Motives behind cyber security strategy development: a literature review of national cyber security strategy

R Azmi, W Tibben, KT Win - 2016 - ro.uow.edu.au
Defining the factors that give rise to National Cyber Security Strategy (NCSS) has the
potential to better understand information security in a global context. Considering the large …

[HTML][HTML] A non-linear mathematical approach for solving matrix games with picture fuzzy payoffs with application to cyberterrorism attacks

MR Seikh, S Dutta - Decision Analytics Journal, 2024 - Elsevier
Numerous expansions of fuzzy sets have been proposed to manage uncertain information in
real-world problems. Unlike fuzzy sets and intuitionistic fuzzy sets, picture fuzzy sets …

[图书][B] Media and Terrorism in the 21st Century

E Ismayil, E Karadogan Ismayil - 2022 - books.google.com
Media plays a specific role within modern society. It has been and continues to be a tool for
spreading terrorist messages. However, it can just as easily be used as a tool for countering …

El ciberespacio: presupuestos para su ordenación juridico-internacional

MR Carrillo - Revista chilena de Derecho y Ciencia …, 2016 - derechoycienciapolitica.uct.cl
El ciberespacio es un ámbito en el que el avance y el desarrollo tecnológico, imparables en
su velocidad y en su impacto, contrastan con una situación de relativo impasse desde el …

The role of supply chain resilience on IT and cyber disruptions

GG Siciliano, B Gaudenzi - Network, Smart and Open: Three Keywords for …, 2018 - Springer
This study considers two major disruptions for modern supply chains: IT and cyber risks. As
they may significantly impact the business continuity, the service quality, the investor …

IT governance and enterprise security policy in the 6G era

MA Nafchi, ZA Shahraki - Next-Generation Enterprise Security and …, 2022 - taylorfrancis.com
With the complexity of human–machine interactions, the concerns of various users in this
interaction have also increased. In the 6G generation, users are witnessing the introduction …

[图书][B] Next-Generation Enterprise Security and Governance

M Ahmed, N Moustafa, A Barkat, P Haskell-Dowland - 2022 - books.google.com
The Internet is making our daily lives as digital as possible, and this new era is called the
Internet of Everything (IoE). The key force behind the rapid growth of the Internet is the …

Exploring the cyber security improvements needed by internet game users to reduce cyber security threats

JK Vanover - 2018 - search.proquest.com
Cybersecurity plays a vital role in the interconnected world of today. Cybercrime continues to
be a growing problem that has no borders and affects anyone who uses the Internet. The …

Performance of Virtual Terrorism in Cyber Space

F Ejazi - Media and Terrorism in the 21st Century, 2022 - igi-global.com
Abstract In the 1980s, Barry Collin coined the term virtual terrorism. Nowadays virtual
terrorism is very common all over the world. Virtual terrorism threatened computers …

[图书][B] Cross-border infringement of personality rights via the internet: A resolution of the Institute of International Law

SC Symeonides - 2021 - books.google.com
Conflicts of laws arising from injuries to rights of personality—such as defamation or
invasion of privacy—have always been difficult, if only because they implicate conflicting …