Results for 'cyber security'

999 found
Order:
  1. Impacts of Cyber Security and Supply Chain Risk on Digital Operations: Evidence from the Pharmaceutical Industry.Federico Del Giorgio Solfa - 2022 - International Journal of Technology Innovation and Management (Ijtim) 2 (2):18-32.
    Purpose: The research explored empirical evidence to assess the impact of cyber security and supply chain risk on digital operations in the UAE pharmaceutical industry. Methodology/Design/Approach: Based on responses from 243 personnel working at 14 pharmaceutical manufacturing companies in Dubai, data were examined for normality, instrument validity and regression analysis. Cyber security and SC risk on digital operations were explored by applying convenient sampling and descriptive and analytical research design. Findings: The findings validated the significant positive (...)
    Download  
     
    Export citation  
     
    Bookmark  
  2. Cyber Security and Dehumanisation.Marie Oldfield - 2021 - 5Th Digital Geographies Research Group Annual Symposium.
    Artificial Intelligence is becoming widespread and as we continue ask ‘can we implement this’ we neglect to ask ‘should we implement this’. There are various frameworks and conceptual journeys one should take to ensure a robust AI product; context is one of the vital parts of this. AI is now expected to make decisions, from deciding who gets a credit card to cancer diagnosis. These decisions affect most, if not all, of society. As developers if we do not understand or (...)
    Download  
     
    Export citation  
     
    Bookmark  
  3. The Extent of Cyber Security Application at the Ministry Of Interior and National Security in Palestine.Mahmoud T. Al Najjar, Mazen J. Al Shobaki & Suliman A. El Talla - 2022 - International Journal of Academic Information Systems Research (IJAISR) 6 (11):9-43.
    This study aimed to identify the extent of the application of Cyber Security at the Ministry of Interior and National Security from the point of view of workers in the computer and information technology units. 70 employees, and the study tool (questionnaire) was distributed, and the comprehensive survey method was used, as (61) questionnaires were retrieved at a rate of (87.1%), and they were unloaded and analyzed using the SPSS statistical package. The study reached several results, including: (...)
    Download  
     
    Export citation  
     
    Bookmark  
  4. Analysis of Cyber Security In E-Governance Utilizing Blockchain Performance.Regonda Nagaraju, Selvanayaki Shanmugam, Sivaram Rajeyyagari, Jupeth Pentang, B. Kiran Bala, Arjun Subburaj & M. Z. M. Nomani - manuscript
    E-Government refers to the administration of Information and Communication Technologies (ICT) to the procedures and functions of the government with the objective of enhancing the transparency, efficiency and participation of the citizens. E-Government is tough systems that require distribution, protection of privacy and security and collapse of these could result in social and economic costs on a large scale. Many of the available e-government systems like electronic identity system of management (eIDs), websites are established at duplicated databases and servers. (...)
    Download  
     
    Export citation  
     
    Bookmark   1 citation  
  5. Digital Transformation and Its Impact on the Application of Cyber Security in the Ministry Of Interior and National Security in Palestine.Mazen J. Al Shobaki, Suliman A. El Talla & Mahmoud T. Al Najjar - 2022 - International Journal of Engineering and Information Systems (IJEAIS) 6 (11):92-115.
    This study aimed to identify the digital transformation and its impact on the application of Cyber Security in the Palestinian Ministry of Interior and National Security. The study used the analytical descriptive approach. The study tool (questionnaire), and the comprehensive survey method was used, where (61) questionnaires were retrieved (87.1%), and they were unloaded and analyzed using the SPSS statistical package. The study found several results, including that there is a statistically significant correlation between all dimensions of (...)
    Download  
     
    Export citation  
     
    Bookmark  
  6. Does humanity have an interest in developing a philosophy of cyber security as a philosophical discipline.Hillel Kobrovski - manuscript
    האם לאנושות יש אינטרס לפתח פילוסופיה של אבטחת סייבר כדיסציפלינה פילוסופית | מאת: הילל קוברובסקי | תוכן המאמר לפי נושאים | 1. מבוא - מהם האתגרים בתחילת הדרך על מנת לבנות מהיסוד ולפתח דיסציפלינה חדשה בתחום הפילוסופיה | 2. מהי משמעות המושג "מרחב הסייבר" לעומת "אבטחת הסייבר", מהם גבולות התיחום של הענף הקרוי סייבר | 3. מהי פילוסופיה ?, מהן הפילוסופיות שיכולות להוות השפעה עבור הפילוסופיה של אבטחת הסייבר | 4. מהן הבעיות והשאלות המהותיות בהן צריכה לדון הפילוסופיה של אבטחת (...)
    Download  
     
