Literatura académica sobre el tema "Cyberhot"
Crea una cita precisa en los estilos APA, MLA, Chicago, Harvard y otros
Consulte las listas temáticas de artículos, libros, tesis, actas de conferencias y otras fuentes académicas sobre el tema "Cyberhot".
Junto a cada fuente en la lista de referencias hay un botón "Agregar a la bibliografía". Pulsa este botón, y generaremos automáticamente la referencia bibliográfica para la obra elegida en el estilo de cita que necesites: APA, MLA, Harvard, Vancouver, Chicago, etc.
También puede descargar el texto completo de la publicación académica en formato pdf y leer en línea su resumen siempre que esté disponible en los metadatos.
Artículos de revistas sobre el tema "Cyberhot":
Curran, Kevin y Sheila Mc Kinney . "Cyberart". Journal of Applied Sciences 4, n.º 4 (15 de septiembre de 2004): 531–36. http://dx.doi.org/10.3923/jas.2004.531.536.
LEVIN, BRIAN. "Cyberhate". American Behavioral Scientist 45, n.º 6 (febrero de 2002): 958–88. http://dx.doi.org/10.1177/0002764202045006004.
Lewis, Mike. "CYBERLOG". Health Libraries Review 5, n.º 3 (septiembre de 1988): 211–14. http://dx.doi.org/10.1046/j.1365-2532.1988.5302102.x.
Porett, Tom. "Cyberart Considerations". Art Journal 53, n.º 3 (1994): 32. http://dx.doi.org/10.2307/777416.
Meyer, Helen. "Cybercop scanner". Computers & Security 18, n.º 3 (enero de 1999): 234. http://dx.doi.org/10.1016/s0167-4048(99)90941-0.
Douglas, Karen M., Craig Mcgarty, Ana-Maria Bliuc y Girish Lala. "Understanding Cyberhate". Social Science Computer Review 23, n.º 1 (febrero de 2005): 68–76. http://dx.doi.org/10.1177/0894439304271538.
Maulitz, R. C., J. A. Ohles, R. L. Schnuth, M. S. Lipsky y R. J. Grealish. "The CyberDoc project". Academic Medicine 71, n.º 12 (diciembre de 1996): 1325–8. http://dx.doi.org/10.1097/00001888-199612000-00014.
Bakalis, Chara. "Rethinking cyberhate laws". Information & Communications Technology Law 27, n.º 1 (30 de octubre de 2017): 86–110. http://dx.doi.org/10.1080/13600834.2017.1393934.
Celik, Serkan. "Experiences of internet users regarding cyberhate". Information Technology & People 32, n.º 6 (2 de diciembre de 2019): 1446–71. http://dx.doi.org/10.1108/itp-01-2018-0009.
Celik, Serkan. "Tertiary-level internet users’ opinions and perceptions of cyberhate". Information Technology & People 31, n.º 3 (4 de junio de 2018): 845–68. http://dx.doi.org/10.1108/itp-05-2017-0147.
Tesis sobre el tema "Cyberhot":
Olsson, Sanna y Isabella Hultberg. "Cybersäkerhet - Att stärka den svaga länken : En flerfallsstudie om hur formella och informella styrmedel förebygger interna cyberhot i banksektorn". Thesis, Linköpings universitet, Institutionen för ekonomisk och industriell utveckling, 2021. http://urn.kb.se/resolve?urn=urn:nbn:se:liu:diva-176804.
