Skip to main content
D eclaring America's digital infrastructure to be a "strategic national asset" President Barack Obama called cyberspace the "fifth domain", the "new frontier" and as vital and valuable as land, sea, air and space -and as threatened by the... more
    • by 
    •   11  
      Information SecurityGlobalizationCyber TerrorismCyber Warfare
Military intelligence, abbreviated as "intel" or MI, refers to the collection, analysis, and distribution of information relevant to military operations. Every nation on Earth utilizes military intelligence to make itself more secure and... more
    • by 
    •   7  
      GlobalizationNational SecurityInformation Technology and SecurityResearch in Technology
    • by 
    •   6  
      GlobalizationInformation Technology and SecurityResearch in TechnologyTechnology and it's Advancements
The Fifth Dimension of Conflictuality: The Rise of Cyberspace and Its Effects on In- ternational Politics Cyberspace has become a crucial element for political, social, financial and individual activities. The Information and... more
    • by 
    •   70  
      Information SystemsSociologyArtificial IntelligenceHuman Computer Interaction
Businesses using cyberspace are expanding every day, with Internet users performing different activities affecting cyber hygiene. The user's actions may be good or badultimately determining the state of cyber hygiene. Good cybersecurity... more
    • by 
    •   7  
      BusinessBest PracticesCybercrimeCyber Security
In present day's satellite play important role in various part of life and industry. Security, entertainment, data communication and many other things are dependent on satellite networks and communication modules. Satellite is more or... more
    • by  and +1
    •   5  
      Artificial IntelligenceNetwork SecuritySatellite NetworksCyber Forensics
Il ´Cyber Strategy & Policy Brief´ si pone come scopo quello di sensibilizzare ogni mese il vertice politico e i lettori sui temi legati alla cyber-security, analizzando i principali avvenimenti a livello internazionale, al fine di... more
    • by 
    •   27  
      Military IntelligenceStrategy (Military Science)CyberlawForeign Policy Analysis
    • by 
    •   30  
      Criminal LawCriminal JusticeGlobalizationTerrorism
Today it is globally known that it is a modern era of Artificial Intelligence. There is a great impact of Artificial Intelligence on the society as we are surrounded by technology. It is being observed that in Today's time, Artificial... more
    • by 
    •   5  
      Digital ForensicsCyber SecurityCyber ForensicsArtificial Intelligence And Techniques
With the increase in the number of internet users in the country (India), led to a new form of crimes known as Cyber Crime. No doubt, the internet revolution has been a boon to mankind in many fields. However, the dark side of it also... more
    • by 
    •   17  
      Digital LiteracyCyberneticsCyber TerrorismCyber crime
    • by 
    •   177  
      Information SystemsElectronic EngineeringCommunication EngineeringSociology
There is a growing concern, based on credible technical evidence that the government of Zimbabwe recently started using IMSI Catchers to track its citizens' movements and mobile phone usage within certain defined zones. Originally... more
    • by  and +1
    •   5  
      Data MiningCyber crimeCyber SecurityDigital Forensics and Cyber Investigation
Data Leakage or Loss Prevention (DLP) or information leak prevention (ILP) or information protection and control (IPC) technology has been developed to prevent data from intentionally or accidentally leaking out. Data loss prevention... more
    • by 
    •   12  
      Information ManagementData ManagementIntrusion Detection SystemsCyber Security
what is Troll Trolling & Law in India
    • by 
    •   32  
      CyberlawDemocracy and Cyber-Democracy Theory and PracticeCyberpsychologyInternet Studies
Говорить об ошибке в когнитивной эволюции Homo позволяет наблюдаемая в прогнозе реальность и многовековой опыт жизнедеятельности человечества: ни обширное научное знание, ни фундаментальные духовные учения, ни гуманистическая... more
    • by 
    •   12  
      Jean PiagetHuman ConsciousnessPaul KleeNatural Selection
Biometrics is a statistical analysis of people's unique behavioral characteristics. The technology is used for CYBERSECURITY. The basics of biometric authentication is that to stop security breaches by analyzing a person's unique... more
    • by 
    •   4  
      BiometricsCybercultureCyber SecurityCyber Crime and Technological Advancements
The present study has shed light upon the cyber risks associated with business management. The study has analyzed that with increasing digitalization and advancements in technology, the risks of cybersecurity are increasing as well. The... more
    • by 
    •   10  
      CyberlawCyberpsychologyCyberneticsComputer Security
This paper includes the gender-neutral approach of Section 66E, the application of this section, the explanations, and the kind of situations this section would be applicable in, a similar provision in the Protection of Children from... more
    • by 
    •   16  
      Criminal LawCivil LawCyberlawSocial Sciences
we will investigate an assortment of cyber-attacks and diverse security strategies. We try to make an investigation into the branch of knowledge. This paper investigates how cybercrime has become a genuine danger in our lives and we will... more
    • by  and +2
    •   19  
      CyberlawCyberpsychologyCybercrimesCybernetics
Building up on the following draft we welcome comments and suggestions and would like to elaborate with you a fully shared definition for academics and practitioners.
