to be provided to support operating in challenging situations to develop concrete guidance, procedures, and tools to help individuals collectively react in different, unpredictable situations. Experiential learning is a training technique based on the assumed importance of experimenting and involvement, proposing that active engagement in a scenario develops personal experiences that form the basis of understanding. Exerc
APA, Harvard, Vancouver, ISO, and other styles
4

Abbott, Robert G., Jonathan McClain, Benjamin Anderson, Kevin Nauer, Austin Silva, and Chris Forsythe. "Log Analysis of Cyber Security Training Exercises." Procedia Manufacturing 3 (2015): 5088–94. http://dx.doi.org/10.1016/j.promfg.2015.07.523.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Karjalainen, Mika, and Tero Kokkonen. "Review of Pedagogical Principles of Cyber Security Exercises." Advances in Science, Technology and Engineering Systems Journal 5, no. 5 (2020): 592–600. http://dx.doi.org/10.25046/aj050572.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Conte de Leon, Daniel, Christopher E. Goes, Michael A. Haney, and Axel W. Krings. "ADLES: Specifying, deploying, and sharing hands-on cyber-exercises." Computers & Security 74 (May 2018): 12–40. http://dx.doi.org/10.1016/j.cose.2017.12.007.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Ošlejšek, Radek, and Tomáš Pitner. "Optimization of Cyber Defense Exercises Using Balanced Software Development Methodology." International Journal of Information Technologies and Systems Approach 14, no. 1 (2021): 136–55. http://dx.doi.org/10.4018/ijitsa.2021010108.

Full text
Abstract:
Cyber defense exercises (CDXs) represent an effective way to train cybersecurity experts. However, their development is lengthy and expensive. The reason lies in current practice where the CDX life cycle is not sufficiently mapped and formalized, and then exercises are developed ad-hoc. However, the CDX development shares many aspects with software development, especially with ERP systems. This paper presents a generic CDX development method that has been derived from existing CDX life cycles using the SPEM standard meta-model. The analysis of the method revealed bottlenecks in the CDX develop
APA, Harvard, Vancouver, ISO, and other styles
8

Kuusisto, Tuija, and Rauno Kuusisto. "Strategic Communication for Supporting Cyber-Security." International Journal of Cyber Warfare and Terrorism 3, no. 3 (2013): 72–79. http://dx.doi.org/10.4018/ijcwt.2013070105.

Full text
Abstract:
The purpose of this paper is to outline a methodology for figuring out what types of information shall be shared via strategic level communication to support cyber-security. With this methodology the key development issues required to create relevant strategic messages can be sorted out. The paper follows the system modeling approach and considers the cyber world as a complex adaptive system. First, the paper studies shortly the key concepts of the cyber world and strategic communication. A social system model of a society is applied as an approach for the identifying of emergent phenomena and
APA, Harvard, Vancouver, ISO, and other styles
9

Konstantinou, Charalambos. "Cyber-Physical Systems Security Education Through Hands-on Lab Exercises." IEEE Design & Test 37, no. 6 (2020): 47–55. http://dx.doi.org/10.1109/mdat.2020.3005365.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Andreolini, Mauro, Vincenzo Giuseppe Colacino, Michele Colajanni, and Mirco Marchetti. "A Framework for the Evaluation of Trainee Performance in Cyber Range Exercises." Mobile Networks and Applications 25, no. 1 (2019): 236–47. http://dx.doi.org/10.1007/s11036-019-01442-0.

Full text
APA, Harvard, Vancouver, ISO, and other styles
11

Granåsen, Magdalena, and Dennis Andersson. "Measuring team effectiveness in cyber-defense exercises: a cross-disciplinary case study." Cognition, Technology & Work 18, no. 1 (2015): 121–43. http://dx.doi.org/10.1007/s10111-015-0350-2.

Full text
APA, Harvard, Vancouver, ISO, and other styles
12

Singh Rao, Harshita. "CYBER CRIME IN BANKING SECTOR." International Journal of Research -GRANTHAALAYAH 7, no. 1 (2019): 148–61. http://dx.doi.org/10.29121/granthaalayah.v7.i1.2019.1043.

