Щоб переглянути інші типи публікацій з цієї теми, перейдіть за посиланням: Cybersecurity and privacy.

Статті в журналах з теми "Cybersecurity and privacy"

Оформте джерело за APA, MLA, Chicago, Harvard та іншими стилями

Оберіть тип джерела:

Ознайомтеся з топ-50 статей у журналах для дослідження на тему "Cybersecurity and privacy".

Біля кожної праці в переліку літератури доступна кнопка «Додати до бібліографії». Скористайтеся нею – і ми автоматично оформимо бібліографічне посилання на обрану працю в потрібному вам стилі цитування: APA, MLA, «Гарвард», «Чикаго», «Ванкувер» тощо.

Також ви можете завантажити повний текст наукової публікації у форматі «.pdf» та прочитати онлайн анотацію до роботи, якщо відповідні параметри наявні в метаданих.

Переглядайте статті в журналах для різних дисциплін та оформлюйте правильно вашу бібліографію.

1

Katzan, Jr., Harry. "Cybersecurity Service Model." Journal of Service Science (JSS) 5, no. 2 (December 28, 2012): 71–78. http://dx.doi.org/10.19030/jss.v5i2.7576.

Повний текст джерела
Анотація:
The efficacy of modern computer systems is normally regarded as a function of five basic attributes of computer and information security: availability, accuracy, authenticity, confidentiality, and integrity. The concepts generally apply to government, business, education, and the ordinary lives of private individuals. The considerations normally involve extended applications of the Internet hence the name Cybersecurity. Achieving and maintaining a secure cyberspace is a complicated process, and some of the concerns involve personal identity, privacy and intellectual property, secure maintenance of the critical infrastructure, and the sustainability of organizations. The threats to a secure operating infrastructure are serious and profound: cyber terrorism, cyber war, cyber espionage, and cyber crime, to which the technical community has responded with a plethora of ad hoc safeguards and procedures, usually supplied by the competitive private sector. This paper proposes a fresh view of the cyber domain based on service science with the ultimate objective of developing a cybersecurity service model.
Стилі APA, Harvard, Vancouver, ISO та ін.
2

Bojanova, Irena, Jeffrey Voas, Morris Chang, and Linda Wilbanks. "Cybersecurity or Privacy [Guest editors' introduction]." IT Professional 18, no. 5 (September 2016): 16–17. http://dx.doi.org/10.1109/mitp.2016.80.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
3

Mishra, Neha. "Privacy, Cybersecurity, and GATS Article XIV: A New Frontier for Trade and Internet Regulation?" World Trade Review 19, no. 3 (May 2, 2019): 341–64. http://dx.doi.org/10.1017/s1474745619000120.

Повний текст джерела
Анотація:
AbstractMeasures restricting data flows outside one's borders, including mandatory data/server localization measures, are not only a barrier to trade, but also largely ineffective in achieving better internet security or trust. Nevertheless, governments deploy such measures, primarily on grounds of cybersecurity and privacy, potentially violating their obligations under the General Agreement on Trade in Services (GATS). In this article, I investigate whether GATS-inconsistent measures may be justified under GATS Art. XIV when aimed at ensuring privacy or cybersecurity, and, if so, whether GATS Art. XIV effectively balances trade and internet policy. As the internet governance framework is complex and somewhat ambiguous, applying GATS Art. XIV to cybersecurity/privacy measures necessitates balancing of trade liberalization principles and domestic internet policy. This exercise can be effective in weeding out data localization measures disguised as privacy/cybersecurity measures, particularly by employing relevant technical and factual evidence. However, given the lack of binding international law/norms on these issues, GATS Art. XIV has a limited role, particularly in cases involving direct conflict between multistakeholder/transnational internet norms and domestic internet policies, or where the measures are founded on contentious standards/benchmarks on privacy/cybersecurity. Ultimately, ensuring free and secure data flows requires a multidimensional policy response, including strengthening linkages between trade law and internet governance.
Стилі APA, Harvard, Vancouver, ISO та ін.
4

Katzan, Harry. "Contemporary Issues in Cybersecurity." Journal of Cybersecurity Research (JCR) 1, no. 1 (June 21, 2016): 1–6. http://dx.doi.org/10.19030/jcr.v1i1.9745.

Повний текст джерела
Анотація:
The effectiveness of modern computer applications is normally regarded as a function of five basic attributes of secure computer and information systems: availability, accuracy, authenticity, confidentiality, and integrity. The concepts generally apply to government, business, education, and the ordinary lives of private individuals. The considerations normally involve extended Internet applications – hence the name Cybersecurity. Achieving and maintaining a secure cyberspace is a complicated process, and some of the concerns involve personal identity, privacy, intellectual property, the critical infrastructure, and the sustainability of organizations. The threats to a secure operating infrastructure are serious and profound: cyber terrorism, cyber war, cyber espionage, and cyber crime, to which the technical community has responded with safeguards and procedures, usually supplied by the private sector. This paper provides a comprehensive view of security in the cyber domain with the ultimate objective of developing a science of cybersecurity.
Стилі APA, Harvard, Vancouver, ISO та ін.
5

Barth, Susanne, Menno D. T. de Jong, and Marianne Junger. "Lost in privacy? Online privacy from a cybersecurity expert perspective." Telematics and Informatics 68 (March 2022): 101782. http://dx.doi.org/10.1016/j.tele.2022.101782.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
6

Pehlivan, Ceyhun Necati. "Global Privacy News." Global Privacy Law Review 1, Issue 1 (March 1, 2020): 63–76. http://dx.doi.org/10.54648/gplr2020009.

Повний текст джерела
Анотація:
This article tracks significant developments in some of the key jurisdictions in the area of privacy, data protection, and cybersecurity. It provides concise reports to keep the reader up to date with some of the most recent developments across the globe. privacy, data protection, cyber security, global, news
Стилі APA, Harvard, Vancouver, ISO та ін.
7

Khatoun, Rida, and Sherali Zeadally. "Cybersecurity and Privacy Solutions in Smart Cities." IEEE Communications Magazine 55, no. 3 (March 2017): 51–59. http://dx.doi.org/10.1109/mcom.2017.1600297cm.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
8

Landwehr, C., D. Boneh, J. C. Mitchell, S. M. Bellovin, S. Landau, and M. E. Lesk. "Privacy and Cybersecurity: The Next 100 Years." Proceedings of the IEEE 100, Special Centennial Issue (May 2012): 1659–73. http://dx.doi.org/10.1109/jproc.2012.2189794.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
9

Yuliana, Yuliana. "THE IMPORTANCE OF CYBERSECURITY AWARENESS FOR CHILDREN." Lampung Journal of International Law 4, no. 1 (June 30, 2022): 41–48. http://dx.doi.org/10.25041/lajil.v3i2.2526.

