Journal articles on the topic 'Cyber-FIT'

To see the other types of publications on this topic, follow the link: Cyber-FIT.

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the top 50 journal articles for your research on the topic 'Cyber-FIT.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.

1

Watkins, Laura E., Rosalita C. Maldonado, and David DiLillo. "The Cyber Aggression in Relationships Scale: A New Multidimensional Measure of Technology-Based Intimate Partner Aggression." Assessment 25, no. 5 (September 2, 2016): 608–26. http://dx.doi.org/10.1177/1073191116665696.

Full text
Abstract:
The purpose of this study was to develop and provide initial validation for a measure of adult cyber intimate partner aggression (IPA): the Cyber Aggression in Relationships Scale (CARS). Drawing on recent conceptual models of cyber IPA, items from previous research exploring general cyber aggression and cyber IPA were modified and new items were generated for inclusion in the CARS. Two samples of adults 18 years or older were recruited online. We used item factor analysis to test the factor structure, model fit, and invariance of the measure structure across women and men. Results confirmed that three-factor models for both perpetration and victimization demonstrated good model fit, and that, in general, the CARS measures partner cyber aggression similarly for women and men. The CARS also demonstrated validity through significant associations with in-person IPA, trait anger, and jealousy. Findings suggest the CARS is a useful tool for assessing cyber IPA in both research and clinical settings.
APA, Harvard, Vancouver, ISO, and other styles
2

Ntingi, Nombeko, Petrus Duvenage, Jaco Du Toit, and Sebastian Von Solms. "Effective Cyber Threat Hunting: Where and how does it fit?" European Conference on Cyber Warfare and Security 21, no. 1 (June 8, 2022): 206–13. http://dx.doi.org/10.34190/eccws.21.1.240.

Full text
Abstract:
Traditionally threat detection in organisations is reactive through pre-defined and preconfigured rules that are embedded in automated tools such as firewalls, anti-virus software, security information and event management (SIEMs) and intrusion detection systems/intrusion prevention systems (IDS/IPS). As the fourth industrial revolution (4IR) brings with it an exponential increase in technological advances and global interconnectivity, the cyberspace presents security risks and threats the scale of which is unprecedented. These security risks and threats have the potential of exposing confidential information, damaging the reputation of credible organisations and/or inflicting harm. The regular occurrence and complexity of cyber intrusions makes the guarding enterprise and government networks a daunting task. Nation states and businesses need to be ingenious and consider innovative and proactive means of safeguarding their valuable assets. The growth of technological, physical and biological worlds necessitates the adoption of a proactive approach towards safeguarding cyber space. This paper centers on cyber threat hunting (CTH) as one such proactive and important measure that can be adopted. The paper has a central contention that effective CTH cannot be an autonomous ‘plug in’ or a standalone intervention. To be effective CTH has to be synergistically integrated with relevant existing fields and practices. Academic work on such conceptual integration of where CTH fits is scarce. Within the confines of the paper we do not attempt to integrate CTH with many of the various relevant fields and practices. Instead, we limit the scope to postulations on CTH’s interface with two fields of central importance in cyber security, namely Cyber Counterintelligence (CCI) and Cyber Threat Monitoring and Analysis (CTMA). The paper’s corresponding two primary objectives are to position CTH within the broader field of CCI and further contextualise CTH within the CTMA domain. The postulations we advanced are qualified as tentative, exploratory work to be expanded on. The paper concludes with observations on further research.
APA, Harvard, Vancouver, ISO, and other styles
3

Yaokumah, Winfred. "Development and Psychometric Analysis of Cyber Ethics Instrument (CEI)." International Journal of Technoethics 12, no. 1 (January 2021): 54–74. http://dx.doi.org/10.4018/ijt.2021010104.

Full text
Abstract:
This study developed and validated the psychometric properties of a new instrument, cyber ethics instrument (CEI), for assessing cyber ethics. Items related to cyber ethics were generated from a review of both scholarly and practitioner literature for the development of the instrument. The instrument was administered to university students. A sample of 503 responses was used for exploratory factor analysis (EFA) to extract the factor structure. The results of EFA suggested a six-factor structure (cyber privacy, computer ethics, academic integrity, intellectual property, netiquette, cyber safety), explaining 67.7% of the total variance. The results of confirmatory factor analysis (CFA) showed acceptable model fit indices. Therefore, the results established the viability of CEI for measuring cyber ethics. The instrument is essential for advancing the field of cyber ethics research as it will serve as a tool educators and researchers can use to measure the current stage of cyber ethics. The results obtained from using CEI can help identify and recommend cyber ethics interventions.
APA, Harvard, Vancouver, ISO, and other styles
4

Effendy, Faried, Eto Wuryanto, and Livia Felisia Marentina. "Penerapan Model Technology-to-Performance Chain pada Cyber Campus." Jurnal Edukasi dan Penelitian Informatika (JEPIN) 5, no. 2 (August 6, 2019): 176. http://dx.doi.org/10.26418/jp.v5i2.32684.

Full text
Abstract:
Model Technology to Performance Chain (TPC) merupakan suatu model komprehensif dari dua hal yang komplementer yaitu: sikap pengguna sebagai prediktor utilisasi atau pemanfaatan dan Task Technology Fit sebagai prediktor kinerja. Penelitian ini bertujuan untuk mengidentifikasi pengaruh antar variabel dari model TPC terhadap lingkungan Cyber Campus serta memberikan rekomendasi atau saran untuk peningkatan kualitas Cyber Campus. Pengolahan data menggunakan metode PLS-SEM dengan menggunakan responden 100 mahasiswa pengguna Cyber Campus. Dari hasil penelitian didapatkan 6 hipotesis diterima dan 2 hipotesis ditolak. Rekomendasi yang disarankan agar penggunaan Cyber Campus dapat meningkat adalah dengan pemberdayaan fitur yang sudah ada dan peningkatan layanan Helpdesk.
APA, Harvard, Vancouver, ISO, and other styles
5

Yılmaz Bingöl, Tuğba. "Determining The Predictors of Self-Efficacy and Cyber Bullying." International Journal of Higher Education 7, no. 2 (March 23, 2018): 138. http://dx.doi.org/10.5430/ijhe.v7n2p138.

Full text
Abstract:
In this study, it was aimed to determine the variables affecting self-efficacy and cyber bullying. The participants of the study were 223 high school students. The data was collected through the use of self-administered questionnaires which were the General Self-efficacy Scale, the Gratitude Scale, the Early Memories of Warmth and Safeness Scale and the Revised Cyber Bullying Inventory. Results of structural equation modeling analysis revealed that self-efficacy was affected by early memories of warmth and safeness and cyber bullying was affected by being a cyber victim. All goodness of fit indices of the model in this study was satisfactory. The results of the study demonstrated the importance of early memories of warmth in improving self-efficacy and preventing cyber victimization is effective in decreasing cyber bullying.
APA, Harvard, Vancouver, ISO, and other styles
6

Niki, O’Brien, Ghafur Saira, Sivaramakrishnan Arvind, and Durkin Mike. "Cyber-attacks are a permanent and substantial threat to health systems: Education must reflect that." DIGITAL HEALTH 8 (January 2022): 205520762211046. http://dx.doi.org/10.1177/20552076221104665.

Full text
Abstract:
Cyber-attacks on healthcare institutions have increased in recent years and have made headlines through the COVID-19 pandemic. With the fallout of attacks increasingly reported in academic research and in the media, there is a real urgency to address cyber-threats that must be augmented across and within health systems. Until now, clinical healthcare professionals have considered cyber-attacks on healthcare organisations a predominantly information and communication technology issue, but this perception is no longer fit-for-purpose. This commentary provides insights into the scale of cyber-attacks and their impact on staff wellbeing, arguing that cybersecurity education for all staff in healthcare organisations must be improved through online resources, simulation, and gaming. The role of national educators, policymakers, and multilateral organisations in achieving this is outlined alongside implications for future policy and practice.
APA, Harvard, Vancouver, ISO, and other styles
7

Slack, Chelsey, and Neil Robinson. "Co-operation: A Key to NATO’s Cyberspace Endeavour." European Foreign Affairs Review 24, Issue 2 (May 1, 2019): 154–66. http://dx.doi.org/10.54648/eerr2019010.

