Academic literature on the topic 'Digital threats'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'Digital threats.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Journal articles on the topic "Digital threats"

1

Irons, Alastair, and Jacques Ophoff. "Aspects of Digital Forensics in South Africa." Interdisciplinary Journal of Information, Knowledge, and Management 11 (2016): 273–83. http://dx.doi.org/10.28945/3576.

Full text
Abstract:
This paper explores the issues facing digital forensics in South Africa. It examines particular cyber threats and cyber threat levels for South Africa and the challenges in addressing the cybercrimes in the country through digital forensics. The paper paints a picture of the cybercrime threats facing South Africa and argues for the need to develop a skill base in digital forensics in order to counter the threats through detection of cybercrime, by analyzing cybercrime reports, consideration of current legislation, and an analysis of computer forensics course provision in South African universities. The paper argues that there is a need to develop digital forensics skills in South Africa through university programs, in addition to associated training courses. The intention in this paper is to promote debate and discussion in order to identify the cyber threats to South Africa and to encourage the development of a framework to counter the threats – through legislation, high tech law enforcement structures and protocols, digital forensics education, digital forensics skills development, and a public and business awareness of cybercrime threats.
APA, Harvard, Vancouver, ISO, and other styles
2

Arcos, Rubén, and Hanna Smith. "Digital Communication and Hybrid Threats." Revista ICONO14 Revista científica de Comunicación y Tecnologías emergentes 19, no. 1 (January 1, 2021): 1–14. http://dx.doi.org/10.7195/ri14.v19i1.1662.

Full text
Abstract:
La amenaza híbrida es un concepto que aparece en documentos oficiales y estrategias de seguridad de los estados. Tanto la UE como la OTAN han tomado medidas serias para contrarrestar la actividad relacionada con las amenazas híbridas. Este monográfico sobre comunicación digital y amenazas híbridas tiene como objetivo avanzar en la comprensión de cómo los actores de amenazas híbridas utilizan y pueden potencialmente explotar el entorno de la información para atacar las sociedades democráticas y los procesos de toma de decisiones en diferentes niveles, para diferentes propósitos. Las TIC han traído avances notables en la forma en que obtenemos información y construimos conciencia sobre el mundo y sus eventos e interactuamos con los demás, pero al mismo tiempo crean oportunidades para realizar operaciones e influenciar con una intención hostil. La guerra política, las medidas activas y las acciones encubiertas dirigidas por la comunicación no son nuevas, y la propaganda se ha utilizado a lo largo de la historia en situaciones de conflicto y guerra. Estas herramientas son empleadas por actores autoritarios hostiles y / o en una escala que ha interferido en procesos democráticos como las elecciones, erosiona la confianza en las instituciones, polariza y divide las sociedades de manera malsana. Dado que los seres humanos toman decisiones basadas en sus representaciones sobre el mundo y la información disponible a través de interacciones simbólicas interpersonales y a través de los diferentes medios, la información puede ser utilizada deliberadamente para actividades malignas que produzcan efectos cognitivos, afectivos y conductuales.
APA, Harvard, Vancouver, ISO, and other styles
3

Kareva, Yuliya Yr'evnaKashaeva, Aleksandrovna Victoriya, and Maksim Alekseevich Pendyuhov. "DIGITAL ECONOMY: THREATS AND PROSPECTS." Наука XXI века: актуальные направления развития, no. 1-1 (2021): 396–400. http://dx.doi.org/10.46554/sciencexxi-2021.02-1.1-pp.396.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Fadeeva, Inna Avenirovna. "ECONOMIC THREATS TO DIGITAL SOVEREIGNTY." Journal of Applied Research 3, no. 11 (2022): 212–15. http://dx.doi.org/10.47576/2712-7516_2022_11_3_212.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Khusainova, Ekaterina, Liliya Urazbahtina, Nina Serkina, Regina Salixova, and Zoya Shackih. "Threats to the economic security of a digital enterprise in the energy industry." E3S Web of Conferences 288 (2021): 01018. http://dx.doi.org/10.1051/e3sconf/202128801018.

Full text
Abstract:
The progressive development of regions as open multi-level systems in the context of aggravating contradictions between the interests of economic agents at the stages of deteriorating macroeconomic conditions and intensifying competition at the global and national levels determine the need to form an effective system of economic security at the meso-level, taking into account numerous threats and risk-forming factors. On the one hand, the digital transformation of enterprises provides competitive advantages in the market, on the other hand, it is a challenge that threatens the very existence of the enterprise. The article reveals the features of a digital enterprise through the prism of process vulnerability. Digital transformation creates new threats to economic security. The main specific threats to the digital enterprise are highlighted, as well as the specific industry threats to the digital enterprise in the energy industry. A classification of threats to the economic security of a digital enterprise in the energy industry in an unstable situation is presented, which can be used as a tool for managing the economic security of a digital enterprise.
APA, Harvard, Vancouver, ISO, and other styles
6

Ajetunmobi, Ridwan Lanre. "Digital Rights Management System and Administration: A Wake-up Call for Nigeria!" Law and Development Review 11, no. 2 (June 26, 2018): 609–25. http://dx.doi.org/10.1515/ldr-2018-0031.