    Export citation  
     
    Bookmark  
  7. ISSUES AND CHALLENGES OF CYBER CRIME IN INDIA: AN ETHICAL PERSPECTIVE.Gobinda Bhattacharjee - 2021 - International Journal of Creative Research Thoughts 9 (9):b615-b620.
    The present paper is an attempt to discuss issues and challenges of Cyber Crime in India from an ethical perspective. Ethics is a branch of philosophy which deals with what is considered to be right or wrong. The ethics centers and program devoted to busin age for several re crime’. The advancement ess ethics, legal ethics, bioethics, medical ethics, engineering ethics, and computer ethics have sprung up. Cyber crime is emerging as a serious threat. Computer Technology is one (...)
    Download  
     
    Export citation  
     
    Bookmark  
  8. State Management Mechanisms for the Exchange of Information Regarding Cyberattacks, Cyber Incidents and Information Security Incidents.Myroslav Kryshtanovych, Igor Britchenko, Peter Lošonczi, Tetiana Baranovska & Ulyana Lukashevska - 2022 - IJCSNS International Journal of Computer Science and Network Security 22 (4):33-38.
    The main purpose of the study is to determine the key aspects of the mechanisms of state management of the exchange of information about cyberattacks, cyber incidents, and information security incidents. The methodology includes a set of theoretical methods. Modern government, on the one hand, must take into account the emergence of such a new weapon as cyber, which can break various information systems, can be used in hybrid wars, influence political events, pose a threat to the (...)
    Download  
     
    Export citation  
     
    Bookmark  
  9. A Study of Awareness About Cyber Laws for Indian Youth.Jigar Shah - 2016 - International Journal of Trend in Scientific Research and Development 1 (1):10-16.
    In india each and every minute one person become internet users. its convergence with digitally supported platforms and gadgets, safeguarding the parents as well as students from the cybercrimes is becoming a challenging task. In addition to, the pinching reality is that the internet users are not getting updated on the vulnerable cyber threats and security issues, at the pace they are getting updated with the usage of internet enabled tools and apps. Thus the current research paper focuses (...)
    Download  
     
    Export citation  
     
    Bookmark  
  10. Relationship Between Corporate Governance and Information Security Governance Effectiveness in United States Corporations.Dr Robert E. Davis - 2017 - Dissertation, Walden
    Cyber attackers targeting large corporations achieved a high perimeter penetration success rate during 2013, resulting in many corporations incurring financial losses. Corporate information technology leaders have a fiduciary responsibility to implement information security domain processes that effectually address the challenges for preventing and deterring information security breaches. Grounded in corporate governance theory, the purpose of this correlational study was to examine the relationship between strategic alignment, resource management, risk management, value delivery, performance measurement implementations, and information (...) governance (ISG) effectiveness in United States-based corporations. Surveys were used to collect data from 95 strategic and tactical leaders of the 500 largest for-profit United States headquartered corporations. The results of the multiple linear regression indicated the model was able to significantly predict ISG effectiveness, F(5, 89) = 3.08, p = 0.01, R² = 0.15. Strategic alignment was the only statistically significant (t = 2.401, p <= 0.018) predictor. The implications for positive social change include the potential to constructively understand the correlates of ISG effectiveness, thus increasing the propensity for consumer trust and reducing consumers' costs. (shrink)
    Download  
     
    Export citation  
     
    Bookmark  
  11. An Investigation into the Performances of the State-of-the-art Machine Learning Approaches for Various Cyber-attack Detection: A Survey. [REVIEW]Tosin Ige, Christopher Kiekintveld & Aritran Piplai - forthcoming - Proceedings of the IEEE:11.
    To secure computers and information systems from attackers taking advantage of vulnerabilities in the system to commit cybercrime, several methods have been proposed for real-time detection of vulnerabilities to improve security around information systems. Of all the proposed methods, machine learning had been the most effective method in securing a system with capabilities ranging from early detection of software vulnerabilities to real-time detection of ongoing compromise in a system. As there are different types of cyberattacks, each of the existing (...)
    Download  
     
