Academic literature on the topic 'Cyborg landscapes'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'Cyborg landscapes.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Journal articles on the topic "Cyborg landscapes"

1

Lokman, Kees. "Cyborg landscapes: Choreographing resilient interactions between infrastructure, ecology, and society." Journal of Landscape Architecture 12, no. 1 (January 2, 2017): 60–73. http://dx.doi.org/10.1080/18626033.2017.1301289.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Purnomo, Arif D., Charles Lim, and Burman Noviansyah. "Threat Hunting Early Experiment through Event Correlation and Memory Forensic." ACMIT Proceedings 6, no. 1 (July 6, 2021): 56–63. http://dx.doi.org/10.33555/acmit.v6i1.98.

Full text
Abstract:
The cyber threat landscapes nowadays are dynamically evolving over time, the cyber security practitioner in corporations need to adapt with more sophisticated way with the latest cyber threat attacks are launched. Cyber Threat Intelligence is one of the tools that can be utilized as a cyber threat detection. Generally, CTI operates by integrating its directory with events collected from Security Information and Event Management (SIEM) to correlates all of the appliances logs within corporation and providing summarized and meaningful information that can be reviewed to identify legitimate malicious cyber threat activity. However, relying only CTI subscription that only contains blacklist domain and ip addresses integrated with SIEM will only provide passive detection for known cyber threats. The needs for proactive cyber threat detection is required to compete with the modern threat landscape. This research work will try to explore the possibility of detecting unknown or undetected cyber threats using network event correlation and memory forensic to validate its existence. Throughout this research time span, we’re able to discover malicious network pattern that is proven to be undetected within internal organization endpoint protection. Therefore, this research will provide baseline for threat hunting activity based on network behavioural pattern.
APA, Harvard, Vancouver, ISO, and other styles
3

Heise, Ursula K. "The Android and the Animal." PMLA/Publications of the Modern Language Association of America 124, no. 2 (March 2009): 503–10. http://dx.doi.org/10.1632/pmla.2009.124.2.503.

Full text
Abstract:
Pixar's animated feature wall-E (2008) revolves around a sentient robot, a small trash compactor who faith fully continues his programmed duties seven hundred years into the future, after humans have long abandoned their polluted home planet. Landscaped into skyscrapers of compacted waste, Earth no longer seems to harbor any organic life other than a cockroach, Wall-E's only and constant friend. Similarly, in Mamoru Oshii's Ghost in the Shell 2: Innocence (2004; ), sequel to the groundbreaking first Ghost in the Shell anime, the love of the cyborg police officer Batou for his vanished colleague Motoko Kusanagi is surpassed only by the care and affection he displays for his pet basset hound. These films are two recent examples of works of science fiction in which the emergence of new kinds of humanoid consciousness in robots, cyborgs, or biotechnologically produced humans is accompanied by a renewed attention to animals. Why? In what ways does the presence of wild, domestic, genetically modified, or mechanical animals reshape the concerns about the human subject that are most centrally articulated, in many of these works, through technologically produced and reproduced human minds and bodies?
APA, Harvard, Vancouver, ISO, and other styles
4

Jimenez-Zepeda, Victor, Donna E. Reece, McCurdy R. Arleigh, Esther Masih-Khan, Eshetu G. Atenafu, Michael Sebag, Julie Stakiw, et al. "Real-World Outcomes with Bortezomib-Containing Regimens and Lenalidomide Plus Dexamethasone for the Treatment of Transplant Ineligible MM Patients: A Multi-Institutional Report from the National Myeloma Canada Research Network (MCRN) Database." Blood 132, Supplement 1 (November 29, 2018): 2008. http://dx.doi.org/10.1182/blood-2018-99-117363.