Full text
Abstract:
Abstract The advent of the digital milieu and the explosion of the internet has made access, use, modification or duplication of original work easy. Physical reproductions have been replaced by digital reproduction, which has become much easier as well as cost-effective. The increased use of digital technology and online activities pose a serious threat to the cardinal objective of copyright protection. To counter these threats, measures have been developed technologically to make digital works difficult to copy, distribute and access without the necessary permission. These measures are covered under the heading of Digital Rights Management (DRM). Traditional copyright laws did not contemplate these threats and does not make provision to tackle them. Several countries have amended their copyright laws to address the threats posed by digital advancement. In this context, Nigeria has a draft (amendment) bill, 2015, which is before its national assembly. This paper calls for the swift passage of the bill to enable Nigeria to effectively provide for a legal framework to counter the threats posed by these digital advancements.
APA, Harvard, Vancouver, ISO, and other styles
7

Gambo Danmuchikwali, Bilkisu, and Muhammmad Muhammad Suleiman. "DIGITAL EDUCATION: OPPORTUNITIES, THREATS, AND CHALLENGES." Jurnal Evaluasi Pendidikan 11, no. 2 (November 3, 2020): 78–83. http://dx.doi.org/10.21009/10.21009/jep.0126.

Full text
Abstract:
Digital education is largely an innovation of the last few decades, although it already existed in various forms slightly earlier. Shortly, the educational system environments are anticipated as mitigation to unforeseen natural and artificial pandemics such as Covid-19 in 2020 by the significant changes associated with the digitalization of some portion of the system. This article aims to provide valuable perspectives of ICT and digital education into its future benefits, risks, and challenges of embracing the latest technologies in the digital era, and vast online open courses. We have checked a profound change in the way we interact and generate within the academics with the advent of internet technologies. Globally, the digital revolution favoured open access to information. Classrooms today have a lot of ICT resources nearly all the teachers have made great strides to incorporate digital technology to increase access to information and collaborative activities for the learners.
APA, Harvard, Vancouver, ISO, and other styles
8

Konyeha, Susan. "Exploring Cybersecurity Threats in Digital Marketing." NIPES Journal of Science and Technology Research 2, no. 3 (August 31, 2020): 12. http://dx.doi.org/10.37933/nipes/2.3.2020.2.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Kozlov, V. V., and T. V. Tomashevska. "Digital Economy: Preconditions, Threats and Prospects." Statistics of Ukraine 92, no. 2 (June 16, 2021): 58–66. http://dx.doi.org/10.31767/su.2(93)2021.02.06.

Full text
Abstract:
Digital economy is an economy based on digital computer technology. The current stage of civilization is characterized by the formation of a new information society technological structure, the basic innovations of which are infocommunication technologies (ICT), network market architecture, the information resources domination. Infocommunication nature of new technological way of life and digital economy determines the development of adequate digital reality of scientific and methodological support of the management system in infocommunications and related industries, and in general the national digital economy. Understanding the phenomenon of digital economy and information society is based on the analysis of human society and technological systems evolution. Although the impact of the digital economy on economic processes and relations is obvious, this issue is not yet sufficiently studied and needs detailed consideration. Modern realities are such that the dynamic development of information technology, the widespread complexity of business processes, as well as the accumulation of significant amounts of data leads to the objective emergence of such a concept as the digital economy. The digital type of economy affects all industries without exception, from retail to education, energy, and so on. The onslaught of the new digital economy on the position of the old industrial economy testifies to a natural, natural-historical and objectively inevitable process. Accumulation and renewal of knowledge is accelerating, a single global socio-planetary memory is being formed and, expanding, deepening, various types of intellectual property are intensively developing. However, the digitalization of economic and social activities has not only positive aspects. Information attacks on state and commercial structures of individual countries, theft of information, personal data are among the main problems in the transition to the information society. It is necessary to analyze in detail the world experience in cybersecurity of critical infrastructure. At present, there is a significant potential for the use of modern digital technologies in the activities of modern companies. The phenomenon of the digital economy leads to the transformation of information resources into the main source of added value, the emergence on this basis of opportunities to ensure the intensive nature of economic development based on low-cost technologies, including information management technologies. The countries of the post-Soviet space in the field of digital economy lagged behind the advanced countries. They have a paradoxical economic situation, namely: with an excess of outdated information flows, there is a hunger for information on the latest flows. To overcome the information gap, the governments of these countries are trying to close this gap through government regulation.
APA, Harvard, Vancouver, ISO, and other styles
10

Berghel, Hal. "Bruce Schneier on Future Digital Threats." Computer 51, no. 2 (February 2018): 64–67. http://dx.doi.org/10.1109/mc.2018.1451653.

Full text
APA, Harvard, Vancouver, ISO, and other styles

Dissertations / Theses on the topic "Digital threats"

1

Shridevi, Rajesh Jayashankara. "Emerging Security Threats in Modern Digital Computing Systems: A Power Management Perspective." DigitalCommons@USU, 2019. https://digitalcommons.usu.edu/etd/7483.

