Results for 'Cybersecurity'

13 found
Order:
  1.  47
    Cybersecurity, Trustworthiness and Resilient Systems: Guiding Values for Policy.Adam Henschke & Shannon Ford - 2017 - Journal of Cyber Policy 1 (2).
    Cyberspace relies on information technologies to mediate relations between different people, across different communication networks and is reliant on the supporting technology. These interactions typically occur without physical proximity and those working depending on cybersystems must be able to trust the overall human–technical systems that support cyberspace. As such, detailed discussion of cybersecurity policy would be improved by including trust as a key value to help guide policy discussions. Moreover, effective cybersystems must have resilience designed into them. This paper (...)
    Download  
     
    Export citation  
     
    Bookmark   1 citation  
  2. Trusting artificial intelligence in cybersecurity is a double-edged sword.Mariarosaria Taddeo, Tom McCutcheon & Luciano Floridi - 2019 - Philosophy and Technology 32 (1):1-15.
    Applications of artificial intelligence (AI) for cybersecurity tasks are attracting greater attention from the private and the public sectors. Estimates indicate that the market for AI in cybersecurity will grow from US$1 billion in 2016 to a US$34.8 billion net worth by 2025. The latest national cybersecurity and defence strategies of several governments explicitly mention AI capabilities. At the same time, initiatives to define new standards and certification procedures to elicit users’ trust in AI are emerging on (...)
    Download  
     
    Export citation  
     
    Bookmark   15 citations  
  3. A principlist framework for cybersecurity ethics.Paul Formosa, Michael Wilson & Deborah Richards - 2021 - Computers and Security 109.
    The ethical issues raised by cybersecurity practices and technologies are of critical importance. However, there is disagreement about what is the best ethical framework for understanding those issues. In this paper we seek to address this shortcoming through the introduction of a principlist ethical framework for cybersecurity that builds on existing work in adjacent fields of applied ethics, bioethics, and AI ethics. By redeploying the AI4People framework, we develop a domain-relevant specification of five ethical principles in cybersecurity: (...)
    Download  
     
    Export citation  
     
    Bookmark  
  4. Use of Blockchain in Strengthening Cybersecurity And Protecting Privacy.Arif Sari - 2018 - International Journal of Engineering and Information Systems (IJEAIS) 2 (12):59-66.
    Abstract—The purpose of this study is to highlight and prove the positive impact in which blockchain could have on today’s IoT environment in terms of providing Cybersecurity for not just organizations, but other individuals who share data via the internet. The current IoT environs operates on a centralized cloud based server, meanwhile block chain operates on a decentralized server. The differentiation between the both plays a major role in the level of security they both provide; whereby, decentralized systems are (...)
    Download  
     
    Export citation  
     
    Bookmark  
  5.  49
    Attack Prevention in IoT through Hybrid Optimization Mechanism and Deep Learning Framework.Regonda Nagaraju, Jupeth Pentang, Shokhjakhon Abdufattokhov, Ricardo Fernando CosioBorda, N. Mageswari & G. Uganya - 2022 - Measurement: Sensors 24:100431.
    The Internet of Things (IoT) connects schemes, programs, data management, and operations, and as they continuously assist in the corporation, they may be a fresh entryway for cyber-attacks. Presently, illegal downloading and virus attacks pose significant threats to IoT security. These risks may acquire confidential material, causing reputational and financial harm. In this paper hybrid optimization mechanism and deep learning,a frame is used to detect the attack prevention in IoT. To develop a cybersecurity warning system in a huge data (...)
    Download  
     
    Export citation  
     
    Bookmark   2 citations  
  6. Privacy and Digital Ethics After the Pandemic.Carissa Véliz - 2021 - Nature Electronics 4:10-11.
    The increasingly prominent role of digital technologies during the coronavirus pandemic has been accompanied by concerning trends in privacy and digital ethics. But more robust protection of our rights in the digital realm is possible in the future. -/- After surveying some of the challenges we face, I argue for the importance of diplomacy. Democratic countries must try to come together and reach agreements on minimum standards and rules regarding cybersecurity, privacy and the governance of AI.
    Download  
     
    Export citation  
     
    Bookmark  
  7.  60
    State Management Mechanisms for the Exchange of Information Regarding Cyberattacks, Cyber Incidents and Information Security Incidents.Myroslav Kryshtanovych, Igor Britchenko, Peter Lošonczi, Tetiana Baranovska & Ulyana Lukashevska - 2022 - IJCSNS International Journal of Computer Science and Network Security 22 (4):33-38.
    The main purpose of the study is to determine the key aspects of the mechanisms of state management of the exchange of information about cyberattacks, cyber incidents, and information security incidents. The methodology includes a set of theoretical methods. Modern government, on the one hand, must take into account the emergence of such a new weapon as cyber, which can break various information systems, can be used in hybrid wars, influence political events, pose a threat to the national security of (...)
    Download  
     