Full text
Abstract:
With the headways in innovation, the Indian Managing an account Division has been at standard with the developing patterns and critical changes required in its tasks. The call for development has given this unit monstrous chances and therefore, banks are currently among the greatest recipients of the IT Insurgency. The multiplication in online exchanges mounting on advancements like NEFT (National Electronic Store Exchange), RTGS (Constant Gross Settlement) , ECS ( Electronic Clearing Administration) and portable exchanges is a look at the profound established innovation in saving money and bu
APA, Harvard, Vancouver, ISO, and other styles
13

Wang, Lixin, Jianhua Yang, and Peng-Jun Wan. "Educational modules and research surveys on critical cybersecurity topics." International Journal of Distributed Sensor Networks 16, no. 9 (2020): 155014772095467. http://dx.doi.org/10.1177/1550147720954678.

Full text
Abstract:
Cybersecurity comprised all the technologies and practices that protect data as well as computer and network systems. In this article, we develop four course modules on critical cybersecurity topics that can be adopted in college-level cybersecurity courses in which these topics are covered. Our goal for developing these course modules with the hands-on labs is to increase students’ understanding and hands-on experiences on these critical topics that support cyber skills development for college students. The hands-on labs are designed to enhance students’ engagement and provide them hands-on e
APA, Harvard, Vancouver, ISO, and other styles
14

Hadaegh, Bahee, and Venus Torabi. "Borges’s “The Intruder” Remediated: Adaptation to Silver/Cyber Screens." Khazar Journal of Humanities and Social Sciences 21, no. 3 (2018): 136–53. http://dx.doi.org/10.5782/2223-2621.2018.21.3.136.

Full text
Abstract:
The present article is a critical scene for studying Ghazal 1975, an Iranian film by Masud Kimiai and Natalie Bookchin’s videogame, The Intruder 1999, both adapted from Borges’s short story, “The Intruder”. Exploiting Linda Hutcheon’s A Theory of Adaptation (three modes of engagement in a story), the concentration is on showing how Borges’s story, as a telling mode (print), is remediated into showing (film) and interactive (video game). Ghazal exercises both fidelity criticism and appropriation regarding contextualization and adaptability, whereas The Intruder is a game of narration and intera
APA, Harvard, Vancouver, ISO, and other styles
15

Solansky, Stephanie T., and Tammy E. Beck. "Enhancing Community Safety and Security Through Understanding Interagency Collaboration in Cyber-Terrorism Exercises." Administration & Society 40, no. 8 (2009): 852–75. http://dx.doi.org/10.1177/0095399708326345.

Full text
APA, Harvard, Vancouver, ISO, and other styles
16

Richter, Maximilian, Klaus Schwarz, and Reiner Creutzburg. "Conception and Implementation of Professional Laboratory Exercises in the field of ICS/SCADA Security Part II: Red Teaming and Blue Teaming." Electronic Imaging 2021, no. 3 (2021): 74–1. http://dx.doi.org/10.2352/issn.2470-1173.2021.3.mobmu-074.

Full text
Abstract:
Industrial control systems are essential for producing goods, generating electricity, maintaining infrastructure, and transporting energy, water, and gas. They form the core of the critical infrastructure of modern industrial nations and are therefore of particular interest. Through the increased interconnectivity of formerly isolated ICS process environments and the use of standard IT technologies such as Ethernet, processes can be optimized and synergies leveraged.However, ICS/SCADA also becomes the target of the same cyber-attacks as conventional IT systems. It is, therefore, necessary to c
APA, Harvard, Vancouver, ISO, and other styles
17

Schwarz, Klaus, Franziska Schwarz, and Reiner Creutzburg. "Conception and implementation of professional laboratory exercises in the field of open source intelligence (OSINT)." Electronic Imaging 2020, no. 3 (2020): 278–1. http://dx.doi.org/10.2352/issn.2470-1173.2020.3.mobmu-277.

Full text
Abstract:
A large amount of personal and very incriminating data is currently stored on websites, apps and social media platforms. Users often update these data daily, and this data is open source. This information can become evidence for citizens, governments, and businesses to use in solving real financial, employment, and crime problems with the help of a professional information collector. To respond to this new situation, it is important to have well-trained staff. The fact that many authorities and companies work with very sensitive data makes it necessary to train their employees in Open Source I
APA, Harvard, Vancouver, ISO, and other styles
18

Joveda, Nahid, Md Tarek Khan, and Abhijit Pathak. "Cyber Laundering: A Threat to Banking Industries in Bangladesh: In Quest of Effective Legal Framework and Cyber Security of Financial Information." International Journal of Economics and Finance 11, no. 10 (2019): 54. http://dx.doi.org/10.5539/ijef.v11n10p54.