Full text
Abstract:
Design of computing systems — from pocket-sized smart phones to massive cloud based data-centers — have one common daunting challenge : minimizing the power consumption. In this effort, power management sector is undergoing a rapid and profound transformation to promote clean and energy proportional computing. At the hardware end of system design, there is proliferation of specialized, feature rich and complex power management hardware components. Similarly, in the software design layer complex power management suites are growing rapidly. Concurrent to this development, there has been an upsurge in the integration of third-party components to counter the pressures of shorter time-to-market. These trends collectively raise serious concerns about trust and security of power management solutions. In recent times, problems such as overheating, performance degradation and poor battery life, have dogged the mobile devices market, including the infamous recall of Samsung Note 7. Power outage in the data-center of a major airline left innumerable passengers stranded, with thousands of canceled flights costing over 100 million dollars. This research examines whether such events of unintentional reliability failure, can be replicated using targeted attacks by exploiting the security loopholes in the complex power management infrastructure of a computing system. At its core, this research answers an imminent research question: How can system designers ensure secure and reliable operation of third-party power management units? Specifically, this work investigates possible attack vectors, and novel non-invasive detection and defense mechanisms to safeguard system against malicious power attacks. By a joint exploration of the threat model and techniques to seamlessly detect and protect against power attacks, this project can have a lasting impact, by enabling the design of secure and cost-effective next generation hardware platforms.
APA, Harvard, Vancouver, ISO, and other styles
2

Berger, Stephan [Verfasser], and Maximilian [Akademischer Betreuer] Röglinger. "Digital Technologies in the Industrial Sector : Technology-driven Threats and Opportunities / Stephan Berger ; Betreuer: Maximilian Röglinger." Bayreuth : Universität Bayreuth, 2020. http://d-nb.info/1220356271/34.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Lindström, Sofia, Sebastian Edemalm, and Erik Reinholdsson. "Marketers are Watching You : An exploration of AI in relation to marketing, existential threats, and opportunities." Thesis, Jönköping University, 2021. http://urn.kb.se/resolve?urn=urn:nbn:se:hj:diva-52744.

Full text
Abstract:
Background: As of today, it is apparent that with the ever-changing demands and needs of customers, companies are facing enormous pressure to deliver the right value, on time, in the right way, and proper manner. To realize the full potential of Artificial Intelligence (AI), a careful plan and method need to be established in the development and deployment when incorporating the technology with marketing. Technology is evolving at a rapid pace and Artificial Intelligence (AI) can be found in a variety of applications. AI in marketing can provide valuable data clusterization and insights for personalized recommendations, customer segmentation, or even advertising optimization.  Problem:  To date, a few studies have been made due to the rapid development of AI which has shown an opportunity for marketers. From this hype, companies are looking into speedy implementation where one can forget that this technology comes with risks and threats. “The problem is that everybody has unconscious biases and people embed their own biases into technology” (Kantayya, 2021). Although machines can deliver personalized numerical information, it cannot deliver new solutions such as products and services, nor classify different outputs with a cognitive mindset which could result in biased results. The objective of this research is to utilize the information and insights gathered from experts in the field of engineering and marketing to gain a holistic view of the current and future capabilities of AI in marketing.  Purpose: The focus of this bachelor thesis is to provide additional insights in regards to Artificial Intelligence in relation to marketing, taking into consideration bias, personalization, the black box, along with other possible implications of AI systems, also referred to as the dark side. To fulfill the researchers’ objective, qualitative interviews with practitioners and employees with different roles within the field of AI and Marketing were conducted. The paper will be focusing on concepts, theories, secondary data, and interviews which will be further discussed and give opportunities for future research.   Method: To perform this research, a qualitative research design was applied, and 12 structured interviews were conducted with those who have knowledge and experience with AI, marketing, or both.  Results: The study elucidates the potentials and fallbacks of Artificial Intelligence in marketing. Where the findings suggest a mixture of human intervention and technology is needed to work against the perceptions, bias, and manipulation the technology can possess. The aims then guide towards the conclusion presenting the important cognitive and emotional skills that humans obtain that are currently lacking in AI.  This study finds several key areas both in terms of opportunities and risks. Such key areas involve the possibility of delivering new, unique personalized content to a mass audience at lightning-quick speed and at the same time presenting a handful of risks by giving machines the permission to make human decisions. Risks found in this study presented as the dark side include the bubble, bias, manipulation, fear of losing jobs, lack of transparency creating the black-box phenomena. Therefore, this research is interesting especially for marketing managers in how AI could be used both from an opportunity perspective and possible risks to consider.
APA, Harvard, Vancouver, ISO, and other styles
4

Dlamini, Moses Thandokuhle. "Combating Data Leakage in the Cloud." Thesis, University of Pretoria, 2020. http://hdl.handle.net/2263/73245.

