Добірка наукової літератури з теми "Digital threats"
Оформте джерело за APA, MLA, Chicago, Harvard та іншими стилями
Ознайомтеся зі списками актуальних статей, книг, дисертацій, тез та інших наукових джерел на тему "Digital threats".
Біля кожної праці в переліку літератури доступна кнопка «Додати до бібліографії». Скористайтеся нею – і ми автоматично оформимо бібліографічне посилання на обрану працю в потрібному вам стилі цитування: APA, MLA, «Гарвард», «Чикаго», «Ванкувер» тощо.
Також ви можете завантажити повний текст наукової публікації у форматі «.pdf» та прочитати онлайн анотацію до роботи, якщо відповідні параметри наявні в метаданих.
Статті в журналах з теми "Digital threats"
Irons, Alastair, and Jacques Ophoff. "Aspects of Digital Forensics in South Africa." Interdisciplinary Journal of Information, Knowledge, and Management 11 (2016): 273–83. http://dx.doi.org/10.28945/3576.
Повний текст джерелаArcos, Rubén, and Hanna Smith. "Digital Communication and Hybrid Threats." Revista ICONO14 Revista científica de Comunicación y Tecnologías emergentes 19, no. 1 (January 1, 2021): 1–14. http://dx.doi.org/10.7195/ri14.v19i1.1662.
Повний текст джерелаKareva, Yuliya Yr'evnaKashaeva, Aleksandrovna Victoriya, and Maksim Alekseevich Pendyuhov. "DIGITAL ECONOMY: THREATS AND PROSPECTS." Наука XXI века: актуальные направления развития, no. 1-1 (2021): 396–400. http://dx.doi.org/10.46554/sciencexxi-2021.02-1.1-pp.396.
Повний текст джерелаFadeeva, Inna Avenirovna. "ECONOMIC THREATS TO DIGITAL SOVEREIGNTY." Journal of Applied Research 3, no. 11 (2022): 212–15. http://dx.doi.org/10.47576/2712-7516_2022_11_3_212.
Повний текст джерелаKhusainova, Ekaterina, Liliya Urazbahtina, Nina Serkina, Regina Salixova, and Zoya Shackih. "Threats to the economic security of a digital enterprise in the energy industry." E3S Web of Conferences 288 (2021): 01018. http://dx.doi.org/10.1051/e3sconf/202128801018.
Повний текст джерелаAjetunmobi, Ridwan Lanre. "Digital Rights Management System and Administration: A Wake-up Call for Nigeria!" Law and Development Review 11, no. 2 (June 26, 2018): 609–25. http://dx.doi.org/10.1515/ldr-2018-0031.
Повний текст джерелаGambo Danmuchikwali, Bilkisu, and Muhammmad Muhammad Suleiman. "DIGITAL EDUCATION: OPPORTUNITIES, THREATS, AND CHALLENGES." Jurnal Evaluasi Pendidikan 11, no. 2 (November 3, 2020): 78–83. http://dx.doi.org/10.21009/10.21009/jep.0126.
Повний текст джерелаKonyeha, Susan. "Exploring Cybersecurity Threats in Digital Marketing." NIPES Journal of Science and Technology Research 2, no. 3 (August 31, 2020): 12. http://dx.doi.org/10.37933/nipes/2.3.2020.2.
Повний текст джерелаKozlov, V. V., and T. V. Tomashevska. "Digital Economy: Preconditions, Threats and Prospects." Statistics of Ukraine 92, no. 2 (June 16, 2021): 58–66. http://dx.doi.org/10.31767/su.2(93)2021.02.06.
Повний текст джерелаBerghel, Hal. "Bruce Schneier on Future Digital Threats." Computer 51, no. 2 (February 2018): 64–67. http://dx.doi.org/10.1109/mc.2018.1451653.
Повний текст джерелаДисертації з теми "Digital threats"
Shridevi, Rajesh Jayashankara. "Emerging Security Threats in Modern Digital Computing Systems: A Power Management Perspective." DigitalCommons@USU, 2019. https://digitalcommons.usu.edu/etd/7483.
Повний текст джерелаBerger, Stephan [Verfasser], and Maximilian [Akademischer Betreuer] Röglinger. "Digital Technologies in the Industrial Sector : Technology-driven Threats and Opportunities / Stephan Berger ; Betreuer: Maximilian Röglinger." Bayreuth : Universität Bayreuth, 2020. http://d-nb.info/1220356271/34.
Повний текст джерелаLindström, Sofia, Sebastian Edemalm, and Erik Reinholdsson. "Marketers are Watching You : An exploration of AI in relation to marketing, existential threats, and opportunities." Thesis, Jönköping University, 2021. http://urn.kb.se/resolve?urn=urn:nbn:se:hj:diva-52744.
