Articles with "cyber" as a keyword



Photo by possessedphotography from unsplash

Intelligent educational cyber‐physical systems for college English course

Sign Up to like & get
recommendations!
Published in 2021 at "Computer Applications in Engineering Education"

DOI: 10.1002/cae.22341

Abstract: Cyber‐physical systems (CPS) refer to the incorporation of computing systems in physical world procedures. In the present systems, researchers are facing some difficulties, such as their use in school and colleges, which need to be… read more here.

Keywords: intelligent educational; cyber physical; educational cyber; cyber ... See more keywords
Photo by thinkmagically from unsplash

A model to analyze the challenge of using cyber insurance

Sign Up to like & get
recommendations!
Published in 2019 at "Information Systems Frontiers"

DOI: 10.1007/s10796-017-9737-3

Abstract: This work analyzes and extends insurance dynamics in the context of cyber risk. Cyber insurance contracts, when used as a means to manage residual cyber risk, could behave differently from other traditional (e.g., property) insurance.… read more here.

Keywords: cyber; model analyze; challenge using; cyber insurance ... See more keywords
Photo from wikipedia

Deterrence by Norms to Stop Interstate Cyber Attacks

Sign Up to like & get
recommendations!
Published in 2017 at "Minds and Machines"

DOI: 10.1007/s11023-017-9446-1

Abstract: In April 2017, the foreign ministers of the G7 countries approved a ‘Declaration on Responsible States Behaviour in Cyberspace’ (G7 Declaration 2017). The Declaration addresses a mounting concern about international stability and the security of… read more here.

Keywords: state; declaration; norms stop; cyber attacks ... See more keywords
Photo from wikipedia

A Framework for the Evaluation of Trainee Performance in Cyber Range Exercises

Sign Up to like & get
recommendations!
Published in 2020 at "Mobile Networks and Applications"

DOI: 10.1007/s11036-019-01442-0

Abstract: This paper proposes a novel approach for the evaluation of the performance achieved by trainees involved in cyber security exercises implemented in modern cyber ranges. Our main contributions include: the definition of a distributed monitoring… read more here.

Keywords: trainee; framework evaluation; evaluation trainee; performance ... See more keywords
Photo from wikipedia

Cyber-bystanders’ reactions toward tourism companies’ prejudice practice during the COVID-19 pandemic

Sign Up to like & get
recommendations!
Published in 2021 at "Journal of Hospitality and Tourism Management"

DOI: 10.1016/j.jhtm.2021.09.002

Abstract: Prejudice against tourists from the epidemic areas or those infected during the COVID-19 pandemic has attracted much attention. While many studies examined the influence of this prejudice on tourists themselves, little research has been conducted… read more here.

Keywords: tourism; cyber bystanders; cyber; bystanders reactions ... See more keywords
Photo from wikipedia

Probabilistic safety assessment-based importance analysis of cyber-attacks on nuclear power plants

Sign Up to like & get
recommendations!
Published in 2019 at "Nuclear Engineering and Technology"

DOI: 10.1016/j.net.2018.09.009

Abstract: Abstract With the application of digital technology to safety-critical infrastructures, cyber-attacks have emerged as one of the new dangerous threats. In safety-critical infrastructures such as a nuclear power plant (NPP), a cyber-attack could have serious… read more here.

Keywords: cyber attacks; importance analysis; cyber; safety ... See more keywords
Photo by priscilladupreez from unsplash

Cyber Bullying Experiences of Adolescents and Parental Awareness: Turkish Example

Sign Up to like & get
recommendations!
Published in 2019 at "Journal of Pediatric Nursing"

DOI: 10.1016/j.pedn.2018.11.006

Abstract: Purpose This study investigates the experiences of adolescents with cyber bullying and the awareness of their parents regarding the problem of cyber bullying. Design and Methods The descriptive cross‐sectional research was carried out with 1129… read more here.

Keywords: social media; victimization; experiences adolescents; cyber ... See more keywords
Photo by hollymindrup from unsplash

Risk based approach in scope of cybersecurity threats and requirements

Sign Up to like & get
recommendations!
Published in 2020 at "Procedia Manufacturing"

DOI: 10.1016/j.promfg.2020.02.243

Abstract: Abstract Paper is focused on theoretical and practical considerations related to risk management and cyber security based on the cyber kill chain concept introduced by Lockheed Martin. Proposed approach of cyber risk management embedded on… read more here.

Keywords: risk; kill chain; cyber kill; approach ... See more keywords
Photo from wikipedia

A National Survey of Hospital Cyber Attack Emergency Operation Preparedness

Sign Up to like & get
recommendations!
Published in 2023 at "Disaster Medicine and Public Health Preparedness"

DOI: 10.1017/dmp.2022.283

Abstract: Abstract Objective: Cyberattacks on healthcare systems are increasing in frequency and severity. Hospitals need to integrate cybersecurity preparedness into their emergency operations planning and response to mitigate adverse outcomes during increasingly likely cyber events. No… read more here.

Keywords: emergency; survey; cybersecurity; hospital ... See more keywords
Photo from wikipedia

Maritime Cyber Risk Management: An Experimental Ship Assessment

Sign Up to like & get
recommendations!
Published in 2019 at "Journal of Navigation"

DOI: 10.1017/s0373463318001157

Abstract: The maritime transport industry is increasingly reliant on computing and communication technologies, and the need for cyber risk management of critical systems and assets on vessels is becoming critically important. In this paper, a comprehensive… read more here.

Keywords: cyber; risk management; ship; assessment ... See more keywords
Photo from wikipedia

Cyber War and Lessons from History in the Digital Age

Sign Up to like & get
recommendations!
Published in 2018 at "Intelligence and National Security"

DOI: 10.1080/02684527.2018.1502002

Abstract: Much used, although often little understood, the terms ‘cyber warfare’ and ‘cyber conflict’ litter the Internet and the print media in the guise of a variety of revelatory exposes, confessions, exclusives and alarmist headlines. In… read more here.

Keywords: cyber; cyber war; technology; cyber conflict ... See more keywords