    Export citation  
     
    Bookmark  
  12. Computational Transformation of the Public Sphere: Theories and Cases.S. M. Amadae (ed.) - 2020 - Helsinki: Faculty of Social Sciences, University of Helsinki.
    This book is an edited collection of original research papers on the digital revolution of the public and governance. It covers cyber governance in Finland, and the securitization of cyber security in Finland. It investigates the cases of Brexit, the 2016 US presidential election of Donald Trump, the 2017 presidential election of Volodymyr Zelensky, and Brexit. It examines the environmental concerns of climate change and greenwashing, and the impact of digital communication giving rise to the #MeToo and (...)
    Download  
     
    Export citation  
     
    Bookmark  
  13. Autonomy and Machine Learning as Risk Factors at the Interface of Nuclear Weapons, Computers and People.S. M. Amadae & Shahar Avin - 2019 - In Vincent Boulanin (ed.), The Impact of Artificial Intelligence on Strategic Stability and Nuclear Risk: Euro-Atlantic Perspectives. Stockholm, Sweden: pp. 105-118.
    This article assesses how autonomy and machine learning impact the existential risk of nuclear war. It situates the problem of cyber security, which proceeds by stealth, within the larger context of nuclear deterrence, which is effective when it functions with transparency and credibility. Cyber vulnerabilities poses new weaknesses to the strategic stability provided by nuclear deterrence. This article offers best practices for the use of computer and information technologies integrated into nuclear weapons systems. Focusing on nuclear command (...)
    Download  
     
    Export citation  
     
    Bookmark   1 citation  
  14. FONDASI KEMANANAN SIBER UNTUK LAYANAN PEMERINTAH.Dhanang Witjaksono & Arimurti Kriswibowo - 2023 - Al-Ijtima`I: International Journal of Government and Social Science 9 (1):21-38.
    The use of the internet in the current government environment continues to grow. The increasingly complex use of the internet can cause vulnerabilities to cyber attacks in information security, which include aspects of confidentiality, integrity, and service availability, so that it can disrupt the performance of public service delivery. The systematic literature review research method was carried out because of the large amount of information and data regarding cyber security strategies. This can be traced through various (...)
    Download  
     
    Export citation  
     
    Bookmark  
  15. Even good bots fight: the case of Wikipedia.Milena Tsvetkova, Ruth García-Gavilanes, Luciano Floridi & Taha Yasseri - 2017 - PLoS ONE 12 (2).
    In recent years, there has been a huge increase in the number of bots online, varying from Web crawlers for search engines, to chatbots for online customer service, spambots on social media, and content-editing bots in online collaboration communities. The online world has turned into an ecosystem of bots. However, our knowledge of how these automated agents are interacting with each other is rather poor. Bots are predictable automatons that do not have the capacity for emotions, meaning-making, creativity, and sociality (...)
    Download  
     
    Export citation  
     
    Bookmark   3 citations  
  16. Attack Prevention in IoT through Hybrid Optimization Mechanism and Deep Learning Framework.Regonda Nagaraju, Jupeth Pentang, Shokhjakhon Abdufattokhov, Ricardo Fernando CosioBorda, N. Mageswari & G. Uganya - 2022 - Measurement: Sensors 24:100431.
    The Internet of Things (IoT) connects schemes, programs, data management, and operations, and as they continuously assist in the corporation, they may be a fresh entryway for cyber-attacks. Presently, illegal downloading and virus attacks pose significant threats to IoT security. These risks may acquire confidential material, causing reputational and financial harm. In this paper hybrid optimization mechanism and deep learning,a frame is used to detect the attack prevention in IoT. To develop a cybersecurity warning system in a huge (...)
    Download  
     
    Export citation  
     
    Bookmark   3 citations  
  17. Targeted Human Trafficking -- The Wars between Proxy and Surrogated Economy.Yang Immanuel Pachankis - 2022 - International Journal of Scientific and Engineering Research 13 (7):398-409.
    Upon Brexit & Trade War, the research took a supply-side analysis in macroeconomic paradigm for the purpose and cause of the actions. In the geopolitical competitions on crude oil resources between the allied powers & the Russian hegemony, the latter of which has effective control over P. R. China’s multilateral behaviors, the external research induced that trade war, either by complete information in intelligence or an unintended result, was a supply chain attack in prohibiting the antisatellite weapon supplies in the (...)
    Download  
     