Full text
Abstract:
The increasing number of reports on data leakage incidents increasingly erodes the already low consumer confidence in cloud services. Hence, some organisations are still hesitant to fully trust the cloud with their confidential data. Therefore, this study raises a critical and challenging research question: How can we restore the damaged consumer confidence and improve the uptake and security of cloud services? This study makes a plausible attempt at unpacking and answering the research question in order to holistically address the data leakage problem from three fronts, i.e. conflict-aware virtual machine (VM) placement, strong authentication and digital forensic readiness. Consequently, this study investigates, designs and develops an innovative conceptual architecture that integrates conflict-aware VM placement, cutting-edge authentication and digital forensic readiness to strengthen cloud security and address the data leakage problem in the hope of eventually restoring consumer confidence in cloud services. The study proposes and presents a conflict-aware VM placement model. This model uses varying degrees of conflict tolerance levels, the construct of sphere of conflict and sphere of non-conflict. These are used to provide the physical separation of VMs belonging to conflicting tenants that share the same cloud infrastructure. The model assists the cloud service provider to make informed VM placement decisions that factor in their tenants’ security profile and balance it against the relevant cost constraints and risk appetite. The study also proposes and presents a strong risk-based multi-factor authentication mechanism that scales up and down, based on threat levels or risks posed on the system. This ensures that users are authenticated using the right combination of access credentials according to the risk they pose. This also ensures end-to-end security of authentication data, both at rest and in transit, using an innovative cryptography system and steganography. Furthermore, the study proposes and presents a three-tier digital forensic process model that proactively collects and preserves digital evidence in anticipation of a legal lawsuit or policy breach investigation. This model aims to reduce the time it takes to conduct an investigation in the cloud. Moreover, the three-tier digital forensic readiness process model collects all user activity in a forensically sound manner and notifies investigators of potential security incidents before they occur. The current study also evaluates the effectiveness and efficiency of the proposed solution in addressing the data leakage problem. The results of the conflict-aware VM placement model are derived from simulated and real cloud environments. In both cases, the results show that the conflict-aware VM placement model is well suited to provide the necessary physical isolation of VM instances that belong to conflicting tenants in order to prevent data leakage threats. However, this comes with a performance cost in the sense that higher conflict tolerance levels on bigger VMs take more time to be placed, compared to smaller VM instances with low conflict tolerance levels. From the risk-based multifactor authentication point of view, the results reflect that the proposed solution is effective and to a certain extent also efficient in preventing unauthorised users, armed with legitimate credentials, from gaining access to systems that they are not authorised to access. The results also demonstrate the uniqueness of the approach in that even minor deviations from the norm are correctly classified as anomalies. Lastly, the results reflect that the proposed 3-tier digital forensic readiness process model is effective in the collection and storage of potential digital evidence. This is done in a forensically sound manner and stands to significantly improve the turnaround time of a digital forensic investigation process. Although the classification of incidents may not be perfect, this can be improved with time and is considered part of the future work suggested by the researcher.
Thesis (PhD)--University of Pretoria, 2020.
Computer Science
PhD
Unrestricted
APA, Harvard, Vancouver, ISO, and other styles
5

Dunkels, Elza. "Bridging the distance : children’s strategies on the internet." Doctoral thesis, Umeå University, Interactive Media and Learning, 2007. http://urn.kb.se/resolve?urn=urn:nbn:se:umu:diva-1340.

Full text
Abstract:

This thesis deals with the following questions: What do children find negative on the Internet? What counter strategies do they use? How have they developed these strategies? The method used is one-to-one online interviews and the analyses are qualitative in nature. The sample is children in grade 6 of the Swedish compulsory school, aged between 11 and 13. 104 children, 52 girls and 52 boys, from different parts of Sweden were interviewed.

The media debate seems to display consensus regarding what threats the Internet poses to young people. The conclusion of this thesis is, however, that children’s views of the Internet in many ways differ from the media related adult view. The children of this study do not express a great deal of anxiety about the negative sides of the Internet. They are aware of, and can describe many downsides but these are not present in their everyday use of the Internet. Digging deeper it turns out that many children have in fact well-developed counter strategies. However, these strategies are not conscious in the sense that the children discuss them. Instead, they seem integrated in their online environment. The counter strategies have been developed by the children alone or together with peers. In some, but remarkably few, cases adults have been giving tips or teaching the children strategies. Nevertheless, the study does not paint a picture of naïve children, unable to see actual threats, but of responsible young citizens who are aware of the threats that exist in their online setting – sometimes from personal experience – and have developed methods to avoid such threats.

APA, Harvard, Vancouver, ISO, and other styles
6

Ahlgren, Erik. "Does EU copyright law threaten digital freedom?" Thesis, Uppsala universitet, Juridiska institutionen, 2017. http://urn.kb.se/resolve?urn=urn:nbn:se:uu:diva-324451.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Singh, Victor. "Towards a feedback design process using Digital Thread." Thesis, Massachusetts Institute of Technology, 2019. https://hdl.handle.net/1721.1/122373.

Full text
Abstract:
This electronic version was submitted by the student author. The certified thesis is available in the Institute Archives and Special Collections.
Thesis: Ph. D., Massachusetts Institute of Technology, Department of Aeronautics and Astronautics, 2019
Cataloged from student-submitted PDF version of thesis.
Includes bibliographical references (pages 141-148).
Digital Thread is a data-driven architecture that links together information generated from across the product lifecycle. Though Digital Thread is gaining traction as a digital communication framework to streamline design, manufacturing, and operational processes in order to more efficiently design, build and maintain engineering products, a principled and unified formulation of the data-driven design problem using Digital Thread remains absent in the literature. Prior work on Digital Thread has targeted enterprise level risk/value assessments, addressing upcoming challenges and future visions, and establishing requirements from the vantage point of model-based systems engineering, product lifecycle management, and additive manufacturing. However, such a formulation must account for the fact that the design process is highly iterative and not all information is available at once.
Design decisions must be made not only on what data to collect but also on the costs and benefits involved to collect those data. Furthermore, since full use of acquired information can become computationally prohibitive, it is important to evaluate what minimal information is sufficient for design decisions and in what form that information is needed. The contribution of this thesis is to present such a formulation from the context of a data-driven design and decision problem under uncertainty. In particular, we lay down a mathematical foundation for Digital Thread and develop an dynamical feedback process model that governs the mechanics of the data-driven design problem that uses Digital Thread. From this model, we construct a Bayesian filter that describes the overall data assimilation process and formulate a multistage optimization problem that produces optimal data-informed decisions with respect to specified cost and constraint metrics.
A numerical approach based on function and policy approximation is detailed and an algorithm is provided to solve the multistage optimization problem. The overall methodology is illustrated on an example structural fiber-steered composite component. In this setting, the methodology enables design space explorations that assess the costs/benefits of future outcomes based on current design decisions. These design decisions can incorporate structural tailoring, sensor placement, and sensor selection in addition to fiber angle and thickness specification. Different design scenarios utilizing sensor placement and selection are compared and quantified. It is found that placement of sensors has less impact on cost than the choice of which sensors are used and how frequently. Accordingly, this method is able to assess how many sensors need to be used to resolve the dominant loading components effectively, and then use this knowledge to produce appropriate designs of low costs.
"The work in this thesis was supported in part by AFOSR grant FA9550-16-1-0108 under the Dynamic Data Driven Application System Program (Program Manager Dr. E. Blasch); The MIT-SUTD International Design Center; and the United States Department of Energy Office of Advanced Scientific Computing Research (ASCR) grants DE-FG02-08ER2585 and DE-SC0009297, as part of the DiaMonD Multifaceted Mathematics Integrated Capability Center"--Page 9.
by Victor Singh.
Ph. D.
Ph.D. Massachusetts Institute of Technology, Department of Aeronautics and Astronautics
APA, Harvard, Vancouver, ISO, and other styles
8

