Добірка наукової літератури з теми "Human aspects of cyber security"

Оформте джерело за APA, MLA, Chicago, Harvard та іншими стилями

Оберіть тип джерела:

Ознайомтеся зі списками актуальних статей, книг, дисертацій, тез та інших наукових джерел на тему "Human aspects of cyber security".

Біля кожної праці в переліку літератури доступна кнопка «Додати до бібліографії». Скористайтеся нею – і ми автоматично оформимо бібліографічне посилання на обрану працю в потрібному вам стилі цитування: APA, MLA, «Гарвард», «Чикаго», «Ванкувер» тощо.

Також ви можете завантажити повний текст наукової публікації у форматі «.pdf» та прочитати онлайн анотацію до роботи, якщо відповідні параметри наявні в метаданих.

Статті в журналах з теми "Human aspects of cyber security"

1

Begishev, I. R. "Cyber-Security Culture: Psychological and Legal Aspects." Psychology and Law 11, no. 4 (2021): 207–20. http://dx.doi.org/10.17759/psylaw.2021110415.

Повний текст джерела
Анотація:
Digitalization has become part and parcel of the modern-day human activities. Nowadays it is going into every field of business and personal life. To develop and prosper, most organizations need IT systems, and hence to take the safeguarding of their informational assets seriously. Many of the processes which are essential for securing their IT assets, largely depend on human interaction. This study has attempted to address the culture of cyber-security in the light of psychology and law. The results of the research showed that from the psychological standpoint, the culture of cyber-security involves the willingness on the part of a modern human to overcome the digital expansion by mastering the tools for countering the negative IT factors. In its turn, from the legal standpoint, the culture of cyber-security is based on the legislative framework which regulates the legal relations in the field of cyber-security.
Стилі APA, Harvard, Vancouver, ISO та ін.
2

R., Moinescu. "Aspects of human weaknesses in cyber security." Scientific Bulletin of Naval Academy XXII, no. 1 (July 15, 2019): 163–70. http://dx.doi.org/10.21279/1454-864x-19-i1-022.

Повний текст джерела
Анотація:
Along with the development of information technology in recent years, awareness about the security of computer systems is also increasing. Because the human factor is often guilty of the vulnerabilities to which an information system is exposed, this paper will research and evaluate disparate attack vectors which are being utilized today to successfully exploit human weaknesses. We will also try to create a mechanism to mitigate against these attack vectors.
Стилі APA, Harvard, Vancouver, ISO та ін.
3

Nel, Frans, and Lynette Drevin. "Key elements of an information security culture in organisations." Information & Computer Security 27, no. 2 (June 12, 2019): 146–64. http://dx.doi.org/10.1108/ics-12-2016-0095.

Повний текст джерела
Анотація:
Purpose The purpose of this paper is to report on a study that investigated the information security culture in organisations in South Africa, with the aim of identifying key aspects of the culture. The unique aspects for building an information security culture were examined and presented in the form of an initial framework. These efforts are necessary to address the critical human aspect of information security in organisations where risky cyber behaviour is still experienced. Design/methodology/approach Literature was investigated with the focus on the main keywords security culture and information security. The information security culture aspects of different studies were compared and analysed to identify key elements of information security culture after which an initial framework was constructed. An online survey was then conducted in which respondents were asked to assess the importance of the elements and to record possible missing elements/aspects regarding their organisation’s information security culture to construct an enhanced framework. Findings A list of 21 unique security culture elements was identified from the literature. These elements/aspects were divided into three groups based on the frequency each was mentioned or discussed in studies. The number of times an element was found was interpreted as an indication of how important that element/aspect is. A further four aspects were added to the enhanced framework based on the results that emerged from the survey. Originality/value The value of this research is that an initial framework of information security culture aspects was constructed that can be used to ensure that an organisation incorporates all key aspects in its own information security culture. This framework was further enhanced from the results of the survey. The framework can also assist further studies related to the information security culture in organisations for improved security awareness and safer cyber behaviour of employees.
Стилі APA, Harvard, Vancouver, ISO та ін.
4

Pattinson, Malcolm, Marcus Butavicius, Meredith Lillie, Beau Ciccarello, Kathryn Parsons, Dragana Calic, and Agata McCormac. "Matching training to individual learning styles improves information security awareness." Information & Computer Security 28, no. 1 (November 11, 2019): 1–14. http://dx.doi.org/10.1108/ics-01-2019-0022.

Повний текст джерела
Анотація:
Purpose This paper aims to introduce the concept of a framework of cyber-security controls that are adaptable to different types of organisations and different types of employees. One of these adaptive controls, namely, the mode of training provided, is then empirically tested for its effectiveness. Design/methodology/approach In total, 1,048 working Australian adults completed the human aspects of the information security questionnaire (HAIS-Q) to determine their individual information security awareness (ISA). This included questions relating to the various modes of cyber-security training they had received and how often it was provided. Also, a set of questions called the cyber-security learning-styles inventory was used to identify their preferred learning styles for training. Findings The extent to which the training that an individual received matched their learning preferences was positively associated with their information security awareness (ISA) level. However, the frequency of such training did not directly predict ISA levels. Research limitations/implications Further research should examine the influence of matching cyber-security learning styles to training packages more directly by conducting a controlled trial where the training packages provided differ only in the mode of learning. Further research should also investigate how individual tailoring of aspects of an adaptive control framework (ACF), other than training, may improve ISA. Practical implications If cyber-security training is adapted to the preferred learning styles of individuals, their level of ISA will improve, and therefore, their non-malicious behaviour, whilst using a digital device to do their work, will be safer. Originality/value A review of the literature confirmed that ACFs for cyber-security does exist, but only in terms of hardware and software controls. There is no evidence of any literature on frameworks that include controls that are adaptable to human factors within the context of information security. In addition, this is the first study to show that ISA is improved when cyber-security training is provided in line with an individual’s preferred learning style. Similar improvement was not evident when the training frequency was increased suggesting real-world improvements in ISA may be possible without increasing training budgets but by simply matching individuals to their desired mode of training.
Стилі APA, Harvard, Vancouver, ISO та ін.
5

Quader, Faisal, and Vandana P. Janeja. "Insights into Organizational Security Readiness: Lessons Learned from Cyber-Attack Case Studies." Journal of Cybersecurity and Privacy 1, no. 4 (November 11, 2021): 638–59. http://dx.doi.org/10.3390/jcp1040032.