Full text
Abstract:
For nearly seventy years, NATO has been used as a forum for its Allies to consult, co-operate, and act on the decisions taken collectively for the benefit of their security and defence. Against the backdrop of a rapidly evolving cyber threat landscape, the Alliance has taken a number of steps in recent years to bolster its cyber defences, recognizing that cyber defence forms a part of NATO’s core task of collective defence. This article will shed light on NATO’s approach to cultivating co-operation on cyber defence – among Allies but also with a broad partnership network of countries, international organizations, industry and academia. Specific initiatives that are being pursued by the Allies to support NATO’s broader deterrence and defence, enhance national cyber resilience, and collaborate with partners in a spirit of co-operative security will be explored. In the end, these activities contribute to ensuring thatNATOcontinues to adapt and remain fit for purpose as a platform for consultation and action on collective security in the digital age.
APA, Harvard, Vancouver, ISO, and other styles
8

Mohammadi, Fazel. "Emerging Challenges in Smart Grid Cybersecurity Enhancement: A Review." Energies 14, no. 5 (March 3, 2021): 1380. http://dx.doi.org/10.3390/en14051380.

Full text
Abstract:
In this paper, a brief survey of measurable factors affecting the adoption of cybersecurity enhancement methods in the smart grid is provided. From a practical point of view, it is a key point to determine to what degree the cyber resilience of power systems can be improved using cost-effective resilience enhancement methods. Numerous attempts have been made to the vital resilience of the smart grid against cyber-attacks. The recently proposed cybersecurity methods are considered in this paper, and their accuracies, computational time, and robustness against external factors in detecting and identifying False Data Injection (FDI) attacks are evaluated. There is no all-inclusive solution to fit all power systems requirements. Therefore, the recently proposed cyber-attack detection and identification methods are quantitatively compared and discussed.
APA, Harvard, Vancouver, ISO, and other styles
9

Pinko, Eyal. "Maritime Cyber Threats and Challenges." National security and the future 20, no. 1-2 (January 9, 2020): 63–70. http://dx.doi.org/10.37458/nstf.20.1-2.7.

Full text
Abstract:
The maritime trade becomes crucial for countries' economy, security and sovereignty. Side by side to the growth of shipping, the vessels themselves and the sea-ports become more and more sophisticated, advanced and controlled by computerized and automated systems. Most of the maritime industry companies (from sea ports to shipping companies) are not ready and protected enough against cyber-attacks. Furthermore, there are no world regulation for the maritime industry yet, although the IMO (International Maritime Organization) is working on regulation that will fit the maritime industry, focusing on vessels. The IMO regulation is expecting to be implemented during 2021.
APA, Harvard, Vancouver, ISO, and other styles
10

Leslie, Nandi O., Richard E. Harang, Lawrence P. Knachel, and Alexander Kott. "Statistical models for the number of successful cyber intrusions." Journal of Defense Modeling and Simulation: Applications, Methodology, Technology 15, no. 1 (June 30, 2017): 49–63. http://dx.doi.org/10.1177/1548512917715342.

Full text
Abstract:
We propose several generalized linear models (GLMs) to predict the number of successful cyber intrusions (or “intrusions”) into an organization’s computer network, where the rate at which intrusions occur is a function of the following observable characteristics of the organization: (i) domain name system (DNS) traffic classified by their top-level domains (TLDs); (ii) the number of network security policy violations; and (iii) a set of predictors that we collectively call the “cyber footprint” that is comprised of the number of hosts on the organization’s network, the organization’s similarity to educational institution behavior, and its number of records on scholar.google.com . In addition, we evaluate the number of intrusions to determine whether these events follow a Poisson or negative binomial (NB) probability distribution. We reveal that the NB GLM provides the best fit model for the observed count data, number of intrusions per organization, because the NB model allows the variance of the count data to exceed the mean. We also show that there are restricted and simpler NB regression models that omit selected predictors and improve the goodness-of-fit of the NB GLM for the observed data. With our model simulations, we identify certain TLDs in the DNS traffic as having a significant impact on the number of intrusions. In addition, we use the models and regression results to conclude that the number of network security policy violations is consistently predictive of the number of intrusions.
APA, Harvard, Vancouver, ISO, and other styles
11

Farrell, Albert D., Erin L. Thompson, Krista R. Mehari, Terri N. Sullivan, and Elizabeth A. Goncy. "Assessment of In-Person and Cyber Aggression and Victimization, Substance Use, and Delinquent Behavior During Early Adolescence." Assessment 27, no. 6 (August 3, 2018): 1213–29. http://dx.doi.org/10.1177/1073191118792089.

Full text
Abstract:
This study evaluated the Problem Behavior Frequency Scale–Adolescent Report (PBFS-AR), a measure designed to assess adolescents’ frequency of victimization, aggression, substance use, and delinquent behavior. Participants were 1,263 students (50% female; 78% African American, 18% Latino) from three urban middle schools in the United States. Confirmatory factor analyses of competing models of the structure of the PBFS-AR supported a model that differentiated among three forms of aggression (in-person physical, in-person relational, and cyber), two forms of victimization (in-person and cyber), substance use, and delinquent behavior. This seven-factor model fit the data well and demonstrated strong measurement invariance across groups that differed on sex and grade. Support was found for concurrent validity of the PBFS-AR based on its pattern of relations with school office discipline referrals.
APA, Harvard, Vancouver, ISO, and other styles
12

Alismaiel, Omar A. "Digital Media Used in Education: The Influence on Cyberbullying Behaviors among Youth Students." International Journal of Environmental Research and Public Health 20, no. 2 (January 12, 2023): 1370. http://dx.doi.org/10.3390/ijerph20021370.

Full text
Abstract:
Students, colleagues, and other members of society are increasingly using digital media. Students utilize digital media for a variety of reasons, including communication, gaming, making new friends, and simply being curious. However, there are some disadvantages to using digital media. Cyberbullying, cyberharassment, and cyberstalking are examples of useful digital media activities that can have a negative impact on digital media users and lead to societal issues. Surprisingly, limited studies have investigated cyberbullying in depth, utilizing a broad and varied sample of Middle Eastern institutions. As a result, the purpose of this study is to fill a research vacuum by questioning students’ use of digital media for cyber involvement. This research aims to create a model for assessing the ethical consequences of behaviors that directly impact students’ psychological health because of their use of digital media. The questionnaire looked at how people used digital media to engage in cyberbullying and cyber engagement, the ethical implications of bullying, and being harassed, stalked, and bullied. The study employed a quantitative questionnaire to collect data to achieve the research goal. It was given to 1012 students who are digital media users. Partial least squares (PLS) and structural equation modeling (SEM) were used to examine the data. Considering the empirical data, nearly half of the participants admitted to being harassed, stalked, or bullied on different digital platforms. The evaluation of discriminant validity is a prerequisite factor for examining possible variables’ relationships. The goodness-of-fit index indicates that the model is well-fit. Through the established model, decision-makers and school administration would be able to implement measures that would effectively reduce cyber harassment among students and improve the digital media usage experience.
APA, Harvard, Vancouver, ISO, and other styles
13

Aderibigbe, Nurudeen, Dennis Ocholla, and Johannes Britz. "Differences in Ethical Cyber Behavioural Intention of Nigerian and South African Students: A Multi-Group Analysis Based on the Theory of Planned Behaviour." Libri 71, no. 4 (October 20, 2021): 389–406. http://dx.doi.org/10.1515/libri-2019-0062.

Full text
Abstract:
Abstract Cybertechnology has become a fundamental part of educational institutions, with the student’s routine to use these technologies to communicate, learn and play, causing a need for understanding the impact and general principles of ethical computer use in academia. However, the practice of cyberethics in these environments has presented many challenges for the institutions. This study, based on the theory of planned behaviour, examined the differences in ethical cyber behavioural intention of Nigerian and South African students using a multi-group analysis. The study adopted a survey research design– structured questionnaires were randomly distributed among students of two purposively selected universities, one in South Africa and the other Nigeria. Structural equation modelling was employed to test the proposed model fit. Overall, 450 undergraduate students participated in the survey; 343 respondents completed and returned the questionnaire, resulting in a response rate of 76.2%. The subjective norm was found to be statistically significant in influencing students’ ethical cyber behavioural intention with cyber technologies. The study contributes to the extant literature on the application of the Theory of Planned Behaviour (TPB). The originality and value of this study can be viewed from the application of a socio-psychology theory to determine ethical cyber behavioural intention in relation to cybertechnology, which provides further evidence that the TPB can be applied to cyberethics research. Moreover, to the best of authors’ knowledge, this is a pioneer study that comprehensively examines the linkage of components of TPB with ethical cyber behavioural intention in joint samples from South Africa and Nigeria.
APA, Harvard, Vancouver, ISO, and other styles
14

Lara, Laura. "Cyber dating abuse: Assessment, prevalence, and relationship with offline violence in young Chileans." Journal of Social and Personal Relationships 37, no. 5 (February 27, 2020): 1681–99. http://dx.doi.org/10.1177/0265407520907159.