Full text
Abstract:
Abstract Introduction: Bortezomib-containing regimens (BCRs) have been the standard frontline approach for the treatment of transplant ineligible multiple myeloma (TIMM) patients in Canada for many years. Based on recent randomized clinical trial results lenalidomide and dexamethasone (Ld) has become another provincially funded option in Canada in the same therapeutic space. We aimed to compare the effect of BCRs and Ld for the treatment of TIMM using the newly-formed Myeloma Canada Research Network Multiple Myeloma Database (MCRN-MM-DB) project. This web-based centralized platform can track and characterize real-world outcomes of patients treated at major Canadian institutions and includes both legacy data dating back to 2007 (from 4 centres) as well as ongoing prospective data collection (from 11 centres) analyzed up to 01/07/18. Patients and Methods: The primary objective was to assess the ORR, PFS and OS for TIMM patients treated with CyBorD/CyBorP, Ld, VMP or VD/VP, each given as reported previously but with dose-adjustments at the discretion of the treating physician to maintain patients on therapy. The two-sided Fisher exact test was used to test for differences between categorical variables. Survival curves were constructed according to the Kaplan-Meier method and compared using the log rank test; a p value of <0.05 was considered significant. Results: 842 TIMM patients were evaluated. Clinical characteristics are shown in Table 1. Median OS and PFS for the entire cohort were 54.1 and 20.4 months, respectively. ORR and ≥VGPR better rates were 83% and 52% for the entire cohort. A ≥VGPR rate of 53%, 46%, 56% and 51% were observed for patients treated with CyBorD/P, VMP, Ld and VD/VP, respectively (p=0.3). The median PFS was longer for Ld patients (25 months) compared to CyBorD/CyBorP, VMP and Vd/VP (19.3, 20.5 and 13.7 months, respectively), (p=0.03, Fig 1a); there was no significant difference in PFS between the 2 different alkylating-agent containing regimens when combined with bortezomib + steroids (CyBorD/P vs VMP, p =0.9). Median OS was 51, 59.5, 29.4 and 66.5 months for those patients treated with CyBorD/CyBorP, VMP, VD/VP and Ld, respectively (p=0.07, Fig 1b). When the OS and PFS for CyBorD/P (typically given for a fixed duration of 9 cycles) were compared with Ld in a subset analysis, the p-values were 0.08 and 0.008, respectively. Conclusions: 1) OS was not significantly different in patients treated with either a bortezomib-containing triplet that includes an alkylator + steroid or continuous Ld. 2) The BCR triplets and Ld were more efficacious than the bortezomib + steroid doublet (VD/VP) for both OS and PFS although, the small sample size and adverse factors, such as frailty and comorbidities, may have influenced the findings. 3) The results in the real-world setting, i.e., a median PFS in the range of 1.5-2 years and median OS of 4.5-5.5 years, confirm triplet-based BCRs and Ld as current valid standards of care for frontline therapy in TIMM. 5) This study confirms the utility of a large comprehensive national database to benchmark current results for comparison with newer regimens as they are introduced into the Canadian therapeutic landscape. Disclosures Arleigh: Celgene: Honoraria; Janssen: Honoraria. Sebag:Janssen Inc.: Membership on an entity's Board of Directors or advisory committees; Amgen Canada: Membership on an entity's Board of Directors or advisory committees; Takeda Canada: Membership on an entity's Board of Directors or advisory committees; Celgene Canada: Membership on an entity's Board of Directors or advisory committees. Leblanc:Celgene Canada: Membership on an entity's Board of Directors or advisory committees; Janssen Inc.: Membership on an entity's Board of Directors or advisory committees; Amgen Canada: Membership on an entity's Board of Directors or advisory committees; Takeda Canada: Membership on an entity's Board of Directors or advisory committees. Louzada:Janssen: Honoraria; Celgene: Honoraria; amgen: Honoraria; pfizer: Honoraria. Venner:Janssen: Honoraria, Research Funding; Celgene: Honoraria, Research Funding; Amgen: Honoraria; Takeda: Honoraria.
APA, Harvard, Vancouver, ISO, and other styles
5

Ramsdale, Andrew, Stavros Shiaeles, and Nicholas Kolokotronis. "A Comparative Analysis of Cyber-Threat Intelligence Sources, Formats and Languages." Electronics 9, no. 5 (May 16, 2020): 824. http://dx.doi.org/10.3390/electronics9050824.

Full text
Abstract:
The sharing of cyber-threat intelligence is an essential part of multi-layered tools used to protect systems and organisations from various threats. Structured standards, such as STIX, TAXII and CybOX, were introduced to provide a common means of sharing cyber-threat intelligence and have been subsequently much-heralded as the de facto industry standards. In this paper, we investigate the landscape of the available formats and languages, along with the publicly available sources of threat feeds, how these are implemented and their suitability for providing rich cyber-threat intelligence. We also analyse at a sample of cyber-threat intelligence feeds, the type of data they provide and the issues found in aggregating and sharing the data. Moreover, the type of data supported by various formats and languages is correlated with the data needs for several use cases related to typical security operations. The main conclusions drawn by our analysis suggest that many of the standards have a poor level of adoption and implementation, with providers opting for custom or traditional simple formats.
APA, Harvard, Vancouver, ISO, and other styles
6

Alhajjar, Elie, and Kevin Lee. "The U.S. Cyber Threat Landscape." European Conference on Cyber Warfare and Security 21, no. 1 (June 8, 2022): 18–24. http://dx.doi.org/10.34190/eccws.21.1.197.