Повний текст джерела
Анотація:
This paper focuses on understanding the characteristics of multiple types of cyber-attacks through a comprehensive evaluation of case studies of real-world cyber-attacks. For each type of attack, we identify and link the attack type to the characteristics of that attack and the factors leading up to the attack, as observed from the review of case studies for that type of attack. We explored both the quantitative and qualitative characteristics for the types of attacks, including the type of industry, the financial intensity of the attack, non-financial intensity impacts, the number of impacted customers, and the impact on users’ trust and loyalty. In addition, we investigated the key factors leading up to an attack, including the human behavioral aspects; the organizational–cultural factors at play; the security policies adapted; the technology adoption and investment by the business; the training and awareness of all stakeholders, including users, customers and employees; and the investments in cybersecurity. In our study, we also analyzed how these factors are related to each other by evaluating the co-occurrence and linkage of factors to form graphs of connected frequent rules seen across the case studies. This study aims to help organizations take a proactive approach to the study of relevant cyber threats and aims to educate organizations to become more knowledgeable through lessons learned from other organizations experiencing cyber-attacks. Our findings indicate that the human behavioral aspects leading up to attacks are the weakest link in the successful prevention of cyber threats. We focus on human factors and discuss mitigation strategies.
Стилі APA, Harvard, Vancouver, ISO та ін.
6

Vieane, Alex, Gregory Funke, Robert Gutzwiller, Vincent Mancuso, Ben Sawyer, and Christopher Wickens. "Addressing Human Factors Gaps in Cyber Defense." Proceedings of the Human Factors and Ergonomics Society Annual Meeting 60, no. 1 (September 2016): 770–73. http://dx.doi.org/10.1177/1541931213601176.

Повний текст джерела
Анотація:
Cyber security is a high-ranking national priority that is only likely to grow as we become more dependent on cyber systems. From a research perspective, currently available work often focuses solely on technological aspects of cyber, acknowledging the human in passing, if at all. In recent years, the Human Factors community has begun to address human-centered issues in cyber operations, but in comparison to technological communities, we have only begun to scratch the surface. Even with publications on cyber human factors gaining momentum, there still exists a major gap in the field between understanding of the domain and currently available research meant to address relevant issues. The purpose for this panel is to continue to expand the role of human factors in cyber research by introducing the community to current work being done, and to facilitate collaborations to drive future research. We have assembled a panel of scientists across multiple specializations in the human factors community to have an open discussion regarding how to leverage previous human factors research and current work in cyber operations to continue to push the bounds of the field.
Стилі APA, Harvard, Vancouver, ISO та ін.
7

Balaganesh, Duraisamy. "Future of Secure Remote Workforce Perspective - What’s Next?" IRO Journal on Sustainable Wireless Systems 4, no. 3 (September 5, 2022): 149–61. http://dx.doi.org/10.36548/jsws.2022.3.002.

Повний текст джерела
Анотація:
Recently, finding a connection between changes in work habits and the controls put in place to handle cyber security threats is an innovative area of study. Surveys and conversations with subject matter experts are utilized to gather data. Since many employees struggle with the psychological and emotional aspects of working remotely, employers and information security managers are expected to continue to devote more resources to mitigating human-factor threats, which have multiplied during the COVID-19 epidemic. Consequently, the research has focused on approaches to manage or enhance security in the light of the COVID-19 pandemic's impact on present cyber threats and issues. Moreover, this article consists of various perspectives such as remote work environment, privacy authentication procedure and future security procedure.
Стилі APA, Harvard, Vancouver, ISO та ін.
8

Sebestyen, Gheorghe, and Anca Hangan. "Anomaly detection techniques in cyber-physical systems." Acta Universitatis Sapientiae, Informatica 9, no. 2 (December 20, 2017): 101–18. http://dx.doi.org/10.1515/ausi-2017-0007.

Повний текст джерела
Анотація:
AbstractNowadays, when multiple aspects of our life depend on complex cyber-physical systems, automated anomaly detection, prevention and handling is a critical issue that inuence our security and quality of life. Recent catastrophic events showed that manual (human-based) handling of anomalies in complex systems is not recommended, automatic and intelligent handling being the proper approach. This paper presents, through a number of case studies, the challenges and possible solutions for implementing computer-based anomaly detection systems.
Стилі APA, Harvard, Vancouver, ISO та ін.
9

Horbachenko, S. "Cyber security as a component of economic security of Ukraine." Galic'kij ekonomičnij visnik 66, no. 5 (2020): 180–86. http://dx.doi.org/10.33108/galicianvisnyk_tntu2020.05.180.

Повний текст джерела
Анотація:
The main essential aspects of the country economic security as a foundation for structural change and sustainable development of the national economy, strengthening its competitiveness, improvement of the economic entities efficiency are formulated in this paper. The processes affecting the economic security at the state, regions and individual enterprises levels are identified. Taking into account the available classifications of the economic security components, the role of information and cybersecurity is highlighted. It is determined that almost in all classifications of information security in one form or another is considered as an opportunity for information support and protection of confidential information of the socio-economic system. It is proved that «cybersecurity» category is gradually shifting from micro to macro level, from the problems of information protection on individual devices in local networks to the creation of a single cybersecurity system as a full component of national security at the state level. The assessment of cyberspace as the environment for potential criminal actions in the field of unauthorized access to the confidential information, software failures, automated systems functional breakdowns is carried out. It is identified how such characteristics of economic security as countermeasures resistance to internal and external threats, economic independence, self-reproduction and self-development, national interests, can be supported and protected in cyberspace Proposals for creating an effective system of cybersecurity state regulation and conditions for online information exchange within «public authorities – private sector – civil society», triangle, optimization of staffing cyber protection, development of the system of economic indicators of cyberspace functioning are introduced. Emphasis is placed on the research prospects concerning the stimulation of innovative activity aimed at the creation of effective organizational and technological model of the national cybersecurity system, the implementation of human resources, optimization of domestic legislation.
Стилі APA, Harvard, Vancouver, ISO та ін.
10

Fausett, Crystal M., and Joseph R. Keebler. "Shift Happens: Human Factors Considerations for Handoffs in Cyber-Security Operations Centers." Proceedings of the Human Factors and Ergonomics Society Annual Meeting 66, no. 1 (September 2022): 110–14. http://dx.doi.org/10.1177/1071181322661131.