Full text
Abstract:
The aims of the present study were to (1) adapt and validate the Cyber Dating Abuse Questionnaire (CDAQ) for young Chileans and (2) provide data on the prevalence of cyber dating abuse in young Chileans. As a sample, 1,538 Chilean high school and university students (14–24 years old) participated in the study (59.8% females). Results showed that the CDAQ had an adequate fit with the original correlated four-factor model as well as with a second-order factor model that considered the four scales as primary factors of two secondary factors: victimization (control and aggression from the victimization perspective) and perpetration (control and aggression from the perpetrator’s perspective). Reliability analysis also showed that the questionnaire presented satisfactory values for internal consistency. Scores on the CDAQ were positively correlated with traditional forms of assessing dating violence, providing new evidences of validity. Prevalence data showed cyber dating behaviors are common practices among young Chileans, with around three quarters of that population reporting being victims or aggressors. Finally, prevalence of control (around 72% for both perspectives) was higher than direct aggression (34.4% for victimization and 27% for direct aggression).
APA, Harvard, Vancouver, ISO, and other styles
15

Görzig, Anke, Tijana Milosevic, and Elisabeth Staksrud. "Cyberbullying Victimization in Context: The Role of Social Inequalities in Countries and Regions." Journal of Cross-Cultural Psychology 48, no. 8 (August 18, 2017): 1198–215. http://dx.doi.org/10.1177/0022022116686186.

Full text
Abstract:
The phenomenon of cyberbullying is gaining ever more attention by media and policy makers in many countries. Theoretical frameworks using a socio-ecological approach emphasize the importance of contextual explanatory factors located at the societal level. It has been suggested that in addition to cross-national differences, the analysis of smaller units of more adjacent cultural contexts (i.e., regions) might yield more explanatory power. Leaning on previous findings and theory, the current article aims to identify and compare contextual explanatory factors associated with social inequality (i.e., crime rates, gross domestic product [GDP], life expectancy, and population density) for variation in cyber- and face-to-face bullying victimization rates within one sample. Moreover, corresponding explanatory factors are investigated across national and regional levels. Cyber- and face-to-face bullying victimization of 15,813 nine- to sixteen-year-olds (50% female) from the cross-national survey data of EU Kids Online were linked with contextual variables of 18 countries and 179 regions obtained from data of the European Social Survey (ESS). Hierarchical multilevel-modeling analyses, adding first regional and then country-level contextual predictors for bullying victimization, were performed. Against expectations, differences for cyber- and face-to-face victimization between regions within countries were smaller than differences between countries. Regional-level life expectancy showed a negative and crime rates showed a marginal positive relation with both cyber- and face-to-face victimization. Population density showed a negative and GDP a positive relationship with cyber- but not face-to-face victimization. Adding the same predictors on the country level did not improve model fit. Possible research and policy implications are discussed.
APA, Harvard, Vancouver, ISO, and other styles
16

Brants, Chrisje, Adam Jackson, and Tim J. Wilson. "A Comparative Analysis of Anglo-Dutch Approaches to ‘Cyber Policing’: Checks and Balances Fit for Purpose?" Journal of Criminal Law 84, no. 5 (October 2020): 451–73. http://dx.doi.org/10.1177/0022018320952561.

Full text
Abstract:
This article examines two contrasting approaches to the governance of police investigations for ensuring that cybercrime-policing is lawful and ethical. The Netherlands has a national police force working under the direction of an equally centralised prosecution service according to specific laws on the use of special powers of surveillance, with evidence tested judicially when added incrementally to the case file. Theoretically, the process of adapting to the novel features of cybercrime policing should be much easier than within the much more fragmented policing structure in England and Wales, where unreliable evidence is challengeable only at the trial stage and the laws governing police action are equally fragmented. The Dutch police, however, have not found it easy to adapt concepts of covert policing developed in the 1990’s to their on-line investigative activities, despite the existence of comparatively detailed guidance and case law for undercover policing in the ‘real’ world. In the UK, the police seem unsure which requirements and concepts actually apply to their different on-line-investigations. More generally, it is concluded that legal comparisons of the kind undertaken in this article can identify general bottlenecks and barriers to adapting to the cyber environment, but such analysis cannot identify best practices that are readily transferable from one country to another. Legal transplants are a potentially hazardous undertaking because any practices and policies that work successfully will do so because they are necessarily compliant with the underlying systemic legal-cultural factors that make each legal system unique. Indeed, we make no attempt to identify best practices, other than to remark that the centralised nature of Dutch policing seems to afford some advantage, although, for historical and legal-cultural reasons, centralisation is unlikely to be an option for the UK police forces
APA, Harvard, Vancouver, ISO, and other styles
17

Ricaforte, Lhuillier B. "Social Media Exposure and Usage of Cyber Slang: Bases in Examining the Academic Writing Conventions of the Students." Shanti Journal 1, no. 1 (August 31, 2022): 229–54. http://dx.doi.org/10.3126/shantij.v1i1.47906.

Full text
Abstract:
The study established the relation of social media exposure and cyber slang usage towards the academic writing conventions of the Grade ten students of Kumalarang National High School, Kumalarang Zamboanga del Sur, Philippines. The study has been conducted in the second semester of the school year 2020-2021 and has utilized the descriptive statistics such as percentage, weighted mean as a measure of average, and standard deviation as a measure of variability of numerical observations in order to determine the levels of the students’ exposure to social media, cyber slang, and academic writing conventions. Fifty (50) respondents coming from the aforementioned grade have been distributed with online survey questionnaires based on the concept of several references related to this study. The study found that the Grade 10 students of Kumalarang National High School held the high level of exposure in social media, and usage of cyber slang in social media; and their overall writing convention has a descriptive equivalent of average. The results of the study justified the following; there is no significant relationship between students’ social media exposure and cyber slang usage, there is no significant relationship between exposure to social media and students’ academic writing conventions, and there is no significant relationship between cyber slang usage and students’ academic writing conventions. The result of the study also signified that even if the students are exposed to social media, yet their use of cyber slang is still controlled. The more they used cyber slang in social media, their academic writing conventions will also increase. Further, the results of the study implied that social media exposure contributes a lot to students’ academic writing conventions. Besides it supplied notable entertainment, this can also be a communication channel at their most convenient time, pace and location that teachers cannot afford to overlook. The possibilities to acquire learning with variety of data in social media has reinforced and influenced students’ academic writing conventions. Even if cyber slang is already part of human’s lives in the modern century, yet this will academically challenge the students to decide as to what form of writing they are going to use in order to fit in the requirements both in school and in the community. With this, students must know how to set limit as to when and when not to use them. By knowing this fact, they may widen their competency in the field of writing without sacrificing the English language. This will also allow them to establish their voice in writing.
APA, Harvard, Vancouver, ISO, and other styles
18

Eichensehr, Kristen E. "Ukraine, Cyberattacks, and the Lessons for International Law." AJIL Unbound 116 (2022): 145–49. http://dx.doi.org/10.1017/aju.2022.20.

Full text
Abstract:
Russia's invasion of Ukraine has put to the test theories about how cyberattacks fit into conventional war. Contrary to many expectations, cyber operations appear to have played only a limited role in the initial stages of the invasion, prompting competing theories and rampant speculation about why. Although written while the conflict continues, this essay considers how either of two broad explanations for the limited role of cyberattacks to date—that Russia's attempted cyberattacks were thwarted or that Russia chose not to deploy them widely—challenges conventional wisdom about cybersecurity. The essay concludes by suggesting that one lesson international lawyers should draw from the current conflict is the urgent need to clarify and enforce international rules not just for the rare high-end destructive or widely disruptive cyber operations, but also for lower-level operations that have proven more consistently problematic, both in Ukraine and elsewhere. Clarifying such rules could help to manage escalation risk now and in the future, even if such rules—like the most venerable international law prohibitions that Russia's invasion has violated—do not necessarily restrain behavior directly.
APA, Harvard, Vancouver, ISO, and other styles
19

Sjursø, Ida Risanger, Hildegunn Fandrem, James O’Higgins Norman, and Erling Roland. "Teacher Authority in Long-Lasting Cases of Bullying: A Qualitative Study from Norway and Ireland." International Journal of Environmental Research and Public Health 16, no. 7 (March 31, 2019): 1163. http://dx.doi.org/10.3390/ijerph16071163.

