Статті в журналах з теми "4604 Cybersecurity and privacy"
Оформте джерело за APA, MLA, Chicago, Harvard та іншими стилями
Ознайомтеся з топ-50 статей у журналах для дослідження на тему "4604 Cybersecurity and privacy".
Біля кожної праці в переліку літератури доступна кнопка «Додати до бібліографії». Скористайтеся нею – і ми автоматично оформимо бібліографічне посилання на обрану працю в потрібному вам стилі цитування: APA, MLA, «Гарвард», «Чикаго», «Ванкувер» тощо.
Також ви можете завантажити повний текст наукової публікації у форматі «.pdf» та прочитати онлайн анотацію до роботи, якщо відповідні параметри наявні в метаданих.
Переглядайте статті в журналах для різних дисциплін та оформлюйте правильно вашу бібліографію.
Bojanova, Irena, Jeffrey Voas, Morris Chang, and Linda Wilbanks. "Cybersecurity or Privacy [Guest editors' introduction]." IT Professional 18, no. 5 (September 2016): 16–17. http://dx.doi.org/10.1109/mitp.2016.80.
Повний текст джерелаMishra, Neha. "Privacy, Cybersecurity, and GATS Article XIV: A New Frontier for Trade and Internet Regulation?" World Trade Review 19, no. 3 (May 2, 2019): 341–64. http://dx.doi.org/10.1017/s1474745619000120.
Повний текст джерелаBarth, Susanne, Menno D. T. de Jong, and Marianne Junger. "Lost in privacy? Online privacy from a cybersecurity expert perspective." Telematics and Informatics 68 (March 2022): 101782. http://dx.doi.org/10.1016/j.tele.2022.101782.
Повний текст джерелаPehlivan, Ceyhun Necati. "Global Privacy News." Global Privacy Law Review 1, Issue 1 (March 1, 2020): 63–76. http://dx.doi.org/10.54648/gplr2020009.
Повний текст джерелаKhatoun, Rida, and Sherali Zeadally. "Cybersecurity and Privacy Solutions in Smart Cities." IEEE Communications Magazine 55, no. 3 (March 2017): 51–59. http://dx.doi.org/10.1109/mcom.2017.1600297cm.
Повний текст джерелаLandwehr, C., D. Boneh, J. C. Mitchell, S. M. Bellovin, S. Landau, and M. E. Lesk. "Privacy and Cybersecurity: The Next 100 Years." Proceedings of the IEEE 100, Special Centennial Issue (May 2012): 1659–73. http://dx.doi.org/10.1109/jproc.2012.2189794.
Повний текст джерелаPattanasri, Thanaphol. "Mandatory Data Breach Notification and Hacking the Smart Home: A Legal Response to Cybersecurity?" QUT Law Review 18, no. 2 (March 1, 2019): 268. http://dx.doi.org/10.5204/qutlr.v18i2.752.
Повний текст джерелаPattanasri, Thanaphol. "Mandatory Data Breach Notification and Hacking the Smart Home: A Legal Response to Cybersecurity?" QUT Law Review 18, no. 2 (March 5, 2019): 268. http://dx.doi.org/10.5204/qutlr.v18i2.770.
Повний текст джерелаJofre, Marc, Diana Navarro-Llobet, Ramon Agulló, Jordi Puig, Gustavo Gonzalez-Granadillo, Juan Mora Zamorano, and Ramon Romeu. "Cybersecurity and Privacy Risk Assessment of Point-of-Care Systems in Healthcare—A Use Case Approach." Applied Sciences 11, no. 15 (July 21, 2021): 6699. http://dx.doi.org/10.3390/app11156699.
Повний текст джерелаLandwehr, Carl. "Prolog to the Section on Privacy and Cybersecurity." Proceedings of the IEEE 100, Special Centennial Issue (May 2012): 1657–58. http://dx.doi.org/10.1109/jproc.2012.2189820.
Повний текст джерелаKshetri, Nir. "Blockchain's roles in strengthening cybersecurity and protecting privacy." Telecommunications Policy 41, no. 10 (November 2017): 1027–38. http://dx.doi.org/10.1016/j.telpol.2017.09.003.