Full text
Abstract:
Cybersecurity is concerned with protecting information, hardware, and software on the internet from unauthorized use, intrusions, sabotage, and natural disasters. It is the body of technologies, processes and practices designed to protect networks, computers, programs and data from attack, damage, or unauthorized access. The numerous ways in which computer systems and data can be compromised and the dramatic increase in cybercrimes have made cybersecurity a growing field. One of the most problematic elements of cybersecurity is the quick and constant evolving nature of security risks in critical infrastructure and major businesses all around the world. In this paper, we sketch a general frame for the cyber threat landscape in the United States of America by focusing on five major categories: ransomware, social engineering, third party software, deep fakes, and insider threats. We elaborate on each of these pillars by providing case studies from the past decade, as well as discussing ways to move forward.
APA, Harvard, Vancouver, ISO, and other styles
7

Furnell, Steven, and Samantha Dowling. "Cyber crime: a portrait of the landscape." Journal of Criminological Research, Policy and Practice 5, no. 1 (February 28, 2019): 13–26. http://dx.doi.org/10.1108/jcrpp-07-2018-0021.

Full text
Abstract:
Purpose The purpose of this paper is to review current evidence in relation to scale and impacts of cyber crime, including various approaches to defining and measuring the problem. Design/methodology/approach A review and analysis of survey evidence is used to enable an understanding of the scope and scale of the cyber crime problem, and its effect upon those experiencing it. Findings The analysis evidences that cyber crime exists in several dimensions, with costs and harms that can be similarly varied. There is also a sense that, moving forward, the “cyber” label will become somewhat redundant as many crimes have the potential to have a technology component. Research limitations/implications The key evidence in this particular discussion has some geographic limitations, with much of the discussion focussed upon data drawn from the Crime Survey for England and Wales, as well as other UK-based sources. However, many of the broader points still remain more widely relevant. Practical implications This study helps in: better understanding the range and scale of cyber crime threats; understanding how the cyber element fits into the wider context of crime; improving the appreciation of what cyber crime can mean for potential victims; and recognising the cost dimensions, and the implications for protection and response. Social implications The discussion will help businesses and individuals to have a better appreciation of the cyber crime threat, and what ought to be considered in response to it. Originality/value The discussion is based upon recent evidence, and therefore represents a more up-to-date view of the cyber crime landscape than reviews already available in earlier literature.
APA, Harvard, Vancouver, ISO, and other styles
8

Deakin, Mark. "From The City Of Bits to E-Topia." International Journal of E-Adoption 6, no. 1 (January 2014): 16–33. http://dx.doi.org/10.4018/ijea.2014010102.

Full text
Abstract:
Mitchell's book on the City of Bits, sets out a vision of urban life literally done to bits. His next book e-topia, provides the counter-point to this vision of urban life and scenario where the city is no longer left in bits and pieces, but a place where it ‘all comes together'. As Mitchell states in Me++: the Cyborg Self and the Networked City, all this ‘coming together' becomes possible because the trial separation of bits and atoms is over and the dissolution of the boundaries between virtual and physical space now makes citizenship worth playing for. The landscape which this paper uncovers is different. For it reveals the middle ground between the ‘high-level' issues surrounding e-topia and those lying at the ‘grass roots' level of me ++ and the cyborg-self. This is because it is here and with the likes of Laclau and Mouffe and Zizek, that matters which concern the ‘city of bits' and notion of ‘e-topia' as the ‘me++ of the cyborg self', get ‘bottomed out' as the space, citizenship and community of global strategy.
APA, Harvard, Vancouver, ISO, and other styles
9

Kaloudi, Nektaria, and Jingyue Li. "The AI-Based Cyber Threat Landscape." ACM Computing Surveys 53, no. 1 (May 29, 2020): 1–34. http://dx.doi.org/10.1145/3372823.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Civitarese, Giuseppe. "Do cyborgs dream? Post‐human landscapes in Shinya Tsukamoto’s Nightmare Detective (2006)." International Journal of Psychoanalysis 91, no. 4 (August 2010): 1005–16. http://dx.doi.org/10.1111/j.1745-8315.2010.00305.x.

Full text
APA, Harvard, Vancouver, ISO, and other styles

Dissertations / Theses on the topic "Cyborg landscapes"

1

Testart, Pacheco Cecilia Andrea. "Understanding the institutional landscape of cyber security." Thesis, Massachusetts Institute of Technology, 2016. http://hdl.handle.net/1721.1/104820.

