Results for 'Cyber attacks'

966 found
Order:
  1. USC Football Notebook: Robey, McDonald Secondary Stalwarts.White House Confirms Cyber Attack - forthcoming - Hermes.
     
    Export citation  
     
    Bookmark  
  2.  57
    Cyber Attacks and Terrorism: A Twenty-First Century Conundrum.Marwan Albahar - 2019 - Science and Engineering Ethics 25 (4):993-1006.
    In the recent years, an alarming rise in the incidence of cyber attacks has made cyber security a major concern for nations across the globe. Given the current volatile socio-political environment and the massive increase in the incidence of terrorism, it is imperative that government agencies rapidly realize the possibility of cyber space exploitation by terrorist organizations and state players to disrupt the normal way of life. The threat level of cyber terrorism has never been (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark   1 citation  
  3.  97
    Just War Theory and Cyber-Attacks.Leonard Kahn - 2013 - In Not Just Wars.
    In this chapter, I take up the question of whether one of the central principles of jus ad bellum – just cause – is relevant in a world in which cyberattacks occur. I argue that this principle is just as relevant as ever, though it needs modification in light of recent developments. In particular, I argue, contrary to many traditional just war theorists, that just cause should not be limited to physical attacks. In the process, I offer an improved (...)
    Direct download  
     
    Export citation  
     
    Bookmark  
  4.  33
    The Ethics of Cyber Attack: Pursuing Legitimate Security and the Common Good in Contemporary Conflict Scenarios.David J. Lonsdale - 2020 - Journal of Military Ethics 19 (1):20-39.
    Cyber attack against Critical National Infrastructure is a developing capability in state arsenals. The onset of this new instrument in national security has implications for conflict thresholds an...
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark  
  5. (1 other version)Just War Theory and Cyber-Attacks.Leonard Kahn - 2013 - In Not Just Wars.
     
    Export citation  
     
    Bookmark  
  6.  15
    Node Importance Evaluation of Cyber-Physical System under Cyber-Attacks Spreading.Xin-Rui Liu, Yuan Meng & Peng Chang - 2021 - Complexity 2021:1-15.
    The study of cyber-attacks, and in particular the spread of attack on the power cyber-physical system, has recently attracted considerable attention. Identifying and evaluating the important nodes under the cyber-attack propagation scenario are of great significance for improving the reliability and survivability of the power system. In this paper, we improve the closeness centrality algorithm and propose a compound centrality algorithm based on adaptive coefficient to evaluate the importance of single-layer network nodes. Moreover, we quantitatively calculated (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  7.  9
    Maybe If We Turn It Off and Then Turn It Back On Again? Exploring Health Care Reform as a Means to Curb Cyber Attacks.Deborah R. Farringer - 2019 - Journal of Law, Medicine and Ethics 47 (S4):91-102.
    The health care industry has moved at a rapid pace away from paper records to an electronic platform across almost all sectors — much of it at the encouragement and insistence of the federal government. Such rapid expansion has increased exponentially the risk to individuals in the privacy of their data and, increasingly, to their physical well-being when medical records are inaccessible through ransomware attacks. Recognizing the unique and critical nature of medical records, the United States Congress established the (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  8.  34
    Deterrence by Norms to Stop Interstate Cyber Attacks.Mariarosaria Taddeo - 2017 - Minds and Machines 27 (3):387-392.
  9.  21
    High-Order Observer-Based Sliding Mode Control for the Isolated Microgrid with Cyber Attacks and Physical Uncertainties.Hao Wang, He Jiang, Yan Zhao, Huanxin Guan, Bo Hu & Shunjiang Wang - 2020 - Complexity 2020:1-11.
    System security is essential for the operation of the island microgrid. However, the system security is generally threatened due to the presence of physical uncertainties and cyber attacks. In this article, a novel sliding mode load control strategy is proposed for the microgrid to mitigate cyber attacks and physical uncertainties. Firstly, a high-order disturbance observer is designed to estimate the unmeasurable factors in the microgrid. Secondly, a HODO-based sliding mode control strategy is proposed where the estimated (...)
    No categories
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  10. Government agencies and businesses should coordinate efforts to restructure the United States defenses against cyber attacks.James Starbuck & Marianna Shelbourne - forthcoming - Argument: Biannual Philosophical Journal.
     