    • by  and +1
    •   61  
      Computer ScienceArtificial IntelligenceInformation TechnologyMilitary Science
Information security breaches pose a growing threat to organizations and individuals, particularly those that are mainly associated with the e-commerce industry. Data security within an organization is important as Information systems are... more
    • by 
    •   15  
      Political SociologyInformation SecurityCybercrimesInternational Security
Social media may be seen as the new oil that makes the world go round providing access to all manner of information about the users. With the challenges to cyber security, social media users now require a level of awareness of the impact... more
    • by 
    •   8  
      Information TechnologyCyberlawInformation ManagementCyber Terrorism
Note : √√ indicates aprincipal resposibility; √ indicates a secondary responsibility. Functional-level decisions implement the overall strategy formulated at the corporate and business levels. They involveaction-orientied operational... more
    • by 
    • Cyber Crime and Technological Advancements
Today cyber space is easily accessible and has presence beyond geo-political boundaries; also rapidly becoming a global battlefield for various states and non-states entities. With the advent of the Internet of Things (IoT), every... more
    • by 
    •   34  
      Policy Analysis/Policy StudiesSocial PolicyCyberlawDemocracy and Cyber-Democracy Theory and Practice
This thesis discusses the analysis and implementation of an information system for improving the management of internship program in higher institutions of learning a case study of the University of Kisubi. The system is meant to aid in... more
    • by 
    •   3  
      ICT integration in teaching and learingCyber Crime and Technological AdvancementsWill Preparation and Management with ICT integration
    • by 
    •   36  
      CyberlawDemocracy and Cyber-Democracy Theory and PracticeCyberpsychologyCybercrimes
= A NEW DIGITAL VERSION [E-BOOK] OF THIS WORK IS AVAILABLE IN KINDLE STORE | WWW.AMAZON.COM THIS CONTENT IS SUPLYIED AS A COURTESY TO STUDENTS AND RESERCHERS. IF ADDITIONAL MATERIAL IS NEEDED, PLEASE CONTACT THE AUTHOR AT... more
    • by 
    •   22  
      HistoryCyberlawDemocracy and Cyber-Democracy Theory and PracticeSocial Sciences
The benefits of autonomous vehicles (AVs) are widely acknowledged, but there are concerns about the extent of these benefits and AV risks and unintended consequences. In this article, we first examine AVs and different categories of the... more
    • by  and +1
    •   289  
      BusinessInformation SystemsManagementRisk Management and Insurance
    • by 
    •   141  
      BusinessHistoryMilitary HistoryDiplomatic History
Serious weaknesses were discovered in WPA2, a protocol that secures all modern protected Wi-Fi networks. An attacker within range of a victim can exploit these weaknesses using key reinstallation attacks (KRACKs). Concretely, attackers... more
    • by 
    •   12  
      Network SecurityBiometricsCryptographyBiometrics Authentication Technologies
    • by 
    •   7  
      GlobalizationInformation and Communication Technology LawInformation Technology and SecurityResearch in Technology
ABSTRACT Cybercrime is a kind of crime that happens in cyberspace world, it happens in the world of computer (network or system) and the Internet. It is obvious that, many people have a limited knowledge of cybercrime, and this kind of... more
    • by 
    •   6  
      GlobalizationInformation Technology and SecurityResearch in TechnologyTechnology and it's Advancements
The term shareware is used in contrast to retail software, which refers to commercial software available only with the purchase of a license which may not be copied for others; public domain software, which refers to software not... more
    • by 
    •   13  
      Information SystemsComputer ScienceSoftware EngineeringGlobalization
    • by 
    •   83  
      Information SystemsCultural StudiesInformation TechnologyLaw
This paper examined the changes in librarianship brought about by advancement in technology especially as it relates to new work functions expected of librarians. The major objective of the study was to identify the role of curriculum in... more
    • by 
    •   8  
      GlobalizationInnovation statisticsICT in EducationInformation Technology and Security