    Export citation  
     
    Bookmark   1 citation  
  18. The Modern Origins & Sources of China’s Techtransfer.Yang Immanuel Pachankis - 2022 - International Journal of Scientific and Engineering Research 13 (7):18-25.
    The research identified the key element on P. R. China’s incentives in modern history on techtransfer practices. With reviewing on the state funding surrogacy in the natural sciences, the author identified the key militant coercive contracting clauses in the document of the National Natural Science Foundation of China. With its combined workings with the statutory & martial laws, the analysis takes a com- parative culture approach that partially counteracts the work of the “United Front Working Group of the CPC”, which (...)
    Download  
     
    Export citation  
     
    Bookmark   3 citations  
  19. An Evaluation of the Readiness of Corporate Governance Frameworks to deal with Crises: A Covid-19 Perspective.Masiu Paseka Nicolas - 2022 - SunScholar.Ac.Za.
    This study investigates the adequacy of the current corporate governance frameworks by evaluating their efficiency relative to the context of crises. The Covid-19 pandemic is identified as the ideal case study on the merit that it has significant implications for corporate governance theory and practice. The study work from the premise that the current crisis situation necessitates a thorough evaluation of the readiness of the existing corporate governance regimes. While cognizant to the fact that the pandemic is still unfolding, this (...)
    Download  
     
    Export citation  
     
    Bookmark  
  20. An Evaluation of the Readiness of Corporate Governance Frameworks to deal with Crises: A Covid-19 Perspective.Paseka Nicolas Masiu - 2022 - Dissertation, University of Stellenbosch
    This study investigates the adequacy of the current corporate governance frameworks by evaluating their efficiency relative to the context of crises. The Covid-19 pandemic is identified as the ideal case study on the merit that it has significant implications for corporate governance theory and practice. The study work from the premise that the current crisis situation necessitates a thorough evaluation of the readiness of the existing corporate governance regimes. While cognizant to the fact that the pandemic is still unfolding, this (...)
    Download  
     
    Export citation  
     
    Bookmark  
  21. Cybercrime and Online Safety: Addressing the Challenges and Solutions Related to Cybercrime, Online Fraud, and Ensuring a Safe Digital Environment for All Users— A Case of African States (10th edition).Emmanuel N. Vitus - 2023 - Tijer- International Research Journal 10 (9):975-989.
    The internet has made the world more linked than ever before. While taking advantage of this online transition, cybercriminals target flaws in online systems, networks, and infrastructure. Businesses, government organizations, people, and communities all across the world, particularly in African countries, are all severely impacted on an economic and social level. Many African countries focused more on developing secure electricity and internet networks; yet, cybersecurity usually receives less attention than it should. One of Africa's major issues is the lack of (...)
    Download  
     
    Export citation  
     
    Bookmark  
  22. 'Techno-Risk - The Perils of Learning and Sharing Everything' from a Criminal Information Sharing Perspective.John Sliter - manuscript
    The author has extensive law enforcement experience and the paper is intended to provoke thought on the use of technology as it pertains to information sharing between the police and the private sector. -/- As the world edges closer and closer to the convergence of man and machine, the human capacity to retrieve information is increasing by leaps and bounds. We are on the verge of knowing everything and anything there is to know, and literally in the blink of an (...)
    Download  
     
    Export citation  
     
    Bookmark  
  23. Where Is the Money? The Intersectionality of the Spirit World and the Acquisition of Wealth.Suleman Lazarus - 2019 - Religions 10 (146):1-20.
    This article is a theoretical treatment of the ways in which local worldviews on wealth acquisition give rise to contemporary manifestations of spirituality in cyberspace. It unpacks spiritual (occult) economies and wealth generation through a historical perspective. The article ‘devil advocates’ the ‘sainthood’ of claimed law-abiding citizens, by highlighting that the line dividing them and the Nigerian cybercriminals (Yahoo-Boys) is blurred with regards to the use of magical means for material ends. By doing so, the article also illustrates that the (...)
    Download  
     