    Export citation  
     
    Bookmark  
  11.  19
    Machine learning techniques applied to detect cyber attacks on web applications.M. Chora & R. Kozik - 2015 - Logic Journal of the IGPL 23 (1):45-56.
  12. A Model to Facilitate Discussions About Cyber Attacks.Graham Fairclough & Jassim Happa - 2016 - In Ludovica Glorioso & Mariarosaria Taddeo (eds.), Ethics and Policies for Cyber Operations: A Nato Cooperative Cyber Defence Centre of Excellence Initiative. Cham: Springer Verlag.
    No categories
     
    Export citation  
     
    Bookmark  
  13.  58
    Cyber Force and the Role of Sovereign States in Informational Warfare.Ugo Pagallo - 2015 - Philosophy and Technology 28 (3):407-425.
    The use of cyber force can be as severe and disruptive as traditional armed attacks are. Cyber attacks may neither provoke physical injuries nor cause property damages and still, they can affect essential functions of today’s societies, such as governmental services, business processes or communication systems that progressively depend on information as a vital resource. Whereas several scholars claim that an international treaty, much as new forms of international cooperation, are necessary, a further challenge should be (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark   1 citation  
  14. Just War, Cyber War, and the Concept of Violence.Christopher J. Finlay - 2018 - Philosophy and Technology 31 (3):357-377.
    Recent debate on the relationship between cyber threats, on the one hand, and both strategy and ethics on the other focus on the extent to which ‘cyber war’ is possible, both as a conceptual question and an empirical one. Whether it can is an important question for just war theorists. From this perspective, it is necessary to evaluate cyber measures both as a means of responding to threats and as a possible just cause for using armed kinetic (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark   4 citations  
  15.  14
    #WeareUnited, cyber-nationalism during times of a national crisis: The case of a terrorist attack on a school in Pakistan.Fauzia Janjua & Salma Kalim - 2019 - Discourse and Communication 13 (1):68-94.
    Seeing language as a social practice and national identities as a product of discourse, the study intends to analyze discursive practices employed on social media to create the discourses of sameness and difference in times of national crisis. Following the discourse historical approach, I have illustrated how argumentative strategies and topos have been strategically employed to draw boundaries between Us and Them. In this exploration of exclusionary rhetoric, I have also underlined the use of images, memes and hashtags in the (...)
    No categories
    Direct download  
     
    Export citation  
     
    Bookmark   2 citations  
  16. Regulate artificial intelligence to avert cyber arms race.Mariarosaria Taddeo & Luciano Floridi - 2018 - Nature 556 (7701):296-298.
    This paper argues that there is an urgent need for an international doctrine for cyberspace skirmishes before they escalate into conventional warfare.
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark   24 citations  
  17.  35
    Crossing the Rubicon: Understanding Cyber Terrorism in the European Context.Emerald M. Archer - 2014 - The European Legacy 19 (5):606-621.
    The first decade of the twenty-first century introduced a cultural shift where terrorism is concerned by making new technologies such as computers and networks available as both tools and targets for exploitation. The current rise in the number of attempts at launching a cyber attack may represent a new generation of “terrorists” and their discontent with governments, private companies, or with other non-governmental groups. Using cyber technologies has many benefits for the user and the potential of causing more (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  18.  16
    Book Review: Cyber Racism: White Supremacy Online and the New Attack on Civil Rights. By Jessie Daniels. New York: Rowman & Littlefield, 2009, 274 pp., $75.00 (cloth); $28.95. [REVIEW]R. Sophie Statzel - 2010 - Gender and Society 24 (3):408-409.
    No categories
    Direct download  
     