Full text
Abstract:
A growing body of research shows a correlation between an authoritative school climate and lower levels of bullying. One objective of this study is to conceptualize authoritative intervention in bullying cases. A second goal is to explore whether, and how, the pupils, having experienced traditional and /or cyber victimization, perceive that the class teacher is demonstrating authoritative leadership when intervening in long-lasting cases of bullying. Class teacher refers to the teacher that has a special responsibility for the class. The article presents the findings from nine semi-structured interviews with four Irish and five Norwegian pupils. The informants were between 12 to 18 years of age and had experienced either traditional victimization or both traditional and cyber victimization for 1 to 7 years. The informants were selected because their cases had been reported as resolved. The findings showed no descriptions of the class teacher that appeared to fit with the authoritative style of leadership, both high on warmth and control. The possible practical implications of these findings are discussed.
APA, Harvard, Vancouver, ISO, and other styles
20

Agarwal, Nitin, Sean Andrist, Dan Bohus, Fei Fang, Laurie Fenstermacher, Lalana Kagal, Takashi Kido, et al. "Reports on the 2015 AAAI Spring Symposium Series." AI Magazine 36, no. 3 (September 28, 2015): 113–19. http://dx.doi.org/10.1609/aimag.v36i3.2608.

Full text
Abstract:
The AAAI 2015 Spring Symposium Series was held Monday through Wednesday, March 23-25, at Stanford University near Palo Alto, California. The titles of the seven symposia were Ambient Intelligence for Health and Cognitive Enhancement, Applied Computational Game Theory, Foundations of Autonomy and Its (Cyber) Threats: From Individuals to Interdependence, Knowledge Representation and Reasoning: Integrating Symbolic and Neural Approaches, Logical Formalizations of Commonsense Reasoning, Socio-Technical Behavior Mining: From Data to Decisions, Structured Data for Humanitarian Technologies: Perfect Fit or Overkill? and Turn-Taking and Coordination in Human-Machine Interaction.The highlights of each symposium are presented in this report.
APA, Harvard, Vancouver, ISO, and other styles
21

Liu, Hongyu, and Bo Lang. "Machine Learning and Deep Learning Methods for Intrusion Detection Systems: A Survey." Applied Sciences 9, no. 20 (October 17, 2019): 4396. http://dx.doi.org/10.3390/app9204396.

Full text
Abstract:
Networks play important roles in modern life, and cyber security has become a vital research area. An intrusion detection system (IDS) which is an important cyber security technique, monitors the state of software and hardware running in the network. Despite decades of development, existing IDSs still face challenges in improving the detection accuracy, reducing the false alarm rate and detecting unknown attacks. To solve the above problems, many researchers have focused on developing IDSs that capitalize on machine learning methods. Machine learning methods can automatically discover the essential differences between normal data and abnormal data with high accuracy. In addition, machine learning methods have strong generalizability, so they are also able to detect unknown attacks. Deep learning is a branch of machine learning, whose performance is remarkable and has become a research hotspot. This survey proposes a taxonomy of IDS that takes data objects as the main dimension to classify and summarize machine learning-based and deep learning-based IDS literature. We believe that this type of taxonomy framework is fit for cyber security researchers. The survey first clarifies the concept and taxonomy of IDSs. Then, the machine learning algorithms frequently used in IDSs, metrics, and benchmark datasets are introduced. Next, combined with the representative literature, we take the proposed taxonomic system as a baseline and explain how to solve key IDS issues with machine learning and deep learning techniques. Finally, challenges and future developments are discussed by reviewing recent representative studies.
APA, Harvard, Vancouver, ISO, and other styles
22

Sohn, Hee-jeong. "Strange Passion: Gore Masculinity in the Digital Age." Sookmyung Research Institute of Humanities 12 (October 31, 2022): 57–83. http://dx.doi.org/10.37123/th.2022.12.57.

Full text
Abstract:
In 2022, the cyber hell unfolds in South Korea. In a situation where the web hard cartel and welcome to video cases could not be properly resolved, a network of Nth Room Case-Digital Prison-Illegal Gambling Site was formed. Along with this, Hacklers and cybe-wreckers are indiscriminately making money by making sacrifices for people. This is also in line with the generational change of the gangster culture. This essay analyzes the political and economic background that led to the opening of this ‘cyber hell’ and the problem of subjectivity formed therein. To this end, it borrows Sayak Valencia's concept of gore capitalism and names the system in which violence becomes a mode of accumulating wealth in the digital media field as digital gore capitalism, and the masculinity formed as Gore Masculinity. In this case, gore masculinity refers to the concept of appropriating the subject of Endriago in Valencia's assertion to fit the Korean situation, and it refers to the use of marginalized masculinity as a resource while justifying violence. The key here is that there are consumers who consume violence, and there is an online misogyny culture at the birth of such consumers. Finally, this paper introduces the discussion of Trans Feminism as an alternative ethics to gore masculinity.
APA, Harvard, Vancouver, ISO, and other styles
23

Mitra, Amit, and Nicholas O’Regan. "Creative Leadership Within the Cyber asset Market: An Interview With Dame Inga Beale." Journal of Management Inquiry 29, no. 1 (February 21, 2019): 51–58. http://dx.doi.org/10.1177/1056492619828837.

Full text
Abstract:
This interview with Dame Inga Beale, one of the most distinguished corporate leaders in the United Kingdom, explores her ideas around creative leadership of Lloyd’s of London in the cyber asset market. Uniqueness of Beale’s approach stems from the deep-seated social purpose of insurance to support development of trust in a complex asset management cyberspace. Beale’s collaborative approach to dealing with risk in a digitally connected asset market is exclusive in its ethos. At a time when digital assets are threatened by cyberattacks and losses that are many times in magnitude in comparison with those of natural calamities, Beale’s innovative leadership is likely to fit in with a boundary-less online context. Beale’s enunciation of leadership aspirations for Lloyd’s has striking similarities with recent research on digital transformation of organizations and provides a practical articulation of collaborative trust building within the insurance market and beyond.
APA, Harvard, Vancouver, ISO, and other styles
24

Monedero, Íñigo, Julio Barbancho, Rafael Márquez, and Juan F. Beltrán. "Cyber-Physical System for Environmental Monitoring Based on Deep Learning." Sensors 21, no. 11 (May 24, 2021): 3655. http://dx.doi.org/10.3390/s21113655.

Full text
Abstract:
Cyber-physical systems (CPS) constitute a promising paradigm that could fit various applications. Monitoring based on the Internet of Things (IoT) has become a research area with new challenges in which to extract valuable information. This paper proposes a deep learning classification sound system for execution over CPS. This system is based on convolutional neural networks (CNNs) and is focused on the different types of vocalization of two species of anurans. CNNs, in conjunction with the use of mel-spectrograms for sounds, are shown to be an adequate tool for the classification of environmental sounds. The classification results obtained are excellent (97.53% overall accuracy) and can be considered a very promising use of the system for classifying other biological acoustic targets as well as analyzing biodiversity indices in the natural environment. The paper concludes by observing that the execution of this type of CNN, involving low-cost and reduced computing resources, are feasible for monitoring extensive natural areas. The use of CPS enables flexible and dynamic configuration and deployment of new CNN updates over remote IoT nodes.
APA, Harvard, Vancouver, ISO, and other styles
25

Arsene, Camelia Gabriela, and George Constantin. "Industry 4.0: Key Questions in Manufacturing." MATEC Web of Conferences 290 (2019): 02003. http://dx.doi.org/10.1051/matecconf/201929002003.

Full text
Abstract:
The actual industrial revolution is bringing multiple opportunities of increased productivity through Cyber-Physical Systems, better cost control and decision making through Digitization and improved data communication chain through IoT. However, finding the best fit within Industry 4.0 context and writing the business case to support massive investments is not an easy task considering the organisations and the environment dynamics. The risk of disruptive implementation may be also high and involving massive implications. The paper proposes to highlight in a structured way . top-down approach . the key questions to address as an organization when leaving the awareness phase and preparing the implementation. This is a cross-industry study, covering as well different patterns: make to stock, make to order, engineering to order.
APA, Harvard, Vancouver, ISO, and other styles
26

Beggs, Christopher, and Ryan McGowan. "Fostering SCADA and IT Relationships." International Journal of Cyber Warfare and Terrorism 1, no. 3 (July 2011): 1–11. http://dx.doi.org/10.4018/ijcwt.2011070101.