    Export citation  
     
    Bookmark   8 citations  
  24. Use of Blockchain in Strengthening Cybersecurity And Protecting Privacy.Arif Sari - 2018 - International Journal of Engineering and Information Systems (IJEAIS) 2 (12):59-66.
    Abstract—The purpose of this study is to highlight and prove the positive impact in which blockchain could have on today’s IoT environment in terms of providing Cybersecurity for not just organizations, but other individuals who share data via the internet. The current IoT environs operates on a centralized cloud based server, meanwhile block chain operates on a decentralized server. The differentiation between the both plays a major role in the level of security they both provide; whereby, decentralized systems are (...)
    Download  
     
    Export citation  
     
    Bookmark  
  25.  89
    Intelligence Info, Volumul 2, 2023.Nicolae Sfetcu - 2023 - Intelligence Info 2.
    Revista Intelligence Info este o publicație trimestrială din domeniile intelligence, geopolitică și securitate, și domenii conexe de studiu și practică. -/- Cuprins: -/- EDITORIALE / EDITORIALS -/- Tiberiu TĂNASE Considerații privind necesitatea educării și formării resursei umane pentru intelligence–ul național Considerations regarding the need to educate and train human resources for national intelligence Nicolae SFETCU Epistemologia activității de intelligence Epistemology of intelligence Nicolae SFETCU Rolul serviciilor de informații în război The role of the intelligence agencies in a war Nicolae SFETCU (...)
    Download  
     
    Export citation  
     
    Bookmark  
  26. An Evidence-driven Research to the Transgressions of Geneva Conventions by the Communist Party of China Led Autocratic Regime.Yang Immanuel Pachankis - 2022 - International Journal of Scientific and Engineering Research 13 (10):249-266.
    The "second-generation indigenization" hypothesis of Huntington's phenomenological observations on totalitarianism in Cold War regime collapse subtly portrayed the realpolitik interest groups' political influences with autocracy disbandment processes. The research puts democratization as the premise and globalization as purpose for the analysis, with the cultural anthropological psychopathology & criminological elements of genocide and crime against humanity explained, underlying some of the Communist Party of China (CPC)’s organizational behaviors. With the regionalism purposes & approaches to multilateralism by People's Republic of China (PRC), (...)
    Download  
     
    Export citation  
     
    Bookmark  
  27. Beginner's Guide for Cybercrime Investigators.Nicolae Sfetcu - 2014 - Drobeta Turnu Severin: MultiMedia Publishing.
    In the real world there are people who enter the homes and steal everything they find valuable. In the virtual world there are individuals who penetrate computer systems and "steal" all your valuable data. Just as in the real world, there are uninvited guests and people feel happy when they steal or destroy someone else's property, the computer world could not be deprived of this unfortunate phenomenon. It is truly detestable the perfidy of these attacks. For if it can be (...)
    Download  
     
    Export citation  
     
    Bookmark  
  28. Perceptually Secured Knowledge.Elijah Chudnoff - forthcoming - In Ori Beck & Farid Masrour (eds.), The Relational View of Perception: New Essays. Routledge.
    Perceptually secured knowledge consists of beliefs that amount to knowledge just because they are based on suitable perceptual states. Relationism about the ground of perceptually secured knowledge is the view that if a perceptual state can make a belief based on it amount to knowledge, then it can do that because it constitutes an appropriate kind of relational state, e.g., a state of perceptual acquaintance. I explore the prospects of both maintaining that some beliefs amount to perceptually secured knowledge and (...)
    Download  
     
    Export citation  
     
    Bookmark  
  29. Energy security issues in contemporary Europe.Josef Abrhám, Igor Britchenko, Marija Jankovic & Kristina Garškaitė-Milvydienė - 2018 - Journal of Security and Sustainability Issues 7 (3):388-398.
    Throughout the history of mankind, energy security has been always seen as a means of protection from disruptions of essential energy systems. The idea of protection from disorders emerged from the process of securing political and military control over energy resources to set up policies and measures on managing risks that affect all elements of energy systems. The various systems placed in a place to achieve energy security are the driving force towards the energy innovations or emerging trends (...)
    Download  
     
    Export citation  
     
    Bookmark  
  30. Moral Security.Jessica Wolfendale - 2017 - Journal of Political Philosophy 25 (2):238-255.
    In this paper, I argue that an account of security as a basic human right must incorporate moral security. Broadly speaking, a person possesses subjective moral security when she believes that her basic interests and welfare will be accorded moral recognition by others in her community and by social, political, and legal institutions in her society. She possesses objective moral security if, as a matter of fact, her interests and welfare are regarded by her society as (...)
    Download  
     