    Export citation  
     
    Bookmark  
  19. Simulations in Cyber-Security: A Review of Cognitive Modeling of Network Attackers, Defenders, and Users. [REVIEW]Vladislav D. Veksler, Norbou Buchler, Blaine E. Hoffman, Daniel N. Cassenti, Char Sample & Shridat Sugrim - 2018 - Frontiers in Psychology 9.
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark   2 citations  
  20.  62
    Reliable Old Wineskins: The Applicability of the Just War Tradition to Military Cyber Operations.Edward T. Barrett - 2015 - Philosophy and Technology 28 (3):387-405.
    This article argues that the traditional jus ad bellum and jus in bello criteria are fully capable of providing the ethical guidance needed to legitimately conduct military cyber operations. The first part examines the criteria’s foundations by focusing on the notion of liability to defensive harm worked out by revisionist just war thinkers. The second part critiques the necessity of alternative frameworks, which its proponents assert are required to at least supplement the traditional just war criteria. Using the latter, (...)
    No categories
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  21.  63
    How to Think About Cyber Conflicts Involving Non-state Actors.Phillip McReynolds - 2015 - Philosophy and Technology 28 (3):427-448.
    A great deal of attention has been paid in recent years to the legality of the actions of states and state agents in international and non-international cyber conflicts. Less attention has been paid to ethical considerations in these situations, and very little has been written regarding the ethics of the participation of non-state actors in such conflicts. In this article, I analyze different categories of non-state participation in cyber operations and undertake to show under what conditions such actions, (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark   1 citation  
  22.  39
    Rethinking Cyber War.Daniel K. Rosenfield - 2009 - Critical Review: A Journal of Politics and Society 21 (1):77-90.
    ABSTRACT Cybernetic attacks have been wrongly perceived as weapons of physical destruction rather than of disruption. Because modern, post‐industrial societies have become critically dependent on computer networks to function on a day‐to‐day basis, disruption of those networks could have serious social and economic consequences. In order to better protect society, policymakers will have to re‐orient their approach toward cyber security so as to emphasize the genuine cybernetic threat, which is network disruption rather than physical destruction.
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark   1 citation  
  23.  54
    Can there be a Just Cyber War?Michael Boylan - unknown
    Cyber warfare is challenging traditional paradigms about what constitutes a just war. It is an emerging phenomenon that needs to be addressed separately in order to create reasonable regulations on its use and proper responses to the same. Some of these challenges refer to first what might constitute an act of war as opposed to a case of criminal sabotage. Other difficulties concern issues of sovereignty, the right to remain neutral, and proportionate responses to attack. Several recent examples of (...)
    No categories
    Direct download  
     
    Export citation  
     
    Bookmark   1 citation  
  24.  44
    Ethics and Cyber Warfare: The Quest for Responsible Security in the Age of Digital Warfare.George R. Lucas - 2016 - New York, US: Oxford University Press USA.
    From North Korea's recent attacks on Sony to perpetual news reports of successful hackings and criminal theft, cyber conflict has emerged as a major topic of public concern. Yet even as attacks on military, civilian, and commercial targets have escalated, there is not yet a clear set of ethical guidelines that apply to cyber warfare. Indeed, like terrorism, cyber warfare is commonly believed to be a war without rules. Given the prevalence cyber warfare, developing (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark   2 citations  
  25.  11
    An Optimal DoS Attack Strategy Disturbing the Distributed Economic Dispatch of Microgrid.Yihe Wang, Mingli Zhang, Kun Song, Tie Li & Na Zhang - 2021 - Complexity 2021:1-16.
    As a promising method with excellent characteristics in terms of resilience and dependability, distributed methods are gradually used in the field of energy management of microgrid. However, these methods have more stringent requirements on the working conditions, which will make the system more sensitive to communication failures and cyberattacks. As a result, it is both theoretical merits and practical values to investigate the malicious effect of cyber attacks on microgrid. This paper studies the distributed economic dispatch problem under (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  26.  26
    Cyber security threats: A never-ending challenge for e-commerce.Xiang Liu, Sayed Fayaz Ahmad, Muhammad Khalid Anser, Jingying Ke, Muhammad Irshad, Jabbar Ul-Haq & Shujaat Abbas - 2022 - Frontiers in Psychology 13.
    This study explores the challenge of cyber security threats that e-commerce technology and business are facing. Technology applications for e-commerce are attracting attention from both academia and industry. It has made what was not possible before for the business community and consumers. But it did not come all alone but has brought some challenges, and cyber security challenge is one of them. Cyber security concerns have many forms, but this study focuses on social engineering, denial of services, (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  27.  41
    Justifying Cyber-intelligence?Ross W. Bellaby - 2016 - Journal of Military Ethics 15 (4):299-319.
    The surge in threats aided by or carried out through cyberspace has placed significant pressure on the intelligence community to adapt or leave itself open to attack. Indeed, many in both political and intelligence circles argue for access to ever greater amounts of cyber information in order to catch potential threats before they become real. By collecting all our digital information, the intelligence community argues that it is not only able to detail what people have done or are currently (...)
    No categories
    Direct download (6 more)  
     
