[图书][B] Cyber security and the politics of time

T Stevens - 2016 - books.google.com
"'Cyber security'is a recent addition to the global security agenda, concerned with protecting
states and citizens from the misuse of computer networks for war, terrorism, economic …

Governance of the Internet of Things (IOT)

LJ Trautman, MT Hussein, L Ngamassi, MJ Molesky - Jurimetrics, 2020 - JSTOR
Today's increasing rate of technological change results from the rapid growth in computer
processing speed, when combined with the cost decline of processing capacity, and is of …

Reducing systemic cybersecurity risk

P Sommer, I Brown - … and Development Working Paper No. IFP …, 2011 - papers.ssrn.com
This report is part of a broader OECD study into Future Global Shocks, examples of which
could include a further failure of the global financial system and large-scale pandemics. The …

[PDF][PDF] Организационно-экономическое риски внедрения систем информационной безопасности предприятия

ВВ Филатов, ВЮ Мишаков, НП Родинова… - Известия высших …, 2020 - ttp.ivgpu.com
Security of information circulating in the enterprise, and between enterprises and public
institutions is one of the components of information security in particular and national …

Financial and non-financial implications of cybercrimes in emerging countries

M Antonescu, R Birău - Procedia Economics and Finance, 2015 - Elsevier
This article aims to investigate financial and non-financial implications of cybercrimes in
emerging countries. In a globalized world, is very difficult to quantify in a precise manner the …

Between hype and understatement: reassessing cyber risks as a security strategy

A Guinchard - Journal of Strategic Security, 2011 - JSTOR
Most of the actions that fall under the trilogy of cyber crime, terrorism, and war exploit pre-
existing weaknesses in the underlying technology. Because these vulnerabilities that exist in …

The impact of security by design on the success of open source software

G Chehrazi, I Heimbach, O Hinz - 2016 - aisel.aisnet.org
Abstract The Security by Design paradigm–a systematic awareness for and integration of
security during the whole lifecycle of a software product–is claimed to be beneficial. Studies …

[图书][B] Networks, complexity and internet regulation: scale-free law

A Guadamuz - 2011 - elgaronline.com
PSYCHOHISTORY-… Gaal Dornick, using non-mathematical concepts, has defined
psychohistory to be that branch of mathematics which deals with the reactions of human …

Operations in financial services: Processes, technologies, and risks

M Pinedo, Y Xu - Foundations and Trends® in Technology …, 2017 - nowpublishers.com
This monograph is an attempt to establish a framework for Operations in Financial Services
as a research area from an Operations Management perspective. Operations in Financial …

Chapter two: Cyberspace and sovereignty

DJ Betz, T Stevens - Adelphi Series, 2011 - Taylor & Francis
The so-called cyber-threat commands the attention of multinational corporations,
governments and the strategic community, keen as they are to harness the power of digital …