Повний текст джерела
Анотація:
Online school during the COVID-19 pandemic makes the children prone to cyberattacks and malware. Therefore, cybersecurity awareness among children is critical. Online games and stories caused children to neglect their studying time. Therefore, this paper aims to describe the importance of cybersecurity awareness among children. Analyses were performed by using a literature review. Inclusion criteria are review and research articles. Inclusion criteria are review and research articles that were read twice to reduce the bias, then were summarized and narrated descriptively. Results revealed that cybersecurity awareness could be increased by digital literacy training. Children should be taught how to avoid risky behavior online. The cybersecurity awareness program is suitable for children to avoid phishing, pornography, cyberbullying, identity theft, and breaking of privacy. Children must be taught how to keep their passwords safe and private. They also need to be more cautious when playing online games. In conclusion, digital literacy and cybersecurity programs can be taught to children. These programs are suitable for raising cybersecurity among children.
Стилі APA, Harvard, Vancouver, ISO та ін.
10

Yuliana, Yuliana. "THE IMPORTANCE OF CYBERSECURITY AWARENESS FOR CHILDREN." Lampung Journal of International Law 4, no. 1 (June 30, 2022): 41–48. http://dx.doi.org/10.25041/lajil.v4i1.2526.

Повний текст джерела
Анотація:
Online school during the COVID-19 pandemic makes the children prone to cyberattacks and malware. Therefore, cybersecurity awareness among children is critical. Online games and stories caused children to neglect their studying time. Therefore, this paper aims to describe the importance of cybersecurity awareness among children. Analyses were performed by using a literature review. Inclusion criteria are review and research articles. Inclusion criteria are review and research articles that were read twice to reduce the bias, then were summarized and narrated descriptively. Results revealed that cybersecurity awareness could be increased by digital literacy training. Children should be taught how to avoid risky behavior online. The cybersecurity awareness program is suitable for children to avoid phishing, pornography, cyberbullying, identity theft, and breaking of privacy. Children must be taught how to keep their passwords safe and private. They also need to be more cautious when playing online games. In conclusion, digital literacy and cybersecurity programs can be taught to children. These programs are suitable for raising cybersecurity among children.
Стилі APA, Harvard, Vancouver, ISO та ін.
11

Pattanasri, Thanaphol. "Mandatory Data Breach Notification and Hacking the Smart Home: A Legal Response to Cybersecurity?" QUT Law Review 18, no. 2 (March 1, 2019): 268. http://dx.doi.org/10.5204/qutlr.v18i2.752.

Повний текст джерела
Анотація:
This paper will investigate whether the Australian legal and regulatory framework sufficiently addresses cybersecurity concerns particular to the smart home. Specifically, the paper will analyse the extent to which the introduction of the data breach notification scheme in Australia will apply to smart home device manufacturers regulated by the federal Privacy Act 1988 (Cth) regarding device breaches. By examining Australian Privacy Principle 11 and the introduction of mandatory data breach notification, the paper aims to determine whether the Australian privacy model of Principles Based Regulation is capable of providing a market-based solution to cybersecurity concerns in the smart home.
Стилі APA, Harvard, Vancouver, ISO та ін.
12

Pattanasri, Thanaphol. "Mandatory Data Breach Notification and Hacking the Smart Home: A Legal Response to Cybersecurity?" QUT Law Review 18, no. 2 (March 5, 2019): 268. http://dx.doi.org/10.5204/qutlr.v18i2.770.

Повний текст джерела
Анотація:
This paper will investigate whether the Australian legal and regulatory framework sufficiently addresses cybersecurity concerns particular to the smart home. Specifically, the paper will analyse the extent to which the introduction of the data breach notification scheme in Australia will apply to smart home device manufacturers regulated by the federal Privacy Act 1988 (Cth) regarding device breaches. By examining Australian Privacy Principle 11 and the introduction of mandatory data breach notification, the paper aims to determine whether the Australian privacy model of Principles-Based Regulation is capable of providing a market-based solution to cybersecurity concerns in the smart home.
Стилі APA, Harvard, Vancouver, ISO та ін.
13

Razaque, Abdul, Abrar Al Ajlan, Noussaiba Melaoune, Munif Alotaibi, Bandar Alotaibi, Issabekov Dias, Ammar Oad, Salim Hariri, and Chenglin Zhao. "Avoidance of Cybersecurity Threats with the Deployment of a Web-Based Blockchain-Enabled Cybersecurity Awareness System." Applied Sciences 11, no. 17 (August 26, 2021): 7880. http://dx.doi.org/10.3390/app11177880.

Повний текст джерела
Анотація:
Modern information technology (IT) is well developed, and almost everyone uses the features of IT and services within the Internet. However, people are being affected due to cybersecurity threats. People can adhere to the recommended cybersecurity guidelines, rules, adopted standards, and cybercrime preventive measures to largely mitigate these threats. The ignorance of or lack of cybersecurity knowledge also causes a critical problem regarding confidentiality and privacy. It is not possible to fully avoid cybercrimes that often lead to sufficient business losses and spread forbidden themes (disgust, extremism, child porn, etc.). Therefore, to reduce the risk of cybercrimes, a web-based Blockchain-enabled cybersecurity awareness program (WBCA) process is introduced in this paper. The proposed WBCA trains users to improve their security skills. The proposed program helps with understanding the common behaviors of cybercriminals and improves user knowledge of cybersecurity hygiene, best cybersecurity practices, modern cybersecurity vulnerabilities, and trends. Furthermore, the proposed WBCA uses Blockchain technology to protect the program from potential threats. The proposed program is validated and tested using real-world cybersecurity topics with real users and cybersecurity experts. We anticipate that the proposed program can be extended to other domains, such as national or corporate courses, to increase the cybersecurity awareness level of users. A CentOS-based virtual private server is deployed for testing the proposed WBCA to determine its effectiveness. Finally, WBCA is also compared with other state-of-the-art web-based programs designed for cybersecurity awareness.
Стилі APA, Harvard, Vancouver, ISO та ін.
14

Landwehr, Carl. "Prolog to the Section on Privacy and Cybersecurity." Proceedings of the IEEE 100, Special Centennial Issue (May 2012): 1657–58. http://dx.doi.org/10.1109/jproc.2012.2189820.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
15