Full text
Abstract:
In recent years, critical infrastructure utilities have been faced with conflicting attitudes and cultural differences of where SCADA (Supervisory Control and Data Acquisition) and IT fit into an organizational structure. This lack of understanding between SCADA, IT processes, and business operations remains a concern for many utilities within the SCADA community. The importance of SCADA and IT relationships is an area of the SCADA landscape that is often unrecognised. This paper examines the results and findings of a SCADA and IT relationship survey that was undertaken to identify where SCADA operations fit within organizations around the world. It describes several proposed models that define the role and responsibility of SCADA within an organizational structure. It also presents a concept model for SCADA security responsibility and identifies key observations of SCADA and IT working together at the INL Control System Cyber Security Training in Idaho, USA. The main findings of the research suggest that clear defined roles and responsibilities for SCADA operations and SCADA security need to be established and secondly, that immediate cultural driven change is required in order to improve SCADA and IT relationships.
APA, Harvard, Vancouver, ISO, and other styles
27

Almoughem, Khaled. "The Future of Cybersecurity Workforce Development." Academic Journal of Research and Scientific Publishing 4, no. 45 (January 5, 2023): 37–48. http://dx.doi.org/10.52132/ajrsp.en.2023.45.3.

Full text
Abstract:
This paper will discuss the future of cybersecurity workforce development. Cybersecurity is a field that is increasingly becoming important in today's workplaces. Considering the rapid growth of technology, it is expected that the field of cybersecurity will change significantly in the future. As such, preparedness is needed to ensure that the future cybersecurity workforce is not hindered by a lack of training, resources, or technical expertise. The personality traits of a cybersecurity professional should be evaluated before the assumption of a given occupation to ensure that this professional is the best fit and possesses all skills, values, and values required for that post. Teamwork should be integral in future workforce development because, according to the current trend in different industries, being a team player is essential. Lastly, cybersecurity professionals should be trained to observe ethics and civic duty by being loyal to their employers. They should also prioritize continued learning because the cyber domain is ever-changing and requires flexibility and adjustment. This paper will first explore the cyber environment and highlight some of the challenges currently facing the area. Next, the most fundamental skills needed for the furtherance of this field will be covered. One area that will be the paper's focus will be the importance of social skills. The article will finally provide an overview of some of the anticipated changes that will take place in the area of cybersecurity workforce development.
APA, Harvard, Vancouver, ISO, and other styles
28

Lee, Jungup, Neil Abell, and Jennifer L. Holmes. "Validation of Measures of Cyberbullying Perpetration and Victimization in Emerging Adulthood." Research on Social Work Practice 27, no. 4 (March 31, 2015): 456–67. http://dx.doi.org/10.1177/1049731515578535.

Full text
Abstract:
Objective: Cyber bullying represents a new and alarming form of bullying that potentially leads to serious and long-lasting consequences for young people; yet, there is a dearth of research on the assessment of cyberbullying behaviors among emerging adults. Thus, this study aims to close this gap by assessing the development and validation of the cyberbullying behavior scales for application in social work research and practice settings. Methods: Two scales, cyberbullying perpetration (CBP) and cyberbullying victimization (CBV), were validated using a purposive sample of 286 undergraduate students aged 18 to 25. Results: Both CBP and CBV scales showed excellent reliability (α = .93 for CBP and α = .95 for CBV), good fit, and strong convergent validity. Conclusions: The cyberbullying behavior scales provide valid and reliable measures of emerging adults’ bullying behaviors. Implications for further social work research and practice are discussed.
APA, Harvard, Vancouver, ISO, and other styles
29

Zhang, Xiaohui, Xianghua Miao, and Mingying Xue. "A Reputation-Based Approach Using Consortium Blockchain for Cyber Threat Intelligence Sharing." Security and Communication Networks 2022 (August 10, 2022): 1–20. http://dx.doi.org/10.1155/2022/7760509.

Full text
Abstract:
The CTI (Cyber Threat Intelligence) sharing and exchange is an effective method to improve the responsiveness of the protection party. Blockchain technology enables sharing collaboration consortium to conduct a trusted CTI sharing and exchange without a centralized institution. However, the distributed connectivity of the blockchain-based CTI sharing model proposed before exposes the systems to byzantine attacks. The compromised members of partner organizations will further decrease the accuracy and trust level of CTI by generating false reporting. This paper proposes a new blockchain-based CTI model to address the unbalance issues of performance in speed, scalability, and security, which combines consortium blockchain and distributed reputation management systems to achieve automated analysis and response of tactical threat intelligence. In addition, the novel consensus algorithm of consortium blockchain that is fit for CTI sharing and exchange is introduced in this paper. The new consensus algorithm is called “Proof-of Reputation” (PoR) consensus, which meets the requirements of transaction rate and makes the consensus in a creditable network environment through constructing a reputation model. Finally, the effectiveness and security performance of the proposed model and consensus algorithm is verified by experiments.
APA, Harvard, Vancouver, ISO, and other styles
30

Hou, Fang. "Echoing Mechanism of Juvenile Delinquency Prevention and Occupational Therapy Education Guidance Based on Artificial Intelligence." Occupational Therapy International 2022 (September 29, 2022): 1–10. http://dx.doi.org/10.1155/2022/9115547.

Full text
Abstract:
In this paper, in-depth research and analysis of juvenile delinquency prevention and occupational therapy education guidance using artificial intelligence are conducted, and its response mechanism is designed in this way. Two crime type prediction algorithms based on time-crime type count vectorization and dense neural network and crime type prediction based on the fusion of dense neural network and long- and short-term memory neural network are proposed. The outputs of both are fed into a new neural network for training to achieve the fusion of the two neural networks. Among them, the use of the dense neural network can effectively fit the relationship between the constructed features and crime types. The behavioral manifestations and causes of the formation of deviant behavior in adolescents are discussed. They can only read numerical data, but there is a lot of information in the textual data that is closely related to the training effect. When experimenting, it is necessary to extract knowledge and build applications. The practical work with adolescents with deviant behaviors is again carried out from group work and casework, respectively, with problem diagnosis, needs assessment, and service plan development for specific clients, to carry out relevant practical service work. The causes of juvenile delinquency in the Internet culture are discussed in terms of the Internet environment, juvenile use of the Internet, Internet supervision, and crime prevention education, respectively. The fourth chapter focuses on the analysis of the prevention and control measures for juvenile delinquency in cyberculture. In response to the above-mentioned causes of juvenile delinquency in cyberculture, the prevention and control measures are discussed in four aspects, namely, strengthening the construction of cyberculture and building a healthy cyber environment, strengthening the capacity building of guiding juveniles to use cyber correctly, building a prevention and supervision system to promote the improvement of the legal system, and improving and innovating the crime prevention education in the cyber era.
APA, Harvard, Vancouver, ISO, and other styles
31

Krush, Dmytro, Christoph Cammin, Ralf Heynicke, Gerd Scholl, and Bernd Kaercher. "A wireless communication system for energy and environmental monitoring." Journal of Sensors and Sensor Systems 6, no. 1 (January 10, 2017): 19–26. http://dx.doi.org/10.5194/jsss-6-19-2017.

Full text
Abstract:
Abstract. Custom-fit communication systems are key elements in modern cyber-physical sensor systems. Therefore a wireless communication system (WCS) for sensor/actuator communication has been developed to facilitate energy and environmental monitoring on the shop floor of industrial production sites. Initially, the distinct demands and requirements are described. As the WCS has been designed for new installations as well as for retrofitting already installed facilities, the WCS has to be able to coexist with other wireless communication systems already allocated in the same frequency band. The WCS handles measurement data from both, energy-autarkic sensors and fast line-powered sensors. Mobile users in the field equipped with mobile devices are served by the system, too. A modular hardware concept has been chosen for easy system modification or for the integration of new wireless standards. Finally, measured results for the coexistence capability are presented.
APA, Harvard, Vancouver, ISO, and other styles
32

Li, Xuelan, Xiao Li, and Jiyu Jiang. "Deep Intelligence-Driven Efficient Forecasting for the Agriculture Economy of Computational Social Systems." Computational Intelligence and Neuroscience 2022 (September 27, 2022): 1–12. http://dx.doi.org/10.1155/2022/2854675.

Full text
Abstract:
In the vision of smart cities, everything is highly connected with the aid of computational intelligence. Therefore, the cyber-physical society has been named a computational social system for a long time. Due to the high relation with vast populations’ national livelihood, agriculture will still serve as a core industry in the national economy. As a result, this study focused on an efficient forecasting method for the agriculture economy. In recent years, the conception of deep intelligence has received overall prevalence in academia because of its excellent performance in implementing intelligent information processing tasks. Hence, this paper utilized deep intelligence driven by neural networks and managed to investigate an efficient prediction method for the agriculture economy of computational social systems. To fit the time-series forecasting scene of the long-term development of the agriculture economy, the convolutional neural network model is slightly improved by revising its parallel structure into the recurrent format. Finally, simulations on realistic datasets are carried out to evaluate the proposed forecasting method.
APA, Harvard, Vancouver, ISO, and other styles
33

Kilovaty, Ido. "The Elephant in the Room: Coercion." AJIL Unbound 113 (2019): 87–91. http://dx.doi.org/10.1017/aju.2019.10.