Повний текст джерелаDlamini, Moses Thandokuhle. "Combating Data Leakage in the Cloud." Thesis, University of Pretoria, 2020. http://hdl.handle.net/2263/73245.
Повний текст джерелаThesis (PhD)--University of Pretoria, 2020.
Computer Science
PhD
Unrestricted
Dunkels, Elza. "Bridging the distance : children’s strategies on the internet." Doctoral thesis, Umeå University, Interactive Media and Learning, 2007. http://urn.kb.se/resolve?urn=urn:nbn:se:umu:diva-1340.
Повний текст джерелаThis thesis deals with the following questions: What do children find negative on the Internet? What counter strategies do they use? How have they developed these strategies? The method used is one-to-one online interviews and the analyses are qualitative in nature. The sample is children in grade 6 of the Swedish compulsory school, aged between 11 and 13. 104 children, 52 girls and 52 boys, from different parts of Sweden were interviewed.
The media debate seems to display consensus regarding what threats the Internet poses to young people. The conclusion of this thesis is, however, that children’s views of the Internet in many ways differ from the media related adult view. The children of this study do not express a great deal of anxiety about the negative sides of the Internet. They are aware of, and can describe many downsides but these are not present in their everyday use of the Internet. Digging deeper it turns out that many children have in fact well-developed counter strategies. However, these strategies are not conscious in the sense that the children discuss them. Instead, they seem integrated in their online environment. The counter strategies have been developed by the children alone or together with peers. In some, but remarkably few, cases adults have been giving tips or teaching the children strategies. Nevertheless, the study does not paint a picture of naïve children, unable to see actual threats, but of responsible young citizens who are aware of the threats that exist in their online setting – sometimes from personal experience – and have developed methods to avoid such threats.
Ahlgren, Erik. "Does EU copyright law threaten digital freedom?" Thesis, Uppsala universitet, Juridiska institutionen, 2017. http://urn.kb.se/resolve?urn=urn:nbn:se:uu:diva-324451.
Повний текст джерелаSingh, Victor. "Towards a feedback design process using Digital Thread." Thesis, Massachusetts Institute of Technology, 2019. https://hdl.handle.net/1721.1/122373.
Повний текст джерелаThesis: Ph. D., Massachusetts Institute of Technology, Department of Aeronautics and Astronautics, 2019
Cataloged from student-submitted PDF version of thesis.
Includes bibliographical references (pages 141-148).
Digital Thread is a data-driven architecture that links together information generated from across the product lifecycle. Though Digital Thread is gaining traction as a digital communication framework to streamline design, manufacturing, and operational processes in order to more efficiently design, build and maintain engineering products, a principled and unified formulation of the data-driven design problem using Digital Thread remains absent in the literature. Prior work on Digital Thread has targeted enterprise level risk/value assessments, addressing upcoming challenges and future visions, and establishing requirements from the vantage point of model-based systems engineering, product lifecycle management, and additive manufacturing. However, such a formulation must account for the fact that the design process is highly iterative and not all information is available at once.
Design decisions must be made not only on what data to collect but also on the costs and benefits involved to collect those data. Furthermore, since full use of acquired information can become computationally prohibitive, it is important to evaluate what minimal information is sufficient for design decisions and in what form that information is needed. The contribution of this thesis is to present such a formulation from the context of a data-driven design and decision problem under uncertainty. In particular, we lay down a mathematical foundation for Digital Thread and develop an dynamical feedback process model that governs the mechanics of the data-driven design problem that uses Digital Thread. From this model, we construct a Bayesian filter that describes the overall data assimilation process and formulate a multistage optimization problem that produces optimal data-informed decisions with respect to specified cost and constraint metrics.
A numerical approach based on function and policy approximation is detailed and an algorithm is provided to solve the multistage optimization problem. The overall methodology is illustrated on an example structural fiber-steered composite component. In this setting, the methodology enables design space explorations that assess the costs/benefits of future outcomes based on current design decisions. These design decisions can incorporate structural tailoring, sensor placement, and sensor selection in addition to fiber angle and thickness specification. Different design scenarios utilizing sensor placement and selection are compared and quantified. It is found that placement of sensors has less impact on cost than the choice of which sensors are used and how frequently. Accordingly, this method is able to assess how many sensors need to be used to resolve the dominant loading components effectively, and then use this knowledge to produce appropriate designs of low costs.