Kshetri, Nir. "Blockchain's roles in strengthening cybersecurity and protecting privacy." Telecommunications Policy 41, no. 10 (November 2017): 1027–38. http://dx.doi.org/10.1016/j.telpol.2017.09.003.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
16

de Fuentes, José M., Lorena González-Manzano, Juan Tapiador, and Pedro Peris-Lopez. "PRACIS: Privacy-preserving and aggregatable cybersecurity information sharing." Computers & Security 69 (August 2017): 127–41. http://dx.doi.org/10.1016/j.cose.2016.12.011.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
17

Jofre, Marc, Diana Navarro-Llobet, Ramon Agulló, Jordi Puig, Gustavo Gonzalez-Granadillo, Juan Mora Zamorano, and Ramon Romeu. "Cybersecurity and Privacy Risk Assessment of Point-of-Care Systems in Healthcare—A Use Case Approach." Applied Sciences 11, no. 15 (July 21, 2021): 6699. http://dx.doi.org/10.3390/app11156699.

Повний текст джерела
Анотація:
Point-of-care systems are generally used in healthcare to respond rapidly and prevent critical health conditions. Hence, POC systems often handle personal health information; and consequently, their cybersecurity and privacy requirements are of crucial importance. While, assessing these requirements is a significant task. In this work, we propose a use case approach to assess specifications of cybersecurity and privacy requirements of POC systems in a structured and self-contained form. Such an approach is appropriate since use cases are one of the most common means adopted by developers to derive requirements. As a result, we detail a use case approach in the framework of a real-based healthcare IT infrastructure that includes a health information system, integration engines, application servers, web services, medical devices, smartphone apps and medical modalities (all data simulated) together with the interaction with participants. Since our use case also sustains the analysis of cybersecurity and privacy risks in different threat scenarios, it also supports decision making and the analysis of compliance considerations.
Стилі APA, Harvard, Vancouver, ISO та ін.
18

Lee, In. "Internet of Things (IoT) Cybersecurity: Literature Review and IoT Cyber Risk Management." Future Internet 12, no. 9 (September 18, 2020): 157. http://dx.doi.org/10.3390/fi12090157.

Повний текст джерела
Анотація:
Along with the growing threat of cyberattacks, cybersecurity has become one of the most important areas of the Internet of Things (IoT). The purpose of IoT cybersecurity is to reduce cybersecurity risk for organizations and users through the protection of IoT assets and privacy. New cybersecurity technologies and tools provide potential for better IoT security management. However, there is a lack of effective IoT cyber risk management frameworks for managers. This paper reviews IoT cybersecurity technologies and cyber risk management frameworks. Then, this paper presents a four-layer IoT cyber risk management framework. This paper also applies a linear programming method for the allocation of financial resources to multiple IoT cybersecurity projects. An illustration is provided as a proof of concept.
Стилі APA, Harvard, Vancouver, ISO та ін.
19

E. Larrea, Guillermo, and Juan Carlos Quinzaños. "Report: Privacy in Latin America During COVID-19 Times and Reasonable Digital Security." Global Privacy Law Review 2, Issue 2 (June 1, 2021): 162–68. http://dx.doi.org/10.54648/gplr2021021.

Повний текст джерела
Анотація:
The global COVID-19 pandemic has tested the business and human capacity in Latin America to adapt to the digital world. While the world has experienced similar developments in privacy and data protection, the Latin American region is rarely analysed as a whole in terms of privacy and data protection. Besides GDPR, Latin America has older and even more robust data protection regimes than the US and is now quickly shifting to cybersecurity. In this article, we provide a quick overview of the data protection regimes in Latin America to summarize representative actions that countries in Latin America took for the protection of privacy and personal data during the pandemic period. We examine the factors and circumstances that have affected the region’s privacy through this period, including unsuitable data processing, the design of new tracking technologies, teleworking, the risks of relying on digital platforms, and alleged new cybersecurity regulation. With that in mind, we are making a value proposition towards identifying common factors for a reasonable security in order to help companies preparing to confront risks. This digital trend will undoubtedly resonate on the complexity of data transfers inbound and outbound the region, and the consequences of security breaches for those improperly processing data in the region. Mexico, Latin America, COVID-19, Digital Transformation, Cybersecurity, Personal Data, Data Processing, Incident Response, Teleworking, Reasonable Security, Privacy
Стилі APA, Harvard, Vancouver, ISO та ін.
20

Jun, Sung-In. "National Security or Privacy: A Second Thought on the DNC Hack." AJIL Unbound 110 (2016): 352–57. http://dx.doi.org/10.1017/aju.2017.4.

Повний текст джерела
Анотація:
The recent U.S. Democratic National Committee (DNC) hack raises several difficult questions in the fields of cybersecurity and privacy. Obviously, this was first and foremost a matter of security in that the hack likely involved a foreign government attempting to intervene in a presidential election process with the possible motive of influencing its outcome. From another perspective, however, the incident was also a matter of privacy, in that the fundamental motive of the DNC hack was to reveal “information that the victim wants to keep private” and to influence its future decision through the compromise of privacy.
Стилі APA, Harvard, Vancouver, ISO та ін.
21

Rawat, Danda B. "Journal of Cybersecurity and Privacy: A New Open Access Journal." Journal of Cybersecurity and Privacy 1, no. 1 (March 19, 2021): 195–98. http://dx.doi.org/10.3390/jcp1010010.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
22

Riebe, Thea, Tom Biselli, Marc-André Kaufhold, and Christian Reuter. "Privacy Concerns and Acceptance Factors of OSINT for Cybersecurity: A Representative Survey." Proceedings on Privacy Enhancing Technologies 2023, no. 1 (January 2023): 477–93. http://dx.doi.org/10.56553/popets-2023-0028.