    Export citation  
     
    Bookmark   7 citations  
  31. Freedom, security, and the COVID-19 pandemic.Josette Anna Maria Daemen - forthcoming - Critical Review of International Social and Political Philosophy.
    Freedom and security are often portrayed as things that have to be traded off against one another, but this view does not capture the full complexity of the freedom-security relationship. Rather, there seem to be four different ways in which freedom and security connect to each other: freedom can come at the cost of security, security can come at the cost of freedom, freedom can work to the benefit of security, and security can (...)
    Download  
     
    Export citation  
     
    Bookmark  
  32.  91
    Cyber-Threats: Anticipation & Strategic Management, SciencesPo, 24h, 2023.Jan Stoermann & Jean Langlois-Berthelot - unknown
    Download  
     
    Export citation  
     
    Bookmark  
  33. Peter Sloterdijk and the ‘Security Architecture of Existence’: Immunity, Autochthony, and Ontological Nativism.Thomas Sutherland - 2019 - Theory, Culture and Society 36 (7-8):193-214.
    Centred on 'Foams', the third volume of his Spheres trilogy, this article questions the privilege granted by Peter Sloterdijk to motifs of inclusion and exclusion, contending that whilst his prioritization of dwelling as a central aspect of human existence provides a promising counterpoint to the dislocative and isolative effects of post-industrial capitalism, it is compromised by its dependence upon an anti-cosmopolitan outlook that views cultural distantiation as a natural and preferable state of human affairs, and valorizes a purported ontological (...) attained through defensive postures with respect to perceived foreigners or externalities. Sloterdijk’s conceptualization of culture as a kind of immune system, it is argued, although posited as a rebuke to models of essentialism and ethno-nationalism, provides ontological support to the xenophobic critiques of immigration that are today finding increasing currency. (shrink)
    Download  
     
    Export citation  
     
    Bookmark   6 citations  
  34. Digital Socialism and Cyber-Communism in the Fourth Industrial Revolution.Piero Gayozzo - 2023 - Interfases 18:169-184.
    Socialism is a political ideology that proposes that the state should control the means of production to manage a planned economy. The possibility of realizing this thesis has been debated throughout the 20th century. The Fourth Industrial Revolution (4IR) includes technologies such as artificial intelligence or big data that could reopen the debate through the formulation of new digital models of planned economy. This qualitative research presents some theoretical models proposed in academia to update socialism in the 4IR. It describes (...)
    Download  
     
    Export citation  
     
    Bookmark  
  35. AI Powered Anti-Cyber bullying system using Machine Learning Algorithm of Multinomial Naïve Bayes and Optimized Linear Support Vector Machine.Tosin Ige & Sikiru Adewale - 2022 - International Journal of Advanced Computer Science and Applications 13 (5):1 - 5.
    Unless and until our society recognizes cyber bullying for what it is, the suffering of thousands of silent victims will continue.” ~ Anna Maria Chavez. There had been series of research on cyber bullying which are unable to provide reliable solution to cyber bullying. In this research work, we were able to provide a permanent solution to this by developing a model capable of detecting and intercepting bullying incoming and outgoing messages with 92% accuracy. We also developed (...)
    Download  
     
    Export citation  
     
    Bookmark   5 citations  
  36. Food security as a global public good.Cristian Timmermann - 2020 - In José Luis Vivero-Pol, Tomaso Ferrando, Olivier de Schutter & Ugo Mattei (eds.), Routledge Handbook of Food as a Commons. Routledge. pp. 85-99.
    Food security brings a number of benefits to humanity from which nobody can be excluded and which can be simultaneously enjoyed by all. An economic understanding of the concept sees food security qualify as a global public good. However, there are four other ways of understanding a public good which are worthy of attention. A normative public good is a good from which nobody ought to be excluded. Alternatively, one might acknowledge the benevolent character of a public good. (...)
    Download  
     