Full text
Abstract:
Cyberspace is a great media for exchanging information and data in the arena of E-banking. Banks are under pressure for the establishment of digitalization in its day by day operations to satisfy the clients' need. But the abuse of information technology has become a menace in the banking sector of Bangladesh. Concealing of original source and using advance technological solutions to transfer money illegally– the whole phenomenon is called Cyber laundering. This paper offers insights to increase an understanding of the nexus of corruption in banks, local economy and money laundering scandals.
APA, Harvard, Vancouver, ISO, and other styles
19

Richter, Maximilian, Klaus Schwarz, and Reiner Creutzburg. "Conception and Implementation of Professional Laboratory Exercises in the field of ICS/SCADA Security - Part I: Fundamentals." Electronic Imaging 2021, no. 3 (2021): 73–1. http://dx.doi.org/10.2352/issn.2470-1173.2021.3.mobmu-073.

Full text
Abstract:
Industrial control systems are essential for producing goods, electricity generation, infrastructure maintenance, and the transport of energy, water, and gas. They form the core of the critical infrastructure of modern industrial nations and are therefore of particular interest. Through the increased inter-connectivity of formerly isolated ICS process environments and standard IT technologies such as Ethernet, processes can be optimized and synergies leveraged. However, ICS/SCADA also becomes the target of the same cyber-attacks as conventional IT systems. Therefore, it is necessary to combine
APA, Harvard, Vancouver, ISO, and other styles
20

Yamin, Muhammad Mudassar, Basel Katt, and Mariusz Nowostawski. "Serious games as a tool to model attack and defense scenarios for cyber-security exercises." Computers & Security 110 (November 2021): 102450. http://dx.doi.org/10.1016/j.cose.2021.102450.

Full text
APA, Harvard, Vancouver, ISO, and other styles
21

Demertzis, Maria, and Guntram Wolff. "Hybrid and Cyber Security Threats and the EU’s Financial System." Journal of Financial Regulation 6, no. 2 (2020): 306–16. http://dx.doi.org/10.1093/jfr/fjaa006.

Full text
Abstract:
ABSTRACT Increasing cyber and hybrid risks will test the European Union’s system of fragmentation on issues of security, but centralization on financial and other economic issues. This asymmetry was not an obstacle in a world in which security threats were more contained or of a different nature. But the world is changing. In this article, we document the rise in cyber attacks in the EU. Meanwhile, hybrid threats are real, though difficult to quantify. We then explore preparations to increase the resilience of the financial system in terms of regulation, testing, and governance. We find that a
APA, Harvard, Vancouver, ISO, and other styles
22

Dayanika, J., G. Archana, K. Siva Kumar, and N. Pavani. "Early Detection of Cyber Attacks Based on Feature Selection Algorithm." Journal of Computational and Theoretical Nanoscience 17, no. 9 (2020): 4648–53. http://dx.doi.org/10.1166/jctn.2020.9293.

Full text
Abstract:
The world is turning out to be progressively digitalized raising security concerns and the urgent requirement for strong and propelled security advancements and systems to battle the expanding complex nature of digital assaults. This paper talks about how machine learning is being utilized in digital security in resistance and offense exercises, remembering conversations for digital assaults focused at machine learning models. In this review, we are proposing a scientific categorization of IDS, which considers information protests to be essential measurements to group and condense IDS Literatu
APA, Harvard, Vancouver, ISO, and other styles
23

Simon, Stephanie, and Marieke de Goede. "Cybersecurity, Bureaucratic Vitalism and European Emergency." Theory, Culture & Society 32, no. 2 (2015): 79–106. http://dx.doi.org/10.1177/0263276414560415.

Full text
Abstract:
Securing the internet has arguably become paradigmatic for modern security practice, not only because modern life is considered to be impossible or valueless if disconnected, but also because emergent cyber-relations and their complex interconnections are refashioning traditional security logics. This paper analyses European modes of governing geared toward securing vital, emergent cyber-systems in the face of the interconnected emergency. It develops the concept of ‘bureaucratic vitalism’ to get at the tension between the hierarchical organization and reductive knowledge frames of security ap
APA, Harvard, Vancouver, ISO, and other styles
24

Amoah, Michael. "Sleight is right: Cyber control as a new battleground for African elections." African Affairs 119, no. 474 (2019): 68–89. http://dx.doi.org/10.1093/afraf/adz023.