Background: Banks play an important role in society and have since the increasing digitalization been particularly exposed to cyber threats. At the same time, the bank's operations are largely based on maintaining trust of its customers, and therefore it is of great importance for banks to have a high level of cyber security. Above all, internal cyber threats in the form of human error constitute one of the greatest risks to banks' security work today. Therefore, it is interesting to investigate how banks work to mitigate internal cyber threats through formal and informal management controls. Purpose: This study aims to contribute to an increased understanding of how banks use formal and informal management control to mitigate internal cyber threats in the workplace. Methodology: This study adopts a hermeneutic perspective and uses qualitative method. Furthermore, an abductive approach has shaped the essay. The purpose and research questions have been answered through a multiple case study of four different banks in Sweden. The empirical material has been obtained with the help of interviews with representatives from each bank who work with security. Conclusion: To prevent internal cyber threats, banks work with rules which global standards and the company’s culture help design. We have noted that competence and awareness in cyber security is something that is valued highly. To strengthen the competence banks invest large resources in training. Making the idea of safety a natural part of employees' daily work has above all been emphasized by, at the same time as cultural development is largely done passively as the strong regulations shape culture. Informal dialogues, however, increase awareness and thus strengthen culture. Finally, we have identified that all the management controls mentioned above affect each other. Therefore, it is important to have a holistic approach to the governance work regarding cyber security.
Fearn, Harriet. "The impacts of cyberhate". Thesis, University of Sussex, 2017. http://sro.sussex.ac.uk/id/eprint/66869/.
Cheung, Kwong-chung. "Reinforced earth wall design & construction in northern access road for Cyberport Development /". View the Table of Contents & Abstract, 2005. http://sunzi.lib.hku.hk/hkuto/record/B3676288X.
Cheung, Kwong-chung y 張光中. "Reinforced earth wall design & construction in northern access road for Cyberport Development". Thesis, The University of Hong Kong (Pokfulam, Hong Kong), 2005. http://hub.hku.hk/bib/B45014279.
Kabil, Alexandre. "CyberCOP 3D : visualisation 3D interactive et collaborative de l'état de sécurité d'un système informatique". Thesis, Ecole nationale supérieure Mines-Télécom Atlantique Bretagne Pays de la Loire, 2019. http://www.theses.fr/2019IMTA0166.
The aim of this thesis was to study the use of Collaborative Virtual Environments (CVE) for the analysis of the state of security of computer systems, also called Cyber Situational Awareness (CSA). After studying CSA’s models and tools, we have had the opportunity to visit the Security Operations Centers (SOCs) of four industrial partners of the CyberCNI chair, in order to better understand the needs and expectations of cyber analysts. These visits were made as part of a collaborative activity analysis protocol and have allowed us to propose a model, the 3D Cyber-COP. Based on this model and a model of the WannaCry ransomware, we have developed a CVE and a simplified scenario engine that allows users to design their own alert analysis scenarios. We have also performed a usability evaluation of a virtual environment for alert analysis, with a panel of novice users
Dul, Anna y Johanna Velin. "How Do Leadership Behaviours Affect Employee Attitudes Towards Sustainability? A case study on IT consultancy Cybercom". Thesis, Malmö universitet, Fakulteten för kultur och samhälle (KS), 2018. http://urn.kb.se/resolve?urn=urn:nbn:se:mau:diva-23091.
Strauss, Juergen. "Interaktions- und Animationstechniken in virtuellen Welten". Master's thesis, Universitätsbibliothek Chemnitz, 1997. http://nbn-resolving.de/urn:nbn:de:bsz:ch1-199700063.
Edin, Andreas. "Autentisering med OAuth 2.0 i SiteVision : Jämförelse mellan Java Portlets och WebApps". Thesis, Mittuniversitetet, Avdelningen för informationssystem och -teknologi, 2018. http://urn.kb.se/resolve?urn=urn:nbn:se:miun:diva-33878.