Повний текст джерела
Анотація:
Cybersecurity breaches have consequences not only at a technical level, but also at economic, legal, individual levels. Organizations depend heavily on the internet to conduct daily operations and activities. As cyber threats increase with frequency and severity, organizations and the cybersecurity experts they employ are facing an uphill battle. To our knowledge, very little research has been done to investigate the handoff processes that exist in Security Operations Centers (SOCs). Researchers and practitioners within the cybersecurity community would benefit from a better understanding of how handoff mechanisms influence SOC team processes and performance. To help attain this goal, this paper aims to explore handoff processes within other domains and illuminate what aspects of handoffs may be extended to SOCs and in what ways handoffs performed in SOCs may need special consideration.
Стилі APA, Harvard, Vancouver, ISO та ін.

Дисертації з теми "Human aspects of cyber security"

1

Afzal, Muhammad. "Human and Organizational Aspects of Cyber Security : From a System Suppliers Perspective." Thesis, KTH, Industriella informations- och styrsystem, 2010. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-105778.

Повний текст джерела
Анотація:
SCADA systems have been successfully implemented in industries like oil, gas and electricity for maintenance, monitoring and control. While these systems provide immense advantage in terms of productivity, management and performance, they are also prone to exploitation and problems. These SCADA systems largely consist of network infrastructure which is subject to cyber security issues. Most of the weaknesses, or threats posed to these systems can be eliminated or reduced if the human aspect associated with them can be explored and corrected if needed. Because of human involvement in planning, designing, developing, deployment and operating of such systems, probability of flaws will always be present. This study focuses on such human aspects which effect cyber security in SCADA systems. We identified common mistakes which can be attributed to human error or negligence. A set of causes was then identified by use of interviews and finally, a Bayesian model was developed to simulate the identified cases and mistakes. We analyzed the influence and probability of occurrence of mistakes using this model. Our results prove that causes of the mistakes resulting in security problems for SCADA systems are directly related to human aspects. Furthermore, we identified some of the most prominent of these causes in this study. Based on the identified causes and mistakes, we suggested mitigation strategies to cater the problems faced.
Стилі APA, Harvard, Vancouver, ISO та ін.
2

Gopisetty, Yugandhar. "A study of online users' cyber threat awareness and their use of threat countermeasures." Thesis, Umeå universitet, Institutionen för informatik, 2016. http://urn.kb.se/resolve?urn=urn:nbn:se:umu:diva-115918.

Повний текст джерела
Анотація:
The internet has permeated the lives of the modern men in more respects than can be tabulated simply. The ease of access to online shopping, social networking, simplified communication, etc. make the internet a modern panacea for a number of problems. However, the internet also opens up avenues that expose the user to vulnerabilities at the hand of hackers and malicious software coders. The use of the internet to exchange personal and fiscal information makes attacks all the more inviting. This is compounded by the fact that most online users are unaware of threats that affect them on a daily basis and how to protect themselves against such threats. Despite the fact that the level of awareness of the contemporary cyber threats, has significantly increased among online users within the last few years, there is a growing need to improve the efficiency and effectiveness of the countermeasures currently being used. Fortunately, there are a number of Human Computer Interaction (HCI) principles that can effectively be used to enhance online user interaction and reduce internet security threats.
Стилі APA, Harvard, Vancouver, ISO та ін.
3

Jung, Sung-Oh. "A quantitative man-machine model for cyber security efficiency analysis." Texas A&M University, 2005. http://hdl.handle.net/1969.1/4851.

Повний текст джерела
Анотація:
The analysis of security defense processes is of utmost importance in the management of various cyber-security attacks, which are increasing in scope and rapidity. Organizations need to optimize their resources based on a sound understanding of the level of their security defense processes' efficiency and the impact of their investment. Modeling and characterization of the dynamics of cyber security management are essential to risk prediction, damage assessment, and resource allocations. This dissertation addresses the interactions between human factors and information systems. On the basis of the spiral life cycle model of software development processes, we develop a realistic, holistic security attack-defense model - Man-Machine Model (M3), which combines human factors and information systems' (i.e., machine) states under an integrated analytical framework. M3 incorporates man and machine components. The man component is comprised of several variables such as Skill & Knowledge (SKKN) and Teamwork Quality (TWQ). The machine component is composed of variables such as traffic volume and the amount of downtime. M3 enables the analysis of intrusion detection and incident response process efficiency, i.e., security defense team performance. With data analysis, we formulate and test four major research hypotheses based on the data collected during security experiments. Through hypothesis testing, we evaluate regression models to estimate the security defense team performance (i.e. efficiency) at different levels of human intelligence (e.g., skill and knowledge) and teamwork (e.g., teamwork quality). We assess the fitness and significance of the regression models, and verify their assumptions. Based on these results, organizations can hire those who have an appropriate level of skill and knowledge when it concerns investments to increase the level of skill and knowledge of security personnel. They also can attempt to increase the level of skill and knowledge of security personnel.
Стилі APA, Harvard, Vancouver, ISO та ін.
4

Ayereby, Manouan Pierre-Marius. "Overcoming Data Breaches and Human Factors in Minimizing Threats to Cyber-Security Ecosystems." ScholarWorks, 2018. https://scholarworks.waldenu.edu/dissertations/6163.