Hughes, Judith University of Ballarat. "Thread of truth." University of Ballarat, 2005. http://archimedes.ballarat.edu.au:8080/vital/access/HandleResolver/1959.17/12766.

Full text
Abstract:
"It is thought that phobias are caused by a fear of the unknown and can be overcome by self-help learning resulting in better understanding. Observation and scientific investigation have been used to create a body of artwork for the purpose of helping to desensitize people who suffer from arachnophobia. Field trip collections, photography, printmaking and installations have been used to capture, explore and create visual artworks that have been designed to highlight fact-based features of spiders and their webs."
Master of Arts (Visual Arts)
APA, Harvard, Vancouver, ISO, and other styles
9

Hughes, Judith. "Thread of truth." University of Ballarat, 2005. http://archimedes.ballarat.edu.au:8080/vital/access/HandleResolver/1959.17/14601.

Full text
Abstract:
"It is thought that phobias are caused by a fear of the unknown and can be overcome by self-help learning resulting in better understanding. Observation and scientific investigation have been used to create a body of artwork for the purpose of helping to desensitize people who suffer from arachnophobia. Field trip collections, photography, printmaking and installations have been used to capture, explore and create visual artworks that have been designed to highlight fact-based features of spiders and their webs."
Master of Arts (Visual Arts)
APA, Harvard, Vancouver, ISO, and other styles
10

Hedberg, Thomas Daniel Jr. "Enabling Connections in the Product Lifecycle using the Digital Thread." Diss., Virginia Tech, 2018. http://hdl.handle.net/10919/85627.

Full text
Abstract:
Product lifecycles are complex heterogeneous systems. Applying control methods to lifecycles requires significant human capital. Additionally, measuring lifecycles relies primarily on domain expertise and estimates. Presented in this dissertation is a way to semantically represent a product lifecycle as a cyber-physical system for enabling the application of control methods to the lifecycle. Control requires a model and no models exist currently that integrate each phase of lifecycles. The contribution is an integration framework that brings all phases and systems of a lifecycle together. First presented is a conceptual framework and technology innovation. Next, linking product lifecycle data dynamical is described and then how that linked data could be certified and traced for trustworthiness. After that, discussion is focused how the trusted linked data could be combined with machine learning to drive applications throughout the product lifecycle. Last, a case study is provided that integrates the framework and technology. Integrating all of this would enable efficient and effective measurements of the lifecycle to support prognostic and diagnostic control of that lifecycle and related decisions.
Ph. D.
The manufacturing sector is on a precipice to disruptive change that will signifcantly alter the way industrial organizations think, communicate, and interact. Industry has been chasing the dream of integrating and linking data across the product lifecycle and enterprises for decades. However, inexpensive and easy to implement technologies to integrate the people, processes, and things across various enterprises are still not available to the entire value stream. Industry needs technologies that use cyber-physical infrastructures efectively and efciently to collect and analyze data and information across an enterprise instead of a single domain of expertise. Meeting key technical needs would save over $100 billion annually in emerging advanced manufacturing sectors in the US. By enabling a systems-thinking approach, signifcant economic opportunities can be achieved through an industrial shift from paper-based processes to a digitally enabled model-based enterprise via the digital thread. The novel contribution of this dissertation is a verifed and validated integration framework, using trusted linked-data, that brings all phases and systems of the product lifecycle together. A technology agnostic approach was pursued for dynamically generating links. A demonstration is presented as a reference implementation using currently available technology. Requirements, models, and policies were explored for enabling product-data trustworthiness. All methods were developed around open, consensus-based standards to increase the likelihood of scalability. The expected outcome of this work is efcient and efective measurements of the lifecycle to support data-driven methods, specifcally related to knowledge building, decision support, requirements management, and control of the entire product lifecycle.
APA, Harvard, Vancouver, ISO, and other styles

Books on the topic "Digital threats"

1

Wood, Theodore A. Understanding recent cyberlaw lawsuits and developments: An in-depth look at new cyber security threats and their impact on digital business. [Boston, Mass.]: Aspatore, 2010.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
2