Повний текст джерелаde Fuentes, José M., Lorena González-Manzano, Juan Tapiador, and Pedro Peris-Lopez. "PRACIS: Privacy-preserving and aggregatable cybersecurity information sharing." Computers & Security 69 (August 2017): 127–41. http://dx.doi.org/10.1016/j.cose.2016.12.011.
Повний текст джерелаE. Larrea, Guillermo, and Juan Carlos Quinzaños. "Report: Privacy in Latin America During COVID-19 Times and Reasonable Digital Security." Global Privacy Law Review 2, Issue 2 (June 1, 2021): 162–68. http://dx.doi.org/10.54648/gplr2021021.
Повний текст джерелаKatzan, Jr., Harry. "Cybersecurity Service Model." Journal of Service Science (JSS) 5, no. 2 (December 28, 2012): 71–78. http://dx.doi.org/10.19030/jss.v5i2.7576.
Повний текст джерелаRiebe, Thea, Tom Biselli, Marc-André Kaufhold, and Christian Reuter. "Privacy Concerns and Acceptance Factors of OSINT for Cybersecurity: A Representative Survey." Proceedings on Privacy Enhancing Technologies 2023, no. 1 (January 2023): 477–93. http://dx.doi.org/10.56553/popets-2023-0028.
Повний текст джерелаLee, In. "Internet of Things (IoT) Cybersecurity: Literature Review and IoT Cyber Risk Management." Future Internet 12, no. 9 (September 18, 2020): 157. http://dx.doi.org/10.3390/fi12090157.
Повний текст джерелаAlodaynan, Abdullah Mohammed, and Adwan Alownie Alanazi. "A survey of cybersecurity vulnerabilities in healthcare systems." International Journal of ADVANCED AND APPLIED SCIENCES 8, no. 12 (December 2021): 48–55. http://dx.doi.org/10.21833/ijaas.2021.12.007.
Повний текст джерелаRawat, Danda B. "Journal of Cybersecurity and Privacy: A New Open Access Journal." Journal of Cybersecurity and Privacy 1, no. 1 (March 19, 2021): 195–98. http://dx.doi.org/10.3390/jcp1010010.
Повний текст джерелаJaccard, Julian Jang. "Cybersecurity threats in cloud computing." Australian Journal of Telecommunications and the Digital Economy 1, no. 1 (December 15, 2013): 58–74. http://dx.doi.org/10.18080/ajtde.v1n1.128.
Повний текст джерелаJaccard, Julian Jang. "Cybersecurity threats in cloud computing." Journal of Telecommunications and the Digital Economy 1, no. 1 (December 15, 2013): 58–74. http://dx.doi.org/10.18080/jtde.v1n1.128.
Повний текст джерелаPetron, David, Michael Wolk, and Edward McNicholas. "Broker-dealers need to respond to recent focus on cybersecurity threats." Journal of Investment Compliance 15, no. 2 (June 3, 2014): 29–32. http://dx.doi.org/10.1108/joic-05-2014-0020.
Повний текст джерелаKatzan, Harry. "Contemporary Issues in Cybersecurity." Journal of Cybersecurity Research (JCR) 1, no. 1 (June 21, 2016): 1–6. http://dx.doi.org/10.19030/jcr.v1i1.9745.
Повний текст джерелаNte, Ngboawaji Daniel, Brebina Kelvin Enoke, and Joda Adekunbi Omolara. "An Evaluation of the Challenges of Mainstreaming Cybersecurity Laws and Privacy Protection in Nigeria." Journal of Law and Legal Reform 3, no. 2 (April 30, 2022): 246–66. http://dx.doi.org/10.15294/jllr.v3i2.56484.
Повний текст джерелаDunn Cavelty, Myriam, and Matthias Leese. "Politicising Security at the Boundaries: Privacy in Surveillance and Cybersecurity." Special Issue: The Politicisation of Security: Controversy, Mobilisation, Arena Shifting, no. 3-2018 (February 18, 2019): 49–69. http://dx.doi.org/10.3224/eris.v5i3.03.
