Security attacks are growing in an exponential manner and their impact on existing systems is seriously high and can lead to dangerous consequences. However, in order to reduce the …
S Kumar, D Agarwal - … Journal of Advance Research in Computer …, 2018 - researchgate.net
As public and private associations relocate a greater amount of their basic capacities to the Internet, criminals have greater opportunity and motivating force to access sensitive data …
I Flechais, G Chalhoub - Proceedings of the 2023 New Security …, 2023 - dl.acm.org
Research into the ethics of cybersecurity is an established and growing topic of investigation, however the translation of this research into practice is lacking: there exists a …
T Georg, B Oliver, L Gregory - The ORBIT Journal, 2018 - Elsevier
This paper discusses the issues of implied trust in ethical hacking. Unlike many other long- established professions, such as lawyers, doctors, and accountants; ethical hacking is a …
W Knowles, A Baron, T McGarr - Computers & Security, 2016 - Elsevier
Simulated security assessments (a collective term used here for penetration testing, vulnerability assessment, and related nomenclature) may need standardisation, but not in …
El artículo analiza el delito de espionaje informático, con énfasis en su concepto y delimitación. Con dicha finalidad, parte examinando brevemente su injusto en relación con …
The sophistication of organised cyber-criminals has evolved dramatically in recent years–to the point that it's now not a question of whether businesses will be hacked, but when. It is …
Cybersecurity and cybercrime cannot exist without each other. They are not contraries, but rather two opposite poles of the same idea. Although it may seem that it is a rather black and …
RE Hinson, KK Twum, E Arhin - Digital Business in Africa: Social Media …, 2022 - Springer
Consumer perception of ethical standards in the use of social media marketing determines trust and loyalty. Social media marketing in Africa is a dominant marketing channel and …