    Export citation  
     
    Bookmark   2 citations  
  28.  25
    Towards a Cognitive Theory of Cyber Deception.Edward A. Cranford, Cleotilde Gonzalez, Palvi Aggarwal, Milind Tambe, Sarah Cooney & Christian Lebiere - 2021 - Cognitive Science 45 (7):e13013.
    This work is an initial step toward developing a cognitive theory of cyber deception. While widely studied, the psychology of deception has largely focused on physical cues of deception. Given that present‐day communication among humans is largely electronic, we focus on the cyber domain where physical cues are unavailable and for which there is less psychological research. To improve cyber defense, researchers have used signaling theory to extended algorithms developed for the optimal allocation of limited defense resources (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  29.  28
    Cyber Security and Key Management Issues for Internet of Things: Techniques, Requirements, and Challenges.Mohammad Faisal, Ikram Ali, Muhammad Sajjad Khan, Junsu Kim & Su Min Kim - 2020 - Complexity 2020:1-9.
    Internet of Things-based environments pose various challenges due to their anytime/anywhere computing, and the efficient cryptographic based key management is one of the major challenges in Internet of Things. The key management life cycle consists of initialization, key generation, key registration, key backup, key update, key recovery, and key revocation. Our contribution in this paper is to summarize the state-of-the-art key management schemes and techniques in different scenarios, such as mobile ad hoc networks, wireless sensor networks, and the Internet of (...)
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark  
  30.  9
    Event-Triggered H ∞ Filtering for Markovian Jump Neural Networks under Random Missing Measurements and Deception Attacks.Jinxia Wang, Jinfeng Gao, Tian Tan, Jiaqi Wang & Miao Ma - 2020 - Complexity 2020:1-19.
    This paper concentrates on the event-triggered H ∞ filter design for the discrete-time Markovian jump neural networks under random missing measurements and cyber attacks. Considering that the controlled system and the filtering can exchange information over a shared communication network which is vulnerable to the cyber attacks and has limited bandwidth, the event-triggered mechanism is proposed to relieve the communication burden of data transmission. A variable conforming to Bernoulli distribution is exploited to describe the stochastic phenomenon (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  31.  16
    Examination of cyber aggression by adult consumers: ethical framework and drivers.Mei Han & Arturo Z. Vasquez - 2019 - Journal of Information, Communication and Ethics in Society 18 (2):305-319.
    Purpose The widespread use of information and communication technologies enables consumers to obtain and share information whenever they feel the urge. With the advent of review websites and forums, companies and business owners may find themselves victims of consumer cyber aggression, which can hurt a company badly. This study aims to explore why consumers would engage in cyber aggression against companies, and to that end, it examines consumers’ ethical orientation and other possible drivers of cyber aggression. Design/methodology/approach (...)
    No categories
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  32.  22
    Rogue people: on adversarial crowdsourcing in the context of cyber security.Mohammad Moradi & Qi Li - 2021 - Journal of Information, Communication and Ethics in Society 19 (1):87-103.
    Purpose Over the past decade, many research works in various disciplines have benefited from the endless ocean of people and their potentials as an effective problem-solving strategy and computational model. But nothing interesting is ever completely one-sided. Therefore, when it comes to leveraging people's power, as the dark side of crowdsourcing, there are some possible threats that have not been considered as should be, such as recruiting black hat crowdworkers for organizing targeted adversarial intentions. The purpose of this paper is (...)
    No categories
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark   1 citation  
  33.  21
    Security Risk Analysis of Active Distribution Networks with Large-Scale Controllable Loads under Malicious Attacks.Jiaqi Liang, Yibei Wu, Jun’E. Li, Xiong Chen, Heqin Tong & Ming Ni - 2021 - Complexity 2021:1-12.
    With the development of distributed networks, the remote controllability of the distributed energy objects and the vulnerability of user-side information security protection measures make distributed energy objects extremely vulnerable to malicious control by attackers. Hence, the large-scale loads may produce abnormal operation performance, such as load casting/dropping synchronously or frequent and synchronous casting and dropping, and hence, it can threaten the security and stable operation of the distribution networks. First, we analyze the security threats faced by industrial controllable load, civil (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  34.  11
    Analysis of Impact of Industry 4.0 on Africa, Eastern Europe and US: A Case Study of Cyber-Security and Sociopolitical Dynamics of Nigeria, Russia and USA. [REVIEW]James Chike Nwankwo - 2022 - Bulletin of Science, Technology and Society 42 (1-2):3-10.
    This article explores the technological innovations associated with industry 4.0 and how it has altered virtually every aspect of the human life. Even though in the process of redefining technology, the insatiable and complex needs of man can be met quite considerably, there are various challenges observed with its usage by individuals, groups, business organizations and countries. Some of the consequences highlighted in this study include cyber-threat or attacks against businesses and individuals, political figures and government. Therefore the (...)
    No categories
    Direct download  
     