Full text
Abstract:
Dan Efrony and Yuval Shany's article offers some critically important observations on the reception of the Tallinn Manual 2.0 by states, as well as subsequent state practice and opinio juris with regard to the international use of cyber operations. Based on their case studies, Efrony and Shany conclude that states have largely been reluctant to adopt fully the norms, premises, and analogies offered by the Tallinn Manual. The authors argue that there is a “deep uncertainty about the treatment of cyberspace as just another physical space, like land, air, or sea—over which states may exercise sovereignty or control.” The authors further explain that there is an “uneasy fit” between traditional international law regarding internal and external state power, and the regulation of a unterritorial cyberspace. In other words, cyberspace is a sui generis domain, such that analogies to physical-space domains are often ill-suited, and at times doomed to failure.
APA, Harvard, Vancouver, ISO, and other styles
34

Quint, Fabian, Katharina Mura, and Dominic Gorecky. "In-Factory Learning – Qualification For The Factory Of The Future." ACTA Universitatis Cibiniensis 66, no. 1 (July 1, 2015): 159–64. http://dx.doi.org/10.1515/aucts-2015-0046.

Full text
Abstract:
Abstract The Industry 4.0 vision anticipates that internet technologies will find their way into future factories replacing traditional components by dynamic and intelligent cyber-physical systems (CPS) that combine the physical objects with their digital representation. Reducing the gap between the real and digital world makes the factory environment more flexible, more adaptive, but also more complex for the human workers. Future workers require interdisciplinary competencies from engineering, information technology, and computer science in order to understand and manage the diverse interrelations between physical objects and their digital counterpart. This paper proposes a mixed-reality based learning environment, which combines physical objects and visualisation of digital content via Augmented Reality. It uses reality-based interaction in order to make the dynamic interrelations between real and digital factory visible and tangible. We argue that our learning system does not work as a stand-alone solution, but should fit into existing academic and advanced training curricula.
APA, Harvard, Vancouver, ISO, and other styles
35

Yerpude, Samir, and Tarun Kumar Singhal. "Value Enablement of Collaborative Supply Chain Environment Embedded With the Internet of Things." International Journal of Intelligent Information Technologies 16, no. 3 (July 2020): 19–51. http://dx.doi.org/10.4018/ijiit.2020070102.

Full text
Abstract:
Currently, industry is going through the fourth Industrial Revolution, also termed Industry 4.0. It is characterized mainly by the cyber-physical systems dominated by digital technologies such as the Internet of Things (IoT). Organizations are making significant effort to understand customer needs and subsequently align them to the business goals for achieving market leadership. It is imperative for the longevity of the organization that goods and services be made available to the customer at the most appropriate place, time, and price. Supply chains are contributing to achieving this organizational goal. A paradigm shift was observed in the past few decades when organizations competed as supply chains in the market more than an individual brand. This shift brought forward the importance of collaborative supply chains. Researchers in this study have presented the impact of IoT origins on real-time data on a collaborative supply chain model, including internally and externally aligned parameters. The study recommends the best model basis for the goodness of fit from the customer and vendor perspective for the automotive industry in India.
APA, Harvard, Vancouver, ISO, and other styles
36

Banerjee, Shruti, Partha Sarathi Chakraborty, and . "Proposed approach to detect distributed denial of service attacks in software defined network using machine learning algorithms." International Journal of Engineering & Technology 7, no. 2.8 (March 19, 2018): 472. http://dx.doi.org/10.14419/ijet.v7i2.8.10488.

Full text
Abstract:
SDN (Software Defined Network) is rapidly gaining importance of ‘programmable network’ infrastructure. The SDN architecture separates the Data plane (forwarding devices) and Control plane (controller of the SDN). This makes it easy to deploy new versions to the infrastructure and provides straightforward network virtualization. Distributed Denial-of-Service attack is a major cyber security threat to the SDN. It is equally vulnerable to both data plane and control plane. In this paper, machine learning algorithms such as Naïve Bayesian, KNN, K Means, K-Medoids, Linear Regression, use to classify the incoming traffic as usual or unusual. Above mentioned algorithms are measured using the two metrics: accuracy and detection rate. The best fit algorithm is applied to implement the signature IDS which forms the module 1 of the proposed IDS. Second Module uses open connections to state the exact node which is an attacker and to block that particular IP address by placing it in Access Control List (ACL), thus increasing the processing speed of SDN as a whole.
APA, Harvard, Vancouver, ISO, and other styles
37

Abdel-Basset, Mohamed, Reda Mohamed, Nazeeruddin Mohammad, Karam Sallam, and Nour Moustafa. "An Adaptive Cuckoo Search-Based Optimization Model for Addressing Cyber-Physical Security Problems." Mathematics 9, no. 10 (May 18, 2021): 1140. http://dx.doi.org/10.3390/math9101140.

Full text
Abstract:
One of the key challenges in cyber-physical systems (CPS) is the dynamic fitting of data sources under multivariate or mixture distribution models to determine abnormalities. Equations of the models have been statistically characterized as nonlinear and non-Gaussian ones, where data have high variations between normal and suspicious data distributions. To address nonlinear equations of these distributions, a cuckoo search algorithm is employed. In this paper, the cuckoo search algorithm is effectively improved with a novel strategy, known as a convergence speed strategy, to accelerate the convergence speed in the direction of the optimal solution for achieving better outcomes in a small number of iterations when solving systems of nonlinear equations. The proposed algorithm is named an improved cuckoo search algorithm (ICSA), which accelerates the convergence speed by improving the fitness values of function evaluations compared to the existing algorithms. To assess the efficacy of ICSA, 34 common nonlinear equations that fit the nature of cybersecurity models are adopted to show if ICSA can reach better outcomes with high convergence speed or not. ICSA has been compared with several well-known, well-established optimization algorithms, such as the slime mould optimizer, salp swarm, cuckoo search, marine predators, bat, and flower pollination algorithms. Experimental outcomes have revealed that ICSA is superior to the other in terms of the convergence speed and final accuracy, and this makes a promising alternative to the existing algorithm.
APA, Harvard, Vancouver, ISO, and other styles
38

Alqahtani, Abdulrahman. "Towards a framework for the potential cyber-terrorist threat to critical national infrastructure." Information & Computer Security 23, no. 5 (November 9, 2015): 532–69. http://dx.doi.org/10.1108/ics-09-2014-0060.

Full text
Abstract:
Purpose – The main purpose of this research is to produce the most accurate theoretical framework of the potential threat of cyberterrorism to the national security, compared to conventional terrorism. So it aims to identify the theoretical framework that best explains the threat of cyberterrorism and conventional terrorism to national security derived from empirical data, using grounded theory, and to validate the developed grounded theory statistically by quantitative data. Design/methodology/approach – This paper presents the results of the quantitative study survey. It provides in the beginning basic information about the data. To purify the data, reliability and exploratory factor analysis, as well as confirmatory factor analysis (CFA), were performed. Then, structural equation modelling was utilised to test the final model of the theory and to assess the overall goodness-of-fit between the proposed model and the collected data set. Findings – The first study, as a qualitative exploratory study, gives a rich data set that provides the foundation of the development of the second study, as a quantitative confirmatory study. In the researcher’s previous qualitative study, it provides a better theoretical understanding of the potential threat of cyber and conventional terrorism to Saudi national security. Also, it provides the development of the grounded theory of the study (Figure 1). It also has led to the development of the conceptual framework and the hypotheses for the second phase of the study (i.e. survey). Originality/value – It is original study based on empirical data collected from Saudi military and security officials and experts in the critical infrastructures.
APA, Harvard, Vancouver, ISO, and other styles
39

Agarwal, Arushi, Purushottam Sharma, Mohammed Alshehri, Ahmed A. Mohamed, and Osama Alfarraj. "Classification model for accuracy and intrusion detection using machine learning approach." PeerJ Computer Science 7 (April 7, 2021): e437. http://dx.doi.org/10.7717/peerj-cs.437.