Full text
Abstract:
Abstract Sleight of hand in manipulating the computation of results has become the new might for deciding who wins presidential elections. It appears that whoever controls the computation exercises a right to take advantage and win, and whoever loses or relinquishes control of the computation loses the election. As incumbents do not want to be identified with direct interference or rigging, hacking has become an alternative means. This raises a serious challenge for election management bodies (EMBs) and a new frontier for international observation. As electronic data management has become a ke
APA, Harvard, Vancouver, ISO, and other styles
25

Li, Chengcheng. "Penetration Testing Curriculum Development in Practice." Journal of Information Technology Education: Innovations in Practice 14 (2015): 085–99. http://dx.doi.org/10.28945/2189.

Full text
Abstract:
As both the frequency and the severity of network breaches have increased in recent years, it is essential that cybersecurity is incorporated into the core of business operations. Evidence from the U.S. Bureau of Labor Statistics (Bureau of Labor Statistics, 2012) indicates that there is, and will continue to be, a severe shortage of cybersecurity professionals nationwide throughout the next decade. To fill this job shortage we need a workforce with strong hands-on experience in the latest technologies and software tools to catch up with the rapid evolution of network technologies. It is vital
APA, Harvard, Vancouver, ISO, and other styles
26

Allen, Theodore T., Olivia K. Hernandez, and Abdullah Alomair. "Optimal Off-line Experimentation for Games." Decision Analysis 17, no. 4 (2020): 277–98. http://dx.doi.org/10.1287/deca.2020.0412.

Full text
Abstract:
Many business situations can be called “games” because outcomes depend on multiple decision makers with differing objectives. Yet, in many cases, the payoffs for all combinations of player options are not available, but the ability to experiment off-line is available. For example, war-gaming exercises, test marketing, cyber-range activities, and many types of simulations can all be viewed as off-line gaming-related experimentation. We address the decision problem of planning and analyzing off-line experimentation for games with an initial procedure seeking to minimize the errors in payoff esti
APA, Harvard, Vancouver, ISO, and other styles
27

Rogulis, Dovydas. "The Development of the Lithuanian Armed Forces and Its Response to the Russian Conventional Threats in 2015‒2020." Jaunųjų mokslininkų darbai 51, no. 1 (2021): 48–58. http://dx.doi.org/10.15388/jmd.2021.4.

Full text
Abstract:
In a period of 2015-2020, Lithuanian Armed Forces (LAF) military spending increased twice, thus it enabled to initiate and to arrange significant critical projects that eventually allowed armed forces to upgrade military equipment and tactics. New artillery units, armoured personnel vehicles, air defence systems, anti-tank weapons, radars, anti-drone systems boosted military power of LAF. Tactics switched from anti green men to conventional tactics, where fire and manoeuvre dominates again. Meanwhile, in the same period of time in Kaliningrad the Russian armed forces boosted the number of mili
APA, Harvard, Vancouver, ISO, and other styles
28

Konak, Abdullah, Sadan Kulturel-Konak, Mahdi Nasereddin, and Michael R. Bartolacci. "Impact of Collaborative Work on Technology Acceptance: A Case Study from Virtual Computing." Journal of Information Technology Education: Research 16 (2017): 015–29. http://dx.doi.org/10.28945/3622.

Full text
Abstract:
Aim/Purpose This paper utilizes the Technology Acceptance Model (TAM) to examine the extent to which acceptance of Remote Virtual Computer Laboratories (RVCLs) is affected by students’ technological backgrounds and the role of collaborative work. Background RVCLs are widely used in information technology and cyber security education to provide students with hands-on experimentation. However, students may not exploit their full benefits if they do not accept RVCLs as a viable educational technology. Methodology In order to study the impact of collaborative work on technology acceptance, an empi
APA, Harvard, Vancouver, ISO, and other styles
29

Bussing, Joseph. "The Degrees of Force Exercised in the Cyber Battlespace." Connections: The Quarterly Journal 2, no. 4 (2013): 1–13. http://dx.doi.org/10.11610/connections.12.4.01.

Full text
APA, Harvard, Vancouver, ISO, and other styles
30

Bussing, Joseph. "Степени применения силы в боевом киберпространстве". Connections: The Quarterly Journal 12, № 4 (2013): 1–16. http://dx.doi.org/10.11610/connections.rus.12.4.01.