Det övergripande syftet med detta projekt har varit att bidra till en effektiviserad digitalisering och individualisering. Målet för projektet har varit att undersöka alternativa tekniska lösningar för att göra egna tillägg i CMS:et SiteVision. Tillägg vars uppgift består i att hämta data från ett externt API (Office 365) som kräver autentisering med OAuth 2.0. Vidare har de alternativa tekniska lösningarna värderats och jämförts. Jämförelsen har gjorts utifrån kriterier som tagits fram genom intervjuer med utvecklare på ett IT-konsultbolag. Inom projektet har ett tillämpat exempel (POC) skapats för att visa exempel på hur tekniken kan användas. I detta exempel har Java Portlets använts för att implementera ovanstående funktionalitet. Även WebApps i SiteVision har studerats då den tekniken utgör ett alternativ till Java Portlets. Undersökningen visar att det är fullt möjligt att skapa ett eget tillägg i SiteVision som genomför autentisering med OAuth 2.0 och sedan använda denna för att hämta data från ett externt API. Resultaten från jämförelsen mellan de två olika teknikerna Java Portlets och WebApps visar att det finns för- och nackdelar med respektive teknik. Båda alternativen framstår som jämstarka i jämförelsen. De individuella omständigheterna kring ett framtida användande bör fälla avgörandet för vilken teknik som väljs.
Nicolas, Clémence. "Polymérisation par ouverture de cycle par métathèse de monomères antioxydants en vue de l’amélioration des propriétés de matériaux à base de polydicyclopentadiène". Thesis, Le Mans, 2019. http://cyberdoc-int.univ-lemans.fr/Theses/2019/2019LEMA1025.pdf.
Polydicyclopentadiene (PDCPD) is a thermoset polymer material with particularly interesting properties: it combines high impact resistance, good resistance to chemical corrosion and high heat deflection temperature. These features allow to consider its use in extreme conditions as a pipeline joint for the extraction of offshore oil. However, its use is limited by its oxidation sensibility because of the presence of double bonds in its backbone. Adding additives to PDCPD materials is needed to limit the PDCPD degradation by inhibition of oxidation. However, conventional additives undergo diffusion that decreases their long-term efficacy because of their low molar mass. To address this issue, two strategies were studied: (1) the grafting of additives with antioxidant properties within the backbone by ring-opening metathesis polymerization (ROMP) of dicyclopentadiene (DCPD) with norbornenyl antioxidant-functionalized comonomers; (2) ROMP of these monomers to prepare additives with higher molar masses, which are less likely to undergo diffusion. The original materials obtained from industrial formulations based on PDCPD and the synthesized monomers and polymers have shown a better stability than the formulations based on commercially available additives, confirming the relevance of the strategies implemented in this thesis work
Clavier, Batiste. "Synthèse, caractérisations et évaluation de l'activité bactéricide de composés inorganiques à base de cuivre". Thesis, Le Mans, 2019. http://cyberdoc-int.univ-lemans.fr/Theses/2019/2019LEMA1041.pdf.
Bacterial pathogens causing healthcare-associated-infections pose ongoing and increasing challenges to care facilities. In France, Escherichia coli and Staphylococcus aureus are responsible for more than 40% of these infections. Due to the permanent adaptation of these bacteria to new antibiotics placed on the market, complementary solutions must be found. One of these solutions proposed in this thesis work aims to exacerbate performances of known bactericidal materials (synergistic effect) or to provide bactericidal properties to non-active compounds by partially substituting magnesium ions by cupric ones or vice versa. New solid solutions were thus highlighted. Solid state reaction, co-precipitation, hydrothermal routes or mechanosynthesis were employed to synthesize micrometer-sized or nanometer-sized particles of those desired compounds. When obtained, X-Ray Diffraction, electron microscopies, dinitrogen adsorption, IR/UV-visible spectroscopies, ThermoGravimetric Analysis-Mass Spectrometry and Atomic Emission Spectroscopy are used to determine the nature, composition and size of those particles as well as their stability in water or CO2 rich atmosphere. The evaluation of bactericidal properties in water and at 20°C showed that the partial substitution of magnesium by copper enhances the activity of compounds both in terms of magnitude and kinetics. These increased performances are not necessarily related to the copper content in the active compound
Libros sobre el tema "Cyberhot":
Heickerö, Roland. Internets mörka sidor: Om cyberhot och informationskrigföring. Stockholm: Atlantis, 2012.
Heickerö, Roland. Emerging cyber threats and Russian views on information warfare and information operations: Utveckling av cyberhot och den ryska synen på informationskrigföring och informationsoperationer. Stockholm: FOI, Swedish Defence Research Agency, Division of Defence Analysis, 2010.