Повний текст джерела
Анотація:
The use of Open Source Intelligence (OSINT) to monitor and detect cybersecurity threats is gaining popularity among Cybersecurity Emergency or Incident Response Teams (CERTs/CSIRTs). They increasingly use semi-automated OSINT approaches when monitoring cyber threats for public infrastructure services and incident response. Most of the systems use publicly available data, often focusing on social media due to timely data for situational assessment. As indirect and affected stakeholders, the acceptance of OSINT systems by users, as well as the conditions which influence the acceptance, are relevant for the development of OSINT systems for cybersecurity. Therefore, as part of the ethical and social technology assessment, we conducted a survey (N=1,093), in which we asked participants about their acceptance of OSINT systems, their perceived need for open source surveillance, as well as their privacy behavior and concerns. Further, we tested if the awareness of OSINT is an interactive factor that affects other factors. Our results indicate that cyber threat perception and the perceived need for OSINT are positively related to acceptance, while privacy concerns are negatively related. The awareness of OSINT, however, has only shown effects on people with higher privacy concerns. Here, particularly high OSINT awareness and limited privacy concerns were associated with higher OSINT acceptance. Lastly, we provide implications for further research and the use of OSINT systems for cybersecurity by authorities. As OSINT is a framework rather than a single technology, approaches can be selected and combined to adhere to data minimization and anonymization as well as to leverage improvements in privacy-preserving computation and machine learning innovations. Regarding the use of OSINT, the results suggest to favor approaches that provide transparency to users regarding the use of the systems and the data they gather.
Стилі APA, Harvard, Vancouver, ISO та ін.
23

Nte, Ngboawaji Daniel, Brebina Kelvin Enoke, and Joda Adekunbi Omolara. "An Evaluation of the Challenges of Mainstreaming Cybersecurity Laws and Privacy Protection in Nigeria." Journal of Law and Legal Reform 3, no. 2 (April 30, 2022): 246–66. http://dx.doi.org/10.15294/jllr.v3i2.56484.

Повний текст джерела
Анотація:
The goal of this study is to discuss cybercrimes and review cybersecurity threats, with a focus on cybersecurity legislations in Nigeria that seek to protect the privacy and digital property of the Nigerian people and the country’s institutions. The study’s methodology includes a qualitative examination of Nigeria's present national cybersecurity laws. It explores how effective they are and interrogates the additional measures that may be needed-notably in cybersecurity and related national laws-to ensure that individuals, institutions are protected and that society and the national economy function well in the 21st Century. Individuals have a right to privacy, so do companies and various other institutions in post- modern societies. This right varies widely across different countries across the globe. In some countries it is minimal or non-existent, in others it is hard fought for constitutional right. In order to reap the benefits of advanced technologies in the information age, personal and institutional data have to be made available to merchants, institutions and government. The benefits of advanced technologies are immense-and vital to modern economies. However, this process involves risks. Abuse of the data is a risk, and criminal abuse has become widespread.
Стилі APA, Harvard, Vancouver, ISO та ін.
24

Petron, David, Michael Wolk, and Edward McNicholas. "Broker-dealers need to respond to recent focus on cybersecurity threats." Journal of Investment Compliance 15, no. 2 (June 3, 2014): 29–32. http://dx.doi.org/10.1108/joic-05-2014-0020.

Повний текст джерела
Анотація:
Purpose – To alert broker-dealers to several regulatory developments relating to cybersecurity threats. Design/methodology/approach – Reviews four regulatory developments in the cybersecurity area and provides several steps broker-dealers should undertake to review and improve their cybersecurity and information technology protocols and practices. Findings – While FINRA’s new cybersecurity sweep appears to be an exploratory and learning exercise to obtain regulatory knowledge and intelligence, firms should be cognizant of the fact that both FINRA and the SEC have imposed significant sanctions against Firms when it has found inadequate cyber security policies and procedures. Practical implications – Broker-dealers should review the White House’s recent Framework for Improving Critical Infrastructure Cybersecurity and evaluate their own cybersecurity preparedness under the key areas of the Framework. Originality/value – Practical guidance from experienced privacy and securities regulatory lawyers that consolidates several recent developments in one piece.
Стилі APA, Harvard, Vancouver, ISO та ін.
25

Renee Staton, A., and Michele Kielty. "A Lurking Threat: Counselor Practices to Guard Against Cyber Threats." Journal of Mental Health Counseling 45, no. 1 (January 1, 2023): 20–33. http://dx.doi.org/10.17744/mehc.45.1.02.

Повний текст джерела
Анотація:
As a result of shifts in global power, the growth of cyber capabilities worldwide, and the impact of COVID-19 on the increasing use of technology in varied workplaces, the potential for threat and disruption to mental health facilities is expected to increase. Counselors and their clients are vulnerable to these threats any time they share data online with each other, with third-party payers, and with allied health professionals. In fact, any private information stored digitally is potentially at risk for exploitation or theft. This current environment highlights the need for an intentional process and approach that can help mental health counselors understand their digital assets and vulnerabilities in order to anticipate and protect against potential cyber threats. This type of process can be facilitated through the application of cyber intelligence and cybersecurity principles to online counseling services in order to address ethical and legal obligations of counselors and to assuage client fears about potential privacy breaches. When counselors keep client data safe, Health Information Portability and Accountability Act and Family Educational Rights and Privacy Act violations are less likely to occur in a variety of settings where clients may be seen. An overview of the need for cybersecurity, a framework for bolstering cybersecurity, and specific guidelines for counselors are provided.
Стилі APA, Harvard, Vancouver, ISO та ін.
26

Leiva, Aldo M., and Michel E. Clark. "COVID-19 considerations for SEC cybersecurity guidance, disclosure, enforcement, and parallel proceedings: navigating the new normal." Journal of Investment Compliance 21, no. 2/3 (November 30, 2020): 111–26. http://dx.doi.org/10.1108/joic-08-2020-0018.

Повний текст джерела
Анотація:
Purpose To examine the COVID-19 pandemic’s effects on regulated entities within the context of cybersecurity, US Securities and Exchange Commission (SEC) compliance, and parallel proceedings. Design/methodology/approach Describes the SEC’s ability to conduct its operations within the telework environment, its commitment and ability to monitor the securities market, its enhanced monitoring of the adverse effects of SEC-regulated companies from COVID-19, its guidance to public companies of disclosure obligations related to cybersecurity risks and incidents, the SEC Office of Compliance and Examinations’s (OCIE’s) focus on broker-dealers’ and investment advisories’ cybersecurity preparedness, the role and activities of the SEC Division of Enforcement’s Cyber Unit, and parallel proceedings on cyberbreaches and incidents by different agencies, branches of government or private litigants. Findings SEC-regulated entities face many challenges in trying to maintain their ongoing business operations and infrastructure due to severe financial pressures, the threat of infection to employees and customers, and cybersecurity risks posed by remote operations from hackers and fraudsters. The SEC has reemphasized that its long-standing focus on cybersecurity and resiliency within the securities industry will continue, including ongoing vigilance over companies’ efforts to identify, assess, and address the inherent, heightened cybersecurity risks of teleworking and the resource reallocation that business need to sustain their operations until a safe and effective vaccine is developed for COVID-19. Originality/value Expert analysis and guidance from experienced lawyers with expertise in securities, litigation, government enforcement, information technology, data protection, privacy and cybersecurity.
Стилі APA, Harvard, Vancouver, ISO та ін.
27

Jaccard, Julian Jang. "Cybersecurity threats in cloud computing." Australian Journal of Telecommunications and the Digital Economy 1, no. 1 (December 15, 2013): 58–74. http://dx.doi.org/10.18080/ajtde.v1n1.128.