Full text
Abstract:
Thesis: S.M., Massachusetts Institute of Technology, Department of Electrical Engineering and Computer Science, 2016.
Thesis: S.M. in Technology and Policy, Massachusetts Institute of Technology, School of Engineering, Institute for Data, Systems, and Society, Technology and Policy Program, 2016.
Cataloged from PDF version of thesis.
Includes bibliographical references (pages 145-153).
The decentralized architecture of the Internet, which has been key to its development and worldwide deployment, is making it challenging to secure Internet user experience. Many organizations claim to be playing a role in improving Internet security. If anything, the space of security-related institutions seems on first inspection to be over-populated, yet poor security persists. This work proposes a framework to understand the role different institutions play in cyber security. The analysis gives insights into the broad institutional ecosystem of public, private and international actors, and the varied nature of these institutions, their interests, incentives, and contributions to cyber security from hardware, software, protocols, standards and regulation. Based on natural language clustering algorithms, this framework classifies institutions along five dimensions: the aspect of cyber security the institution covers (e.g. network security, cybercrime), the industry and activity sector of the institution (e.g. telecommunications, software and service providers), whether it is part of a specific jurisdiction (e.g. US, Europe), specific institution's characteristics such as its working mode (e.g. forum, information sharing) or primary focus (e.g. economic development, consumer trust), and the governance type (for-profit, not-for-profit, government or international organization). We developed a dataset of approximately 120 institutions that claim a role with respect to cyber security, and using the framework, we identify areas of competing and overlapping institutional interest, relevant areas out of scope of current institutions and dysfunctionalities that hinder overall security improvement.
by Cecilia Andrea Testart Pacheco.
S.M.
S.M. in Technology and Policy
APA, Harvard, Vancouver, ISO, and other styles
2

Papadopoulos, Nikolaos. "How Secure are you Online? : A Cybersecurity Assessment of the Recommendations Provided to Swedish Citizens." Thesis, Linnéuniversitetet, Institutionen för datavetenskap och medieteknik (DM), 2021. http://urn.kb.se/resolve?urn=urn:nbn:se:lnu:diva-104921.

Full text
Abstract:
With computers, mobile phones and other smart devices being an increasingly part of peoples lives. It is important now, more than ever that people know how to operate them safely and stay protected in the cyber landscape. For citizens to understand how to stay protected online, it is important to understand what to stay safe from. This thesis is therefore examining the cyber threat landscape to understand what threats pose the greatest threat to users. To understand the prerequisites people have in defending themselves, the thesis also examines and evaluates what are recommendations provided to the general public. The results show that the biggest threat is malware with phishing being the usual access vector for it. Recommendations seem to fall behind in reflecting the most prevalent threats, but manage to stay relevant nonetheless.
APA, Harvard, Vancouver, ISO, and other styles
3

Lucenkiw, Michael. "Flora Machina: A defensible cyborg landscape." 2014. http://hdl.handle.net/1993/24012.

Full text
Abstract:
The landscape is under constant threat from human kind and cannot evolve fast enough to protect itself adequately. By augmenting an ecosystem’s natural resilience with cybernetic technology, it will be better equipped to ensure its survival in an urban setting. This practicum will investigate the creation of a cybernetically-enhanced ecosystem, the cyborg landscape, and how this organism(s) will know and understand the world around it. This practicum has been inspired by the idea of the cyborg, research on plant intelligence, installations, artistic interventions and ideas of chance and performance introduced by composer John Cage. The cyborg plant is a strategy used to expand on the limitations of a plant allowing adaptation to situations and environments. To become a cyborg, is to have an intimate bond between technology and organism, both functioning as one to overcome limitations limiting survival in the environment.
APA, Harvard, Vancouver, ISO, and other styles

Books on the topic "Cyborg landscapes"

1

Reghunadhan, Ramnath. Cyber Technological Paradigms and Threat Landscape in India. Singapore: Springer Singapore, 2022. http://dx.doi.org/10.1007/978-981-16-9128-7.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Great Britain: National Audit Office. UK Cyber Security Strategy: Landscape Review, Cross Government. Stationery Office, The, 2013.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
3

Reghunadhan, Ramnath. Cyber Technological Paradigms and Threat Landscape in India. Springer Singapore Pte. Limited, 2022.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
4

Geer, Dan, Wendy Nather, and Sounil Yu. Cyber Defense Matrix: The Essential Guide to Navigating the Cybersecurity Landscape. Independently Published, 2022.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
5

Kovid, Dr Raj K., Dr Daleep Parimoo, and Dr Santhi Narayanan. EMERGING CONTOURS OF BUSINESS AND MANAGEMENT. SVDES BOOK SERIES, Delhi, 2021. http://dx.doi.org/10.52458/9789391842413.