"The work in this thesis was supported in part by AFOSR grant FA9550-16-1-0108 under the Dynamic Data Driven Application System Program (Program Manager Dr. E. Blasch); The MIT-SUTD International Design Center; and the United States Department of Energy Office of Advanced Scientific Computing Research (ASCR) grants DE-FG02-08ER2585 and DE-SC0009297, as part of the DiaMonD Multifaceted Mathematics Integrated Capability Center"--Page 9.
by Victor Singh.
Ph. D.
Ph.D. Massachusetts Institute of Technology, Department of Aeronautics and Astronautics
Hughes, Judith University of Ballarat. "Thread of truth." University of Ballarat, 2005. http://archimedes.ballarat.edu.au:8080/vital/access/HandleResolver/1959.17/12766.
Повний текст джерелаMaster of Arts (Visual Arts)
Hughes, Judith. "Thread of truth." University of Ballarat, 2005. http://archimedes.ballarat.edu.au:8080/vital/access/HandleResolver/1959.17/14601.
Повний текст джерелаMaster of Arts (Visual Arts)
Hedberg, Thomas Daniel Jr. "Enabling Connections in the Product Lifecycle using the Digital Thread." Diss., Virginia Tech, 2018. http://hdl.handle.net/10919/85627.
Повний текст джерелаPh. D.
The manufacturing sector is on a precipice to disruptive change that will signifcantly alter the way industrial organizations think, communicate, and interact. Industry has been chasing the dream of integrating and linking data across the product lifecycle and enterprises for decades. However, inexpensive and easy to implement technologies to integrate the people, processes, and things across various enterprises are still not available to the entire value stream. Industry needs technologies that use cyber-physical infrastructures efectively and efciently to collect and analyze data and information across an enterprise instead of a single domain of expertise. Meeting key technical needs would save over $100 billion annually in emerging advanced manufacturing sectors in the US. By enabling a systems-thinking approach, signifcant economic opportunities can be achieved through an industrial shift from paper-based processes to a digitally enabled model-based enterprise via the digital thread. The novel contribution of this dissertation is a verifed and validated integration framework, using trusted linked-data, that brings all phases and systems of the product lifecycle together. A technology agnostic approach was pursued for dynamically generating links. A demonstration is presented as a reference implementation using currently available technology. Requirements, models, and policies were explored for enabling product-data trustworthiness. All methods were developed around open, consensus-based standards to increase the likelihood of scalability. The expected outcome of this work is efcient and efective measurements of the lifecycle to support data-driven methods, specifcally related to knowledge building, decision support, requirements management, and control of the entire product lifecycle.
Книги з теми "Digital threats"
Wood, Theodore A. Understanding recent cyberlaw lawsuits and developments: An in-depth look at new cyber security threats and their impact on digital business. [Boston, Mass.]: Aspatore, 2010.
Знайти повний текст джерела50 ways to protect your identity in a digital age: New financial threats you need to know and how to avoid them. 2nd ed. Upper Saddle River, N.J: FT Press, 2012.
Знайти повний текст джерелаProgramming with POSIX threads. Reading, Mass: Addison-Wesley, 1997.
Знайти повний текст джерелаCapabilities, United States Congress House Committee on Armed Services Subcommittee on Emerging Threats and. Digital warriors: Improving military capabilities for cyber operations : hearing before the Subcommittee on Emerging Threats and Capabilities of the Committee on Armed Services, House of Representatives, One Hundred Twelfth Congress, second session, hearing held July 25, 2012. Washington: U.S. Government Printing Office, 2013.
Знайти повний текст джерелаOperating in the digital domain: Organizing the military departments for cyber operations : hearing before the Subcommittee on Terrorism, Unconventional Threats and Capabilities of the Committee on Armed Services, House of Representatives, One Hundred Eleventh Congress, second session, hearing held September 23, 2010. Washington: U.S. G.P.O., 2010.
Знайти повний текст джерелаMironov, A., and S. Zubarev. Interaction of law enforcement agencies to ensure national security. ru: INFRA-M Academic Publishing LLC., 2022. http://dx.doi.org/10.12737/1860938.
Повний текст джерелаSofge, Erik. Popular mechanics who's spying on you?: The looming threat to your privacy, identity, and family in the digital age. Edited by Coburn Davin. New York, NY: Hearst Books, 2012.
Знайти повний текст джерела3DO Games Secrets: Book Two. Maui, HI: Sandwich Islands Publishing, 1996.
Знайти повний текст джерелаOmar, Marwan, and Maurice Dawson. New Threats and Countermeasures in Digital Crime and Cyber Terrorism. IGI Global, 2015.