Full text
APA, Harvard, Vancouver, ISO, and other styles
31

OSTERMAN, ANDREJ. "THE SLOVENIAN ARMED FORCES 15 YEARS AFTER THE REPUBLIC OF SLOVENIA JOINED NATO." CONTEMPORARY MILITARY CHALLENGES, Volume 2019 Issue 21/3 (September 3, 2019): 123–42. http://dx.doi.org/10.33179/bsv.99.svi.11.cmc.21.3.7.

Full text
Abstract:
Abstract The Republic of Slovenia has been a NATO member for 15 years. Its NATO membership has significantly contributed to the quality development of the Slovenian Armed Forces (SAF), which has made a contribution to international security by taking part in international operations and missions. Before and after joining NATO, the SAF has adapted and transformed in view of the newly created settings and security challenges in a way to respond to them effectively. It has participated in and organized multinational military exercises, and has been operating within NATO representations, commands
APA, Harvard, Vancouver, ISO, and other styles
32

Saputri, Dessy Permatasari, Surryanto D. W., and Helda Risman. "The Indonesian Cyber Diplomacy: ASEAN-Japan Online Cyber Exercise." Technium Social Sciences Journal 9 (June 12, 2020): 453–64. http://dx.doi.org/10.47577/tssj.v9i1.911.

Full text
Abstract:
The development of information and communication technology is growing both globally and regionally making it easier for everyone to access all information and communicate without knowing the limits even though many benefits can be obtained. The reality, in turn, gives a negative impact such as personal crime, theft, and data falsification to attack systems or forms of state infrastructure. Cyber threats that occur in Indonesia include racial riots in 1998 which Indonesia had to fight with hackers from China and Taiwan. Besides, the Indonesian government must also face espionage that done by A
APA, Harvard, Vancouver, ISO, and other styles
33

Wu, Zumei, Jinhui Li, and Yin-Leng Theng. "Examining the Influencing Factors of Exercise Intention Among Older Adults: A Controlled Study Between Exergame and Traditional Exercise." Cyberpsychology, Behavior, and Social Networking 18, no. 9 (2015): 521–27. http://dx.doi.org/10.1089/cyber.2015.0065.

Full text
APA, Harvard, Vancouver, ISO, and other styles
34

McGloin, Rory, Kimberly Embacher-Martin, Christine Gilbert, and Jaci VanHeest. "Gearing Up for the Future of Exercise." Simulation & Gaming 51, no. 6 (2020): 819–29. http://dx.doi.org/10.1177/1046878120943253.

Full text
Abstract:
Background Exergames—which combine physical activity with elements of virtual interaction (e.g., “cyber-cycling”)—come in a wide range of styles and with an array of structural and environmental characteristics that are likely to influence a user’s experience, including their overall enjoyment. Aim The aim of the current study was thus to compare adolescents’ experience of flow and enjoyment across two cyber-cycling sessions that featured two unique styles of cycling exergames. Method Eighty-eight participants aged 11-13 participated in two cyber-cycling sessions spaced one week apart. Partici
APA, Harvard, Vancouver, ISO, and other styles
35

Jin, Seung-A. Annie. "Does Imposing a Goal Always Improve Exercise Intentions in Avatar-Based Exergames? The Moderating Role of Interdependent Self-Construal on Exercise Intentions and Self-Presence." Cyberpsychology, Behavior, and Social Networking 13, no. 3 (2010): 335–39. http://dx.doi.org/10.1089/cyber.2009.0186.

Full text
APA, Harvard, Vancouver, ISO, and other styles
36

Knoeppel, David E. "Alternative Cybex Exercise Positions." Journal of Orthopaedic & Sports Physical Therapy 7, no. 2 (1985): 73–76. http://dx.doi.org/10.2519/jospt.1985.7.2.73.

Full text
APA, Harvard, Vancouver, ISO, and other styles
37

Ackermann, Bronwen, Roger Adams, and Elfreda Marshall. "Strength or Endurance Training for Undergraduate Music Majors at a University?" Medical Problems of Performing Artists 17, no. 1 (2002): 33–41. http://dx.doi.org/10.21091/mppa.2002.1006.

