Showing 171 - 180 of 177,554
Persistent link: https://www.econbiz.de/10014022468
This paper sets forth a conceptual model for web security within the context of the overall systems development effort, and within the context of traditional accounting internal control processes and structures. Such a model allows for the enterprise-wide control of security risks over a...
Persistent link: https://www.econbiz.de/10014029178
Persistent link: https://www.econbiz.de/10013549176
Cyber Policy and Economics in an Internet Age is a collection of essays from some of the world's best-known experts on … Internet public policy. It provides an accessible introduction to critical issues that policymakers, businesspeople, and the … values), Internet broadcasting, intellectual property, Internet taxation, consumer protection, privacy, fair E …
Persistent link: https://www.econbiz.de/10013520346
Persistent link: https://www.econbiz.de/10013534161
Persistent link: https://www.econbiz.de/10013500599
connected to the Internet is the subject of this Article. We proceed in nine sections. First, we focus on humanity in crisis …. Second, we define the Internet of Things (IoT), comment on the explosive growth in sensory devices connected to the Internet …
Persistent link: https://www.econbiz.de/10013309271
1. Cybersecurity Technology: A Landscape Analysis -- 2. Cybersecurity technology: an analysis of the topic from 2011 to 2021 -- 3. Cybersecurity and Technology Convergence: Analysis of AI, Blockchain, and IoT Using SNA -- 4. Patent Alert System -- 5. Technology Assessment of Cybersecurity -- 6....
Persistent link: https://www.econbiz.de/10014318464
One year after Russia's invasion of Ukraine, certain assumptions about the utility of cyber operations during wartime can now be put to the test. Russian cyber salvos opened this war, but they failed to achieve their objectives in the face of a resilient cyber defender. Joint cyber/conventional...
Persistent link: https://www.econbiz.de/10014283759
Cyber sovereignty means that states have authority within a fixed boundary to devise rules, laws, and norms about behaviour of individuals, institutions, applications, and other actors and factors in the cyberspace. This idea is intrinsically associated with information security propagated by...
Persistent link: https://www.econbiz.de/10014361320