    Export citation  
     
    Bookmark  
  37. An Ontology of Security from a Risk Treatment Perspective.Ítalo Oliveira, Tiago Prince Sales, Riccardo Baratella, Mattia Fumagalli & Giancarlo Guizzardi - 2022 - In Ítalo Oliveira, Tiago Prince Sales, Riccardo Baratella, Mattia Fumagalli & Giancarlo Guizzardi (eds.), 41th International Conference, ER 2022, Proceedings. Cham: Springer. pp. 365-379.
    In Risk Management, security issues arise from complex relations among objects and agents, their capabilities and vulnerabilities, the events they are involved in, and the value and risk they ensue to the stakeholders at hand. Further, there are patterns involving these relations that crosscut many domains, ranging from information security to public safety. Understanding and forming a shared conceptualization and vocabulary about these notions and their relations is fundamental for modeling the corresponding scenarios, so that proper security (...)
    Download  
     
    Export citation  
     
    Bookmark  
  38. Economic Security of the Enterprise Within the Conditions of Digital Transformation.Yuliia Samoilenko, Igor Britchenko, Iaroslava Levchenko, Peter Lošonczi, Oleksandr Bilichenko & Olena Bodnar - 2022 - Economic Affairs 67 (04):619-629.
    In the context of the digital economy development, the priority component of the economic security of an enterprise is changing from material to digital, constituting an independent element of enterprise security. The relevance of the present research is driven by the need to solve the issue of modernizing the economic security of the enterprise taking into account the new risks and opportunities of digitalization. The purpose of the academic paper lies in identifying the features of preventing internal (...)
    Download  
     
    Export citation  
     
    Bookmark  
  39. Virtual water and groundwater security.Minh-Hoang Nguyen & Quan-Hoang Vuong - manuscript
    In a recent study by Cai et al. about water shortages in Beijing-Tianjin-Hebei urban areas, virtual water has become the central concept of the groundwater security strategy by suggesting increasing imports of water-intensive agricultural products instead of utilizing the depleted groundwater resources for production. However, despite reviewing the content, we could not see how the authors discussed the households’ economic and financial issues from both production and consumption perspectives.
    Download  
     
    Export citation  
     
    Bookmark  
  40.  84
    Secure and Scalable Data Mining Technique over a Restful Web Services.Solar Francesco & Oliver Smith - forthcoming - International Journal of Research and Innovation in Applied Science.
    Scalability, efficiency, and security had been a persistent problem over the years in data mining, several techniques had been proposed and implemented but none had been able to solve the problem of scalability, efficiency and security from cloud computing. In this research, we solve the problem scalability, efficiency and security in data mining over cloud computing by using a restful web services and combination of different technologies and tools, our model was trained by using different machine learning (...)
    Download  
     
    Export citation  
     
    Bookmark  
  41. Modal Security and Evolutionary Debunking.Daniel Z. Korman & Dustin Locke - 2023 - Midwest Studies in Philosophy 47:135-156.
    According to principles of modal security, evidence undermines a belief only when it calls into question certain purportedly important modal connections between one’s beliefs and the truth (e.g., safety or sensitivity). Justin Clarke-Doane and Dan Baras have advanced such principles with the aim of blocking evolutionary moral debunking arguments. We examine a variety of different principles of modal security, showing that some of these are too strong, failing to accommodate clear cases of undermining, while others are too weak, (...)
    Download  
     
    Export citation  
     
    Bookmark  
  42. Microbiopolitics: Security Mechanisms, the Hela Cell, and The Human Strain.Sean Erwin - 2014 - Humanities and Technology Review 33.
    This paper examines the notion of the biopolitical body from the standpoint of Foucault’s logic of the security mechanism and the history he tells of vaccine technology. It then investigates how the increasing importance of the genetic code for determining the meaning and limits of the human in the field of 20th century cell biology has been a cause for ongoing transformation in the practices that currently extend vaccine research and development. I argue that these transformations mark the emergence (...)
    Download  
     
    Export citation  
     
    Bookmark  
  43. Food security: modern challenges and mechanisms to ensure.Maksym Bezpartochnyi, Igor Britchenko & Olesia Bezpartochna - 2023 - Košice: Vysoká škola bezpečnostného manažérstva v Košiciach.
    The authors of the scientific monograph have come to the conclusion that ensuring food security during martial law requires the use of mechanisms to support agricultural exports, diversify logistics routes, ensure environmental safety, provide financial and marketing support. Basic research focuses on assessment the state of agricultural producers, analysing the financial and accounting system, logistics activities, ensuring competitiveness, and environmental pollution. The research results have been implemented in the different decision-making models during martial law, international logistics management, digital audit, (...)
    Download  
     