Full text
Abstract:
The pandemic has triggered changes across the walks of life including governance, business and management. External environmental turbulence is reshaping the market landscape drastically and hence the way organizations run. Normal practices in corporations are being redefined and revisited. The organizations are trying innovative approaches to face the unparalleled challenges staying afloat. So, the key of success lies in the way corporations adapt to the emerging trends the business sector is leaning toward. The emerging contours of business and management in the ‗new-normalized‘ situation include increasing role of technology convergence, balancing the organizational and individual expectations among others. Advancement of Artificial intelligence, machine learning, internet of things and other emerging technologies have spilled over to create impact on socio-psychological dimensions of human behaviour at large. Business organizations are facing challenges across the dimensions of doing business. For example, cyber-crimes and issues related to protection of intellectual property in the virtual world are keeping the managing executives on their toes. The pattern of organizations‘ responses to the emerging challenges is embedded with innovative ideas leading to entrepreneurship at individual and corporate level. The innovation and entrepreneurship as a response to deal with an unprecedented crisis has found roots down to the bottom of the pyramid. Reskilling and upskilling the workforce is one of the dominating emerging corporate landscapes. Further, organizations appear to have extended their support-net even to the family of their employees. This edited book provides insights on varied aspects of emerging contours of business and management around the world. The themes around which authors have contributed chapters include entrepreneurship, innovation, managing human resources, managerial competences, intellectual property, globalization, online marketing, artificial intelligence, machine learning, and business data mining among others. The book also highlights issues related to emerging themes in sectors such as healthcare, tourism, academics etc.
APA, Harvard, Vancouver, ISO, and other styles
6

Wilner, Alex S. Transnational Terrorism. Oxford University Press, 2018. http://dx.doi.org/10.1093/oso/9780198790501.003.0029.

Full text
Abstract:
Transnational terrorism, an enduring phenomenon that became a hallmark of the post-cold-war era, continues to evolve. This chapter explores several emerging trends in Islamist terrorism that are likely to challenge European security institutions in the coming years and decades. The chapter argues that the Islamic State has revolutionized the jihadist landscape. ISIS has effectively eclipsed al-Qaeda, modernizing its predecessor’s hidebound model of allegiance and recruitment, sponsoring and facilitating attacks overseas, lighting sectarian fires across the Middle East and North Africa, and exploiting cyber tools and social media to propagandize itself widely. Relatedly, European foreign fighters have joined ISIS at an unprecedented clip: several thousand have fought within its ranks. Combining these trends helps illustrate how transnational terrorism challenges European security in new and complex ways.
APA, Harvard, Vancouver, ISO, and other styles
7

Department of Defense. Rising Dragon: Deterring China in 2035 - Social, Political, Economic, and Military Landscape, Space and Cyber Attack Capabilities, Compellence and Coercion, People's Liberation Army , Air Force. Independently Published, 2017.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
8

Department of Defense. Organizing, Training, and Retaining Intelligence Professionals for Cyber Operations - NSA and Air Force Cyberspace Landscape, ISR, Equipping ISR Pros to Win in Cyberspace, Preserving the Advantage. Independently Published, 2019.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
9

Gartzke, Eric, and Jon R. Lindsay. Cross-Domain Deterrence. Oxford University Press, 2019. http://dx.doi.org/10.1093/oso/9780190908645.001.0001.

Full text
Abstract:
The complexity of the twenty-first century threat landscape contrasts significantly with the bilateral nuclear bargaining context envisioned by classical deterrence theory. Nuclear and conventional arsenals continue to develop alongside antisatellite programs, autonomous robotics or drones, cyber operations, biotechnology, and other innovations barely imagined in the early nuclear age. The concept of cross-domain deterrence emerged near the end of the George W. Bush administration as policymakers and commanders confronted emerging threats to vital American military systems in space and cyberspace. The Pentagon now recognizes five operational environments or so-called domains (land, sea, air, space, and cyberspace), and cross-domain deterrence poses serious problems in practice. This book steps back to assess the theoretical relevance of cross-domain deterrence for the field of international relations. As a general concept, cross-domain deterrence posits that the ways in which actors choose to deter affects the quality of the deterrence they achieve. Contributors to this book include senior and junior scholars and national security practitioners. Their chapters probe the analytical utility of cross-domain deterrence by examining how differences across, and combinations of, different military and nonmilitary instruments can affect choices and outcomes in coercive policy in historical and contemporary cases.
APA, Harvard, Vancouver, ISO, and other styles

Book chapters on the topic "Cyborg landscapes"