Повний текст джерела
Анотація:
This mixed-methods study focused on the internal human factors responsible for data breaches that could cause adverse impacts on organizations. Based on the Swiss cheese theory, the study was designed to examine preventative measures that managers could implement to minimize potential data breaches resulting from internal employees' behaviors. The purpose of this study was to provide insight to managers about developing strategies that could prevent data breaches from cyber-threats by focusing on the specific internal human factors responsible for data breaches, the root causes, and the preventive measures that could minimize threats from internal employees. Data were collected from 10 managers and 12 employees from the business sector, and 5 government managers in Ivory Coast, Africa. The mixed methodology focused on the why and who using the phenomenological approach, consisting of a survey, face-to-face interviews using open-ended questions, and a questionnaire to extract the experiences and perceptions of the participants about preventing the adverse consequences from cyber-threats. The results indicated the importance of top managers to be committed to a coordinated, continuous effort throughout the organization to ensure cyber security awareness, training, and compliance of security policies and procedures, as well as implementing and upgrading software designed to detect and prevent data breaches both internally and externally. The findings of this study could contribute to social change by educating managers about preventing data breaches who in turn may implement information accessibility without retribution. Protecting confidential data is a major concern because one data breach could impact many people as well as jeopardize the viability of the entire organization.
Стилі APA, Harvard, Vancouver, ISO та ін.
5

Sanjab, Anibal Jean. "Security of Cyber-Physical Systems with Human Actors: Theoretical Foundations, Game Theory, and Bounded Rationality." Diss., Virginia Tech, 2018. http://hdl.handle.net/10919/86204.

Повний текст джерела
Анотація:
Cyber-physical systems (CPSs) are large-scale systems that seamlessly integrate physical and human elements via a cyber layer that enables connectivity, sensing, and data processing. Key examples of CPSs include smart power systems, smart transportation systems, and the Internet of Things (IoT). This wide-scale cyber-physical interconnection introduces various operational benefits and promises to transform cities, infrastructure, and networked systems into more efficient, interactive, and interconnected smart systems. However, this ubiquitous connectivity leaves CPSs vulnerable to menacing security threats as evidenced by the recent discovery of the Stuxnet worm and the Mirai malware, as well as the latest reported security breaches in a number of CPS application domains such as the power grid and the IoT. Addressing these culminating security challenges requires a holistic analysis of CPS security which necessitates: 1) Determining the effects of possible attacks on a CPS and the effectiveness of any implemented defense mechanism, 2) Analyzing the multi-agent interactions -- among humans and automated systems -- that occur within CPSs and which have direct effects on the security state of the system, and 3) Recognizing the role that humans and their decision making processes play in the security of CPSs. Based on these three tenets, the central goal of this dissertation is to enhance the security of CPSs with human actors by developing fool-proof defense strategies founded on novel theoretical frameworks which integrate the engineering principles of CPSs with the mathematical concepts of game theory and human behavioral models. Towards realizing this overarching goal, this dissertation presents a number of key contributions targeting two prominent CPS application domains: the smart electric grid and drone systems. In smart grids, first, a novel analytical framework is developed which generalizes the analysis of a wide set of security attacks targeting the state estimator of the power grid, including observability and data injection attacks. This framework provides a unified basis for solving a broad set of known smart grid security problems. Indeed, the developed tools allow a precise characterization of optimal observability and data injection attack strategies which can target the grid as well as the derivation of optimal defense strategies to thwart these attacks. For instance, the results show that the proposed framework provides an effective and tractable approach for the identification of the sparsest stealthy attacks as well as the minimum sets of measurements to defend for protecting the system. Second, a novel game-theoretic framework is developed to derive optimal defense strategies to thwart stealthy data injection attacks on the smart grid, launched by multiple adversaries, while accounting for the limited resources of the adversaries and the system operator. The analytical results show the existence of a diminishing effect of aggregated multiple attacks which can be leveraged to successfully secure the system; a novel result which leads to more efficiently and effectively protecting the system. Third, a novel analytical framework is developed to enhance the resilience of the smart grid against blackout-inducing cyber attacks by leveraging distributed storage capacity to meet the grid's critical load during emergency events. In this respect, the results demonstrate that the potential subjectivity of storage units' owners plays a key role in shaping their energy storage and trading strategies. As such, financial incentives must be carefully designed, while accounting for this subjectivity, in order to provide effective incentives for storage owners to commit the needed portions of their storage capacity for possible emergency events. Next, the security of time-critical drone-based CPSs is studied. In this regard, a stochastic network interdiction game is developed which addresses pertinent security problems in two prominent time-critical drone systems: drone delivery and anti-drone systems. Using the developed network interdiction framework, the optimal path selection policies for evading attacks and minimizing mission completion times, as well as the optimal interdiction strategies for effectively intercepting the paths of the drones, are analytically characterized. Using advanced notions from Nobel-prize winning prospect theory, the developed framework characterizes the direct impacts of humans' bounded rationality on their chosen strategies and the achieved mission completion times. For instance, the results show that this bounded rationality can lead to mission completion times that significantly surpass the desired target times. Such deviations from the desired target times can lead to detrimental consequences primarily in drone delivery systems used for the carriage of emergency medical products. Finally, a generic security model for CPSs with human actors is proposed to study the diffusion of threats across the cyber and physical realms. This proposed framework can capture several application domains and allows a precise characterization of optimal defense strategies to protect the critical physical components of the system from threats emanating from the cyber layer. The developed framework accounts for the presence of attackers that can have varying skill levels. The results show that considering such differing skills leads to defense strategies which can better protect the system. In a nutshell, this dissertation presents new theoretical foundations for the security of large-scale CPSs, that tightly integrate cyber, physical, and human elements, thus paving the way towards the wide-scale adoption of CPSs in tomorrow's smart cities and critical infrastructure.
Ph. D.
Enhancing the efficiency, sustainability, and resilience of cities, infrastructure, and industrial systems is contingent on their transformation into more interactive and interconnected smart systems. This has led to the emergence of what is known as cyber-physical systems (CPSs). CPSs are widescale distributed and interconnected systems integrating physical components and humans via a cyber layer that enables sensing, connectivity, and data processing. Some of the most prominent examples of CPSs include the smart electric grid, smart cities, intelligent transportation systems, and the Internet of Things. The seamless interconnectivity between the various elements of a CPS introduces a wealth of operational benefits. However, this wide-scale interconnectivity and ubiquitous integration of cyber technologies render CPSs vulnerable to a range of security threats as manifested by recently reported security breaches in a number of CPS application domains. Addressing these culminating security challenges requires the development and implementation of fool-proof defense strategies grounded in solid theoretical foundations. To this end, the central goal of this dissertation is to enhance the security of CPSs by advancing novel analytical frameworks which tightly integrate the cyber, physical, and human elements of a CPS. The developed frameworks and tools enable the derivation of holistic defense strategies by: a) Characterizing the security interdependence between the various elements of a CPS, b) Quantifying the consequences of possible attacks on a CPS and the effectiveness of any implemented defense mechanism, c) Modeling the multi-agent interactions in CPSs, involving humans and automated systems, which have a direct effect on the security state of the system, and d) Capturing the role that human perceptions and decision making processes play in the security of CPSs. The developed tools and performed analyses integrate the engineering principles of CPSs with the mathematical concepts of game theory and human behavioral models and introduce key contributions to a number of CPS application domains such as the smart electric grid and drone systems. The introduced results enable strengthening the security of CPSs, thereby paving the way for their wide-scale adoption in smart cities and critical infrastructure.
Стилі APA, Harvard, Vancouver, ISO та ін.
6

