CINXE.COM

Search results for: active cyber defence

<!DOCTYPE html> <html lang="en" dir="ltr"> <head> <!-- Google tag (gtag.js) --> <script async src="https://www.googletagmanager.com/gtag/js?id=G-P63WKM1TM1"></script> <script> window.dataLayer = window.dataLayer || []; function gtag(){dataLayer.push(arguments);} gtag('js', new Date()); gtag('config', 'G-P63WKM1TM1'); </script> <!-- Yandex.Metrika counter --> <script type="text/javascript" > (function(m,e,t,r,i,k,a){m[i]=m[i]||function(){(m[i].a=m[i].a||[]).push(arguments)}; m[i].l=1*new Date(); for (var j = 0; j < document.scripts.length; j++) {if (document.scripts[j].src === r) { return; }} k=e.createElement(t),a=e.getElementsByTagName(t)[0],k.async=1,k.src=r,a.parentNode.insertBefore(k,a)}) (window, document, "script", "https://mc.yandex.ru/metrika/tag.js", "ym"); ym(55165297, "init", { clickmap:false, trackLinks:true, accurateTrackBounce:true, webvisor:false }); </script> <noscript><div><img src="https://mc.yandex.ru/watch/55165297" style="position:absolute; left:-9999px;" alt="" /></div></noscript> <!-- /Yandex.Metrika counter --> <!-- Matomo --> <!-- End Matomo Code --> <title>Search results for: active cyber defence</title> <meta name="description" content="Search results for: active cyber defence"> <meta name="keywords" content="active cyber defence"> <meta name="viewport" content="width=device-width, initial-scale=1, minimum-scale=1, maximum-scale=1, user-scalable=no"> <meta charset="utf-8"> <link href="https://cdn.waset.org/favicon.ico" type="image/x-icon" rel="shortcut icon"> <link href="https://cdn.waset.org/static/plugins/bootstrap-4.2.1/css/bootstrap.min.css" rel="stylesheet"> <link href="https://cdn.waset.org/static/plugins/fontawesome/css/all.min.css" rel="stylesheet"> <link href="https://cdn.waset.org/static/css/site.css?v=150220211555" rel="stylesheet"> </head> <body> <header> <div class="container"> <nav class="navbar navbar-expand-lg navbar-light"> <a class="navbar-brand" href="https://waset.org"> <img src="https://cdn.waset.org/static/images/wasetc.png" alt="Open Science Research Excellence" title="Open Science Research Excellence" /> </a> <button class="d-block d-lg-none navbar-toggler ml-auto" type="button" data-toggle="collapse" data-target="#navbarMenu" aria-controls="navbarMenu" aria-expanded="false" aria-label="Toggle navigation"> <span class="navbar-toggler-icon"></span> </button> <div class="w-100"> <div class="d-none d-lg-flex flex-row-reverse"> <form method="get" action="https://waset.org/search" class="form-inline my-2 my-lg-0"> <input class="form-control mr-sm-2" type="search" placeholder="Search Conferences" value="active cyber defence" name="q" aria-label="Search"> <button class="btn btn-light my-2 my-sm-0" type="submit"><i class="fas fa-search"></i></button> </form> </div> <div class="collapse navbar-collapse mt-1" id="navbarMenu"> <ul class="navbar-nav ml-auto align-items-center" id="mainNavMenu"> <li class="nav-item"> <a class="nav-link" href="https://waset.org/conferences" title="Conferences in 2024/2025/2026">Conferences</a> </li> <li class="nav-item"> <a class="nav-link" href="https://waset.org/disciplines" title="Disciplines">Disciplines</a> </li> <li class="nav-item"> <a class="nav-link" href="https://waset.org/committees" rel="nofollow">Committees</a> </li> <li class="nav-item dropdown"> <a class="nav-link dropdown-toggle" href="#" id="navbarDropdownPublications" role="button" data-toggle="dropdown" aria-haspopup="true" aria-expanded="false"> Publications </a> <div class="dropdown-menu" aria-labelledby="navbarDropdownPublications"> <a class="dropdown-item" href="https://publications.waset.org/abstracts">Abstracts</a> <a class="dropdown-item" href="https://publications.waset.org">Periodicals</a> <a class="dropdown-item" href="https://publications.waset.org/archive">Archive</a> </div> </li> <li class="nav-item"> <a class="nav-link" href="https://waset.org/page/support" title="Support">Support</a> </li> </ul> </div> </div> </nav> </div> </header> <main> <div class="container mt-4"> <div class="row"> <div class="col-md-9 mx-auto"> <form method="get" action="https://publications.waset.org/abstracts/search"> <div id="custom-search-input"> <div class="input-group"> <i class="fas fa-search"></i> <input type="text" class="search-query" name="q" placeholder="Author, Title, Abstract, Keywords" value="active cyber defence"> <input type="submit" class="btn_search" value="Search"> </div> </div> </form> </div> </div> <div class="row mt-3"> <div class="col-sm-3"> <div class="card"> <div class="card-body"><strong>Commenced</strong> in January 2007</div> </div> </div> <div class="col-sm-3"> <div class="card"> <div class="card-body"><strong>Frequency:</strong> Monthly</div> </div> </div> <div class="col-sm-3"> <div class="card"> <div class="card-body"><strong>Edition:</strong> International</div> </div> </div> <div class="col-sm-3"> <div class="card"> <div class="card-body"><strong>Paper Count:</strong> 3972</div> </div> </div> </div> <h1 class="mt-3 mb-3 text-center" style="font-size:1.6rem;">Search results for: active cyber defence</h1> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">3972</span> Active Cyber Defense within the Concept of