    Export citation  
     
    Bookmark  
  35. Information Warfare: A Philosophical Perspective. [REVIEW]Mariarosaria Taddeo - 2012 - Philosophy and Technology 25 (1):105-120.
    This paper focuses on Information Warfare—the warfare characterised by the use of information and communication technologies. This is a fast growing phenomenon, which poses a number of issues ranging from the military use of such technologies to its political and ethical implications. The paper presents a conceptual analysis of this phenomenon with the goal of investigating its nature. Such an analysis is deemed to be necessary in order to lay the groundwork for future investigations into this topic, addressing the ethical (...)
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark   20 citations  
  36.  72
    Is it OK to be an Anonymous?Philip Serracino-Inglott - 2013 - Ethics and Global Politics 6 (4):217-244.
    Do the deviant acts carried out by the collective known as Anonymous qualify as vigilante activity, and if so, can they be justified? Addressing this question helps expose the difficulties of morally evaluating technologically enabled deviance. Anonymous is a complex, fluid actor but not as mysterious as popularly portrayed. Under a definition of vigilantism that includes reprobative punishment rather than violence as a key element, Anonymous are vigilantes. Many of its Ops can be justified in view of the mismatch between (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark   1 citation  
  37.  34
    Apriori Algorithm for the Data Mining of Global Cyberspace Security Issues for Human Participatory Based on Association Rules.Zhi Li, Xuyu Li, Runhua Tang & Lin Zhang - 2021 - Frontiers in Psychology 11.
    This study explored the global cyberspace security issues, with the purpose of breaking the stereotype of people’s cognition of cyberspace problems, which reflects the relationship between interdependence and association. Based on the Apriori algorithm in association rules, a total of 181 strong rules were mined from 40 target websites and 56,096 web pages were associated with global cyberspace security. Moreover, this study analyzed support, confidence, promotion, leverage, and reliability to achieve comprehensive coverage of data. A total of 15,661 sites mentioned (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark   3 citations  
  38.  20
    Academic Information Security Researchers: Hackers or Specialists?Mehdi Dadkhah, Mohammad Lagzian & Glenn Borchardt - 2018 - Science and Engineering Ethics 24 (2):785-790.
    In this opinion piece, we present a synopsis of our findings from the last 2 years concerning cyber-attacks on web-based academia. We also present some of problems that we have faced and try to resolve any misunderstandings about our work. We are academic information security specialists, not hackers. Finally, we present a brief overview of our methods for detecting cyber fraud in an attempt to present general guidelines for researchers who would like to continue our work. We (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  39.  27
    Just War Doctrine – Relic or Relevant?John Thomas - 2021 - Russian Journal of Philosophical Sciences 63 (11):7-38.
    In the article, I examine the relevance of Just War Doctrine to contemporary conflicts. Just War Doctrine, which grew out of Western Christian thinking, presupposes that evil might be confronted with force, if there is no alternative way to restore a just order. But modern trends call into question the certainty and universality of this doctrine. On the one hand, ideas of moral relativism and comparative justice have become more widespread, potentially undermining the use of the notions “just” and “justified” (...)
    No categories
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  40.  26
    Cooperation creates results: third prize: 2007 Schubmehl-Prein Essay contest.Maria Lee - 2008 - Acm Sigcas Computers and Society 38 (1):24-27.
    Cyberspace is the non-physical space by which the whole world is connected. Cyberspace is made possible by the inventions of the computer and the internet. With this interconnectivity comes danger and fear as well. In this non-physical space, people never know what could be happening on the other end. Someone at this moment could be trying to get into the nation's computer infrastructure to plan an attack against America. However, the organization of the government, cooperation with other countries, and the (...)
    No categories
    Direct download (4 more)  
     