1

Richards, Julian. "Introduction: The Cyber Landscape." In Cyber-War, 1–13. London: Palgrave Macmillan UK, 2014. http://dx.doi.org/10.1057/9781137399625_1.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Patil, Sameer. "India's cyber security landscape." In Securing India in the Cyber Era, 13–21. London: Routledge India, 2021. http://dx.doi.org/10.4324/9781003152910-2.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Patil, Sameer. "India’s Cyber Security Landscape." In India Studies in Business and Economics, 75–90. Singapore: Springer Singapore, 2022. http://dx.doi.org/10.1007/978-981-16-7593-5_6.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Papadimitriou, Fivos. "Emergence, Sustainability and Cyber-Physical Landscapes." In RaumFragen: Stadt – Region – Landschaft, 123–39. Wiesbaden: Springer Fachmedien Wiesbaden, 2022. http://dx.doi.org/10.1007/978-3-658-35596-8_8.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Bellini, E., G. Sargsyan, and D. Kavallieros. "Cyber-resilience." In Internet of Things, Threats, Landscape, and Countermeasures, 291–333. Boca Raton : CRC Press, 2021.: CRC Press, 2021. http://dx.doi.org/10.1201/9781003006152-8.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Palmer, David A. "Cyberspace and the Emerging Chinese Religious Landscape—Preliminary Observations." In Cyber China, 37–50. New York: Palgrave Macmillan US, 2004. http://dx.doi.org/10.1057/9781403979551_3.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Portnoy, Michael, and Seymour Goodman. "The International Landscape of Cyber Security." In Global Initiatives to Secure Cyberspace, 1–3. Boston, MA: Springer US, 2008. http://dx.doi.org/10.1007/978-0-387-09764-0_1.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Rajput, Balsing. "Changing Landscape of Crime in Cyberspace." In Cyber Economic Crime in India, 13–23. Cham: Springer International Publishing, 2020. http://dx.doi.org/10.1007/978-3-030-44655-0_2.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Lei, Fanyu, and Neha Jain. "Characteristics of Plant Landscape Design in Modern Urban Landscape Design Based on BP Neural Network." In Cyber Security Intelligence and Analytics, 551–56. Cham: Springer International Publishing, 2022. http://dx.doi.org/10.1007/978-3-030-97874-7_71.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Masys, Anthony. "Examining Systemic Risk in the Cyber Landscape." In The Great Power Competition Volume 3, 69–82. Cham: Springer International Publishing, 2022. http://dx.doi.org/10.1007/978-3-031-04586-8_4.

Full text
APA, Harvard, Vancouver, ISO, and other styles

Conference papers on the topic "Cyborg landscapes"

1

Shanker, Anusha Kadambari, and G. Usha. "Cyber threat landscape in cyber space." In 2017 International Conference of Electronics, Communication and Aerospace Technology (ICECA). IEEE, 2017. http://dx.doi.org/10.1109/iceca.2017.8203709.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Jorgensen, John M., and Kevin P. McSweeney. "Cyber Security - Understanding Your Threat Landscape." In Offshore Technology Conference. Offshore Technology Conference, 2018. http://dx.doi.org/10.4043/28933-ms.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Sumner, Machelle. "Emerging Cyber-Physical Landscape of Transportation Technology." In International Conference on Safe and Secure Transport of Nuclear and Radioactive Materials, Vienna, Austria, December 13-17, 2021. US DOE, 2021. http://dx.doi.org/10.2172/1845840.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Jones, Joseph. "Integrating and Shaping Military Cyber Defence in Operational and Intelligence Planning." In International Conference on Cybersecurity and Cybercrime. Romanian Association for Information Security Assurance, 2022. http://dx.doi.org/10.19107/cybercon.2022.07.

Full text
Abstract:
The cyber threat landscape has undoubtedly evolved at an exponential rate. As such, NATO and EU forces have transformed their capabilities to meet present-day operational challenges in cyberspace. However, this paper will not only identify relative successes by NATO and EU forces with regards to their respective development of cyber defence capabilities, it will also indicate limitations with regards to the projection of power within cyberspace and the lack of national and international coordination concerning offensive cyber operations and the collection of intelligence from cyberspace.
APA, Harvard, Vancouver, ISO, and other styles
5

Yeboah-Ofori, Abel, and Daniel Opoku-Akyea. "Mitigating Cyber Supply Chain Risks in Cyber Physical Systems Organizational Landscape." In 2019 International Conference on Cyber Security and Internet of Things (ICSIoT). IEEE, 2019. http://dx.doi.org/10.1109/icsiot47925.2019.00020.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Robinson, Michael. "The SCADA Threat Landscape." In 1st International Symposium for ICS & SCADA Cyber Security Research 2013 (ICS-CSR 2013). BCS Learning & Development, 2013. http://dx.doi.org/10.14236/ewic/icscsr2013.4.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Sharma, Priyanshu, Damandeep Kaur, and Bharti Ramola. "JavaScript API Deprecation Landscape: A Mining Study." In 2022 International Conference on Cyber Resilience (ICCR). IEEE, 2022. http://dx.doi.org/10.1109/iccr56254.2022.9995957.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Xu, Wei, Yaodong Tao, and Xin Guan. "The Landscape of Industrial Control Systems (ICS) Devices on the Internet." In 2018 International Conference On Cyber Situational Awareness, Data Analytics and Assessment (Cyber SA). IEEE, 2018. http://dx.doi.org/10.1109/cybersa.2018.8551422.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Oancea, Vlad. "Establishing Effective Cyber Diplomacy and Deterrence Capabilities between International Partners." In International Conference on Cybersecurity and Cybercrime. Romanian Association for Information Security Assurance, 2022. http://dx.doi.org/10.19107/cybercon.2022.15.