Full text
Abstract:
The purposes of this study were to evaluate the effect of an exercise regimen for undergraduate music majors at a university, and to determine whether a short-term, moderate-intensity program designed to assist in their preparation for the athletic task of playing an instrument for many hours a day could be incorporated into their timetables and show strength gains. In this study, 18 volunteer university undergraduate music majors were randomly allocated into either six weeks of strength training or six weeks of endurance training of proximal upper-limb and trunk muscles. All subjects were mea
APA, Harvard, Vancouver, ISO, and other styles
38

Baños, Rosa M., Patricia Escobar, Ausias Cebolla, et al. "Using Virtual Reality to Distract Overweight Children from Bodily Sensations During Exercise." Cyberpsychology, Behavior, and Social Networking 19, no. 2 (2016): 115–19. http://dx.doi.org/10.1089/cyber.2015.0283.

Full text
APA, Harvard, Vancouver, ISO, and other styles
39

Kurebwa, Jeffrey. "Understanding Cyber Security." International Journal of Systems and Service-Oriented Engineering 11, no. 1 (2021): 43–55. http://dx.doi.org/10.4018/ijssoe.2021010104.

Full text
Abstract:
This study provides an understanding of cyber security and further analyses the Cyber Security and Data Protection Bill of Zimbabwe. The internet and other technological developments have provided a variety of platforms for increased and sometimes unrestricted exercise of freedom of expression, association, online transactions, and access to information rights. Zimbabwe has faced increased threats from cyber activities. This has necessitated the country to enact the Cyber Security and Data Protection Bill. The purpose of the Cyber Security and Data Protection Bill is to increase cyber security
APA, Harvard, Vancouver, ISO, and other styles
40

Knox, Benjamin James, Ricardo G. Lugo, Kirsi Helkala, and Stefan Sütterlin. "Slow Education and Cognitive Agility." International Journal of Cyber Warfare and Terrorism 9, no. 1 (2019): 48–66. http://dx.doi.org/10.4018/ijcwt.2019010104.

Full text
Abstract:
Governance of cyberpower from a military perspective are focused on the efforts to control and influence events occurring in cyberspace. For the Norwegian Defence, this means educating cyber engineers, responsible for governing cyberpower effects, beyond technical skills and competencies. To match the complexity of modern warfighting necessitates adaptive high-order thinking skills. Building on earlier cognitive engineering and human factors research in cyber defence this article suggests how Slow Education has the potential to improve cognitive performance among cyber cadets. Slow techniques
APA, Harvard, Vancouver, ISO, and other styles
41

Wiederhold, Mark D., Megan Crisci, Vrajeshri Patel, Makoto Nonaka, and Brenda K. Wiederhold. "Physiological Monitoring During Augmented Reality Exercise Confirms Advantages to Health and Well-Being." Cyberpsychology, Behavior, and Social Networking 22, no. 2 (2019): 122–26. http://dx.doi.org/10.1089/cyber.2018.0027.

Full text
APA, Harvard, Vancouver, ISO, and other styles
42

Lehto, Martti, Aki-Mauri Huhtinen, and Saara Jantunen. "The Open Definition of Cyber." International Journal of Cyber Warfare and Terrorism 1, no. 2 (2011): 1–9. http://dx.doi.org/10.4018/ijcwt.2011040101.

Full text
Abstract:
Security strategy work requires a definition for ’cyberspace’. This article discusses national definitions and analyses their contents. Defining what cyberspace is equals the exercise of political power. Therefore, it is important to discuss what the definitions mean in practice - whether cyberspace is seen as a restricted mathematical-technological domain or a social construction. Government publications highlight the technological aspect of cyberspace, whereas threats stem from human behaviour. For some, cyberspace is a primary operational environment for national security that must be prote
APA, Harvard, Vancouver, ISO, and other styles
43

Zeng, Nan, Zachary Pope, and Zan Gao. "Acute Effect of Virtual Reality Exercise Bike Games on College Students' Physiological and Psychological Outcomes." Cyberpsychology, Behavior, and Social Networking 20, no. 7 (2017): 453–57. http://dx.doi.org/10.1089/cyber.2017.0042.

Full text
APA, Harvard, Vancouver, ISO, and other styles
44

Molis, Arūnas, Claudia Palazzo, and Kaja Ainsalu. "Mitigating Risks of Hybrid War: Search for an Effective Energy Strategyin The Baltic States." Journal on Baltic Security 4, no. 2 (2018): 23–32. http://dx.doi.org/10.2478/jobs-2018-0009.