    Export citation  
     
    Bookmark  
  8. Implementation of ICO European best practices by SMEs.Alla Ivashchenko, Yevheniia Polishchuk & Igor Britchenko - 2018 - Economic Annals-XXI 169 (1-2):67-71.
    The article deals with a new financial tool of attracting capital, known as Initial Coin Offering (ICO). In conditions of reduced banking lending and difficult access to finance for SMEs, ICO is viewed to be one of the possible ways to access capital. It considers the main advantages and disadvantages of ICO performance, including its typical features, challenges and regulatory approaches to tax regulation, cybersecurity. The authors of the article determine stages of the ICO mechanism, identifying potential risks and (...)
    Download  
     
    Export citation  
     
    Bookmark   2 citations  
  9.  84
    What Kind of Revolutionary is Mr. Robot?Shane J. Ralston - 2017 - In Richard Greene & Rachel Robison-Greene (eds.), Mr. Robot and Philosophy: Beyond Good and Evil Corp. Chicago: Open Court. pp. 73-82.
    Besides being the title of an EP by The (International) Noise Conspiracy, “Bigger cages, longer chains!” is an anarchist rallying cry. It’s meant to ridicule those political activists who compromise their ideals, make demands and then settle for partial concessions or, to put it bluntly, bargain with the Man. In the T.V. series Mr. Robot, Christian Slater plays the anarchist leader of a hacktivist group known as fsociety. Mr. Robot won’t negotiate with the FBI and E(vil) Corp for bigger cages (...)
    Download  
     
    Export citation  
     
    Bookmark  
  10. Nationalism with Chinese Characteristics: Infliction of Condescension.Yang Immanuel Pachankis - manuscript
    The letter analyzes the country-specific structural stigma in the modern media development of People’s Republic of China. It raises the issues on unconventional cybersecurity risks in mental & psychological health with a lens of justice in gender & marriage, and critical discourses in the media environment with the Chinese revisionist nationalism. It studied media coercion in relation to the breaches of humanitarian law in the constitutionalism context of PRC, and adopted a critical theory approach to religion with the background (...)
    Download  
     
    Export citation  
     
    Bookmark  
  11. State of the Art on Ethical, Legal, and Social Issues Linked to Audio- and Video-Based AAL Solutions.Alin Ake-Kob, Aurelija Blazeviciene, Liane Colonna, Anto Cartolovni, Carina Dantas, Anton Fedosov, Francisco Florez-Revuelta, Eduard Fosch-Villaronga, Zhicheng He, Andrzej Klimczuk, Maksymilian Kuźmicz, Adrienn Lukacs, Christoph Lutz, Renata Mekovec, Cristina Miguel, Emilio Mordini, Zada Pajalic, Barbara Krystyna Pierscionek, Maria Jose Santofimia Romero, Albert AliSalah, Andrzej Sobecki, Agusti Solanas & Aurelia Tamo-Larrieux - 2021 - Alicante: University of Alicante.
    Ambient assisted living technologies are increasingly presented and sold as essential smart additions to daily life and home environments that will radically transform the healthcare and wellness markets of the future. An ethical approach and a thorough understanding of all ethics in surveillance/monitoring architectures are therefore pressing. AAL poses many ethical challenges raising questions that will affect immediate acceptance and long-term usage. Furthermore, ethical issues emerge from social inequalities and their potential exacerbation by AAL, accentuating the existing access gap between (...)
    Download  
     
    Export citation  
     
    Bookmark  
  12. Arms Industry.Edmund Byrne - 2017 - Encyclopedia of Business and Professional Ethics.
    A summary assessment of the dimensions and concentrations of military equipment manufacture primarily in the United States and western Europe and the extent of availability of this equipment to buyers throughout the world. Treaty-based limitations are also listed.
    Download  
     
    Export citation  
     
    Bookmark  
  13.  9
    Utilising online eye-tracking to discern the impacts of cultural backgrounds on fake and real news decision-making.Amanda Brockinton, Sam Hirst, Ruijie Wang, John McAlaney & Shelley Thompson - 2022 - Frontiers in Psychology 13:999780.
    Introduction: Online eye-tracking has been used in this study to assess the impacts of different cultural backgrounds on information discernment. An online platform called RealEye allowed participants to engage in the eye-tracking study from their personal computer webcams, allowing for higher ecological validity and a closer replication of social media interaction. -/- Methods: The study consisted of two parts with a total of five visuals of social media posts mimicking news posts on Twitter, Instagram, and Facebook. Participants were asked to (...)
    Download  
     
    Export citation  
     
    Bookmark