Showing 1 - 10 of 141
This article describes how the ease of access to information and communication technologies is practically a prerequisite for the functioning of modern society. Taking the competitive market into consideration, the protection of the information infrastructure for a company, could mean that...
Persistent link: https://www.econbiz.de/10012045474
During the last decade, researchers and practitioners became more interested in the domain of vulnerability analysis. It is considered as a key element in defining and managing supply chain risks. The great complexity of a global supply chain and of its environment, coupled with managerial...
Persistent link: https://www.econbiz.de/10012047281
Cyber threats pose a growing risk to national security for all nations; cyberpower is consequently becoming an increasingly prominent driver in the attainment of national security for any state. This paper investigates the national cyberpower environment by analysing the elements of cyberspace...
Persistent link: https://www.econbiz.de/10012043889
With the continuous development of information technology, mobile e-commerce as a new economic and industrial mode has brought great benefits to the society. Mobile e-commerce does not need to bear the constraints of time and place, which has brought great benefits to the enterprise, from the...
Persistent link: https://www.econbiz.de/10012048998
world for its number of Internet users. So, it is expected that India would come into the top 10 E-commerce hub by 2020 …
Persistent link: https://www.econbiz.de/10012049063
Academia plays an important role in shaping a country's cyber readiness. In the past years, nations have started investing in new cyber-related programs at colleges and universities. This also includes promoting academic exchange with partner countries, as well as putting effort into improved...
Persistent link: https://www.econbiz.de/10012043863
Internet to connect all these controls. However, the controlling devices thus opened to the world do not always have adequate … security. Several years ago the Shodan search engine showed how easy it is to find these control devices on the Internet. The … second contribution is to present a template for a national Internet scanning program. The authors discuss the technology …
Persistent link: https://www.econbiz.de/10012043864
The cyber security discourse is dominated by states and corporations that focus on the protection of critical information infrastructure and databases. The priority is the security of information systems and networks, rather than the protection of connected users. The dominance of war metaphors...
Persistent link: https://www.econbiz.de/10012043867
The cyber threat to industrial control systems is an acknowledged security issue, but a qualified dataset to quantify the risk remains largely unavailable. Senior executives of facilities that operate these systems face competing requirements for investment budgets, but without an understanding...
Persistent link: https://www.econbiz.de/10012043884
The smart grid is a new paradigm that aims to modernize the legacy power grid. It is based on the integration of ICT technologies, embedded system, sensors, renewable energy and advanced algorithms for management and optimization. The smart grid is a system of systems in which communication...
Persistent link: https://www.econbiz.de/10012044694