    Export citation  
     
    Bookmark  
  41. Ethiek voor Cyberkrijg en Cyberkrijgers.Peter Olsthoorn - 2019 - Algemeen Nederlands Tijdschrift voor Wijsbegeerte 111 (1):95-109.
    Although some claim that the term cyber war is merely metaphorical, there are good reasons to see cyber war as a form of warfare ‐ even if it is not war as we have hitherto known it. This poses the question whether the principles of the Just War Tradition, which claims to offer an alternative for pacifism and realism, apply to this specific kind of war too. This article argues that the jus in bello principles of discrimination and (...)
    Direct download (4 more)  
     
    Export citation  
     
    Bookmark  
  42.  15
    Забезпечення кібернетичної безпеки у країнах балтії: Історична ретроспектива.Olga Gapeyeva - 2017 - Схід 6 (152):34-40.
    The Russian Federation conducts an information policy in the Baltic direction, aimed at forming a negative image of Latvia, Lithuania and Estonia in the international scene through involving research and development institutions, Russian media and social networks to informational propaganda. Main forms and methods of destructive influence on Russian-speaking population of the Baltic countries have been identified in previous studies. So, the Baltic countries for a long time are in the epicentre of cyber and information attacks by Russian (...)
    No categories
    Direct download  
     
    Export citation  
     
    Bookmark  
  43.  55
    Security-by-Experiment: Lessons from Responsible Deployment in Cyberspace.Wolter Pieters, Dina Hadžiosmanović & Francien Dechesne - 2016 - Science and Engineering Ethics 22 (3):831-850.
    Conceiving new technologies as social experiments is a means to discuss responsible deployment of technologies that may have unknown and potentially harmful side-effects. Thus far, the uncertain outcomes addressed in the paradigm of new technologies as social experiments have been mostly safety-related, meaning that potential harm is caused by the design plus accidental events in the environment. In some domains, such as cyberspace, adversarial agents may be at least as important when it comes to undesirable effects of deployed technologies. In (...)
    Direct download (12 more)  
     