Повний текст джерела
Анотація:
Recently we have witnessed the emergence of cloud computing as a new computing model that offers resources (e.g., compute, storage, network, etc.) as general utilities to be leased and released on-demand by users through the Internet. Given its innovative nature and reliance on the Internet, the cloud inherently comes with a number of vulnerabilities that increase the space for cyber attacks. This paper aims to provide an overview of major potential risks to privacy and security in the cloud. Various emerging threats and attack methods are discussed, and some speculative future research directions are presented.
Стилі APA, Harvard, Vancouver, ISO та ін.
28

Jaccard, Julian Jang. "Cybersecurity threats in cloud computing." Journal of Telecommunications and the Digital Economy 1, no. 1 (December 15, 2013): 58–74. http://dx.doi.org/10.18080/jtde.v1n1.128.

Повний текст джерела
Анотація:
Recently we have witnessed the emergence of cloud computing as a new computing model that offers resources (e.g., compute, storage, network, etc.) as general utilities to be leased and released on-demand by users through the Internet. Given its innovative nature and reliance on the Internet, the cloud inherently comes with a number of vulnerabilities that increase the space for cyber attacks. This paper aims to provide an overview of major potential risks to privacy and security in the cloud. Various emerging threats and attack methods are discussed, and some speculative future research directions are presented.
Стилі APA, Harvard, Vancouver, ISO та ін.
29

Ferreira, Ana, and Ricardo Cruz-Correia. "COVID-19 and Cybersecurity: Finally, an Opportunity to Disrupt?" JMIRx Med 2, no. 2 (May 6, 2021): e21069. http://dx.doi.org/10.2196/21069.

Повний текст джерела
Анотація:
COVID-19 has challenged cybersecurity to meet the ultimate need of guaranteeing the privacy and security of human beings. Although personal and sensitive health data are needed to better understand, detect, and control the disease, many related cybersecurity challenges and vulnerabilities require further analysis and proper discussion. The aims of this viewpoint are to explore the consequences of COVID-19 on cybersecurity and health care as well as to foster awareness regarding the need for a change in paradigm on how cybersecurity is approached. Education and information technology literacy are important when they are suitably provided; however, they are certainly not a complete solution. Disruption needs to occur at the core of human-device interactions. Building trust, providing novel means to interact with technology (eg, digital humans), and supporting people—the most important cybersecurity asset—are only some of the recommendations for a more human and resilient approach to cybersecurity, during or after the pandemic.
Стилі APA, Harvard, Vancouver, ISO та ін.
30

Pala, Ali, and Jun Zhuang. "Information Sharing in Cybersecurity: A Review." Decision Analysis 16, no. 3 (September 2019): 172–96. http://dx.doi.org/10.1287/deca.2018.0387.

Повний текст джерела
Анотація:
In this survey, we review the cybersecurity information-sharing literature, categorizing the identified papers based on their main focus and methodological approaches implemented to the cybersecurity information-sharing problem. We constitute our research framework on the major considerations of firms, governments, citizens, and adversaries. This includes actors involved, types of information to be shared, current legal baseline, information-sharing organizations/policies/architectures, benefits of sharing, and concerns/costs/barriers of sharing. We observe that both qualitative and quantitative approaches are implemented in the literature. In general, quantitative approaches have been dedicated to discuss the challenges and barriers of public/private collaboration in information sharing, such as privacy and liability, and to propose secure and effective sharing mechanisms. On the other hand, quantitative approaches have been more interested in developing models that balance cybersecurity investment and information sharing as well as provide effective incentive mechanisms. This review summarizes the academic efforts in cybersecurity information sharing by analyzing 82 identified papers with their methodological approaches. The papers using game-theoretical models are dominant in the literature as we spend more time summarizing those efforts. We conclude the review by providing potential research gaps and future research directions.
Стилі APA, Harvard, Vancouver, ISO та ін.
31

Alodaynan, Abdullah Mohammed, and Adwan Alownie Alanazi. "A survey of cybersecurity vulnerabilities in healthcare systems." International Journal of ADVANCED AND APPLIED SCIENCES 8, no. 12 (December 2021): 48–55. http://dx.doi.org/10.21833/ijaas.2021.12.007.

Повний текст джерела
Анотація:
The security of healthcare servers and their applications from unauthorized access and hacking effect of patient file safety as a result of missing or modified data. Therefore, it is necessary to protect those servers and health systems and to know the cyber weaknesses in them and other related services to prevent them before they occur and treat them if they occur as soon as possible to reach the highest level of security and confidentiality of patient data and their privacy in addition to the safety of systems from malfunctions as a result of the attack. This research revolves around the concept of penetration and the motives of the attackers, in addition to the methods of penetration and vulnerability with mentioning some common attacks and clarifying their method of operation, and determining their effects on the victim. The research also deals with the most important basics and requirements to achieve privacy and security for health systems at different levels, including systems, users, and devices, with some intrusion protection techniques mentioned, and some challenges and solutions will be discussed in addition to some security issues in general, the research aims to gain the best level of security and privacy in the infrastructure of health systems.
Стилі APA, Harvard, Vancouver, ISO та ін.
32

Balan, Shilpa, Sanchita Gawand, and Priyanka Purushu. "Application of Machine Learning Classification Algorithm to Cybersecurity Awareness." Information Technology and Management Science 21 (December 14, 2018): 45–48. http://dx.doi.org/10.7250/itms-2018-0006.

Повний текст джерела
Анотація:
Cybersecurity plays a vital role in protecting the privacy and data of people. In the recent times, there have been several issues relating to cyber fraud, data breach and cyber theft. Many people in the United States have been a victim of identity theft. Thus, understanding of cybersecurity plays an important role in protecting their information and devices. As the adoption of smart devices and social networking are increasing, cybersecurity awareness needs to be spread. The research aims at building a classification machine learning algorithm to determine the awareness of cybersecurity by the common masses in the United States. We were able to attain a good F-measure score when evaluating the performance of the classification model built for this study.
Стилі APA, Harvard, Vancouver, ISO та ін.
33

Chen, Su-Yen, Hsin-Yu Kuo, and Chiachun Lee. "Preparing Society for Automated Vehicles: Perceptions of the Importance and Urgency of Emerging Issues of Governance, Regulations, and Wider Impacts." Sustainability 12, no. 19 (September 23, 2020): 7844. http://dx.doi.org/10.3390/su12197844.