NATO’s Protection of Critical Infrastructures</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Serkan%20Ya%C4%9Fl%C4%B1">Serkan Yağlı</a>, <a href="https://publications.waset.org/abstracts/search?q=Sel%C3%A7uk%20Dal"> Selçuk Dal</a> </p> <p class="card-text"><strong>Abstract:</strong></p> Cyber-attacks pose a serious threat to all states. Therefore, states constantly seek for various methods to encounter those threats. In addition, recent changes in the nature of cyber-attacks and their more complicated methods have created a new concept: active cyber defence (ACD). This article tries to answer firstly why ACD is important to NATO and find out the viewpoint of NATO towards ACD. Secondly, infrastructure protection is essential to cyber defence. Critical infrastructure protection with ACD means is even more important. It is assumed that by implementing active cyber defence, NATO may not only be able to repel the attacks but also be deterrent. Hence, the use of ACD has a direct positive effect in all international organizations’ future including NATO. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=active%20cyber%20defence" title="active cyber defence">active cyber defence</a>, <a href="https://publications.waset.org/abstracts/search?q=advanced%20persistent%20treat" title=" advanced persistent treat"> advanced persistent treat</a>, <a href="https://publications.waset.org/abstracts/search?q=critical%20infrastructure" title=" critical infrastructure"> critical infrastructure</a>, <a href="https://publications.waset.org/abstracts/search?q=NATO" title=" NATO"> NATO</a> </p> <a href="https://publications.waset.org/abstracts/3927/active-cyber-defense-within-the-concept-of-natos-protection-of-critical-infrastructures" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/3927.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">244</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">3971</span> A Holistic Approach to Institutional Cyber Security</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Mehmet%20Kargaci">Mehmet Kargaci</a> </p> <p class="card-text"><strong>Abstract:</strong></p> It is more important to access information than to get the correct information and to transform it to the knowledge in a proper way. Every person, organizations or governments who have the knowledge now become the target. Cyber security involves the range of measures to be taken from individual to the national level. The National institutions refer to academic, military and major public and private institutions, which are very important for the national security. Thus they need further cyber security measures. It appears that the traditional cyber security measures in the national level are alone not sufficient, while the individual measures remain in a restricted level. It is evaluated that the most appropriate method for preventing the cyber vulnerabilities rather than existing measures are to develop institutional measures. This study examines the cyber security measures to be taken, especially in the national institutions. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=cyber%20defence" title="cyber defence">cyber defence</a>, <a href="https://publications.waset.org/abstracts/search?q=information" title=" information"> information</a>, <a href="https://publications.waset.org/abstracts/search?q=critical%20infrastructure" title=" critical infrastructure"> critical infrastructure</a>, <a href="https://publications.waset.org/abstracts/search?q=security" title=" security"> security</a> </p> <a href="https://publications.waset.org/abstracts/26126/a-holistic-approach-to-institutional-cyber-security" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/26126.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">537</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">3970</span> Preventing and Coping Strategies for Cyber Bullying and Cyber Victimization</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Erdinc%20Ozturk">Erdinc Ozturk</a>, <a href="https://publications.waset.org/abstracts/search?q=Gizem%20Akcan"> Gizem Akcan</a> </p> <p class="card-text"><strong>Abstract:</strong></p> Although there are several advantages of information and communication technologies, they cause some problems like cyber bullying and cyber victimization. Cyber bullying and cyber victimization have lots of negative effects on people. There are lots of different strategies to prevent cyber bullying and victimization. This study was conducted to provide information about the strategies that are used to prevent cyber bullying and cyber victimization. 120 (60 women, 60 men) university students whose ages are between 18 and 35 participated this study. According to findings of this study, men are more prone to cyber bullying than women. Moreover, men are also more prone to cyber victimization than women. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=cyber%20bullying" title="cyber bullying">cyber bullying</a>, <a href="https://publications.waset.org/abstracts/search?q=cyber%20victimization" title=" cyber victimization"> cyber victimization</a>, <a href="https://publications.waset.org/abstracts/search?q=coping%20strategies" title=" coping strategies"> coping strategies</a>, <a href="https://publications.waset.org/abstracts/search?q=sex" title=" sex"> sex</a> </p> <a href="https://publications.waset.org/abstracts/49753/preventing-and-coping-strategies-for-cyber-bullying-and-cyber-victimization" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/49753.