Повний текст джерелаChen, Su-Yen, Hsin-Yu Kuo, and Chiachun Lee. "Preparing Society for Automated Vehicles: Perceptions of the Importance and Urgency of Emerging Issues of Governance, Regulations, and Wider Impacts." Sustainability 12, no. 19 (September 23, 2020): 7844. http://dx.doi.org/10.3390/su12197844.
Повний текст джерелаAlmanza Olmedo, Moreno. "e-commerce cybersecurity vulnerability, http protocol case." Minerva 2, no. 6 (November 22, 2021): 23–31. http://dx.doi.org/10.47460/minerva.v2i6.39.
Повний текст джерелаYuliana, Yuliana. "THE IMPORTANCE OF CYBERSECURITY AWARENESS FOR CHILDREN." Lampung Journal of International Law 4, no. 1 (June 30, 2022): 41–48. http://dx.doi.org/10.25041/lajil.v3i2.2526.
Повний текст джерелаFerreira, Ana, and Ricardo Cruz-Correia. "COVID-19 and Cybersecurity: Finally, an Opportunity to Disrupt?" JMIRx Med 2, no. 2 (May 6, 2021): e21069. http://dx.doi.org/10.2196/21069.
Повний текст джерелаYuliana, Yuliana. "THE IMPORTANCE OF CYBERSECURITY AWARENESS FOR CHILDREN." Lampung Journal of International Law 4, no. 1 (June 30, 2022): 41–48. http://dx.doi.org/10.25041/lajil.v4i1.2526.
Повний текст джерелаBalan, Shilpa, Sanchita Gawand, and Priyanka Purushu. "Application of Machine Learning Classification Algorithm to Cybersecurity Awareness." Information Technology and Management Science 21 (December 14, 2018): 45–48. http://dx.doi.org/10.7250/itms-2018-0006.
Повний текст джерелаAliyu, Aliyu, Leandros Maglaras, Ying He, Iryna Yevseyeva, Eerke Boiten, Allan Cook, and Helge Janicke. "A Holistic Cybersecurity Maturity Assessment Framework for Higher Education Institutions in the United Kingdom." Applied Sciences 10, no. 10 (May 25, 2020): 3660. http://dx.doi.org/10.3390/app10103660.
Повний текст джерелаSebastian, Glorin. "A Descriptive Study on Metaverse." International Journal of Security and Privacy in Pervasive Computing 15, no. 1 (January 1, 2023): 1–14. http://dx.doi.org/10.4018/ijsppc.315591.
Повний текст джерелаS. Resende, João, Rolando Martins, and Luís Antunes. "A Survey on Using Kolmogorov Complexity in Cybersecurity." Entropy 21, no. 12 (December 5, 2019): 1196. http://dx.doi.org/10.3390/e21121196.
Повний текст джерелаTrappe, Wade, and Jeremy Straub. "Journal of Cybersecurity and Privacy: A New Open Access Journal." Journal of Cybersecurity and Privacy 1, no. 1 (June 14, 2018): 1–3. http://dx.doi.org/10.3390/jcp1010001.
Повний текст джерелаPeter Margulies. "Global Cybersecurity, Surveillance, and Privacy: The Obama Administration's Conflicted Legacy." Indiana Journal of Global Legal Studies 24, no. 2 (2017): 459. http://dx.doi.org/10.2979/indjglolegstu.24.2.0459.
Повний текст джерелаSankar, Lalitha, Wade Trappe, H. Vincent Poor, and Merouane Debbah. "Signal Processing for Cybersecurity and Privacy [From the Guest Editors]." IEEE Signal Processing Magazine 30, no. 5 (September 2013): 14–15. http://dx.doi.org/10.1109/msp.2013.2264854.
Повний текст джерелаLee, Jae Kyu, Younghoon Chang, Hun Yeong Kwon, and Beopyeon Kim. "Reconciliation of Privacy with Preventive Cybersecurity: The Bright Internet Approach." Information Systems Frontiers 22, no. 1 (January 22, 2020): 45–57. http://dx.doi.org/10.1007/s10796-020-09984-5.