Full text
Abstract:
Changes has been always a constant in a modern and dynamic world, but the rapidity of change in the global security landscape accelerated after 9/11 and global war against terrorism. There is a new approach regarding political, ideological, economic and military race due to globalization which improved the landscape with good practices and developmental growth, but is still a major driver of instability. While threat of conventional decrease, accordingly the spread of conflict, it complexity, accuracy, changeable and reach into many areas have emerged. Many new types of warfare have also emerging like cyber, network, digital, information, economic, media pursued cross domains both in peace or war. Especially nowadays but also during challenging times, deterrence has been an important part of foreign affairs of a nation, to conserve internal and external stability and preserve it’s integrity.
APA, Harvard, Vancouver, ISO, and other styles
10

Xiao, Xiangyu, and Nicholas Caporusso. "Comparative Evaluation of Cyber Migration Factors in the Current Social Media Landscape." In 2018 6th International Conference on Future Internet of Things and Cloud Workshops (FiCloudW). IEEE, 2018. http://dx.doi.org/10.1109/w-ficloud.2018.00022.

Full text
APA, Harvard, Vancouver, ISO, and other styles

Reports on the topic "Cyborg landscapes"

1

African Open Science Platform Part 1: Landscape Study. Academy of Science of South Africa (ASSAf), 2019. http://dx.doi.org/10.17159/assaf.2019/0047.