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">367</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">3969</span> Emerging Threats and Adaptive Defenses: Navigating the Future of Cybersecurity in a Hyperconnected World</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Olasunkanmi%20Jame%20Ayodeji">Olasunkanmi Jame Ayodeji</a>, <a href="https://publications.waset.org/abstracts/search?q=Adebayo%20Adeyinka%20Victor"> Adebayo Adeyinka Victor</a> </p> <p class="card-text"><strong>Abstract:</strong></p> In a hyperconnected world, cybersecurity faces a continuous evolution of threats that challenge traditional defence mechanisms. This paper explores emerging cybersecurity threats like malware, ransomware, phishing, social engineering, and the Internet of Things (IoT) vulnerabilities. It delves into the inadequacies of existing cybersecurity defences in addressing these evolving risks and advocates for adaptive defence mechanisms that leverage AI, machine learning, and zero-trust architectures. The paper proposes collaborative approaches, including public-private partnerships and information sharing, as essential to building a robust defence strategy to address future cyber threats. The need for continuous monitoring, real-time incident response, and adaptive resilience strategies is highlighted to fortify digital infrastructures in the face of escalating global cyber risks. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=cybersecurity" title="cybersecurity">cybersecurity</a>, <a href="https://publications.waset.org/abstracts/search?q=hyperconnectivity" title=" hyperconnectivity"> hyperconnectivity</a>, <a href="https://publications.waset.org/abstracts/search?q=malware" title=" malware"> malware</a>, <a href="https://publications.waset.org/abstracts/search?q=adaptive%20defences" title=" adaptive defences"> adaptive defences</a>, <a href="https://publications.waset.org/abstracts/search?q=zero-trust%20architecture" title=" zero-trust architecture"> zero-trust architecture</a>, <a href="https://publications.waset.org/abstracts/search?q=internet%20of%20things%20vulnerabilities" title=" internet of things vulnerabilities"> internet of things vulnerabilities</a> </p> <a href="https://publications.waset.org/abstracts/192296/emerging-threats-and-adaptive-defenses-navigating-the-future-of-cybersecurity-in-a-hyperconnected-world" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/192296.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">20</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">3968</span> New Requirements of the Fifth Dimension of War: Planning of Cyber Operation Capabilities</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Mehmet%20Kargaci">Mehmet Kargaci</a> </p> <p class="card-text"><strong>Abstract:</strong></p> Transformation of technology and strategy has been the main factor for the evolution of war. In addition to land, maritime, air and space domains, cyberspace has become the fifth domain with emerge of internet. The current security environment has become more complex and uncertain than ever before. Moreover, warfare has evaluated from conventional to irregular, asymmetric and hybrid war. Weak actors such as terrorist organizations and non-state actors has increasingly conducted cyber-attacks against strong adversaries. Besides, states has developed cyber capabilities in order to defense critical infrastructure regarding the cyber threats. Cyber warfare will be key in future security environment. Although what to do has been placed in operational plans, how to do has lacked and ignored as to cyber defense and attack. The purpose of the article is to put forward a model for how to conduct cyber capabilities in a conventional war. First, cyber operations capabilities will be discussed. Second put forward the necessities of cyberspace environment and develop a model for how to plan an operation using cyber operation capabilities, finally the assessment of the applicability of cyber operation capabilities and offers will be presented. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=cyber%20war" title="cyber war">cyber war</a>, <a href="https://publications.waset.org/abstracts/search?q=cyber%20threats" title=" cyber threats"> cyber threats</a>, <a href="https://publications.waset.org/abstracts/search?q=cyber%20operation%20capabilities" title=" cyber operation capabilities"> cyber operation capabilities</a>, <a href="https://publications.waset.org/abstracts/search?q=operation%20planning" title=" operation planning"> operation planning</a> </p> <a href="https://publications.waset.org/abstracts/31541/new-requirements-of-the-fifth-dimension-of-war-planning-of-cyber-operation-capabilities" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/31541.