Full text
Abstract:
In today’s cyber world, the demand for the internet is increasing day by day, increasing the concern of network security. The aim of an Intrusion Detection System (IDS) is to provide approaches against many fast-growing network attacks (e.g., DDoS attack, Ransomware attack, Botnet attack, etc.), as it blocks the harmful activities occurring in the network system. In this work, three different classification machine learning algorithms—Naïve Bayes (NB), Support Vector Machine (SVM), and K-nearest neighbor (KNN)—were used to detect the accuracy and reducing the processing time of an algorithm on the UNSW-NB15 dataset and to find the best-suited algorithm which can efficiently learn the pattern of the suspicious network activities. The data gathered from the feature set comparison was then applied as input to IDS as data feeds to train the system for future intrusion behavior prediction and analysis using the best-fit algorithm chosen from the above three algorithms based on the performance metrics found. Also, the classification reports (Precision, Recall, and F1-score) and confusion matrix were generated and compared to finalize the support-validation status found throughout the testing phase of the model used in this approach.
APA, Harvard, Vancouver, ISO, and other styles
40

Ikuabe, Matthew, Clinton Aigbavboa, Chimay Anumba, Ayodeji Oke, and Lerato Aghimien. "Confirmatory Factor Analysis of Performance Measurement Indicators Determining the Uptake of CPS for Facilities Management." Buildings 12, no. 4 (April 11, 2022): 466. http://dx.doi.org/10.3390/buildings12040466.

Full text
Abstract:
With the use of cyber-physical systems (CPS) advanced computational capabilities, the delivery of facilities management (FM) mandates are efficiently and effectively conducted. Since performance measurement is an important yardstick in ascertaining the outcome of FM approaches, this study assesses the performance measurement indicators that influence the uptake of CPS for FM functions. Using a structured questionnaire, data were collected from built environment professionals in the Gauteng province of South Africa. Data collected was analysed using a five-stage process which includes: data reliability and validity, descriptive statistics, establishing a difference in groups’ opinion, principal component analysis, and model testing and fit statistics for confirmatory factor analysis. Results from the study indicate that three significant performance indicators are influential in determining the uptake of CPS for FM, which are operations efficiency, facility adaptation, and client’s satisfaction. The study contributes immensely to the body of knowledge. It unveils the significant performance measurement indicators that would help organisations, facilities managers, and policymakers guide their decisions hinged on the espousal of innovative technologies. Furthermore, the study serves as a solid theoretical base for further studies showcasing a roadmap for digitalisation for FM functions by unravelling the significant performance measurement indicators.
APA, Harvard, Vancouver, ISO, and other styles
41

Raimundo, Ricardo Jorge, and Albérico Travassos Rosário. "Cybersecurity in the Internet of Things in Industrial Management." Applied Sciences 12, no. 3 (February 2, 2022): 1598. http://dx.doi.org/10.3390/app12031598.

Full text
Abstract:
Nowadays, people live amidst the smart home domain, while there are business opportunities in industrial smart cities and healthcare. However, there are concerns about security. Security is central for IoT systems to protect sensitive data and infrastructure, whilst security issues have become increasingly expensive, in particular in Industrial Internet of Things (IIoT) domains. Nonetheless, there are some key challenges for dealing with those security issues in IoT domains: Applications operate in distributed environments such as Blockchain, varied smart objects are used, and sensors are limited, as far as machine resources are concerned. In this way, traditional security does not fit in IoT systems. The issue of cybersecurity has become paramount to the Internet of Things (IoT) and the Industrial Internet of Things (IIoT) in mitigating cybersecurity risk for organizations and end users. New cybersecurity technologies/applications present improvements for IoT security management. Nevertheless, there is a gap in the effectiveness of IoT cyber risk solutions. This review article discusses the literature trends around opportunities and threats in cybersecurity for IIoT, by reviewing 70 key articles discovered from a profound Scopus literature survey. It aims to present the current debate around the issue of IIoT rather than suggesting any particular technical solutions to solve network security problems.
APA, Harvard, Vancouver, ISO, and other styles
42

Toode, Ülle. "Charismatic Leaders in a New Perspective: Reality in Estonia and Italy." Studies in Media and Communication 8, no. 1 (March 2, 2020): 11. http://dx.doi.org/10.11114/smc.v8i1.4676.

Full text
Abstract:
The purpose of this explorative study is to put the existing theories on charismatic political leadership in a current post-web media context. It also seeks to better understand why “charismatic politicians” seem to have success in present-day cyber politics. The paper considers political charisma in a Weberian perspective and aims to explain what elements it includes in a current electoral environment characterized by a fast-changing media landscape. The paper places the existing theoretical models in the context of two European societies, by comparing Estonia and Italy as case studies. Estonia, a small ex-Soviet country has emerged in recent years as an advanced e-society with highly “internetisized” media. At the same time, Italy became known by the phenomenon of the “Berlusconization” of the media, a popular subject of study in political communication. The analysis considers existing research, mostly based on the work of Max Weber, and aims to test the index of charisma, developed by Pappas (2011), in the two observed countries. The paper concludes with a discussion on if and how charismatic political leaders fit a deliberative democracy. Finally, attention is drawn to the need for further systematic comparative research to better understand the phenomenon of charismatic leadership in the post-web media environment.
APA, Harvard, Vancouver, ISO, and other styles
43

Khan, Zeeshan Ali, and Peter Herrmann. "Recent Advancements in Intrusion Detection Systems for the Internet of Things." Security and Communication Networks 2019 (July 3, 2019): 1–19. http://dx.doi.org/10.1155/2019/4301409.

Full text
Abstract:
Many Internet of Things (IoT) systems run on tiny connected devices that have to deal with severe processor and energy restrictions. Often, the limited processing resources do not allow the use of standard security mechanisms on the nodes, making IoT applications quite vulnerable to different types of attacks. This holds particularly for intrusion detection systems (IDS) that are usually too resource-heavy to be handled by small IoT devices. Thus, many IoT systems are not sufficiently protected against typical network attacks like Denial-of-Service (DoS) and routing attacks. On the other side, IDSs have already been successfully used in adjacent network types like Mobile Ad hoc Networks (MANET), Wireless Sensor Networks (WSN), and Cyber-Physical Systems (CPS) which, in part, face limitations similar to those of IoT applications. Moreover, there is research work ongoing that promises IDSs that may better fit to the limitations of IoT devices. In this article, we will give an overview about IDSs suited for IoT networks. Besides looking on approaches developed particularly for IoT, we introduce also work for the three similar network types mentioned above and discuss if they are also suitable for IoT systems. In addition, we present some suggestions for future research work that could be useful to make IoT networks more secure.
APA, Harvard, Vancouver, ISO, and other styles
44

Semerci, Ali. "Investigating the effects of personality traits on cyberbullying." Pegem Eğitim ve Öğretim Dergisi 7, no. 2 (April 8, 2017): 211–30. http://dx.doi.org/10.14527/pegegog.2017.008.

Full text
Abstract:
Cyberbullying is a complicated and multifaceted phenomenon especially among youngsters, thus understanding the determinants of cyberbullying is prominent to explain what causes youngsters experience cyberbullying. Since little is known about the link between personality traits and cyberbullying, the current study aimed to explore the effects of vocational high school students' personality traits on their cyberbullying behaviors. In this regard, "Cyber victim/bully Scale", and "Adjective Based Personality Scale" were administered to 246 participant students. A structural regression model was developed with predictor variables and tested to see the effects of personality traits on cyberbullying. The goodness of fit indices indicated acceptable fitness (χ2/df:2.63, RMSEA: .08, GFI: .55, AGFI: .53, CFI: .61, IFI: .61). The results illustrated that openness is the strongest significant predictor of both cyberbullying (R2=-.83, p<.05) and being bullied (R2=-.77, p<.05). Yet another significant but positive predictor of cyberbully is extroversion (R2=.54, p<.05). However, the weakest positive significant predictor of cyberbully is agreeableness (R2=.14, p<.05). In addition to openness, conscientiousness was also found to be another significant predictor of being bullied (R2=.64, p<.05). Surprisingly, neuroticism has no significant effect on cyberbullying and being bullied.
APA, Harvard, Vancouver, ISO, and other styles
45

Arsenijević, Jasmina, and Dejan Arsenijević. "Public relations in the digital era: New methods and tools." Univerzitetska misao - casopis za nauku, kulturu i umjetnost, Novi Pazar, no. 20 (2021): 54–65. http://dx.doi.org/10.5937/univmis2120054a.