Full text
Abstract:
This report maps the African landscape of Open Science – with a focus on Open Data as a sub-set of Open Science. Data to inform the landscape study were collected through a variety of methods, including surveys, desk research, engagement with a community of practice, networking with stakeholders, participation in conferences, case study presentations, and workshops hosted. Although the majority of African countries (35 of 54) demonstrates commitment to science through its investment in research and development (R&D), academies of science, ministries of science and technology, policies, recognition of research, and participation in the Science Granting Councils Initiative (SGCI), the following countries demonstrate the highest commitment and political willingness to invest in science: Botswana, Ethiopia, Kenya, Senegal, South Africa, Tanzania, and Uganda. In addition to existing policies in Science, Technology and Innovation (STI), the following countries have made progress towards Open Data policies: Botswana, Kenya, Madagascar, Mauritius, South Africa and Uganda. Only two African countries (Kenya and South Africa) at this stage contribute 0.8% of its GDP (Gross Domestic Product) to R&D (Research and Development), which is the closest to the AU’s (African Union’s) suggested 1%. Countries such as Lesotho and Madagascar ranked as 0%, while the R&D expenditure for 24 African countries is unknown. In addition to this, science globally has become fully dependent on stable ICT (Information and Communication Technologies) infrastructure, which includes connectivity/bandwidth, high performance computing facilities and data services. This is especially applicable since countries globally are finding themselves in the midst of the 4th Industrial Revolution (4IR), which is not only “about” data, but which “is” data. According to an article1 by Alan Marcus (2015) (Senior Director, Head of Information Technology and Telecommunications Industries, World Economic Forum), “At its core, data represents a post-industrial opportunity. Its uses have unprecedented complexity, velocity and global reach. As digital communications become ubiquitous, data will rule in a world where nearly everyone and everything is connected in real time. That will require a highly reliable, secure and available infrastructure at its core, and innovation at the edge.” Every industry is affected as part of this revolution – also science. An important component of the digital transformation is “trust” – people must be able to trust that governments and all other industries (including the science sector), adequately handle and protect their data. This requires accountability on a global level, and digital industries must embrace the change and go for a higher standard of protection. “This will reassure consumers and citizens, benefitting the whole digital economy”, says Marcus. A stable and secure information and communication technologies (ICT) infrastructure – currently provided by the National Research and Education Networks (NRENs) – is key to advance collaboration in science. The AfricaConnect2 project (AfricaConnect (2012–2014) and AfricaConnect2 (2016–2018)) through establishing connectivity between National Research and Education Networks (NRENs), is planning to roll out AfricaConnect3 by the end of 2019. The concern however is that selected African governments (with the exception of a few countries such as South Africa, Mozambique, Ethiopia and others) have low awareness of the impact the Internet has today on all societal levels, how much ICT (and the 4th Industrial Revolution) have affected research, and the added value an NREN can bring to higher education and research in addressing the respective needs, which is far more complex than simply providing connectivity. Apart from more commitment and investment in R&D, African governments – to become and remain part of the 4th Industrial Revolution – have no option other than to acknowledge and commit to the role NRENs play in advancing science towards addressing the SDG (Sustainable Development Goals). For successful collaboration and direction, it is fundamental that policies within one country are aligned with one another. Alignment on continental level is crucial for the future Pan-African African Open Science Platform to be successful. Both the HIPSSA ((Harmonization of ICT Policies in Sub-Saharan Africa)3 project and WATRA (the West Africa Telecommunications Regulators Assembly)4, have made progress towards the regulation of the telecom sector, and in particular of bottlenecks which curb the development of competition among ISPs. A study under HIPSSA identified potential bottlenecks in access at an affordable price to the international capacity of submarine cables and suggested means and tools used by regulators to remedy them. Work on the recommended measures and making them operational continues in collaboration with WATRA. In addition to sufficient bandwidth and connectivity, high-performance computing facilities and services in support of data sharing are also required. The South African National Integrated Cyberinfrastructure System5 (NICIS) has made great progress in planning and setting up a cyberinfrastructure ecosystem in support of collaborative science and data sharing. The regional Southern African Development Community6 (SADC) Cyber-infrastructure Framework provides a valuable roadmap towards high-speed Internet, developing human capacity and skills in ICT technologies, high- performance computing and more. The following countries have been identified as having high-performance computing facilities, some as a result of the Square Kilometre Array7 (SKA) partnership: Botswana, Ghana, Kenya, Madagascar, Mozambique, Mauritius, Namibia, South Africa, Tunisia, and Zambia. More and more NRENs – especially the Level 6 NRENs 8 (Algeria, Egypt, Kenya, South Africa, and recently Zambia) – are exploring offering additional services; also in support of data sharing and transfer. The following NRENs already allow for running data-intensive applications and sharing of high-end computing assets, bio-modelling and computation on high-performance/ supercomputers: KENET (Kenya), TENET (South Africa), RENU (Uganda), ZAMREN (Zambia), EUN (Egypt) and ARN (Algeria). Fifteen higher education training institutions from eight African countries (Botswana, Benin, Kenya, Nigeria, Rwanda, South Africa, Sudan, and Tanzania) have been identified as offering formal courses on data science. In addition to formal degrees, a number of international short courses have been developed and free international online courses are also available as an option to build capacity and integrate as part of curricula. The small number of higher education or research intensive institutions offering data science is however insufficient, and there is a desperate need for more training in data science. The CODATA-RDA Schools of Research Data Science aim at addressing the continental need for foundational data skills across all disciplines, along with training conducted by The Carpentries 9 programme (specifically Data Carpentry 10 ). Thus far, CODATA-RDA schools in collaboration with AOSP, integrating content from Data Carpentry, were presented in Rwanda (in 2018), and during17-29 June 2019, in Ethiopia. Awareness regarding Open Science (including Open Data) is evident through the 12 Open Science-related Open Access/Open Data/Open Science declarations and agreements endorsed or signed by African governments; 200 Open Access journals from Africa registered on the Directory of Open Access Journals (DOAJ); 174 Open Access institutional research repositories registered on openDOAR (Directory of Open Access Repositories); 33 Open Access/Open Science policies registered on ROARMAP (Registry of Open Access Repository Mandates and Policies); 24 data repositories registered with the Registry of Data Repositories (re3data.org) (although the pilot project identified 66 research data repositories); and one data repository assigned the CoreTrustSeal. Although this is a start, far more needs to be done to align African data curation and research practices with global standards. Funding to conduct research remains a challenge. African researchers mostly fund their own research, and there are little incentives for them to make their research and accompanying data sets openly accessible. Funding and peer recognition, along with an enabling research environment conducive for research, are regarded as major incentives. The landscape report concludes with a number of concerns towards sharing research data openly, as well as challenges in terms of Open Data policy, ICT infrastructure supportive of data sharing, capacity building, lack of skills, and the need for incentives. Although great progress has been made in terms of Open Science and Open Data practices, more awareness needs to be created and further advocacy efforts are required for buy-in from African governments. A federated African Open Science Platform (AOSP) will not only encourage more collaboration among researchers in addressing the SDGs, but it will also benefit the many stakeholders identified as part of the pilot phase. The time is now, for governments in Africa, to acknowledge the important role of science in general, but specifically Open Science and Open Data, through developing and aligning the relevant policies, investing in an ICT infrastructure conducive for data sharing through committing funding to making NRENs financially sustainable, incentivising open research practices by scientists, and creating opportunities for more scientists and stakeholders across all disciplines to be trained in data management.
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!

To the bibliography