Characterizing and measuring maliciousness for cybersecurity risk assessment

ZM King, DS Henshel, L Flora, MG Cains… - Frontiers in …, 2018 - frontiersin.org
Cyber attacks have been increasingly detrimental to networks, systems, and users, and are
increasing in number and severity globally. To better predict system vulnerabilities …

[HTML][HTML] Applying cultural evolution to sustainability challenges: an introduction to the special issue

JS Brooks, TM Waring, M Borgerhoff Mulder… - Sustainability …, 2018 - Springer
Human activity at multiple scales is the primary driver of the environmental challenges
humanity faces (Steffen et al. 2007). Numerous scholars have argued that addressing …

The evolution of combinatoriality and compositionality in hominid tool use: a comparative perspective

SSJ Putt, Z Anwarzai, C Holden, L Ruck… - International Journal of …, 2024 - Springer
A crucial design feature of language useful for determining when grammatical language
evolved in the human lineage is our ability to combine meaningless units to form a new unit …

[图书][B] Police culture and decision making

L Anthony - 2018 - search.proquest.com
Decisions made by street-level police officers during encounters with the public have an
immediate and long-lasting effect. Bad choices can cause a loss of trust, respect, and …

Re-thinking threat intelligence

C Sample, J Cowley, T Watson… - … Conference on Cyber …, 2016 - ieeexplore.ieee.org
Attribution relies largely on technology; however, experts who rely on technology may
inadvertently inject their own biases when evaluating findings. Attackers are now deceiving …

Cultural exploration of attack vector preferences for self-identified attackers

C Sample, J Cowley… - 2017 11th International …, 2017 - ieeexplore.ieee.org
The examination of digital events through the prism of a quantitatively represented cultural
framework allows for a new perspective on existing cyber security issues and events. When …

Cultural observations on social engineering victims

C Sample, S Hutchinson, A Karamanian… - … Conference on cyber …, 2017 - books.google.com
Geert Hofstede observed the ever-present role of culture in thought. The role of culture in the
thought process is so prevalent, yet unstated, that many cultural beliefs and biases are …

Hofstede's cultural markers in successful victim cyber exploitations

A Karamanian, C Sample, M Kolenko - Journal of Information Warfare, 2016 - JSTOR
Hofstede, Hofstede, and Minkov (2010) observed that culture acts as “software of the mind”.
These authors have written that culture influences behaviour and motivation for behaviour …

Mobile learning in Oman: a case study of two'cycle 2'(grades 5-10) private schools

M Al-Siyabi - 2019 - centaur.reading.ac.uk
Mobile technologies have been utilised in all aspects of life including education. Research
on implementing these technologies in educational settings has been flourishing in recent …

The Persuasion Game

D Ormrod, K Scott, L Scheinman, T Kodalle… - Journal of Information …, 2020 - JSTOR
In an age of hybrid, asymmetric, and non-linear conflict, the role of Information Operations
has become increasingly important. This paper presents a research project examining ways …