Повний текст джерела
Анотація:
This study explores the overall picture of how people perceive the importance level and urgency level regarding issues associated with automated vehicles, by sorting out ten issues, developing a questionnaire with 66 measurement items, and investigating how Artificial Intelligence (AI) experts and Computer Science (CS)/Electrical Engineering (EE) majors assessed these issues. The findings suggest that AI experts in Taiwan believed that the top five issues for preparing a society for autonomous vehicles (AVs) should include (1) data privacy and cybersecurity, (2) regulation considerations, (3) infrastructure, (4) governance, and (5) public acceptance. On the other hand, for their student counterparts, the results (1) demonstrate a somewhat different order from the third to the fifth place, (2) show an attention-focused profile on the issue of cybersecurity and data privacy, and (3) indicate that gender and a few wider-impact variables (technology innovation, infrastructure) are significant predictors for the assessment on the importance level of AVs, while some wider-impact variables (technology innovation, governance, economic benefits, infrastructure), which are positively associated, as well as concerns variables (cybersecurity and data privacy, regulations), which are negatively associated, could be predictors for the urgency level of AVs. Suggestions for future research and policymakers are provided.
Стилі APA, Harvard, Vancouver, ISO та ін.
34

Dunn Cavelty, Myriam, and Matthias Leese. "Politicising Security at the Boundaries: Privacy in Surveillance and Cybersecurity." Special Issue: The Politicisation of Security: Controversy, Mobilisation, Arena Shifting, no. 3-2018 (February 18, 2019): 49–69. http://dx.doi.org/10.3224/eris.v5i3.03.

Повний текст джерела
Анотація:
This article looks into the politicisation of security. Politicisation, in contrast to securitisation, presupposes that security issues are controversially debated in a public arena without foregone conclusions as to how they are going to be handled. In order to locate and observe politicisation processes empirically, we suggest to look at privacy, a key notion and main tool for resistance vis-à-vis security logics. By examining two issue areas (video surveillance and cybersecurity), we highlight different tactics through which privacy is mobilised as a boundary object to politicise security. The invocation of privacy offers an alternative viewpoint on security, one where the human (digital) body and a human centred notion of security is at the centre. The value of its integrity and the need for its protection is a weighty counter to the abstract and often absolute claims of ‘more security’ through technological means.
Стилі APA, Harvard, Vancouver, ISO та ін.
35

Almanza Olmedo, Moreno. "e-commerce cybersecurity vulnerability, http protocol case." Minerva 2, no. 6 (November 22, 2021): 23–31. http://dx.doi.org/10.47460/minerva.v2i6.39.

Повний текст джерела
Анотація:
This paper was designed with the intention of analyzing the vulnerability of e-commerce web sites. We are going to describe the transmission of data in clear text without encryption by hypertext transfer protocol (HTTP), reason why we argue that by means of a sniffer technique this information can be captured and this way violating customer privacy information.
Стилі APA, Harvard, Vancouver, ISO та ін.
36

Trappe, Wade, and Jeremy Straub. "Journal of Cybersecurity and Privacy: A New Open Access Journal." Journal of Cybersecurity and Privacy 1, no. 1 (June 14, 2018): 1–3. http://dx.doi.org/10.3390/jcp1010001.

Повний текст джерела
Анотація:
Journal of Cybersecurity and Privacy is critical to society at large, and its importance is growing daily. The rapid advancement in technology has caused a large-scale integration of computing, communication, and information technologies into virtually every aspect of our modern society[...]
Стилі APA, Harvard, Vancouver, ISO та ін.
37

Sebastian, Glorin. "A Descriptive Study on Metaverse." International Journal of Security and Privacy in Pervasive Computing 15, no. 1 (January 1, 2023): 1–14. http://dx.doi.org/10.4018/ijsppc.315591.

Повний текст джерела
Анотація:
Maximalist, interconnected set of experiences straight out of sci-fi, based on 3D virtual environment through personal computing, and augmented reality headsets—a world known as the Metaverse—this is the futuristic vision of internet that technology giants are investing in. There has been some research on data privacy risks in the metaverse; however, detailed research on the cybersecurity risks of virtual reality platforms like metaverse have not been performed. This research paper addresses this gap of understanding the various possible cybersecurity risks on metaverse platforms. This study tries to understand the risks associated with metaverse by describing the technologies supporting metaverse platform and understanding the inherent cybersecurity threats in each of these technologies. Further, the paper proposes a cybersecurity risk governance regulatory framework to mitigate these risks.
Стилі APA, Harvard, Vancouver, ISO та ін.
38

Aliyu, Aliyu, Leandros Maglaras, Ying He, Iryna Yevseyeva, Eerke Boiten, Allan Cook, and Helge Janicke. "A Holistic Cybersecurity Maturity Assessment Framework for Higher Education Institutions in the United Kingdom." Applied Sciences 10, no. 10 (May 25, 2020): 3660. http://dx.doi.org/10.3390/app10103660.

Повний текст джерела
Анотація:
As organisations are vulnerable to cyberattacks, their protection becomes a significant issue. Capability Maturity Models can enable organisations to benchmark current maturity levels against best practices. Although many maturity models have been already proposed in the literature, a need for models that integrate several regulations exists. This article presents a light, web-based model that can be used as a cybersecurity assessment tool for Higher Education Institutes (HEIs) of the United Kingdom. The novel Holistic Cybersecurity Maturity Assessment Framework incorporates all security regulations, privacy regulations, and best practices that HEIs must be compliant to, and can be used as a self assessment or a cybersecurity audit tool.
Стилі APA, Harvard, Vancouver, ISO та ін.
39

Wang, Yunpeng, Yinghui Wang, Hongmao Qin, Haojie Ji, Yanan Zhang, and Jian Wang. "A Systematic Risk Assessment Framework of Automotive Cybersecurity." Automotive Innovation 4, no. 3 (March 23, 2021): 253–61. http://dx.doi.org/10.1007/s42154-021-00140-6.