Миронець, Оксана Миколаївна, and Tigadi Nageshwar. "Theoretical and legal aspects of human security in the republic of India." Thesis, Київський кооперативний інститут бізнесу і права, 2017. http://er.nau.edu.ua/handle/NAU/35620.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
7

Leppan, Claudette. "Analysis of a South African cyber-security awareness campaign for schools using interdisciplinary communications frameworks." Thesis, Nelson Mandela Metropolitan University, 2017. http://hdl.handle.net/10948/18167.

Повний текст джерела
Анотація:
To provide structure to cyber awareness and educational initiatives in South Africa, Kortjan and Von Solms (2014) developed a five-layer cyber-security awareness and education framework. The purpose of the dissertation is to determine how the framework layers can be refined through the integration of communication theory, with the intention to contribute towards the practical implications of the framework. The study is approached qualitatively and uses a case study for argumentation to illustrate how the existing framework can be further developed. Drawing on several comprehensive campaign planning models, the dissertation illustrates that not all important campaign planning elements are currently included in the existing framework. Proposed changes in the preparation layer include incorporating a situational and target audience analysis, determining resources allocated for the campaign, and formulating a communication strategy. Proposed changes in the delivery layer of the framework are concerned with the implementation, monitoring and adjustment, as well as reporting of campaign successes and challenges. The dissertation builds on, and adds to, the growing literature on the development of campaigns for cyber-security awareness and education aimed at children.
Стилі APA, Harvard, Vancouver, ISO та ін.
8

Munir, Sundas, and Mirza Sanam Iqbal Baig. "Challenges and Security Aspects of Blockchain Based Online Multiplayer Games​." Thesis, Högskolan i Halmstad, Akademin för informationsteknologi, 2019. http://urn.kb.se/resolve?urn=urn:nbn:se:hh:diva-38771.

Повний текст джерела
Анотація:
Video gaming has always been a blooming industry. With the emergence of online multi- player video games , this industry’s worth have sky rocketed. Online multiplayer video games store data of player’s credentials, in-game progress, in-game virtual assets and payment details etc. Which mean security threats to these systems are nothing new and securing these games have always meant to protect player’s data from unauthorized breach. Integration of Blockchain technology in online multiplayer video games apart from other amazing features, provides a way to prove digital ownership of virtual assets with their verifiable scarcity. Trade of these in-game virtual assets have always been a goal for online multiplayer gaming companies, but there was none enough trust-able infrastructure available which can be relied on. Blockchain just solved that problem. It provided a platform for these asset’s secure and transparent transaction between players. Topic for our research not only consider the security challenges in online games but specifi- cally blockchain based online multiplayer games. This adaptation is still new and there is need of consideration of new security challenges. In this dissertation we try to bring out some important challenges related to security of blockchain based online multiplayer video games. There are currently no studies around security concerns and challenges of the integration of the online multiplayer video games in the emerging blockchain systems. In order to fill in the gap, this dissertation discusses and identifies two main security concerning questions related to this domain. Also this dissertation provides basic steps for expanding future research and application in this joint domain.
Стилі APA, Harvard, Vancouver, ISO та ін.
9

Kirkham, E., and C. Flew. "Strengthening embargoes and enhancing human security." Thesis, International Alert, Saferworld and University of Bradford, Department of Peace Studies, Centre for International Co-operation and Security, 2003. http://hdl.handle.net/10454/4275.

Повний текст джерела
Анотація:
yes
Arms embargoes are one of the principal tools of states in seeking to prevent, limit and bring an end to armed conflict and human rights abuses. Despite the frequency with which arms embargoes have been imposed, there are significant problems with their implementation. Pressure is therefore growing for the international governmental community to act in order to ensure that the political commitment embodied by the imposition of arms embargoes is matched by the commitment to ensure their rigorous enforcement and to achieve enhanced human security on the ground. Increasing the effectiveness of arms embargoes is a specific aim of the United Nations Programme of Action for Preventing and Combating the Illicit Trade in Small Arms and Light Weapons in All Its Aspects1 which specifically calls upon states "To take appropriate measures, including all legal or administrative means, against any activity that violates a United Nations Security Council arms embargo in accordance with the Charter of the United Nations".2 Accordingly, within the context of the implementation of the UN PoA, the overall aim of this paper is to explore ways in which the international community can act in order to strengthen the impact of arms embargoes and enhance human security. It will begin by examining the purposes, processes and effects relating to arms embargoes, with particular attention to those agreed at international (UN) level, and by highlighting issues of concern in each regard. An overview of the main issues and challenges facing implementation of arms embargoes will include the elaboration of three case-study examples showing the impact of UN arms embargoes on the availability of arms and on human security and a further five that illustrate the dilemmas faced by states in seeking to implement arms embargoes. Priority areas for attention in any international effort to strengthen the effectiveness of arms embargoes will be followed by more extensive proposals for enhancing international embargo regimes within the context of implementing the UN PoA. Whilst it is recognised that the UN PoA contains measures that relate only to the illicit trade in small arms and light weapons (SALW), if implemented fully, many of these would serve to strengthen the international apparatus of control, information exchange and provision of assistance relating to arms proliferation and misuse as a whole. In turn, this would greatly enhance the implementation of UN arms embargoes. Therefore, as well as providing an opportunity for reviewing progress on implementing the PoA, the first Biennial Meeting of States in July 2003 is clearly a major opportunity for states to address a number of the pressing challenges facing states in the implementation of UN embargoes.
Стилі APA, Harvard, Vancouver, ISO та ін.
10

Hakkestad, Mårten, and Simon Rynningsjö. "Who hacked my toaster? : A study about security management of the Internet of Things." Thesis, Linköpings universitet, Informatik, 2019. http://urn.kb.se/resolve?urn=urn:nbn:se:liu:diva-158468.