Full text
Abstract:
The beginning of the 21st century marked an evolutionary "leap" in Internet technology - the transition from static web pages whose content was determined solely by their creator to dynamic, interactive user-created web pages and the emergence and proliferation of social networks as a special and multi-purpose cyber info-sphere. In such a new and dynamic environment, naturally the need for new ways of functioning of public relations has emerged, finding new approaches and methods that would successfully fit into the new digital environment and take advantage of all the newly created potential. This next evolutive stage of the Internet - Web 2.0 brought interactive access web-pages, blogs, social networks/media, targeted advertising and pod-casts have become new and vital fields of contemporary PR. The new interactive technologies have enabled not only more accurate identification of target groups but also direct access to the collection of unimaginable quantity and quality of data that describes not only groups but individuals as well. This quantum leap in knowledge of target audiences made possible more precise "tailoring" of messages for each of them, thus dramatically increasing the effectiveness of these messages. This paper will analyze the principles, functions and possibilities of modern digital public relations, the methods and tools for it`s application as well as practical examples.
APA, Harvard, Vancouver, ISO, and other styles
46

Ericsson, Mikael, Dahniel Johansson, and David Stjern. "AI-Based Quality Control of Wood Surfaces with Autonomous Material Handling." Applied Sciences 11, no. 21 (October 25, 2021): 9965. http://dx.doi.org/10.3390/app11219965.

Full text
Abstract:
The theory and applications of Smart Factories and Industry 4.0 are increasing the entry into the industry. It is common in industry to start converting exclusive parts, of their production, into this new paradigm rather than converting whole production lines all at once. In Europe and Sweden, recent political decisions are taken to reach the target of greenhouse gas emission reduction. One possible solution is to replace concrete in buildings with Cross Laminated Timber. In the last years, equipment and software that have been custom made for a certain task, are now cheaper and can be adapted to fit more processes than earlier possible. This in combination, with lessons learned from the automotive industry, makes it possible to take the necessary steps and start redesigning and building tomorrows automated and flexible production systems in the wood industry. This paper presents a proof of concept of an automated inspection system, for wood surfaces, where concepts found in Industry 4.0, such as industrial Internet of things (IIoT), smart factory, flexible automation, artificial intelligence (AI), and cyber physical systems, are utilized. The inspection system encompasses, among other things, of the shelf software and hardware, open source software, and standardized, modular, and mobile process modules. The design of the system is conducted with future expansion in mind, where new parts and functions can be added as well as removed.
APA, Harvard, Vancouver, ISO, and other styles
47

Ristić, Predrag, and Sanja Čelik. "Public relations in the digital era: New methods and tools." Univerzitetska misao - casopis za nauku, kulturu i umjetnost, Novi Pazar, no. 19 (2020): 74–85. http://dx.doi.org/10.5937/univmis2019074r.

Full text
Abstract:
The beginning of the 21st century marked an evolutionary "leap" in Internet technology - the transition from static web pages whose content was determined solely by their creator to dynamic, interactive user-created web pages and the emergence and proliferation of social networks as a special and multi-purpose cyber info-sphere.In such a new and dynamic environment, naturally the need for new ways of functioning of public relations has emerged, finding new approaches and methods that would successfully fit into the new digital environment and take advantage of all the newly created potential. This next evolutive stage of the Internet - Web 2.0 brought interactive access web-pages, blogs, social networks/media, targeted advertising and pod-casts have become new and vital fields of contemporary PR. The new interactive technologies have enabled not only more accurate identification of target groups but also direct access to the collection of unimaginable quantity and quality of data that describes not only groups but individuals as well. This quantum leap in knowledge of target audiences made possible more precise "tailoring" of messages for each of them, thus dramatically increasing the effectiveness of these messages. This paper will analyze the principles, functions and possibilities of modern digital public relations, the methods and tools for it`s application as well as practical examples.
APA, Harvard, Vancouver, ISO, and other styles
48

Cao, Yuanlong, Ruiwen Ji, Lejun Ji, Mengshuang Bao, Lei Tao, and Wei Yang. "Can Multipath TCP Be Robust to Cyber Attacks? A Measuring Study of MPTCP with Active Queue Management Algorithms." Security and Communication Networks 2021 (May 27, 2021): 1–11. http://dx.doi.org/10.1155/2021/9963829.

Full text
Abstract:
With the development of social networks, more and more mobile social network devices have multiple interfaces. Multipath TCP (MPTCP), as an emerging transmission protocol, can fit multiple link bandwidths to improve data transmission performance and improve user experience quality. At the same time, due to the large-scale deployment and application of emerging technologies such as the Internet of Things and cloud computing, cyber attacks against MPTCP have gradually increased. More and more network security research studies point out that low-rate distributed denial of service (LDDoS) attacks are relatively popular and difficult to detect and are recognized as one of the most severe threats to network services. This article introduces six classic queue management algorithms: DropTail, RED, FRED, REM, BLUE, and FQ. In a multihomed network environment, we perform the performance evaluation of MPTCP under LDDoS attacks in terms of throughput, delay, and packet loss rate when using the six algorithms, respectively, by simulations. The results show that in an MPTCP-enabled multihomed network, different queue management algorithms have different throughput, delay, and packet loss rate performance when subjected to LDDoS attacks. Considering these three performance indicators comprehensively, the FRED algorithm has better performance. By adopting an effective active queue management (AQM) algorithm, the MPTCP transmission system can enhance its robustness capability, thus improving transmission performance. We suggest that when designing and improving the queue management algorithm, the antiattack performance of the algorithm should be considered: (1) it can adjust the traffic speed by optimizing the congestion control mechanism; (2) the fairness of different types of data streams sharing bandwidth is taken into consideration; and (3) it has the ability to adjust the parameters of the queue management algorithm in a timely and accurate manner.
APA, Harvard, Vancouver, ISO, and other styles
49

Iliyasu, Auwal Sani, Usman Alhaji Abdurrahman, and Lirong Zheng. "Few-Shot Network Intrusion Detection Using Discriminative Representation Learning with Supervised Autoencoder." Applied Sciences 12, no. 5 (February 24, 2022): 2351. http://dx.doi.org/10.3390/app12052351.

Full text
Abstract:
Recently, intrusion detection methods based on supervised deep learning techniques (DL) have seen widespread adoption by the research community, as a result of advantages, such as the ability to learn useful feature representations from input data without excessive manual intervention. However, these techniques require large amounts of data to generalize well. Collecting a large-scale malicious sample is non-trivial, especially in the modern day with its constantly evolving landscape of cyber-threats. On the other hand, collecting a few-shot of malicious samples is more realistic in practical settings, as in cases such as zero-day attacks, where security agents are only able to intercept a limited number of such samples. Hence, intrusion detection methods based on few-shot learning is emerging as an alternative to conventional supervised learning approaches to simulate more realistic settings. Therefore, in this paper, we propose a novel method that leverages discriminative representation learning with a supervised autoencoder to achieve few-shot intrusion detection. Our approach is implemented in two stages: we first train a feature extractor model with known classes of malicious samples using a discriminative autoencoder, and then in the few-shot detection stage, we use the trained feature extractor model to fit a classifier with a few-shot examples of the novel attack class. We are able to achieve detection rates of 99.5% and 99.8% for both the CIC-IDS2017 and NSL-KDD datasets, respectively, using only 10 examples of an unseen attack.
APA, Harvard, Vancouver, ISO, and other styles
50

Wambui, Boniface Mwangi, Joyce W. Gikandi, and Geoffrey Mariga Wambugu. "A Suvery of Biometric Authentication Technologies Towards Secure And Robust Systems: A Case Study of Mount Kenya University." Computer and Information Science 15, no. 2 (March 17, 2022): 43. http://dx.doi.org/10.5539/cis.v15n2p43.

Full text
Abstract:
In response to the increased demand for more effective authentication methods, the usage of biometric authentication to secure systems against unwanted access has grown. Because of the recent COVID-19 pandemic outbreak, any direct physical contact with the system should be avoided. Furthermore, current authentication systems lack the necessary security features, making them vulnerable to cyber risks such as forgery by unethical employees and unauthorized users. The goal of this paper is to investigate the existing biometric authentication systems and propose the best security models to overcome the weaknesses of existing technologies. The study employed mixed methodology, which was qualitative and quantitative in nature and relied on primary and secondary sources of data. The researcher collected the data from a population of 300 staff of Mount Kenya University with a sample size of 169 respondents. The R2 value on the relationship between the studied dependent and independent variables was R2 = 0.792 showing a good fit of the model since is greater than 50% of the test item used in the case study. Therefore the study recommends that institutions to&nbsp; implement a contactless biometric system to eliminate physical contact and use multimodal system that will help overcome the existing challenges associated with unimodal systems. There are still gaps for future researchers where they need to focus on the various decision algorithms that are best efficient in verify users before they are authenticated in the system.
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!

To the bibliography