Знайти повний текст джерелаGaufman, Elizaveta. Security Threats and Public Perception: Digital Russia and the Ukraine Crisis. Palgrave Macmillan, 2016.
Знайти повний текст джерелаЧастини книг з теми "Digital threats"
Schneier, Bruce. "Digital Threats." In Secrets and Lies, 14–22. Indianapolis, Indiana: Wiley Publishing, Inc., 2015. http://dx.doi.org/10.1002/9781119183631.ch2.
Повний текст джерелаWallach, Dan, Jim Roskind, and Edward Felten. "Flexible, extensible Java security using digital signature." In Network Threats, 59–74. Providence, Rhode Island: American Mathematical Society, 1997. http://dx.doi.org/10.1090/dimacs/038/07.
Повний текст джерелаMcStay, Andrew. "Adblocking and Fraud: Threats to Advertising." In Digital Advertising, 111–20. London: Macmillan Education UK, 2017. http://dx.doi.org/10.1057/978-1-137-49435-1_8.
Повний текст джерелаDeFranco, Joanna F., and Bob Maley. "Security Threats." In What Every Engineer Should Know About Cyber Security and Digital Forensics, 1–13. 2nd ed. Boca Raton: CRC Press, 2022. http://dx.doi.org/10.1201/9781003245223-1.
Повний текст джерелаDeibert, Ron. "17. Digital Threats Against Journalists." In Journalism After Snowden, edited by Emily Bell and Taylor Owen, 240–57. New York Chichester, West Sussex: Columbia University Press, 2017. http://dx.doi.org/10.7312/bell17612-020.
Повний текст джерелаCullen, Patrick, and Njord Wegge. "Warning of hybrid threats." In Intelligence Analysis in the Digital Age, 85–103. London: Routledge, 2021. http://dx.doi.org/10.4324/9781003168157-7.
Повний текст джерелаChung, Choong-sik. "Policies against the threats to digital government." In Developing Digital Governance, 257–75. Milton Park, Abingdon, Oxon ; New York, NY : Routledge, 2020.: Routledge, 2020. http://dx.doi.org/10.4324/9780429054426-19.
Повний текст джерелаSimić, Jasminka. "Cyber Security New Threats for Diplomacy." In Artificial Intelligence and Digital Diplomacy, 45–56. Cham: Springer International Publishing, 2021. http://dx.doi.org/10.1007/978-3-030-68647-5_4.
Повний текст джерелаEvans, Ariel. "Enterprise Threats of Today and Cybercriminals." In Enterprise Cybersecurity in Digital Business, 88–98. London: Routledge, 2022. http://dx.doi.org/10.4324/9781003052616-11.
Повний текст джерелаMahalle, Parikshit N., Pooja A. Shelar, Gitanjali R. Shinde, and Nilanjan Dey. "Threats and Attacks in UWSN." In The Underwater World for Digital Data Transmission, 43–53. Singapore: Springer Singapore, 2021. http://dx.doi.org/10.1007/978-981-16-1307-4_4.
Повний текст джерелаТези доповідей конференцій з теми "Digital threats"
Alzoubi, Haitham M., Taher M. Ghazal, Mohammad Kamrul Hasan, Asma Alketbi, Rukshanda Kamran, Nidal A. Al-Dmour, and Shayla Islam. "Cyber Security Threats on Digital Banking." In 2022 1st International Conference on AI in Cybersecurity (ICAIC). IEEE, 2022. http://dx.doi.org/10.1109/icaic53980.2022.9896966.
Повний текст джерелаMousa, Abdulazeez, Murat Karabatak, and Twana Mustafa. "Database Security Threats and Challenges." In 2020 8th International Symposium on Digital Forensics and Security (ISDFS). IEEE, 2020. http://dx.doi.org/10.1109/isdfs49300.2020.9116436.
Повний текст джерелаMezhman, I. F. "Digital Economy In Russia: Threats And Prospects." In Global Challenges and Prospects of The Modern Economic Development. European Publisher, 2021. http://dx.doi.org/10.15405/epsbs.2021.04.02.106.
Повний текст джерелаKettani, Houssain, and Robert M. Cannistra. "On Cyber Threats to Smart Digital Environments." In ICSDE'18: International Conference on Smart Digital Environment. New York, NY, USA: ACM, 2018. http://dx.doi.org/10.1145/3289100.3289130.
Повний текст джерелаPetukhov, Andrey, Pavel Pilyugin, and Karina Pilyugina. "Harmonization of Critical Information Infrastructure Objects Threats." In International Conference Technology & Entrepreneurship in Digital Society. Real Economy Publishing House, 2019. http://dx.doi.org/10.17747/teds-2018-82-85.