50 ways to protect your identity in a digital age: New financial threats you need to know and how to avoid them. 2nd ed. Upper Saddle River, N.J: FT Press, 2012.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
3

Programming with POSIX threads. Reading, Mass: Addison-Wesley, 1997.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
4

Capabilities, United States Congress House Committee on Armed Services Subcommittee on Emerging Threats and. Digital warriors: Improving military capabilities for cyber operations : hearing before the Subcommittee on Emerging Threats and Capabilities of the Committee on Armed Services, House of Representatives, One Hundred Twelfth Congress, second session, hearing held July 25, 2012. Washington: U.S. Government Printing Office, 2013.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
5

Operating in the digital domain: Organizing the military departments for cyber operations : hearing before the Subcommittee on Terrorism, Unconventional Threats and Capabilities of the Committee on Armed Services, House of Representatives, One Hundred Eleventh Congress, second session, hearing held September 23, 2010. Washington: U.S. G.P.O., 2010.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
6

Mironov, A., and S. Zubarev. Interaction of law enforcement agencies to ensure national security. ru: INFRA-M Academic Publishing LLC., 2022. http://dx.doi.org/10.12737/1860938.

Full text
Abstract:
The monograph examines the main directions of the organization and legal regulation of the interaction of law enforcement agencies in the activities to ensure the national security of the Russian state. Special attention is paid to the important characteristics of the constituent elements of national security, theoretical and methodological aspects of the formation of the mechanism of interaction of law enforcement agencies to ensure state and public security and law and order, as well as the analysis of improving the effectiveness of the practical activities of law enforcement agencies in the system of measures to protect the rights and freedoms of the individual, the priority interests of society and the state using modern models of network (digital) interaction. The system of ensuring national security, its forces and means is characterized. Extreme threats and risks to national security within the framework of geopolitical changes in the modern world are shown. It is of interest to specialists of various branches of knowledge interested in security issues.
APA, Harvard, Vancouver, ISO, and other styles
7

Sofge, Erik. Popular mechanics who's spying on you?: The looming threat to your privacy, identity, and family in the digital age. Edited by Coburn Davin. New York, NY: Hearst Books, 2012.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
8

3DO Games Secrets: Book Two. Maui, HI: Sandwich Islands Publishing, 1996.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
9

Omar, Marwan, and Maurice Dawson. New Threats and Countermeasures in Digital Crime and Cyber Terrorism. IGI Global, 2015.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
10

Gaufman, Elizaveta. Security Threats and Public Perception: Digital Russia and the Ukraine Crisis. Palgrave Macmillan, 2016.

Find full text
APA, Harvard, Vancouver, ISO, and other styles

Book chapters on the topic "Digital threats"

1

Schneier, Bruce. "Digital Threats." In Secrets and Lies, 14–22. Indianapolis, Indiana: Wiley Publishing, Inc., 2015. http://dx.doi.org/10.1002/9781119183631.ch2.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Wallach, Dan, Jim Roskind, and Edward Felten. "Flexible, extensible Java security using digital signature." In Network Threats, 59–74. Providence, Rhode Island: American Mathematical Society, 1997. http://dx.doi.org/10.1090/dimacs/038/07.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

McStay, Andrew. "Adblocking and Fraud: Threats to Advertising." In Digital Advertising, 111–20. London: Macmillan Education UK, 2017. http://dx.doi.org/10.1057/978-1-137-49435-1_8.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

DeFranco, Joanna F., and Bob Maley. "Security Threats." In What Every Engineer Should Know About Cyber Security and Digital Forensics, 1–13. 2nd ed. Boca Raton: CRC Press, 2022. http://dx.doi.org/10.1201/9781003245223-1.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Deibert, Ron. "17. Digital Threats Against Journalists." In Journalism After Snowden, edited by Emily Bell and Taylor Owen, 240–57. New York Chichester, West Sussex: Columbia University Press, 2017. http://dx.doi.org/10.7312/bell17612-020.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Cullen, Patrick, and Njord Wegge. "Warning of hybrid threats." In Intelligence Analysis in the Digital Age, 85–103. London: Routledge, 2021. http://dx.doi.org/10.4324/9781003168157-7.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Chung, Choong-sik. "Policies against the threats to digital government." In Developing Digital Governance, 257–75. Milton Park, Abingdon, Oxon ; New York, NY : Routledge, 2020.: Routledge, 2020. http://dx.doi.org/10.4324/9780429054426-19.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Simić, Jasminka. "Cyber Security New Threats for Diplomacy." In Artificial Intelligence and Digital Diplomacy, 45–56. Cham: Springer International Publishing, 2021. http://dx.doi.org/10.1007/978-3-030-68647-5_4.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Evans, Ariel. "Enterprise Threats of Today and Cybercriminals." In Enterprise Cybersecurity in Digital Business, 88–98. London: Routledge, 2022. http://dx.doi.org/10.4324/9781003052616-11.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Mahalle, Parikshit N., Pooja A. Shelar, Gitanjali R. Shinde, and Nilanjan Dey. "Threats and Attacks in UWSN." In The Underwater World for Digital Data Transmission, 43–53. Singapore: Springer Singapore, 2021. http://dx.doi.org/10.1007/978-981-16-1307-4_4.

