Skip to main content
The Fifth Dimension of Conflictuality: The Rise of Cyberspace and Its Effects on In- ternational Politics Cyberspace has become a crucial element for political, social, financial and individual activities. The Information and... more
In present day's satellite play important role in various part of life and industry. Security, entertainment, data communication and many other things are dependent on satellite networks and communication modules. Satellite is more or... more
Il ´Cyber Strategy & Policy Brief´ si pone come scopo quello di sensibilizzare ogni mese il vertice politico e i lettori sui temi legati alla cyber-security, analizzando i principali avvenimenti a livello internazionale, al fine di... more
Today it is globally known that it is a modern era of Artificial Intelligence. There is a great impact of Artificial Intelligence on the society as we are surrounded by technology. It is being observed that in Today's time, Artificial... more
With the increase in the number of internet users in the country (India), led to a new form of crimes known as Cyber Crime. No doubt, the internet revolution has been a boon to mankind in many fields. However, the dark side of it also... more
There is a growing concern, based on credible technical evidence that the government of Zimbabwe recently started using IMSI Catchers to track its citizens' movements and mobile phone usage within certain defined zones. Originally... more
Data Leakage or Loss Prevention (DLP) or information leak prevention (ILP) or information protection and control (IPC) technology has been developed to prevent data from intentionally or accidentally leaking out. Data loss prevention... more
Говорить об ошибке в когнитивной эволюции Homo позволяет наблюдаемая в прогнозе реальность и многовековой опыт жизнедеятельности человечества: ни обширное научное знание, ни фундаментальные духовные учения, ни гуманистическая... more
Biometrics is a statistical analysis of people's unique behavioral characteristics. The technology is used for CYBERSECURITY. The basics of biometric authentication is that to stop security breaches by analyzing a person's unique... more
The present study has shed light upon the cyber risks associated with business management. The study has analyzed that with increasing digitalization and advancements in technology, the risks of cybersecurity are increasing as well. The... more
This paper includes the gender-neutral approach of Section 66E, the application of this section, the explanations, and the kind of situations this section would be applicable in, a similar provision in the Protection of Children from... more
we will investigate an assortment of cyber-attacks and diverse security strategies. We try to make an investigation into the branch of knowledge. This paper investigates how cybercrime has become a genuine danger in our lives and we will... more
Building up on the following draft we welcome comments and suggestions and would like to elaborate with you a fully shared definition for academics and practitioners.
Information security breaches pose a growing threat to organizations and individuals, particularly those that are mainly associated with the e-commerce industry. Data security within an organization is important as Information systems are... more
Social media may be seen as the new oil that makes the world go round providing access to all manner of information about the users. With the challenges to cyber security, social media users now require a level of awareness of the impact... more
Note : √√ indicates aprincipal resposibility; √ indicates a secondary responsibility. Functional-level decisions implement the overall strategy formulated at the corporate and business levels. They involveaction-orientied operational... more
Today cyber space is easily accessible and has presence beyond geo-political boundaries; also rapidly becoming a global battlefield for various states and non-states entities. With the advent of the Internet of Things (IoT), every... more
This thesis discusses the analysis and implementation of an information system for improving the management of internship program in higher institutions of learning a case study of the University of Kisubi. The system is meant to aid in... more
= A NEW DIGITAL VERSION [E-BOOK] OF THIS WORK IS AVAILABLE IN KINDLE STORE | WWW.AMAZON.COM THIS CONTENT IS SUPLYIED AS A COURTESY TO STUDENTS AND RESERCHERS. IF ADDITIONAL MATERIAL IS NEEDED, PLEASE CONTACT THE AUTHOR AT... more
The benefits of autonomous vehicles (AVs) are widely acknowledged, but there are concerns about the extent of these benefits and AV risks and unintended consequences. In this article, we first examine AVs and different categories of the... more
Serious weaknesses were discovered in WPA2, a protocol that secures all modern protected Wi-Fi networks. An attacker within range of a victim can exploit these weaknesses using key reinstallation attacks (KRACKs). Concretely, attackers... more
ABSTRACT Cybercrime is a kind of crime that happens in cyberspace world, it happens in the world of computer (network or system) and the Internet. It is obvious that, many people have a limited knowledge of cybercrime, and this kind of... more
Despite the fact that the online criminal activities of Nigerian cyberfraudsters popularly known as the Yahoo-boys has attracted tremendous scholarly attention, little empirical information exists on their operational tools, techniques... more
Employees today are different. They are not the ones who do not have go experienced and talented ones. As soon as they feel dissatisfied with the current employer or the job due to lack of advancement opportunities, salary and... more
Con il patrocinio di Agenzia per l'Italia Digitale (AgID), nel 2016 la LUISS School of Government ha organizzato il corso executive Rivoluzione Digitale e Cybersecurity rivolto a un gruppo di alti dirigenti pubblici con responsabilità di... more
Upskirting – covertly photographing a person's genital or anal region, often to distribute the footage online – is frequently neglected as a form of serious online sexual predation against women. This behaviour has occurred for centuries,... more
The advancement in technology has gained universal acceptance which has made the use of computer system almost unavoidable in today's world. Most of the facets of all sectors which includes but not limited to commercial, media, education... more
With the increase use of Information and Communication Technology (ICT) in society, there emerge a new form of crime in cyber space which is called Cyber Crime. The cyber crime is different from any other crime happening in the society.... more
The intent of this chapter is to re-imagine and apply the term " civil disobedience " to the cyber domain. The full extent of how it can apply will be analyzed in a framework of the evolutionary rights of protest. Traditional civil... more
In the past, we all witnessed that the production facilities were shifted to the countries with low employment costs due to the increasing labour costs around the world. Today, especially with the revolution of industry 4.0 initiated... more
Purpose-The emergence of the novel coronavirus (COVID-19) has threatened physical and mental health, and changed the behaviour and decision-making processes of individuals, organisations, and institutions worldwide. As many services move... more
Businesses using cyberspace are expanding every day, with Internet users performing different activities affecting cyber hygiene. The user's actions may be good or badultimately determining the state of cyber hygiene. Good cybersecurity... more