Повний текст джерела
Анотація:
AbstractThe increasingly intelligent and connected vehicles have brought many unprecedented automotive cybersecurity threats, which may cause privacy breaches, personal injuries, and even national security issues. Before providing effective security solutions, a comprehensive risk assessment of the automotive cybersecurity must be carried out. A systematic cybersecurity risk assessment framework for automobiles is proposed in this study. It consists of an assessment process and systematic assessment methods considering the changes of threat environment, evaluation target, and available information in vehicle lifecycle. In the process of risk identification and risk analysis, the impact level and attack feasibility level are assessed based on the STRIDE model and attack tree method. An automotive cybersecurity risk matrix using a global rating algorithm is then constructed to create a quantitative risk metric. Finally, the applicability and feasibility of the proposed risk assessment framework are demonstrated through a use case, and the results prove that the proposed framework is effective. The proposed assessment framework helps to systematically derive automotive cybersecurity requirements.
Стилі APA, Harvard, Vancouver, ISO та ін.
40

Peter Margulies. "Global Cybersecurity, Surveillance, and Privacy: The Obama Administration's Conflicted Legacy." Indiana Journal of Global Legal Studies 24, no. 2 (2017): 459. http://dx.doi.org/10.2979/indjglolegstu.24.2.0459.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
41

Sankar, Lalitha, Wade Trappe, H. Vincent Poor, and Merouane Debbah. "Signal Processing for Cybersecurity and Privacy [From the Guest Editors]." IEEE Signal Processing Magazine 30, no. 5 (September 2013): 14–15. http://dx.doi.org/10.1109/msp.2013.2264854.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
42

Lee, Jae Kyu, Younghoon Chang, Hun Yeong Kwon, and Beopyeon Kim. "Reconciliation of Privacy with Preventive Cybersecurity: The Bright Internet Approach." Information Systems Frontiers 22, no. 1 (January 22, 2020): 45–57. http://dx.doi.org/10.1007/s10796-020-09984-5.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
43

TANRIVERDIYEV, Elshan. "THE STATE OF THE CYBER ENVIRONMENT AND NATIONAL CYBERSECURITY STRATEGY IN DEVELOPED COUNTRIES." National Security Studies 23, no. 1 (March 30, 2022): 19–26. http://dx.doi.org/10.37055/sbn/149510.

Повний текст джерела
Анотація:
In the context of integration into modern information technologies, the state, society, business structures and individuals face critical challenges in the field of information and its authenticity in cyberspace, secure use of electronic services, protection of personal data, data completeness and confidentiality. In an environment where new cyber threats are constantly emerging and evolving, it is important for countries to have flexible, operational cybersecurity strategies against global cyber threats. In the modern era, cyberattacks and cyber defense are considered as an integral part of all operations. At present, no military operation is carried out without a cyber element. However, very few countries are able to respond to such attacks with state resources . Today, the issue of cybersecurity is considered one of the priorities. Every year, governmental, non-governmental and international organizations hold various events in this area at the regional and global levels. As it is seen, cybersecurity is a very broad and urgent problem. The Azerbaijani state has taken appropriate steps to assess the existing gaps and threats in this area in a timely manner and will continue to work with great determination . Currently, the number of cyberattacks and cyber-espionage against government agencies and private companies is growing rapidly. The consequences of well-planned and successful cyberattacks targeting interconnected and dependent information infrastructure can be devastating. Cybersecurity and privacy of personal information is becoming a strategic national issue affecting all levels of society. Therefore, cybersecurity becomes a necessary condition for the development of the information society. Each state has a different approach to cybersecurity, there are such views on cybersecurity as information security, the issue of national security, the issue of law enforcement agencies and the economic issue. Although all countries recognize the importance of international cooperation in the field of cybersecurity, the lack of a common language and approach complicates the process of international cooperation. Therefore, the partnership and cooperation of countries in the field of cybersecurity is vital. Provision of reliable cybersecurity is beyond the access of small states independently, and solving this problem requires the partnership and cooperation of all interested parties - states, law enforcement agencies, the private sector and citizens. The cross-border nature of cyber threats encourages countries to work closely together in the field of cybersecurity. Nowadays, the issue of cybersecurity is becoming a national strategic problem and affects all sectors of society. Fast, efficient and effective fight against cyber threats requires the definition of the right strategic goals. The development of a national cybersecurity strategy is the first and main step in the fight against cyber threats. To develop a successful and optimal national cybersecurity strategy, available national cybersecurity strategies should be analyzed and successful practices against cyber threats should be used.
Стилі APA, Harvard, Vancouver, ISO та ін.
44

Silva, Sónia. "Web 3.0 and Cybersecurity – Short Paper." ARIS2 - Advanced Research on Information Systems Security 2, no. 2 (December 30, 2022): 39–49. http://dx.doi.org/10.56394/aris2.v2i2.21.

Повний текст джерела
Анотація:
The Web 3.0 ecosystem is growing exponentially, which also adds to the cybersecurity concerns it imposes. There is a continuous shift in the Internet architecture, from a read/write model to a newer model known as Web 3.0. Global companies are exploring web 3.0 opportunities in their business processes. Along with opportunities, Web 3.0 poses several cybersecurity risks to organizations that need to detect and mitigate efficiently. Data breaches, computer attacks, and social engineering defined the cybersecurity risk landscape of Web 2.0. This work aims to identify solutions to the problem between the evolution of web 3.0 and companies to evolve their infrastructures promptly to ensure the privacy and security of their data.
Стилі APA, Harvard, Vancouver, ISO та ін.
45

Kim, Kyounggon. "Security and Privacy Liability Policy in the Arab World." Security Policy Paper 2, no. 1 (March 31, 2021): 1–11. http://dx.doi.org/10.26735/outi8333.

Повний текст джерела
Анотація:
Focusing on Cooperation, Capability, and Assessment (ACC) approach performed in top-down, bottom-up, short-term, and long-term (TBSL). Cooperation between countries is essential to proactively respond to various cyber threats such as cyber criminals and cyber terrorists and to show rapid recovery resilience. Develop a cybersecurity evaluation model and a gap analysis model and spread them to the remaining Arab countries.
Стилі APA, Harvard, Vancouver, ISO та ін.
46

S. Resende, João, Rolando Martins, and Luís Antunes. "A Survey on Using Kolmogorov Complexity in Cybersecurity." Entropy 21, no. 12 (December 5, 2019): 1196. http://dx.doi.org/10.3390/e21121196.