Full text
APA, Harvard, Vancouver, ISO, and other styles

Conference papers on the topic "Digital threats"

1

Alzoubi, Haitham M., Taher M. Ghazal, Mohammad Kamrul Hasan, Asma Alketbi, Rukshanda Kamran, Nidal A. Al-Dmour, and Shayla Islam. "Cyber Security Threats on Digital Banking." In 2022 1st International Conference on AI in Cybersecurity (ICAIC). IEEE, 2022. http://dx.doi.org/10.1109/icaic53980.2022.9896966.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Mousa, Abdulazeez, Murat Karabatak, and Twana Mustafa. "Database Security Threats and Challenges." In 2020 8th International Symposium on Digital Forensics and Security (ISDFS). IEEE, 2020. http://dx.doi.org/10.1109/isdfs49300.2020.9116436.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Mezhman, I. F. "Digital Economy In Russia: Threats And Prospects." In Global Challenges and Prospects of The Modern Economic Development. European Publisher, 2021. http://dx.doi.org/10.15405/epsbs.2021.04.02.106.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Kettani, Houssain, and Robert M. Cannistra. "On Cyber Threats to Smart Digital Environments." In ICSDE'18: International Conference on Smart Digital Environment. New York, NY, USA: ACM, 2018. http://dx.doi.org/10.1145/3289100.3289130.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Petukhov, Andrey, Pavel Pilyugin, and Karina Pilyugina. "Harmonization of Critical Information Infrastructure Objects Threats." In International Conference Technology & Entrepreneurship in Digital Society. Real Economy Publishing House, 2019. http://dx.doi.org/10.17747/teds-2018-82-85.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Balani, Zina, and Hacer Varol. "Cloud Computing Security Challenges and Threats." In 2020 8th International Symposium on Digital Forensics and Security (ISDFS). IEEE, 2020. http://dx.doi.org/10.1109/isdfs49300.2020.9116266.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Korobeynikova, E. V. "Digital Transformation Of Russian Economy: Challenges, Threats, Prospects." In GCPMED 2018 - International Scientific Conference "Global Challenges and Prospects of the Modern Economic Development. Cognitive-Crcs, 2019. http://dx.doi.org/10.15405/epsbs.2019.03.144.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Sanina, Lyudmila. "Threats To Tax Security In The Digital Economy." In Trends and Innovations in Economic Studies, Science on Baikal Session. European Publisher, 2020. http://dx.doi.org/10.15405/epsbs.2020.12.4.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Macdonald, Mitch, Richard Frank, Joseph Mei, and Bryan Monk. "Identifying Digital Threats in a Hacker Web Forum." In ASONAM '15: Advances in Social Networks Analysis and Mining 2015. New York, NY, USA: ACM, 2015. http://dx.doi.org/10.1145/2808797.2808878.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Prikhodko, Evgenia. "DIGITAL ECONOMY: OPPORTUNITIES AND THREATS OF ECONOMIC SECURITY." In 5th SGEM International Multidisciplinary Scientific Conferences on SOCIAL SCIENCES and ARTS SGEM2018. STEF92 Technology, 2018. http://dx.doi.org/10.5593/sgemsocial2018/1.5/s05.035.

Full text
APA, Harvard, Vancouver, ISO, and other styles

Reports on the topic "Digital threats"

1

Masduki. Same game, new moves: digital threats to journalists in Indonesia. Edited by Ria Ernunsari and Sarah Bailey. Monash University, May 2022. http://dx.doi.org/10.54377/dc91-4ac8.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Lohn, Andrew. Poison in the Well: Securing the Shared Resources of Machine Learning. Center for Security and Emerging Technology, June 2021. http://dx.doi.org/10.51593/2020ca013.

Full text
Abstract:
Modern machine learning often relies on open-source datasets, pretrained models, and machine learning libraries from across the internet, but are those resources safe to use? Previously successful digital supply chain attacks against cyber infrastructure suggest the answer may be no. This report introduces policymakers to these emerging threats and provides recommendations for how to secure the machine learning supply chain.
APA, Harvard, Vancouver, ISO, and other styles
3

Krima, Sylvere, Thomas Hedberg, and Allison Barnard-Feeney. Securing the digital threat for smart manufacturing:. Gaithersburg, MD: National Institute of Standards and Technology, February 2019. http://dx.doi.org/10.6028/nist.ams.300-6.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Durovic, Mateja, and Franciszek Lech. A Consumer Law Perspective on the Commercialization of Data. Universitätsbibliothek J. C. Senckenberg, Frankfurt am Main, 2021. http://dx.doi.org/10.21248/gups.64577.

Full text
Abstract:
Commercialization of consumers’ personal data in the digital economy poses serious, both conceptual and practical, challenges to the traditional approach of European Union (EU) Consumer Law. This article argues that mass-spread, automated, algorithmic decision-making casts doubt on the foundational paradigm of EU consumer law: consent and autonomy. Moreover, it poses threats of discrimination and under- mining of consumer privacy. It is argued that the recent legislative reaction by the EU Commission, in the form of the ‘New Deal for Consumers’, was a step in the right direction, but fell short due to its continued reliance on consent, autonomy and failure to adequately protect consumers from indirect discrimination. It is posited that a focus on creating a contracting landscape where the consumer may be properly informed in material respects is required, which in turn necessitates blending the approaches of competition, consumer protection and data protection laws.
APA, Harvard, Vancouver, ISO, and other styles
5

Allende López, Marcos, Diego López, Sergio Cerón, Antonio Leal, Adrián Pareja, Marcelo Da Silva, Alejandro Pardo, et al. Quantum-Resistance in Blockchain Networks. Inter-American Development Bank, June 2021. http://dx.doi.org/10.18235/0003313.