Повний текст джерела
Анотація:
The Internet of Things is a growing area with growing security concerns, new threat emerge almost everyday. Keeping up to date, monitor the network and devices and responding to compromised devices and networks are a hard and complex matters.  This bachelor’s thesis aims to discover how a IT-company can work with security management within the Internet of Things, this is done by looking into how a IT-company can work with updating, monitoring and responding within the Internet of Things, as well what challenges there are with working with this.  A qualitative research approach was used for this case study along with an interpretative perspective, as well as abductive reasoning. Interviews were performed with employees of a large IT-company based in Sweden, along with extensive document analysis.  Our bachelor’s thesis results in challenges with Security Management within the areas updating, monitoring and responding along with how our Case Company works with these security challenges. Largely these challenges can be summarized that everything is harder with the number of devices there are within the Internet of Things
Internet of Things eller Sakernas internet är ett växande område med en växande hotbild och nya hot uppkommer dagligen. Att hålla sig uppdaterad, övervaka nätverk och enheter samt att reagera på att enheter och nätverk blir hackade är en svår och komplicerad uppgift. Den här uppsatsen ämnar undersöka hur ett IT-företag kan arbeta med säkerhetshantering inom Internet of Things. Detta har gjorts genom att kolla utmaningar och säkerhetslösningar inom de tre områdena uppdatera, övervaka och reagera.  En kvalitativ forskningsmetod har använts i denna fallstudie tillsammans med ett tolkande synsätt och en abduktiv ansats. Vi har utfört intervjuer på ett stort IT-företag baserat i Sverige tillsammans med en utförlig dokumentanalys.  Resultatet av denna uppsats påvisar ett antal utmaningar inom säkerhetshanteringen inom områdena uppdatera, övervaka och reagera tillsammans med hur vårt fallföretag jobbar med att motarbeta dessa utmaningar. I stort sett kan utmaningarna sammanfattas till att allting är svårare när mängden enheten är så hög som den är inom Internet of Things.
Стилі APA, Harvard, Vancouver, ISO та ін.

Книги з теми "Human aspects of cyber security"

1

Kizza, Joseph Migga. Computer network security and cyber ethics. 3rd ed. Jefferson, N.C: McFarland, 2011.

Знайти повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
2

editor, Babic Mile, ed. Human security. London: SCM Press, 2018.

Знайти повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
3

Scott, Lynn M. Human capital management for the USAF cyber force. Santa Monica, CA: RAND Project Air Force, 2010.

Знайти повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
4

Furnell, Steven, and Nathan Clarke, eds. Human Aspects of Information Security and Assurance. Cham: Springer International Publishing, 2021. http://dx.doi.org/10.1007/978-3-030-81111-2.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
5

Clarke, Nathan, and Steven Furnell, eds. Human Aspects of Information Security and Assurance. Cham: Springer International Publishing, 2022. http://dx.doi.org/10.1007/978-3-031-12172-2.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
6

Clarke, Nathan, and Steven Furnell, eds. Human Aspects of Information Security and Assurance. Cham: Springer International Publishing, 2020. http://dx.doi.org/10.1007/978-3-030-57404-8.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
7

Kartashkin, V. A. International security and human rights. Moscow: Novosti Press Agency Pub. House, 1988.

Знайти повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
8

Thanh-Đạm, Trương, Wieringa Saskia 1950-, and Chhachhi Amrita, eds. Engendering human security: Feminist perspectives. London: Zed Books, 2006.

Знайти повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
9

Marinos, Louis, and Ioannis Askoxylakis, eds. Human Aspects of Information Security, Privacy, and Trust. Berlin, Heidelberg: Springer Berlin Heidelberg, 2013. http://dx.doi.org/10.1007/978-3-642-39345-7.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
10

Tryfonas, Theo, ed. Human Aspects of Information Security, Privacy and Trust. Cham: Springer International Publishing, 2017. http://dx.doi.org/10.1007/978-3-319-58460-7.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.

Частини книг з теми "Human aspects of cyber security"

1

Ravidas, Dhrisya, Malcolm R. Pattinson, and Paula Oliver. "Cyber Security in Healthcare Organisations." In Human Aspects of Information Security and Assurance, 3–11. Cham: Springer International Publishing, 2021. http://dx.doi.org/10.1007/978-3-030-81111-2_1.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
2

Perno, Jason, and Christian W. Probst. "Behavioural Profiling in Cyber-Social Systems." In Human Aspects of Information Security, Privacy and Trust, 507–17. Cham: Springer International Publishing, 2017. http://dx.doi.org/10.1007/978-3-319-58460-7_35.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
3

Wall, David S. "Towards a Conceptualisation of Cloud (Cyber) Crime." In Human Aspects of Information Security, Privacy and Trust, 529–38. Cham: Springer International Publishing, 2017. http://dx.doi.org/10.1007/978-3-319-58460-7_37.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
4

Glas, Magdalena, Manfred Vielberth, Tobias Reittinger, Fabian Böhm, and Günther Pernul. "Visual Programming in Cyber Range Training to Improve Skill Development." In Human Aspects of Information Security and Assurance, 3–13. Cham: Springer International Publishing, 2022. http://dx.doi.org/10.1007/978-3-031-12172-2_1.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
5

Jaffray, Alice, Conor Finn, and Jason R. C. Nurse. "SherLOCKED: A Detective-Themed Serious Game for Cyber Security Education." In Human Aspects of Information Security and Assurance, 35–45. Cham: Springer International Publishing, 2021. http://dx.doi.org/10.1007/978-3-030-81111-2_4.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
6

Vasileiou, Ismini. "Cyber Security Education and Training Delivering Industry Relevant Education and Skills via Degree Apprenticeships." In Human Aspects of Information Security and Assurance, 175–85. Cham: Springer International Publishing, 2020. http://dx.doi.org/10.1007/978-3-030-57404-8_14.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
7