Повний текст джерела
Анотація:
Security and privacy concerns are challenging the way users interact with devices. The number of devices connected to a home or enterprise network increases every day. Nowadays, the security of information systems is relevant as user information is constantly being shared and moving in the cloud; however, there are still many problems such as, unsecured web interfaces, weak authentication, insecure networks, lack of encryption, among others, that make services insecure. The software implementations that are currently deployed in companies should have updates and control, as cybersecurity threats increasingly appearing over time. There is already some research towards solutions and methods to predict new attacks or classify variants of previous known attacks, such as (algorithmic) information theory. This survey combines all relevant applications of this topic (also known as Kolmogorov Complexity) in the security and privacy domains. The use of Kolmogorov-based approaches is resource-focused without the need for specific knowledge of the topic under analysis. We have defined a taxonomy with already existing work to classify their different application areas and open up new research questions.
Стилі APA, Harvard, Vancouver, ISO та ін.
47

Morrow, Paul J. "The New Age Of Cybersecurity Privacy, Criminal Procedure And Cyber Corporate Ethics." Journal of Cybersecurity Research (JCR) 3, no. 1 (December 20, 2018): 19–28. http://dx.doi.org/10.19030/jcr.v3i1.10241.

Повний текст джерела
Анотація:
This paper reviews cybersecurity and the new criminal procedure standards of searches and seizures based on the perspectives of probable cause in the digital age involving cell phones. Also, this paper examines the civil corporate policy perspectives involving data breaches as the topic relates to the consumer using social media and provides guidance for executives to enact proper and responsible corporate policies navigating the new cybersecurity landscape in the post - Carpenter vs. U.S. era. Reading this paper is worth your time because: (1) you will learn the new cybercrimes legal standards involved with cyber-privacy and the criminal process which is necessary to develop director competencies; (2) you will gain knowledge which is the key to proposing ethical systems within the corporation required by law; (3) moving forward, we are at a critical point in America and good guidance is vitally important.
Стилі APA, Harvard, Vancouver, ISO та ін.
48

Comizio, V. Gerard, Behnam Dayanim, and Laura Bain. "Cybersecurity as a global concern in need of global solutions: an overview of financial regulatory developments in 2015." Journal of Investment Compliance 17, no. 1 (May 3, 2016): 101–11. http://dx.doi.org/10.1108/joic-01-2016-0003.

Повний текст джерела
Анотація:
Purpose To provide financial institutions an overview of the developments in cybersecurity regulation of financial institutions during 2015 by the United States, the United Kingdom, and the European Union, as well as guidance for developing effective cyber-risk management programs in light of evolving cyber-threats and cyber-regulatory expectations. Design/methodology/approach Reviews US, UK and EU regulatory developments in the cybersecurity area and provides several best practice tips financial institutions should consider and implement to improve their cybersecurity compliance programs. Findings While cyber-threats and financial regulators’ expectations for cyber-security are constantly evolving, recent guidance and enforcement efforts by the US, UK and EU illustrate the need for financial institutions to develop effective cybersecurity programs that address current regulatory compliance requirements and prepare for emergency cyber responses. Practical implications Financial institutions should utilize the Federal Financial Institutions Examination Council’s Cybersecurity Assessment Tool to assess their cyber-risk profile and cyber-preparedness. Originality/value Practical guidance from experienced financial regulatory and privacy lawyers that provides a survey of the current regulatory environment and recommendations for cyber-security compliance.
Стилі APA, Harvard, Vancouver, ISO та ін.
49

Kim, Euiyoung, JungKyoon Yoon, Jieun Kwon, Tiffany Liaw, and Alice M. Agogino. "From Innocent Irene to Parental Patrick: Framing User Characteristics and Personas to Design for Cybersecurity." Proceedings of the Design Society: International Conference on Engineering Design 1, no. 1 (July 2019): 1773–82. http://dx.doi.org/10.1017/dsi.2019.183.

Повний текст джерела
Анотація:
AbstractWith the surging number of digital devices penetrating our daily routines, the risks inherent to cybersecurity—the protection of data on digital products connected to the Internet—have also increased since these devices (e.g., connected home devices, personal monitoring) collect, process, analyze and store users’ sensitive personal information. Thus, there is a pressing need to assist users in being aware of and dealing with potential cybersecurity threats. With the proposition that fulfilling the need starts with developing an in-depth understanding of the user behaviors in the context of cybersecurity, an exploratory study was conducted that employed three mixed qualitative and quantitative research methods—a trend analysis, an interview study, and an online survey study. The paper reports the user characteristics on (1) awareness levels of cybersecurity issues, (2) uses of digital devices, and (3) means of dealing with the privacy issues in product use. The results of the studies were translated into eight personas that systematically reflect distinct characteristics of users, which can help designers empathize with their potential users vulnerable to cybersecurity risks.
Стилі APA, Harvard, Vancouver, ISO та ін.
50

Maqsood, Sana, and Sonia Chiasson. "Design, Development, and Evaluation of a Cybersecurity, Privacy, and Digital Literacy Game for Tweens." ACM Transactions on Privacy and Security 24, no. 4 (November 30, 2021): 1–37. http://dx.doi.org/10.1145/3469821.

Повний текст джерела
Анотація:
Tweens are avid users of digital media, which exposes them to various online threats. Teachers are primarily expected to teach children safe online behaviours, despite not necessarily having the required training or classroom tools to support this education. Using the theory of procedural rhetoric and established game design principles, we designed a classroom-based cybersecurity, privacy, and digital literacy game for tweens that has since been deployed to over 300 Canadian elementary schools. The game, A Day in the Life of the JOs , teaches children about 25 cybersecurity, privacy, and digital literacy topics and allows them to practice what they have learned in a simulated environment. We employed a user-centered design process to create the game, iteratively testing its design and effectiveness with children and teachers through five user studies (with a total of 63 child participants and 21 teachers). Our summative evaluation with children showed that the game improved their cybersecurity, privacy, and digital literacy knowledge and behavioural intent and was positively received by them. Our summative evaluation with teachers also showed positive results. Teachers liked that the game represented the authentic experiences of children on digital media and that it aligned with their curriculum requirements; they were interested in using it in their classrooms. In this article, we discuss our process and experience of designing a production quality game for children and provide evidence of its effectiveness with both children and teachers.
Стилі APA, Harvard, Vancouver, ISO та ін.
Ми пропонуємо знижки на всі преміум-плани для авторів, чиї праці увійшли до тематичних добірок літератури. Зв'яжіться з нами, щоб отримати унікальний промокод!

До бібліографії