[图书][B] Cyber security and the politics of time
T Stevens - 2016 - books.google.com
"'Cyber security'is a recent addition to the global security agenda, concerned with protecting
states and citizens from the misuse of computer networks for war, terrorism, economic …
states and citizens from the misuse of computer networks for war, terrorism, economic …
Governance of the Internet of Things (IOT)
Today's increasing rate of technological change results from the rapid growth in computer
processing speed, when combined with the cost decline of processing capacity, and is of …
processing speed, when combined with the cost decline of processing capacity, and is of …
Reducing systemic cybersecurity risk
P Sommer, I Brown - … and Development Working Paper No. IFP …, 2011 - papers.ssrn.com
This report is part of a broader OECD study into Future Global Shocks, examples of which
could include a further failure of the global financial system and large-scale pandemics. The …
could include a further failure of the global financial system and large-scale pandemics. The …
[PDF][PDF] Организационно-экономическое риски внедрения систем информационной безопасности предприятия
ВВ Филатов, ВЮ Мишаков, НП Родинова… - Известия высших …, 2020 - ttp.ivgpu.com
Security of information circulating in the enterprise, and between enterprises and public
institutions is one of the components of information security in particular and national …
institutions is one of the components of information security in particular and national …
Financial and non-financial implications of cybercrimes in emerging countries
M Antonescu, R Birău - Procedia Economics and Finance, 2015 - Elsevier
This article aims to investigate financial and non-financial implications of cybercrimes in
emerging countries. In a globalized world, is very difficult to quantify in a precise manner the …
emerging countries. In a globalized world, is very difficult to quantify in a precise manner the …
Between hype and understatement: reassessing cyber risks as a security strategy
A Guinchard - Journal of Strategic Security, 2011 - JSTOR
Most of the actions that fall under the trilogy of cyber crime, terrorism, and war exploit pre-
existing weaknesses in the underlying technology. Because these vulnerabilities that exist in …
existing weaknesses in the underlying technology. Because these vulnerabilities that exist in …
The impact of security by design on the success of open source software
G Chehrazi, I Heimbach, O Hinz - 2016 - aisel.aisnet.org
Abstract The Security by Design paradigm–a systematic awareness for and integration of
security during the whole lifecycle of a software product–is claimed to be beneficial. Studies …
security during the whole lifecycle of a software product–is claimed to be beneficial. Studies …
[图书][B] Networks, complexity and internet regulation: scale-free law
A Guadamuz - 2011 - elgaronline.com
PSYCHOHISTORY-… Gaal Dornick, using non-mathematical concepts, has defined
psychohistory to be that branch of mathematics which deals with the reactions of human …
psychohistory to be that branch of mathematics which deals with the reactions of human …
Operations in financial services: Processes, technologies, and risks
This monograph is an attempt to establish a framework for Operations in Financial Services
as a research area from an Operations Management perspective. Operations in Financial …
as a research area from an Operations Management perspective. Operations in Financial …
Chapter two: Cyberspace and sovereignty
DJ Betz, T Stevens - Adelphi Series, 2011 - Taylor & Francis
The so-called cyber-threat commands the attention of multinational corporations,
governments and the strategic community, keen as they are to harness the power of digital …
governments and the strategic community, keen as they are to harness the power of digital …