    Export citation  
     
    Bookmark   1 citation  
  44. (1 other version)The specifics of displaying social networks and computer technologies in the fantasy universe of Stephen King in the early 70s of the XX century — early 20s of the XXI century in historical retrospect. [REVIEW]К. В Каспарян, М. В Рутковская & И. Н Колесников - 2025 - Philosophical Problems of IT and Cyberspace (PhilITandC) 2:64-86.
    This article is devoted to the analysis of the characteristic features of the process of displaying virtual network platforms and cybernetic technologies in the early 1970s — early 2020s in the fantastic universe (literary and cinematic) created by S. King, one of the leading American science fiction writers of our time. In this study, the authors provide a justification for the relevance and scientific novelty of the problem under study. This paper analyzes the specific features of the impact of electronic (...)
    No categories
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  45. Where computer security meets national security.Helen Nissenbaum - 2005 - Ethics and Information Technology 7 (2):61-73.
    This paper identifies two conceptions of security in contemporary concerns over the vulnerability of computers and networks to hostile attack. One is derived from individual-focused conceptions of computer security developed in computer science and engineering. The other is informed by the concerns of national security agencies of government as well as those of corporate intellectual property owners. A comparative evaluation of these two conceptions utilizes the theoretical construct of “securitization,”developed by the Copenhagen School of International Relations.
    Direct download (4 more)  
     
    Export citation  
     
    Bookmark   6 citations  
  46. The Ethics of Cyberwarfare.Randall R. Dipert - 2010 - Journal of Military Ethics 9 (4):384-410.
    The paper addresses several issues in the morality of cyberwar and cyberwarfare, defined as one nation's attacks on the governmental or civilian information systems of another nation. It sketches the diverse technical ways in which an attack may occur, including denial-of-service attacks and the insertion of various forms of malware. It argues that existing international law and widely discussed principles of Just War Theory do not straightforwardly apply to cyberwarfare, and many forms of cyberwarfare differ from previous forms (...)
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark   23 citations  
  47.  12
    Vulnerability of Submarine Cable Network of Mainland China: Comparison of Vulnerability between before and after Construction of Trans-Arctic Cable System.Yongshun Xie & Chengjin Wang - 2021 - Complexity 2021:1-14.
    The submarine optical-fiber cable is a large connectivity infrastructure, which plays an important role in international communication, cyber-physical systems, and even national security. Although submarine cable network interruption may cause serious consequences, researching its vulnerability has not attracted much attention. This paper proposes a quantitative method to measure the vulnerability of the submarine cable network and evaluates the influence of the upcoming trans-Arctic cable system on the submarine cable network of mainland China. To address this issue, first, the submarine (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  48.  16
    Research on data mining method of network security situation awareness based on cloud computing.Rajan Miglani, Abdullah M. Baqasah, Roobaea Alroobaea, Guodong Zhao & Ying Zhou - 2022 - Journal of Intelligent Systems 31 (1):520-531.
    Due to the complexity and versatility of network security alarm data, a cloud-based network security data extraction method is proposed to address the inability to effectively understand the network security situation. The information properties of the situation are generated by creating a set of spatial characteristics classification of network security knowledge, which is then used to analyze and optimize the processing of hybrid network security situation information using cloud computing technology and co-filtering technology. Knowledge and information about the security situation (...)
    Direct download  
     
    Export citation  
     
    Bookmark  
  49.  10
    Hessenberg factorization and firework algorithms for optimized data hiding in digital images.Salama A. Mostafa, Jamal N. Hasoon, Muhanad Tahrir Younis & Methaq Talib Gaata - 2022 - Journal of Intelligent Systems 31 (1):440-453.
    Data hiding and watermarking are considered one of the most important topics in cyber security. This article proposes an optimized method for embedding a watermark image in a cover medium (color image). First, the color of the image is separated into three components (RGB). Consequently, the discrete wavelet transform is applied to each component to obtain four bands (high–high, high–low, low–high, and low–low), resulting in 12 bands in total. By omitting the low–low band from each component, a new square (...)
    No categories
    Direct download  
     
    Export citation  
     
    Bookmark  
  50.  9
    Environmental Just Wars: Jus ad Bellum and the Natural Environment.Tamar Meisels - forthcoming - Journal of Applied Philosophy.
    War is bad for the environment, yet the environmental ramifications of warfare have not been widely addressed by just war theorists and revisionist philosophers of war. The law and legal scholars have paid more attention to protecting nature during armed conflict. But because the law focuses invariably on rules mitigating the conduct of hostilities rather than on objective justice of cause, environmental jus ad bellum has been explored even less extensively than environmental ethics in war. Setting out with the presumption (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
1 — 50 / 966