Gerson, Corinne. Cyberdog. Unionville, N.Y: Royal Fireworks Press, 1998.
Feiler, Jesse. Cyberdog: The complete guide to Apple's Internet productivity technology. Boston: AP Professional, 1996.
Kissell, Joe. Cyberdog: Live objects on the Internet. New York: MIS Press, 1997.
Matrix, Sidney Eve. Cyberpop: Digital lifestyles and commodity culture. New York, NY: Routledge, 2007.
Kisseleva, Olga. Cyberart: Un essai sur l'art du dialogue. Paris: Harmattan, 1998.
Boyle, Sean 1977. Perfect horizon: Finiens perfectus 215X : HDL cyberpop setting. Rochester, NY: Tremorworks, LLC, 2006.
Robin, Régine. Le Golem de l'ecriture: De l'autofiction au cybersoi. Montréal, Québec: XYZ éditeur, 1997.
Vanacker, Bastiaan. Global medium, local laws: Regulating cross-border cyberhate. El Paso: LFB Scholarly Pub., 2009.
Capítulos de libros sobre el tema "Cyberhot":
Jane, Emma A. y Nicole A. Vincent. "Cyberhate, Communication and Transdisciplinarity". En Reimagining Communication: Meaning, 170–96. First edition. | Abingdon, Oxon ; New York, NY : Routledge, 2020.: Routledge, 2020. http://dx.doi.org/10.4324/9781351007924-10.
Shi, Shumin, Xinyu Zhou, Meng Zhao y Heyan Huang. "Identifying Suspected Cybermob on Tieba". En Lecture Notes in Computer Science, 375–86. Cham: Springer International Publishing, 2016. http://dx.doi.org/10.1007/978-3-319-47674-2_31.
Prokopenko, Mikhail, Peter Wang y Thomas Howard. "Cyberoos’2001: “Deep Behaviour Projection” Agent Architecture". En RoboCup 2001: Robot Soccer World Cup V, 507–10. Berlin, Heidelberg: Springer Berlin Heidelberg, 2002. http://dx.doi.org/10.1007/3-540-45603-1_70.
Jane, Emma A. "Feminist flight and fight responses to gendered cyberhate". En Gender, Technology and Violence, 45–61. 1 Edition. | New York : Routledge, 2017. | Series: Routledge studies in crime and society ; 31: Routledge, 2017. http://dx.doi.org/10.4324/9781315441160-4.
Prokopenko, Mikhail, Marc Butler, Wai Yat Wong y Thomas Howard. "Cyberoos’99: Tactical Agents in the RoboCup Simulation League". En RoboCup-99: Robot Soccer World Cup III, 546–49. Berlin, Heidelberg: Springer Berlin Heidelberg, 2000. http://dx.doi.org/10.1007/3-540-45327-x_47.
Vassanelli, Stefano, Florian Felderer, Mufti Mahmud, Marta Maschietto y Stefano Girardi. "CyberRat Probes: High-Resolution Biohybrid Devices for Probing the Brain". En Biomimetic and Biohybrid Systems, 274–85. Berlin, Heidelberg: Springer Berlin Heidelberg, 2012. http://dx.doi.org/10.1007/978-3-642-31525-1_24.
Kabil, Alexandre, Thierry Duval, Nora Cuppens, Gérard Le Comte, Yoran Halgand y Christophe Ponchel. "3D CyberCOP: A Collaborative Platform for Cybersecurity Data Analysis and Training". En Lecture Notes in Computer Science, 176–83. Cham: Springer International Publishing, 2018. http://dx.doi.org/10.1007/978-3-030-00560-3_24.
Prokopenko, Mikhail y Peter Wang. "Disruptive Innovations in RoboCup 2D Soccer Simulation League: From Cyberoos’98 to Gliders2016". En RoboCup 2016: Robot World Cup XX, 529–41. Cham: Springer International Publishing, 2017. http://dx.doi.org/10.1007/978-3-319-68792-6_44.
