Resultado de la búsqueda
223 búsqueda de la palabra clave 'Cyber Ethics'
Añadir el resultado a su cesta Refinar búsqueda Generar el feed de búsqueda rss
Enlace permanente de la búsqueda Hacer una sugerencia
documento electrónico
Wong, Ernest ; Porter, Nan ; Hokanson, McKinnon ; Xie, Bing Bing | USMA Digital Commons | 2021-01-17T00:33:15ZIn April of 2007, Estonia fell victim to a series of distributed denial of service (DDoS) attacks that crippled its government websites, email servers, media outlets, and banking system for nearly a month. Due to the devastating effects of these[...]texto impreso
The Nordic region consists of small states eager to cooperate in order to protect its citizens and territory. Since the end of the Cold War, the Nordic states have openly developed a closer cooperation on security and defense policy, and in 2009[...]texto impreso
Salem Center | 2021-01-16T22:05:05ZIn this episode of Cybersecurity Speaker Series, we enjoyed having Monty St John, the Director of Cyber Intelligence at CyberDefenses Inc. Monty talked about the different career opportunities in cyber intelligence and ways that CyberDefenses se[...]documento electrónico
Jerry, Robert H., II ; Mekel, Michele L. | University of Missouri School of Law Scholarship Repository | 2021-01-16T20:53:50ZWith nearly seven percent of the world's population currently online and e-commerce forecast to hit $6.8 trillion by 2004, one need not be Nostradamus to predict that the Internet means great change for all industries - including the insuran[...]texto impreso
Palop Belloch, Melania | 2021-01-16T20:37:58ZIn this paper, we try to analyze the response of the various existing provisions in the Criminal Code against gender violence produced by cyberbullying. We do it by reviewing the literature and analyzing the Criminal Code where we notice a lack [...]documento electrónico
Fidler, David P. ; Pregent, Richard ; Vandurme, Alex | Digital Repository @ Maurer Law | 2021-01-16T20:42:19ZCybersecurity threats pose challenges to individuals, corporations, states, and intergovernmental organizations. The emergence of these threats also presents international cooperation on security with difficult tasks. This essay analyzes how cyb[...]texto impreso
Li, Xingan | 2021-01-17T00:33:58ZSince the advent of the network era, different countries adopted different stance on maintaining social order in cyber space; soft, strong, or medium. In China, as in some other countries in the same group, a tough approach has been taken from t[...]texto impreso
War as a social construct of dominating others to achieve ones interest at the expense of otherin a competitive global community is an enigma to resolve in the discourse of InternationalHumanitarian Law. Thus, the salience of the transformations[...]texto impreso
Van Breda, Leanne Christine | 2021-01-17T00:34:40ZLL.M. (International Law) Please refer to full text to view abstract.texto impreso
Bircher, IV, John E | 2021-01-17T04:04:27ZAs the global environment becomes increasingly volatile, uncertain, complex, and ambiguous, the military must transform the manner in which it develops, manages, coordinates, synchronizes, and employs capabilities to create effects in cyberspace[...]texto impreso
The main goal of this bachelor thesis is to provide brief description of contemporary situation in the field of cyber security and the role of national CERT team in it according to the newly adopted Law no. 181/2014 Coll., on Cyber Security and [...]documento electrónico
This response to a keynote speech by Judge Margaret McKeown explores some dimensions of copyright in addition to its dominant function as a set of market-facilitating exclusive rights. The recent possible trend towards protecting privacy and oth[...]documento electrónico
The aim of this study is to explore the factors influencing students’ academic achievements in secondary school level (grades 09 and 10). Those factors include students’ self-reported psychological and issues (e.g. being bullied through social m[...]texto impreso
Jin Lei Wang ; Yafeng Li ; Aimin An | The Institution of Engineering and Technology | 2021-01-17T00:54:49ZTo solve the problem of uncertain parameters in dynamic modelling of upper-limb rehabilitation robots, a dynamic parameter identification method based on variable parameters particle swarm optimisation (PSO) is developed. Based on the dynamic mo[...]