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">335</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">3967</span> Developing Cyber Security Asset Mangement Framework for UK Rail</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Shruti%20Kohli">Shruti Kohli</a> </p> <p class="card-text"><strong>Abstract:</strong></p> The sophistication and pervasiveness of cyber-attacks are constantly growing, driven partly by technological progress, profitable applications in organized crime and state-sponsored innovation. The modernization of rail control systems has resulted in an increasing reliance on digital technology and increased the potential for security breaches and cyber-attacks. This research track showcases the need for developing a secure reusable scalable framework for enhancing cyber security of rail assets. A cyber security framework has been proposed that is being developed to detect the tell-tale signs of cyber-attacks against industrial assets. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=cyber%20security" title="cyber security">cyber security</a>, <a href="https://publications.waset.org/abstracts/search?q=rail%20asset" title=" rail asset"> rail asset</a>, <a href="https://publications.waset.org/abstracts/search?q=security%20threat" title=" security threat"> security threat</a>, <a href="https://publications.waset.org/abstracts/search?q=cyber%20ontology" title=" cyber ontology"> cyber ontology</a> </p> <a href="https://publications.waset.org/abstracts/48915/developing-cyber-security-asset-mangement-framework-for-uk-rail" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/48915.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">430</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">3966</span> ISIS after the Defeat of the Islamic Caliphate: The Rise of Cyber-Jihad</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Spyridon%20Plakoudas">Spyridon Plakoudas</a> </p> <p class="card-text"><strong>Abstract:</strong></p> After the capture of Al-Raqqah and the defeat of the short-lived Islamic Caliphate in 2017, everyone predicted the end of ISIS. However, ISIS proved far more resilient than initially thought. The militant group quickly regrouped from its defeat and started a low-intensity guerrilla campaign in central Iraq (near Kirkuk and Mosul) and north-eastern Syria (near Deir ez-Zorr). At the same time, ISIS doubled down on its cyber-campaign; actually, ISIS is as active on the cyber-domain as during the peak of its power in 2015. This paper, a spin-off paper from a co-authored book on the Syrian Civil War (due to be published by Rowman and Littlefield), intends to examine how ISIS operates in the cyber-domain and how this "Cyber-Caliphate" under re-construction is associated with its post-2017 strategy. This paper will draw on the discipline of War Studies (with an emphasis on Cyber-Security and Insurgency / Counter-Insurgency) and will benefit from the insights of interviewed experts on the field (e.g., Hassan Hasssan). This paper will explain how the successful operation of ISIS in the cyber-space preserves the myth of the “caliphate” amongst its worldwide followers (against the odds) and sustains the group’s ongoing insurgency in Syria and Iraq; in addition, this paper will suggest how this cyber-threat can be countered best. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=ISIS" title="ISIS">ISIS</a>, <a href="https://publications.waset.org/abstracts/search?q=cyber-jihad" title=" cyber-jihad"> cyber-jihad</a>, <a href="https://publications.waset.org/abstracts/search?q=Syrian%20Civil%20War" title=" Syrian Civil War"> Syrian Civil War</a>, <a href="https://publications.waset.org/abstracts/search?q=cyber-terrorism" title=" cyber-terrorism"> cyber-terrorism</a>, <a href="https://publications.waset.org/abstracts/search?q=insurgency%20and%20counter-insurgency" title=" insurgency and counter-insurgency"> insurgency and counter-insurgency</a> </p> <a href="https://publications.waset.org/abstracts/117835/isis-after-the-defeat-of-the-islamic-caliphate-the-rise-of-cyber-jihad" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/117835.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">134</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">3965</span> Cyber Security in Russia: Offense, Defense and Strategy in Cyberspace</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Da%20Eun%20Sung">Da Eun Sung</a> </p> <p class="card-text"><strong>Abstract:</strong></p> In today’s world, cyber security has become an important international agenda. As the information age has arrived, the need for cyber defense against cyber attacks is mounting, and the significance of cyber cooperation in the international community is drawing attention. Through the course, international society has agreed that the institutionalization of international norms dealing with cyber space and cyber security is crucial ever. Nevertheless, the West, led by the United States of America, and 'the East', composed of Russia and China, have shown conflicting views on forming international norms and principles which would regulate and ward off the possible threats in cyber space. Thus, the international community hasn’t yet to reach an agreement on cyber security. In other words, the difference between both sides on the approach and understanding of principles, objects, and the definition has rendered such. Firstly, this dissertation will cover the Russia’s perception, strategy, and definition on cyber security through analyzing primary source. Then, it will delve into the two contrasting cyber security strategy between Russia and the US by comparing them. And in the conclusion, it will seek the possible solution for the cooperation in the field of cyber security. It is quite worthwhile to look into Russia’s views, which is the main counterpart to the US in this field, especially when the efforts to institutionalize cyber security by the US-led international community have met with their boundaries, and when the legitimacy of them have been challenged. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=cyber%20security" title="cyber security">cyber security</a>, <a href="https://publications.waset.org/abstracts/search?q=cyber%20security%20strategic" title=" cyber security strategic"> cyber security strategic</a>, <a href="https://publications.waset.org/abstracts/search?q=international%20relation%20in%20cyberspace" title=" international relation in cyberspace"> international relation in cyberspace</a>, <a href="https://publications.waset.org/abstracts/search?q=Russia" title=" Russia"> Russia</a> </p> <a href="https://publications.waset.org/abstracts/79049/cyber-security-in-russia-offense-defense-and-strategy-in-cyberspace" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/79049.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">319</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">3964</span> An Investigation on Organisation Cyber Resilience </h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Arniyati%20Ahmad">Arniyati Ahmad</a>, <a href="https://publications.waset.org/abstracts/search?q=Christopher%20Johnson"> Christopher Johnson</a>, <a href="https://publications.waset.org/abstracts/search?q=Timothy%20Storer"> Timothy Storer</a> </p> <p class="card-text"><strong>Abstract:</strong></p> Cyber exercises used to assess the preparedness of a community against cyber crises, technology failures and critical information infrastructure (CII) incidents. The cyber exercises also called cyber crisis exercise or cyber drill, involved partnerships or collaboration of public and private agencies from several sectors. This study investigates organisation cyber resilience (OCR) of participation sectors in cyber exercise called X Maya in Malaysia. This study used a principal based cyber resilience survey called C-Suite Executive checklist developed by World Economic Forum in 2012. To ensure suitability of the survey to investigate the OCR, the reliability test was conducted on C-Suite Executive checklist items. The research further investigates the differences of OCR in ten Critical National Infrastructure Information (CNII) sectors participated in the cyber exercise. The One Way ANOVA test result showed a statistically significant difference of OCR among ten CNII sectors participated in the cyber exercise. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=critical%20information%20infrastructure" title="critical information infrastructure">critical information infrastructure</a>, <a href="https://publications.waset.org/abstracts/search?q=cyber%20resilience" title=" cyber resilience"> cyber resilience</a>, <a href="https://publications.waset.org/abstracts/search?q=organisation%20cyber%20resilience" title=" organisation cyber resilience"> organisation cyber resilience</a>, <a href="https://publications.waset.org/abstracts/search?q=reliability%20test" title=" reliability test"> reliability test</a> </p> <a href="https://publications.waset.org/abstracts/29946/an-investigation-on-organisation-cyber-resilience" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/29946.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">359</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">3963</span> SAFECARE: Integrated Cyber-Physical Security Solution for Healthcare Critical Infrastructure </h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Francesco%20Lubrano">Francesco Lubrano</a>, <a href="https://publications.waset.org/abstracts/search?q=Fabrizio%20Bertone"> Fabrizio Bertone</a>, <a href="https://publications.waset.org/abstracts/search?q=Federico%20Stirano"> Federico Stirano</a> </p> <p class="card-text"><strong>Abstract:</strong></p> Modern societies strongly depend on Critical Infrastructures (CI). Hospitals, power supplies, water supplies, telecommunications are just few examples of CIs that provide vital functions to societies. CIs like hospitals are very complex environments, characterized by a huge number of cyber and physical systems that are becoming increasingly integrated. Ensuring a high level of security within such critical infrastructure requires a deep knowledge of vulnerabilities, threats, and potential attacks that may occur, as well as defence and prevention or mitigation strategies. The possibility to remotely monitor and control almost everything is pushing the adoption of network-connected devices. This implicitly introduces new threats and potential vulnerabilities, posing a risk, especially to those devices connected to the