    Export citation  
     
    Bookmark  
  44. Securing the Internet of Things: A Study on Machine Learning-Based Solutions for IoT Security and Privacy Challenges.Aziz Ullah Karimy & P. Chandrasekhar Reddy - 2023 - Zkg International 8 (2):30-65.
    The Internet of Things (IoT) is a rapidly growing technology that connects and integrates billions of smart devices, generating vast volumes of data and impacting various aspects of daily life and industrial systems. However, the inherent characteristics of IoT devices, including limited battery life, universal connectivity, resource-constrained design, and mobility, make them highly vulnerable to cybersecurity attacks, which are increasing at an alarming rate. As a result, IoT security and privacy have gained significant research attention, with a particular focus (...)
    Download  
     
    Export citation  
     
    Bookmark  
  45. Birds of a feather flock together: The Nigerian cyber fraudsters (yahoo boys) and hip hop artists.Suleman Lazarus - 2018 - Criminology, Criminal Justice, Law and Society 19 (2):63-80.
    This study sets out to examine the ways Nigerian cyber-fraudsters (Yahoo-Boys) are represented in hip-hop music. The empirical basis of this article is lyrics from 18 hip-hop artists, which were subjected to a directed approach to qualitative content analysis and coded based on the moral disengagement mechanisms proposed by Bandura (1999). While results revealed that the ethics of Yahoo-Boys, as expressed by musicians, embody a range of moral disengagement mechanisms, they also shed light on the motives for the Nigerian (...)
    Download  
     
    Export citation  
     
    Bookmark   9 citations  
  46. Regulate artificial intelligence to avert cyber arms race.Mariarosaria Taddeo & Luciano Floridi - 2018 - Nature 556 (7701):296-298.
    This paper argues that there is an urgent need for an international doctrine for cyberspace skirmishes before they escalate into conventional warfare.
    Download  
     
    Export citation  
     
    Bookmark   21 citations  
  47. Environmental Security and Just Causes for War.Juha Räikkä & Andrei Rodin - 2015 - Almanac: Discourses of Ethics 10 (1):47-54.
    This article asks whether a country that suffers from serious environmental problems caused by another country could have a just cause for a defensive war? Danish philosopher Kasper Lippert-Rasmussen has argued that under certain conditions extreme poverty may give a just cause for a country to defensive war, if that poverty is caused by other countries. This raises the question whether the victims of environmental damages could also have a similar right to self-defense. Although the article concerns justice of war, (...)
    Download  
     
    Export citation  
     
    Bookmark  
  48. The Necessity of Memory for Self-identity: Locke, Hume, Freud and the Cyber-self.Shane J. Ralston - 2000 - Cyberphilosophy Journal 1 (1).
    John Locke is often understood as the inaugurator of the modern discussion of personal human identity—a discussion that inevitably falls back on his own theory with its critical reliance on memory. David Hume and Sigmund Freud would later make arguments for what constituted personal identity, both relying, like Locke, on memory, but parting from Locke's company in respect the role that memory played. The purpose of this paper will be to sketch the groundwork for Locke's own theory of personal identity (...)
    Download  
     
    Export citation  
     
    Bookmark  
  49. Security and the 'war on terror': a roundtable.Julian Baggini, Alex Voorhoeve, Catherine Audard, Saladin Meckled-Garcia & Tony McWalter - 2007 - In Julian Baggini & Jeremy Strangroom (eds.), What More Philosophers Think. Continuum. pp. 19-32.
    What is the appropriate legal response to terrorist threats? This question is discussed by politician Tony McWalter, The Philosophers' Magazine editor Julian Baggini, and philosophers Catherine Audard, Saladin Meckled-Garcia, and Alex Voorhoeve.
    Download  
     
    Export citation  
     
    Bookmark  
  50. Security Institutions, Use of Force and the State: A Moral Framework.Shannon Ford - 2016 - Dissertation, Australian National University
    This thesis examines the key moral principles that should govern decision-making by police and military when using lethal force. To this end, it provides an ethical analysis of the following question: Under what circumstances, if any, is it morally justified for the agents of state-sanctioned security institutions to use lethal force, in particular the police and the military? Recent literature in this area suggests that modern conflicts involve new and unique features that render conventional ways of thinking about the (...)
    Download  
     
    Export citation  
     
    Bookmark  
1 — 50 / 999