[图书][B] Social network analysis

D Knoke, S Yang - 2019 - books.google.com
David Knoke and Song Yang′ s Social Network Analysis, Third Edition provides a concise
introduction to the concepts and tools of social network analysis. The authors convey key …

Public Disclosure of Information Security Breach Incidents: Short-term Stock Market Reaction on Indian Listed Firms

S Paul, S Das - Journal of Organizational Computing and …, 2024 - Taylor & Francis
Data breach incidents are growing by the day and firms struggle to detect, defend, and
respond to such breaches. Nowadays, security breaches are considered one of the major …

Determinants of cybercrime originating within a nation: a cross-country study

SK Srivastava, S Das, GJ Udo… - Journal of Global …, 2020 - Taylor & Francis
ABSTRACT8 Cybercrimes have an adverse impact on the reputation and economy of a
nation. This paper investigates the factors that affect the frequency of cybercrime originating …

Authledger: A novel blockchain-based domain name authentication scheme

Z Guan, A Garba, A Li, Z Chen… - … Conference on Information …, 2019 - hal.science
Nowadays public key infrastructure authentication mainly rely on certificate authorities and
have to be trusted by both domain operators and domain owners. Domain Name System …

Phishing attacks in Qatar: A literature review of the problems and solutions

Y Al-Hamar, H Kolivand… - 2019 12th International …, 2019 - ieeexplore.ieee.org
This paper outlines the literature on phishing attacks in Qatar and techniques for countering
them. It begins with the background of phishing, specifically spearphishing, in Qatar and the …

The importance of ids and ips in cloud computing environment: Intensive review and future directions

AN Jaber, S Anwar, NZB Khidzir, M Anbar - Advances in Cyber Security …, 2021 - Springer
Cloud computing paradigm produce several network access resources for example, storage
server and networking. A vast number of transactions over the cloud computing attract the …

Methods to prevent privacy violations on the internet on the personal level in Indonesia

H Ismail, F Febiyanto, JV Moniaga - Procedia Computer Science, 2023 - Elsevier
In recent years, technology has advanced so much that it is so widespread and the internet
is being used by 53.7% of Indonesia's population. This paper reviewed how privacy …

[PDF][PDF] The influence of black market activities through dark web on the economy: a survey

H Mazi, FN Arsene… - The Midwest Instruction …, 2020 - micsymposium.org
The economy of a country is driven in part by the variety of businesses that thrive in it.
Competition among these businesses is encouraged as long as they follow specific rules set …

[图书][B] Developing a digital competence framework for UAE law enforcement agencies to enhance cyber security of Critical Physical Infrastructure (CPI)

M Alhajeri - 2022 - search.proquest.com
Abstract Critical Physical Infrastructures (CPI) are assets and systems that are vital to the
health, safety, security, and economic or social well-being of people, and have become …

Crime Is as Smart and as Dumb as the Internet

A Bancroft, A Bancroft - The Darknet and Smarter Crime: Methods for …, 2020 - Springer
This chapter sets out why we should think about criminological risks as stemming from the
configuration of technology, economic and social organisation, and cultural …