Yuan, Haiyue, Shujun Li, Patrice Rusconi, and Nouf Aljaffan. "When Eye-Tracking Meets Cognitive Modeling: Applications to Cyber Security Systems." In Human Aspects of Information Security, Privacy and Trust, 251–64. Cham: Springer International Publishing, 2017. http://dx.doi.org/10.1007/978-3-319-58460-7_17.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
8

Fagade, Tesleem, Theo Spyridopoulos, Nabeel Albishry, and Theo Tryfonas. "System Dynamics Approach to Malicious Insider Cyber-Threat Modelling and Analysis." In Human Aspects of Information Security, Privacy and Trust, 309–21. Cham: Springer International Publishing, 2017. http://dx.doi.org/10.1007/978-3-319-58460-7_21.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
9

Buldas, Ahto, and Märt Saarepera. "Are the Current System Engineering Practices Sufficient to Meet Cyber Crime?" In Human Aspects of Information Security, Privacy and Trust, 451–63. Cham: Springer International Publishing, 2017. http://dx.doi.org/10.1007/978-3-319-58460-7_31.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
10

Alotaibi, Mohammed Khaled N. "Employees’ Interest in Professional Advancement on LinkedIn Increases Susceptibility to Cyber-Social Engineering: An Empirical Test." In Human Aspects of Information Security and Assurance, 85–96. Cham: Springer International Publishing, 2020. http://dx.doi.org/10.1007/978-3-030-57404-8_7.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.

Тези доповідей конференцій з теми "Human aspects of cyber security"

1

Leon Bello, Jorge, and Emilio Gonzalez Viosca. "CARONTE project: Creating an Agenda for Research on Transportation Security." In CIT2016. Congreso de Ingeniería del Transporte. Valencia: Universitat Politècnica València, 2016. http://dx.doi.org/10.4995/cit2016.2016.3272.

Повний текст джерела
Анотація:
Europe’s prosperity relies on effective transport systems. Any attacks and disturbances to land freight and passenger transport would have significant impact on economic growth, territorial cohesion, social development and the environment. Unfortunately, there are weaknesses in the land transport security.The objective of CARONTE project is define a future research agenda for security in land transport that focuses on core gaps caused by emerging risks while avoiding any doubling-up of research elsewhere. Its research agenda will cover all threats, including cyber-crime, and security aspects across all modes of land transportation. At the same time, it will respect the fundamental human rights and privacy of European citizens. The step-by-step method of CARONTE’s consortium has analyzed the state of the art and emerging risks; has identified gaps, analyses and assessments of potential solutions; and has produced an overall research agenda for the future. CARONTE’s results will answer the following questions among others: Which existing research projects merit a follow up and extension?Where are the combinations or synergy effects to be attended?Which themes and topics should be elaborated in new research projects?Who should be involved and integrated in future research projects (stakeholders, authorities, etc.)? The CARONTE consortium includes universities and research institutes, companies, and end-users providing with experience in research and consultancy in transportation, logistics, infrastructure management, security and communications. ITENE - Instituto Tecnológico del Embalaje, Transporte y Logística- has been one of the Project partners among a total of 11 members from eight different countries in the European Union which have also been supported via a High Level Advisory Board.DOI: http://dx.doi.org/10.4995/CIT2016.2016.3272
Стилі APA, Harvard, Vancouver, ISO та ін.
2

Mercuri, Ilenia. "Social Engineering and Human-Robot Interactions' Risks." In 13th International Conference on Applied Human Factors and Ergonomics (AHFE 2022). AHFE International, 2022. http://dx.doi.org/10.54941/ahfe1002199.

Повний текст джерела
Анотація:
Modern robotics seems to have taken root from the theories of Isaac Asimov, in 1941. One area of research that has become increasingly popular in recent decades is the study of artificial intelligence or A.I., which aims to use machines to solve problems that, according to current opinion, require intelligence. This is related to the study on “Social Robots”. Social Robots are created in order to interact with human beings; they have been designed and programmed to engage with people by leveraging a "human" aspect and various interaction channels, such as speech or non-verbal communication. They therefore readily solicit social responsiveness in people who often attribute human qualities to the robot. Social robots exploit the human propensity for anthropomorphism, and humans tend to trust them more and more. Several issues could arise due to this kind of trust and to the ability of “superintelligence” to "self-evolve", which could lead to the violation of the purposes for which it was designed by humans, becoming a risk to human security and privacy. This kind of threat concerns social engineering, a set of techniques used to convince users to perform a series of actions that allow cybercriminals to gain access to the victims' resources. The Human Factor is the weakest ring of the security chain, and the social engineers exploit Human-Robots Interaction to persuade an individual to provide private information.An important research area that has shown interesting results for the knowledge of the possibility of human interaction with robots is "cyberpsychology". This paper aims to provide insights into how the interaction with social robots could be exploited by humans not only in a positive way but also by using the same techniques of social engineering borrowed from "bad actors" or hackers, to achieve malevolent and harmful purposes for man himself. A series of experiments and interesting research results will be shown as examples. In particular, about the ability of robots to gather personal information and display emotions during the interaction with human beings. Is it possible for social robots to feel and show emotions, and human beings could empathize with them? A broad area of research, which goes by the name of "affective computing", aims to design machines that are able to recognize human emotions and consistently respond to them. The aim is to apply human-human interaction models to human-machine interaction. There is a fine line that separates the opinions of those who argue that, in the future, machines with artificial intelligence could be a valuable aid to humans and those who believe that they represent a huge risk that could endanger human protection systems and safety. It is necessary to examine in depth this new field of cybersecurity to analyze the best path to protect our future. Are social robots a real danger? Keywords: Human Factor, Cybersecurity, Cyberpsychology, Social Engineering Attacks, Human-Robot Interaction, Robotics, Malicious Artificial Intelligence, Affective Computing, Cyber Threats
Стилі APA, Harvard, Vancouver, ISO та ін.
3

Karjalainen, Mika, Tero Kokkonen, and Samir Puuska. "Pedagogical Aspects of Cyber Security Exercises." In 2019 IEEE European Symposium on Security and Privacy Workshops (EuroS&PW). IEEE, 2019. http://dx.doi.org/10.1109/eurospw.2019.00018.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
4