    • by 
    •   12  
      Internet LawCrime AnalysisCyber crimeThe Internet
Health information technology can save lives, cut costs, and expand access to care. But its full promise will only be realized if policymakers broker a "grand bargain" between providers, patients, and administrative agencies. In exchange... more
    • by 
    •   22  
      GlobalizationMachine LearningData MiningAccess Control
Despite the fact that the online criminal activities of Nigerian cyberfraudsters popularly known as the Yahoo-boys has attracted tremendous scholarly attention, little empirical information exists on their operational tools, techniques... more
    • by 
    •   5  
      CybercrimesCybercrimeCyber SecurityCyber Crime and Technological Advancements
Employees today are different. They are not the ones who do not have go experienced and talented ones. As soon as they feel dissatisfied with the current employer or the job due to lack of advancement opportunities, salary and... more
    • by 
    •   16  
      Impact of Employee Motivation On Organizational PerformanceJob PerformanceThe Effect of Motivation and Job Satisfaction Toward Employee Level of PerformanceEffects of Technological Advancements and Its Impact on Humanity
Con il patrocinio di Agenzia per l'Italia Digitale (AgID), nel 2016 la LUISS School of Government ha organizzato il corso executive Rivoluzione Digitale e Cybersecurity rivolto a un gruppo di alti dirigenti pubblici con responsabilità di... more
    • by 
    •   25  
      Public AdministrationCyberlawCybercrimesCybernetics
Upskirting – covertly photographing a person's genital or anal region, often to distribute the footage online – is frequently neglected as a form of serious online sexual predation against women. This behaviour has occurred for centuries,... more
    • by 
    •   7  
      PhotographyGender and CrimeRepresentations of CrimeCrime and the Media
This paper includes the gender-neutral approach of Section 66E of the IT Act,2000, the application of this section, the explanations, and the kind of situations this section would be applicable in, a similar provision in the Protection of... more
    • by 
    •   15  
      Criminal LawCivil LawCyberlawSocial Sciences
The advancement in technology has gained universal acceptance which has made the use of computer system almost unavoidable in today's world. Most of the facets of all sectors which includes but not limited to commercial, media, education... more
    • by 
    •   4  
      CybercrimeICT policy and regulationICT LawCyber Crime and Technological Advancements
With the increase use of Information and Communication Technology (ICT) in society, there emerge a new form of crime in cyber space which is called Cyber Crime. The cyber crime is different from any other crime happening in the society.... more
    • by 
    •   20  
      Criminal LawInternet StudiesCybercrimesCybernetics
The intent of this chapter is to re-imagine and apply the term " civil disobedience " to the cyber domain. The full extent of how it can apply will be analyzed in a framework of the evolutionary rights of protest. Traditional civil... more
    • by 
    •   238  
      Critical TheoryBusinessDiscourse AnalysisHistory
    • by 
    •   33  
      Artificial IntelligenceGlobalizationTerrorismMachine Learning
In the past, we all witnessed that the production facilities were shifted to the countries with low employment costs due to the increasing labour costs around the world. Today, especially with the revolution of industry 4.0 initiated... more
    • by 
    •   20  
      Information ScienceArtificial IntelligenceInformation TechnologyInformation Security
Purpose-The emergence of the novel coronavirus (COVID-19) has threatened physical and mental health, and changed the behaviour and decision-making processes of individuals, organisations, and institutions worldwide. As many services move... more
    • by 
    •   14  
      CriminologyIdentity Fraud/TheftCyber crime419 Scams
Businesses using cyberspace are expanding every day, with Internet users performing different activities affecting cyber hygiene. The user's actions may be good or badultimately determining the state of cyber hygiene. Good cybersecurity... more
    • by 
    •   6  
      Best PracticesCybercrimeCyber SecuritySmall Businesses