Internet. Modern medical devices used in hospitals are not an exception and are more and more being connected to enhance their functionalities and easing the management. Moreover, hospitals are environments with high flows of people, that are difficult to monitor and can somehow easily have access to the same places used by the staff, potentially creating damages. It is therefore clear that physical and cyber threats should be considered, analysed, and treated together as cyber-physical threats. This means that an integrated approach is required. SAFECARE, an integrated cyber-physical security solution, tries to respond to the presented issues within healthcare infrastructures. The challenge is to bring together the most advanced technologies from the physical and cyber security spheres, to achieve a global optimum for systemic security and for the management of combined cyber and physical threats and incidents and their interconnections. Moreover, potential impacts and cascading effects are evaluated through impact propagation models that rely on modular ontologies and a rule-based engine. Indeed, SAFECARE architecture foresees i) a macroblock related to cyber security field, where innovative tools are deployed to monitor network traffic, systems and medical devices; ii) a physical security macroblock, where video management systems are coupled with access control management, building management systems and innovative AI algorithms to detect behavior anomalies; iii) an integration system that collects all the incoming incidents, simulating their potential cascading effects, providing alerts and updated information regarding assets availability. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=cyber%20security" title="cyber security">cyber security</a>, <a href="https://publications.waset.org/abstracts/search?q=defence%20strategies" title=" defence strategies"> defence strategies</a>, <a href="https://publications.waset.org/abstracts/search?q=impact%20propagation" title=" impact propagation"> impact propagation</a>, <a href="https://publications.waset.org/abstracts/search?q=integrated%20security" title=" integrated security"> integrated security</a>, <a href="https://publications.waset.org/abstracts/search?q=physical%20security" title=" physical security "> physical security </a> </p> <a href="https://publications.waset.org/abstracts/123807/safecare-integrated-cyber-physical-security-solution-for-healthcare-critical-infrastructure" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/123807.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">165</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">3962</span> Defence Diplomacy and Collective Security in Africa: Case of Rwanda Defence Forces</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Emmanuel%20Mugiraneza">Emmanuel Mugiraneza</a> </p> <p class="card-text"><strong>Abstract:</strong></p> Rwanda uses defence diplomacy to pursue international collective security through different mechanisms. This paper shows that with an intent of promoting international collective security, Rwanda has constituted its defense diplomacy policy in three standpoints. First, Rwanda has formed strategic cooperation alliances with state actors, regional and international Organizations that enables her to participate in and promote international collective peace, security and cooperation. Secondary, Rwanda uses defence diplomacy to foster cooperation in to pre-empt, minimize and neutralize potential triggers that would lead to the outbreak of international conflict. Thirdly, Rwanda implements defence diplomacy policy strategy through internationally recognized operational and tactical standards while dispelling hostilities, assisting the friendly nation’s forces and or building and maintaining public confidence and trust in the areas where Rwanda Defence Force deploys for peacekeeping missions in Sudan, South Sudan, Central African Republic and Mozambique for a counterterrorism mission. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=defence%20diplomacy" title="defence diplomacy">defence diplomacy</a>, <a href="https://publications.waset.org/abstracts/search?q=collective%20security" title=" collective security"> collective security</a>, <a href="https://publications.waset.org/abstracts/search?q=Rwanda" title=" Rwanda"> Rwanda</a>, <a href="https://publications.waset.org/abstracts/search?q=Peacekeeping" title=" Peacekeeping"> Peacekeeping</a> </p> <a href="https://publications.waset.org/abstracts/148483/defence-diplomacy-and-collective-security-in-africa-case-of-rwanda-defence-forces" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/148483.