Kabil, Alexandre, Thierry Duval, Nora Cuppens, Gérard Le Comte, Yoran Halgand y Christophe Ponchel. "From Cyber Security Activities to Collaborative Virtual Environments Practices Through the 3D CyberCOP Platform". En Information Systems Security, 272–87. Cham: Springer International Publishing, 2018. http://dx.doi.org/10.1007/978-3-030-05171-6_14.
Jane, Emma. "Gendered cyberhate". En Theorizing Digital Divides, 186–98. Routledge, 2017. http://dx.doi.org/10.4324/9781315455334-15.
Actas de conferencias sobre el tema "Cyberhot":
Omidosu, Joseph y Michael Kyobe. "Towards a harm-based framework to evaluate Cyberhate". En 2021 Conference on Information Communications Technology and Society (ICTAS). IEEE, 2021. http://dx.doi.org/10.1109/ictas50802.2021.9395008.
Kim, Jae H., Fu-Chung Wang, Carlo H. Séquin y Paul K. Wright. "Design for Machining Over the Internet". En ASME 1999 Design Engineering Technical Conferences. American Society of Mechanical Engineers, 1999. http://dx.doi.org/10.1115/detc99/dfm-8938.
Sun, Jianhua, Kun Sun y Qi Li. "CyberMoat: Camouflaging critical server infrastructures with large scale decoy farms". En 2017 IEEE Conference on Communications and Network Security (CNS). IEEE, 2017. http://dx.doi.org/10.1109/cns.2017.8228642.
Gil, Debora, Aura Hernandez-Sabate, David Castells-Rufas y Jordi Carrabina. "CYBERH: Cyber-Physical Systems in Health for Personalized Assistance". En 2017 19th International Symposium on Symbolic and Numeric Algorithms for Scientific Computing (SYNASC). IEEE, 2017. http://dx.doi.org/10.1109/synasc.2017.00067.
Teles, Lucio. "Re-engineering adult education through students' production of cyberart to support curriculum learning". En 2014 9th International Conference on Computer Science & Education (ICCSE). IEEE, 2014. http://dx.doi.org/10.1109/iccse.2014.6926463.
Wrona, Maciej, Mariusz Kastek, Marcin Szolucha, Jaroslaw Bareła y Krzysztof Firmanty. "CYBERDOG: monitoring and control system for law enforcement forces K-9 special activities". En Counterterrorism, Crime Fighting, Forensics, and Surveillance Technologies, editado por Henri Bouma, Robert J. Stokes, Yitzhak Yitzhaky y Radhakrishna Prabhu. SPIE, 2018. http://dx.doi.org/10.1117/12.2325581.
Fox, J. F. y A. N. Papanicolaou. "Carbon and Nitrogen Isotopes and C / N Ratio as a Fingerprinting tracer within Eco-Cybernet". En Watershed Management Conference 2005. Reston, VA: American Society of Civil Engineers, 2005. http://dx.doi.org/10.1061/40763(178)17.
Inouye, Ryan y Paul K. Wright. "Design Rules and Technology Guides for Web-Based Manufacturing". En ASME 1999 Design Engineering Technical Conferences. American Society of Mechanical Engineers, 1999. http://dx.doi.org/10.1115/detc99/cie-9082.
Kong, Daniel K. S., Andrew W. C. Kwong y Hugo H. N. Wong. "Use of Glass Reinforced Concrete in the Construction of Bel-Air No. 8, Cyberport, Hong Kong". En 7th International Conference on Tall Buildings. Singapore: Research Publishing Services, 2009. http://dx.doi.org/10.3850/9789628014194_0037.
Subba, Rajib y Tung Bui. "Self-Coordinated Defense Mechanisms against Cyberhate: An Analysis of Postings Related to the 2010 Haiti Earthquake on Facebook". En 2012 45th Hawaii International Conference on System Sciences (HICSS). IEEE, 2012. http://dx.doi.org/10.1109/hicss.2012.521.