Повний текст джерелаWang, Yunpeng, Yinghui Wang, Hongmao Qin, Haojie Ji, Yanan Zhang, and Jian Wang. "A Systematic Risk Assessment Framework of Automotive Cybersecurity." Automotive Innovation 4, no. 3 (March 23, 2021): 253–61. http://dx.doi.org/10.1007/s42154-021-00140-6.
Повний текст джерелаRazaque, Abdul, Abrar Al Ajlan, Noussaiba Melaoune, Munif Alotaibi, Bandar Alotaibi, Issabekov Dias, Ammar Oad, Salim Hariri, and Chenglin Zhao. "Avoidance of Cybersecurity Threats with the Deployment of a Web-Based Blockchain-Enabled Cybersecurity Awareness System." Applied Sciences 11, no. 17 (August 26, 2021): 7880. http://dx.doi.org/10.3390/app11177880.
Повний текст джерелаSilva, Sónia. "Web 3.0 and Cybersecurity – Short Paper." ARIS2 - Advanced Research on Information Systems Security 2, no. 2 (December 30, 2022): 39–49. http://dx.doi.org/10.56394/aris2.v2i2.21.
Повний текст джерелаMaqsood, Sana, and Sonia Chiasson. "Design, Development, and Evaluation of a Cybersecurity, Privacy, and Digital Literacy Game for Tweens." ACM Transactions on Privacy and Security 24, no. 4 (November 30, 2021): 1–37. http://dx.doi.org/10.1145/3469821.
Повний текст джерелаKim, Kyounggon. "Security and Privacy Liability Policy in the Arab World." Security Policy Paper 2, no. 1 (March 31, 2021): 1–11. http://dx.doi.org/10.26735/outi8333.
Повний текст джерелаMorrow, Paul J. "The New Age Of Cybersecurity Privacy, Criminal Procedure And Cyber Corporate Ethics." Journal of Cybersecurity Research (JCR) 3, no. 1 (December 20, 2018): 19–28. http://dx.doi.org/10.19030/jcr.v3i1.10241.
Повний текст джерелаComizio, V. Gerard, Behnam Dayanim, and Laura Bain. "Cybersecurity as a global concern in need of global solutions: an overview of financial regulatory developments in 2015." Journal of Investment Compliance 17, no. 1 (May 3, 2016): 101–11. http://dx.doi.org/10.1108/joic-01-2016-0003.
Повний текст джерелаKim, Euiyoung, JungKyoon Yoon, Jieun Kwon, Tiffany Liaw, and Alice M. Agogino. "From Innocent Irene to Parental Patrick: Framing User Characteristics and Personas to Design for Cybersecurity." Proceedings of the Design Society: International Conference on Engineering Design 1, no. 1 (July 2019): 1773–82. http://dx.doi.org/10.1017/dsi.2019.183.
Повний текст джерелаDremliuga, Roman, and Mohd Hazmi bin Mohd Rusli. "The Development of the Legal Framework for Autonomous Shipping: Lessons Learned from a Regulation for a Driverless Car." Journal of Politics and Law 13, no. 3 (August 30, 2020): 295. http://dx.doi.org/10.5539/jpl.v13n3p295.
Повний текст джерелаJun, Sung-In. "National Security or Privacy: A Second Thought on the DNC Hack." AJIL Unbound 110 (2016): 352–57. http://dx.doi.org/10.1017/aju.2017.4.
Повний текст джерелаRenee Staton, A., and Michele Kielty. "A Lurking Threat: Counselor Practices to Guard Against Cyber Threats." Journal of Mental Health Counseling 45, no. 1 (January 1, 2023): 20–33. http://dx.doi.org/10.17744/mehc.45.1.02.
Повний текст джерелаLeszczyna, Rafał. "Cybersecurity and privacy in standards for smart grids – A comprehensive survey." Computer Standards & Interfaces 56 (February 2018): 62–73. http://dx.doi.org/10.1016/j.csi.2017.09.005.
Повний текст джерелаDawson, Sophie, and Emma Croft. "Missing (in) Action: Where Are the Australian Data Breach Class Actions?" Global Privacy Law Review 3, Issue 3 (September 1, 2022): 190–94. http://dx.doi.org/10.54648/gplr2022019.
Повний текст джерела