Full text
Abstract:
AbstractMeanwhile, energy security is threatened in new domains – maritime and cyber. In the maritime domain, military operations target construction works of the new objects as well as operating interconnectors, cables, LNG terminals, and other strategic assets. Regular situational awareness in the Baltic Sea region is lacking, as is sufficient naval and civilian maritime cooperation. In the cyber realm attacks become more frequent and more complex, critical infrastructure being the main target. As cyber security expertise and exercise are lacking and integration into European natural gas and
APA, Harvard, Vancouver, ISO, and other styles
45

Waddell, T. Franklin, S. Shyam Sundar, and Joshua Auriemma. "Can Customizing an Avatar Motivate Exercise Intentions and Health Behaviors Among Those with Low Health Ideals?" Cyberpsychology, Behavior, and Social Networking 18, no. 11 (2015): 687–90. http://dx.doi.org/10.1089/cyber.2014.0356.

Full text
APA, Harvard, Vancouver, ISO, and other styles
46

Mikhalevich, Ekaterina A. "The Сoncept of Сyber Sovereignty of the People’s Republic of China: Development History and Essence". RUDN Journal of Political Science 23, № 2 (2021): 254–64. http://dx.doi.org/10.22363/2313-1438-2021-23-2-254-264.

Full text
Abstract:
The transformation of cyber sovereignty into an independent concept is a recent phenomenon, and thus its development and distribution is currently underway, which indicates the relevance of studying this topic. Being one of the most influential actors of contemporary international politics, China uses the concept of cyber sovereignty to promote its national interests and is able to shape the rules in the highly volatile field of international cyberspace. The study is based on quantitative and qualitative content analysis of legal acts and concept of Chinas cyber sovereignty. The author defines
APA, Harvard, Vancouver, ISO, and other styles
47

Ota, Yuitaka, Tomomi Aoyama, Davaaadorj Nyambayar, and Ichiro Koshijima. "Cyber incident exercise for safety protection in critical infrastructure." International Journal of Safety and Security Engineering 8, no. 2 (2018): 246–57. http://dx.doi.org/10.2495/safe-v8-n2-246-257.

Full text
APA, Harvard, Vancouver, ISO, and other styles
48

Dutta, Avijit. "IN SEARCH FOR CYBER DEPENDENCE." International Journal of Research -GRANTHAALAYAH 7, no. 12 (2020): 1–25. http://dx.doi.org/10.29121/granthaalayah.v7.i12.2019.294.

Full text
Abstract:
Civilization progressed through phases like agrarian, semi-industrialization, industrialization, advanced-industrialization and arrived at Information age. Advances in ICT (Information and Communication Technology) transformed most revered ancient concept of ‘Knowledge’ from abstract to measurable form with considerable economic value. Produces of knowledge exercise, in form of data, analyses and documents etc., are being digitized increasingly and stored on servers across the globe building large knowledge warehouses [1,2,3]. Some of these are shared and rests are protected. Material value of
APA, Harvard, Vancouver, ISO, and other styles
49

Lewis, Coleen. "Social Media - Cyber trap door to defamation." Masaryk University Journal of Law and Technology 9, no. 1 (2015): 65–84. http://dx.doi.org/10.5817/mujlt2015-1-5.

Full text
Abstract:
Social media is increasing being used by persons worldwide. The nature and characteristics of social media serve to advance the exercise of the human right to freedom of expression. This article argues that while these qualities of social media has its positives, it also conversely exacerbate the risk of social media users being culpable for claims of defamation worldwide.The recently enacted Jamaican Defamation Act 2013 includes provisions which are applicable to publications via social media. This article will review those.
APA, Harvard, Vancouver, ISO, and other styles
50

Helkala, Kirsi, Benjamin Knox, Øyvind Jøsok, Silje Knox, and Mass Lund. "Factors to affect improvement in cyber officer performance." Information & Computer Security 24, no. 2 (2016): 152–63. http://dx.doi.org/10.1108/ics-01-2016-0001.

Full text
Abstract:
Purpose The purpose of this study is to investigate how motivation – gained by understanding the purpose of specific cyber-oriented tasks – coping strategies and level of physical conditioning can affect cognitive abilities amongst cyber officer cadets. Design/methodology/approach Two cognitive tests (2014 and 2015) and coping strategy questionnaires (2015) were conducted during an annual military exercise involving increased levels of stress and hardship (physical and cognitive) over a sustained two-week period. Findings Motivation – gained by task explanations – and the conscious use of the
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!