Ahmad, Ibtihaj, Muhammad Kaab Zarrar, Takreem Saeed, and Saad Rehman. "Security Aspects of Cyber Physical Systems." In 2018 1st International Conference on Computer Applications & Information Security (ICCAIS). IEEE, 2018. http://dx.doi.org/10.1109/cais.2018.8442009.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
5

Green, Sam, Ihsan Cicek, and Cetin Kaya Koc. "Continuous-Time Computational Aspects of Cyber-Physical Security." In 2016 Workshop on Fault Diagnosis and Tolerance in Cryptography (FDTC). IEEE, 2016. http://dx.doi.org/10.1109/fdtc.2016.19.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
6

Bhatia, Nishant Lalitkumar, Vinod Kumar Shukla, Ritu Punhani, and Shish Kumar Dubey. "Growing Aspects of Cyber Security in E-Commerce." In 2021 International Conference on Communication information and Computing Technology (ICCICT). IEEE, 2021. http://dx.doi.org/10.1109/iccict50803.2021.9510152.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
7

"Cyber Security in HSI." In 2019 12th International Conference on Human System Interaction (HSI). IEEE, 2019. http://dx.doi.org/10.1109/hsi47298.2019.8942627.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
8

LeFebvre, Rebecca. "The human element in cyber security." In the 2012 Information Security Curriculum Development Conference. New York, New York, USA: ACM Press, 2012. http://dx.doi.org/10.1145/2390317.2390318.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
9

Jones, Simon L., Emily I. M. Collins, Ana Levordashka, Kate Muir, and Adam Joinson. "What is 'Cyber Security'?" In CHI '19: CHI Conference on Human Factors in Computing Systems. New York, NY, USA: ACM, 2019. http://dx.doi.org/10.1145/3290607.3312786.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
10

"2 Cyber Security in HSI." In 2021 14th International Conference on Human System Interaction (HSI). IEEE, 2021. http://dx.doi.org/10.1109/hsi52170.2021.9538651.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.

Звіти організацій з теми "Human aspects of cyber security"

1

Beiker, Sven. Unsettled Issues in Remote Operation for On-road Driving Automation. SAE International, December 2021. http://dx.doi.org/10.4271/epr2021028.

Повний текст джерела
Анотація:
On-road vehicles equipped with driving automation features—where a human might not be needed for operation on-board—are entering the mainstream public space. However, questions like “How safe is safe enough?” and “What to do if the system fails?” persist. This is where remote operation comes in, which is an additional layer to the automated driving system where a human remotely assists the so-called “driverless” vehicle in certain situations. Such remote-operation solutions introduce additional challenges and potential risks as the entire vehicle-network-human now needs to work together safely, effectively, and practically. Unsettled Issues in Remote Operation for On-road Driving Automation highlights technical questions (e.g., network latency, bandwidth, cyber security) and human aspects (e.g., workload, attentiveness, situational awareness) of remote operation and introduces evolving solutions. The report also discusses standards development and regulations—both of which are needed to provide frameworks for the deployment of driving automation with remote operation.
Стилі APA, Harvard, Vancouver, ISO та ін.
2

Frieson, Kate Grace. A Gender Assessment of SEACFMD 2020: A Roadmap to Prevent, Control and Eradicate foot and mouth disease (by 2020) in Southeast Asia and China. O.I.E (World Organisation for Animal Health), December 2013. http://dx.doi.org/10.20506/standz.2785.

Повний текст джерела
Анотація:
This gender assessment of SEACFMD 2020: A Roadmap to Prevent, Control and Eradicate foot and mouth disease (by 2020) in Southeast Asia and China, responds to the requirement of AusAID that all strategies affecting human health, food security and poverty alleviation incorporate a gender perspective as women are not often included in the technical and community based aspects of programs relating to animal health and disease control. Gender roles and responsibilities affect women’s and men’s ability and incentive to participate in FMD roadmap activities, and can potentially lead to different project impacts for men and women.
Стилі APA, Harvard, Vancouver, ISO та ін.
3

Coelho Resende, Noelle, Renata Weber, Jardel Fischer Loeck, Mathias Vaiano Glens, Carolina Gomes, Priscila Farfan Barroso, Janine Targino, Emerson Elias Merhy, Leandro Dominguez Barretto, and Carly Machado. Working Paper Series: Therapeutic Communities in Brazil. Edited by Taniele Rui and Fiore Mauricio. Drugs, Security and Democracy Program, Social Science Research Council, June 2021. http://dx.doi.org/10.35650/ssrc.2081.d.2021.

Повний текст джерела
Анотація:
Spread across Brazil and attaining an unparalleled political force, therapeutic communities are as inescapable in the debate on drug policy as they are complex to define. Although they are not a Brazilian creation, they have been operating in that country for decades, and their dissemination intensified in the 1990s. In 2011, they were officially incorporated into Brazil's Psychosocial Care Network (Rede de Atenção Psicossocial, or RAPS). Since then, therapeutic communities have been at the center of public debates about their regulation; about how they should—or even if they should—be a part of the healthcare system; about the level of supervision to which they should be submitted; about their sources of funding, particularly whether or not they should have access to public funding; and, most importantly, about the quality of the services they offer and the many reports of rights violation that have been made public. However, a well-informed public debate can only flourish if the available information is based on sound evidence. The SSRC’s Drugs, Security and Democracy Program is concerned with the policy relevance of the research projects it supports, and the debate around therapeutic communities in Brazil points to a clear need for impartial research that addresses different cross-cutting aspects of this topic in its various dimensions: legal, regulatory, health, and observance of human rights, among others. It is in this context that we publish this working paper series on therapeutic communities in Brazil. The eight articles that compose this series offer a multidisciplinary view of the topic, expanding and deepening the existing literature and offering powerful contributions to a substantive analysis of therapeutic communities as instruments of public policy. Although they can be read separately, it is as a whole that the strength of the eight articles that make up this series becomes more evident. Even though they offer different perspectives, they are complementary works in—and already essential for—delineating and understanding the phenomenon of therapeutic communities in Brazil.
Стилі APA, Harvard, Vancouver, ISO та ін.
Ми пропонуємо знижки на всі преміум-плани для авторів, чиї праці увійшли до тематичних добірок літератури. Зв'яжіться з нами, щоб отримати унікальний промокод!

До бібліографії