Повний текст джерелаBalani, Zina, and Hacer Varol. "Cloud Computing Security Challenges and Threats." In 2020 8th International Symposium on Digital Forensics and Security (ISDFS). IEEE, 2020. http://dx.doi.org/10.1109/isdfs49300.2020.9116266.
Повний текст джерелаKorobeynikova, E. V. "Digital Transformation Of Russian Economy: Challenges, Threats, Prospects." In GCPMED 2018 - International Scientific Conference "Global Challenges and Prospects of the Modern Economic Development. Cognitive-Crcs, 2019. http://dx.doi.org/10.15405/epsbs.2019.03.144.
Повний текст джерелаSanina, Lyudmila. "Threats To Tax Security In The Digital Economy." In Trends and Innovations in Economic Studies, Science on Baikal Session. European Publisher, 2020. http://dx.doi.org/10.15405/epsbs.2020.12.4.
Повний текст джерелаMacdonald, Mitch, Richard Frank, Joseph Mei, and Bryan Monk. "Identifying Digital Threats in a Hacker Web Forum." In ASONAM '15: Advances in Social Networks Analysis and Mining 2015. New York, NY, USA: ACM, 2015. http://dx.doi.org/10.1145/2808797.2808878.
Повний текст джерелаPrikhodko, Evgenia. "DIGITAL ECONOMY: OPPORTUNITIES AND THREATS OF ECONOMIC SECURITY." In 5th SGEM International Multidisciplinary Scientific Conferences on SOCIAL SCIENCES and ARTS SGEM2018. STEF92 Technology, 2018. http://dx.doi.org/10.5593/sgemsocial2018/1.5/s05.035.
Повний текст джерелаЗвіти організацій з теми "Digital threats"
Masduki. Same game, new moves: digital threats to journalists in Indonesia. Edited by Ria Ernunsari and Sarah Bailey. Monash University, May 2022. http://dx.doi.org/10.54377/dc91-4ac8.
Повний текст джерелаLohn, Andrew. Poison in the Well: Securing the Shared Resources of Machine Learning. Center for Security and Emerging Technology, June 2021. http://dx.doi.org/10.51593/2020ca013.
Повний текст джерелаKrima, Sylvere, Thomas Hedberg, and Allison Barnard-Feeney. Securing the digital threat for smart manufacturing:. Gaithersburg, MD: National Institute of Standards and Technology, February 2019. http://dx.doi.org/10.6028/nist.ams.300-6.
Повний текст джерелаDurovic, Mateja, and Franciszek Lech. A Consumer Law Perspective on the Commercialization of Data. Universitätsbibliothek J. C. Senckenberg, Frankfurt am Main, 2021. http://dx.doi.org/10.21248/gups.64577.
Повний текст джерелаAllende López, Marcos, Diego López, Sergio Cerón, Antonio Leal, Adrián Pareja, Marcelo Da Silva, Alejandro Pardo, et al. Quantum-Resistance in Blockchain Networks. Inter-American Development Bank, June 2021. http://dx.doi.org/10.18235/0003313.
Повний текст джерелаMattheis, Ashley A. Atomwaffen Division and its Affiliates on Telegram: Variations, Practices, and Interconnections. RESOLVE Network, April 2022. http://dx.doi.org/10.37805/remve2022.1.
Повний текст джерелаSlattery, Kevin T. Unsettled Aspects of the Digital Thread in Additive Manufacturing. SAE International, November 2021. http://dx.doi.org/10.4271/epr2021026.
Повний текст джерелаDetulio, Kenneth, and David Skipper. Digital Integrated Collection Environment (DICE)/Cognitive Reasoning Engine (CORE) Intelligent Threat Architecture Study. Fort Belvoir, VA: Defense Technical Information Center, May 2003. http://dx.doi.org/10.21236/ada473159.
Повний текст джерелаEwing, Richard E., Richard Crooks, Frank Raushel, James Wall, and James Wild. Disaster Relief and Emergency Medical Services Project (DREAMS): Digital Emergency Medical Services and the Detection and Remediation of Chemical Threat Agents. Fort Belvoir, VA: Defense Technical Information Center, October 2001. http://dx.doi.org/10.21236/ada398662.
Повний текст джерелаEwing, Richard E., Larry Flournoy, Frank Raushel, Jim Wall, and Francois Gabbai. Disaster Relief and Emergency Medical Services Project (DREAMS): Digital Emergency Medical Services and the Detection and Remediation of Chemical Threat Agents. Fort Belvoir, VA: Defense Technical Information Center, October 2002. http://dx.doi.org/10.21236/ada410895.
Повний текст джерела