Full text
Abstract:
This paper describes the work carried out by the Inter-American Development Bank, the IDB Lab, LACChain, Cambridge Quantum Computing (CQC), and Tecnológico de Monterrey to identify and eliminate quantum threats in blockchain networks. The advent of quantum computing threatens internet protocols and blockchain networks because they utilize non-quantum resistant cryptographic algorithms. When quantum computers become robust enough to run Shor's algorithm on a large scale, the most used asymmetric algorithms, utilized for digital signatures and message encryption, such as RSA, (EC)DSA, and (EC)DH, will be no longer secure. Quantum computers will be able to break them within a short period of time. Similarly, Grover's algorithm concedes a quadratic advantage for mining blocks in certain consensus protocols such as proof of work. Today, there are hundreds of billions of dollars denominated in cryptocurrencies that rely on blockchain ledgers as well as the thousands of blockchain-based applications storing value in blockchain networks. Cryptocurrencies and blockchain-based applications require solutions that guarantee quantum resistance in order to preserve the integrity of data and assets in their public and immutable ledgers. We have designed and developed a layer-two solution to secure the exchange of information between blockchain nodes over the internet and introduced a second signature in transactions using post-quantum keys. Our versatile solution can be applied to any blockchain network. In our implementation, quantum entropy was provided via the IronBridge Platform from CQC and we used LACChain Besu as the blockchain network.
APA, Harvard, Vancouver, ISO, and other styles
6

Mattheis, Ashley A. Atomwaffen Division and its Affiliates on Telegram: Variations, Practices, and Interconnections. RESOLVE Network, April 2022. http://dx.doi.org/10.37805/remve2022.1.

Full text
Abstract:
This research brief details findings from a recent collaborative project exploring different groups related to Atomwaffen Division (AWD) on Telegram. The brief provides an initial foray into understanding the digital communicative practices these AWD-related groups use to maintain their loose structure as a transnational, digitally networked extremist culture. Groups affiliated with the meta-brand of AWD are continuing to develop globally and building a transnational, digital networked culture, despite increased scrutiny. This indicates that their structure as a digitally networked, transnational culture provides resilience to traditional policy and law enforcement approaches. Addressing this threat requires insight into the practices that such groups use to interconnect their now multi-nodal, supranational organization.
APA, Harvard, Vancouver, ISO, and other styles
7

Slattery, Kevin T. Unsettled Aspects of the Digital Thread in Additive Manufacturing. SAE International, November 2021. http://dx.doi.org/10.4271/epr2021026.

Full text
Abstract:
In the past years, additive manufacturing (AM), also known as “3D printing,” has transitioned from rapid prototyping to making parts with potentially long service lives. Now AM provides the ability to have an almost fully digital chain from part design through manufacture and service. Web searches will reveal many statements that AM can help an organization in its pursuit of a “digital thread.” Equally, it is often stated that a digital thread may bring great benefits in improving designs, processes, materials, operations, and the ability to predict failure in a way that maximizes safety and minimizes cost and downtime. Now that the capability is emerging, a whole series of new questions begin to surface as well: •• What data should be stored, how will it be stored, and how much space will it require? •• What is the cost-to-benefit ratio of having a digital thread? •• Who owns the data and who can access and analyze it? •• How long will the data be stored and who will store it? •• How will the data remain readable and usable over the lifetime of a product? •• How much manipulation of disparate data is necessary for analysis without losing information? •• How will the data be secured, and its provenance validated? •• How does an enterprise accomplish configuration management of, and linkages between, data that may be distributed across multiple organizations? •• How do we determine what is “authoritative” in such an environment? These, along with many other questions, mark the combination of AM with a digital thread as an unsettled issue. As the seventh title in a series of SAE EDGE™ Research Reports on AM, this report discusses what the interplay between AM and a digital thread in the mobility industry would look like. This outlook includes the potential benefits and costs, the hurdles that need to be overcome for the combination to be useful, and how an organization can answer these questions to scope and benefit from the combination. This report, like the others in the series, is directed at a product team that is implementing AM. Unlike most of the other reports, putting the infrastructure in place, addressing the issues, and taking full advantage of the benefits will often fall outside of the purview of the product team and at the higher organizational, customer, and industry levels.
APA, Harvard, Vancouver, ISO, and other styles
8

Detulio, Kenneth, and David Skipper. Digital Integrated Collection Environment (DICE)/Cognitive Reasoning Engine (CORE) Intelligent Threat Architecture Study. Fort Belvoir, VA: Defense Technical Information Center, May 2003. http://dx.doi.org/10.21236/ada473159.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Ewing, Richard E., Richard Crooks, Frank Raushel, James Wall, and James Wild. Disaster Relief and Emergency Medical Services Project (DREAMS): Digital Emergency Medical Services and the Detection and Remediation of Chemical Threat Agents. Fort Belvoir, VA: Defense Technical Information Center, October 2001. http://dx.doi.org/10.21236/ada398662.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Ewing, Richard E., Larry Flournoy, Frank Raushel, Jim Wall, and Francois Gabbai. Disaster Relief and Emergency Medical Services Project (DREAMS): Digital Emergency Medical Services and the Detection and Remediation of Chemical Threat Agents. Fort Belvoir, VA: Defense Technical Information Center, October 2002. http://dx.doi.org/10.21236/ada410895.

Full text
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!

To the bibliography