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">123</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">3961</span> Quick Reference: Cyber Attacks Awareness and Prevention Method for Home Users</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Haydar%20Teymourlouei">Haydar Teymourlouei</a> </p> <p class="card-text"><strong>Abstract:</strong></p> It is important to take security measures to protect your computer information, reduce identify theft, and prevent from malicious cyber-attacks. With cyber-attacks on the continuous rise, people need to understand and learn ways to prevent from these attacks. Cyber-attack is an important factor to be considered if one is to be able to protect oneself from malicious attacks. Without proper security measures, most computer technology would hinder home users more than such technologies would help. Knowledge of how cyber-attacks operate and protective steps that can be taken to reduce chances of its occurrence are key to increasing these security measures. The purpose of this paper is to inform home users on the importance of identifying and taking preventive steps to avoid cyberattacks. Throughout this paper, many aspects of cyber-attacks will be discuss: what a cyber-attack is, the affects of cyber-attack for home users, different types of cyber-attacks, methodology to prevent such attacks; home users can take to fortify security of their computer. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=cyber-attacks" title="cyber-attacks">cyber-attacks</a>, <a href="https://publications.waset.org/abstracts/search?q=home%20user" title=" home user"> home user</a>, <a href="https://publications.waset.org/abstracts/search?q=prevention" title=" prevention"> prevention</a>, <a href="https://publications.waset.org/abstracts/search?q=security" title=" security"> security</a>, <a href="https://publications.waset.org/abstracts/search?q=technology" title=" technology"> technology</a> </p> <a href="https://publications.waset.org/abstracts/25329/quick-reference-cyber-attacks-awareness-and-prevention-method-for-home-users" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/25329.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">396</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">3960</span> Robust Control of Cyber-Physical System under Cyber Attacks Based on Invariant Tubes</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Bruno%20Vili%C4%87%20Belina">Bruno Vilić Belina</a>, <a href="https://publications.waset.org/abstracts/search?q=Jadranko%20Matu%C5%A1ko"> Jadranko Matuško</a> </p> <p class="card-text"><strong>Abstract:</strong></p> The rapid development of cyber-physical systems significantly influences modern control systems introducing a whole new range of applications of control systems but also putting them under new challenges to ensure their resiliency to possible cyber attacks, either in the form of data integrity attacks or deception attacks. This paper presents a model predictive approach to the control of cyber-physical systems robust to cyber attacks. We assume that a cyber attack can be modelled as an additive disturbance that acts in the measuring channel. For such a system, we designed a tube-based predictive controller based. The performance of the designed controller has been verified in Matlab/Simulink environment. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=control%20systems" title="control systems">control systems</a>, <a href="https://publications.waset.org/abstracts/search?q=cyber%20attacks" title=" cyber attacks"> cyber attacks</a>, <a href="https://publications.waset.org/abstracts/search?q=resiliency" title=" resiliency"> resiliency</a>, <a href="https://publications.waset.org/abstracts/search?q=robustness" title=" robustness"> robustness</a>, <a href="https://publications.waset.org/abstracts/search?q=tube%20based%20model%20predictive%20control" title=" tube based model predictive control"> tube based model predictive control</a> </p> <a href="https://publications.waset.org/abstracts/169652/robust-control-of-cyber-physical-system-under-cyber-attacks-based-on-invariant-tubes" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/169652.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">67</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">3959</span> Reforming the Law to Allow a Duress Defence to Those Committing Crime under Coercive Control</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Amy%20Elkington">Amy Elkington</a> </p> <p class="card-text"><strong>Abstract:</strong></p> Women in abusive relationships who commit crimes under duress are unfairly treated by the English legal system. Despite the offence of Coercive Control being introduced in 2015 that recognises that a woman’s autonomy has been eroded, coercion is no longer a defence to women who feel compelled to act due to their partner’s behavior or abuse. This problem is intensified by the fact that women in abusive relationships are more likely to commit crimes to ensure their survival. Furthermore, the very fact that they are ‘associating’ with their abusive partners means that they are excluded from pleading a defence of duress. Women who kill their abusers may be able to reduce their conviction from murder to manslaughter, but this depends on successfully pleading either loss of control or diminished responsibility, both not without their issues, but this does not provide a defence where a lesser crime is committed. Self-defence is also widely unavailable to either murder or non-fatal offences, as the amount of force used is often deemed disproportionate because women are more likely to use weapons in their defence. Regardless, this would not provide a defence where the crime committed is one such as theft. An alternative that has been proposed would be to introduce a new defence that would work similarly to the exemption to prosecution afforded to those who are trafficked that commit crime under duress. Despite having support in the Lords in March 2021, this recommendation has been rejected by the Government on the basis that it would not achieve an appropriate balance of justice. The result is that abused women who commit crime are left without an appropriate defence. A doctrinal approach highlights the injustices in these types of cases and concludes that it is time for the current law of duress to change. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=coercive%20control" title="coercive control">coercive control</a>, <a href="https://publications.waset.org/abstracts/search?q=crime" title=" crime"> crime</a>, <a href="https://publications.waset.org/abstracts/search?q=defences" title=" defences"> defences</a>, <a href="https://publications.waset.org/abstracts/search?q=duress" title=" duress"> duress</a> </p> <a href="https://publications.waset.org/abstracts/139502/reforming-the-law-to-allow-a-duress-defence-to-those-committing-crime-under-coercive-control" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/139502.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">195</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">3958</span> Cyber Operational Design and Military Decision Making Process</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=M.%20Karaman">M. Karaman</a>, <a href="https://publications.waset.org/abstracts/search?q=H.%20Catalkaya"> H. Catalkaya </a> </p> <p class="card-text"><strong>Abstract:</strong></p> Due to the complex nature of cyber attacks and their effects ranging from personal to governmental level, it becomes one of the priority tasks for operation planners to take into account the risks, influences and effects of cyber attacks. However it can also be embedded or integrated technically with electronic warfare planning, cyber operation planning is needed to have a sole and broadened perspective. This perspective embodies itself firstly in operational design and then military decision making process. In order to find out the ill-structured problems, understand or visualize the operational environment and frame the problem, operational design can help support cyber operation planners and commanders. After having a broadened and conceptual startup with cyber operational design, military decision making process will follow the principles of design into more concrete elements like reaching results after risk management and center of gravity analysis of our and the enemy. In this paper we tried to emphasize the importance of cyber operational design, cyber operation planning and its integration to military decision making problem. In this foggy, uncertain and unaccountable cyber security environment, it is inevitable to stay away from cyber attacks. Therefore, a cyber operational design should be formed with line of operations, decisive points and end states in cyber then a tactical military decision making process should be followed with cyber security focus in order to support the whole operation. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=cyber%20operational%20design" title="cyber operational design">cyber operational design</a>, <a href="https://publications.waset.org/abstracts/search?q=military%20decision%20making%20process%20%28MDMP%29" title=" military decision making process (MDMP)"> military decision making process (MDMP)</a>, <a href="https://publications.waset.org/abstracts/search?q=operation%20planning" title=" operation planning"> operation planning</a>, <a href="https://publications.waset.org/abstracts/search?q=end%20state" title=" end state"> end state</a> </p> <a href="https://publications.waset.org/abstracts/26415/cyber-operational-design-and-military-decision-making-process" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/26415.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">589</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">3957</span> Understanding Cyber Terrorism from Motivational Perspectives: A Qualitative Data Analysis</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Yunos%20Zahri">Yunos Zahri</a>, <a href="https://publications.waset.org/abstracts/search?q=Ariffin%20Aswami"> Ariffin Aswami</a> </p> <p class="card-text"><strong>Abstract:</strong></p> Cyber terrorism represents the convergence of two worlds: virtual and physical. The virtual world is a place in which computer programs function and data move, whereas the physical world is where people live and function. The merging of these two domains is the interface being targeted in the incidence of cyber terrorism. To better understand why cyber terrorism acts are committed, this study presents the context of cyber terrorism from motivational perspectives. Motivational forces behind cyber terrorism can be social, political, ideological and economic. In this research, data are analyzed using a qualitative method. A semi-structured interview with purposive sampling was used for data collection. With the growing interconnectedness between critical infrastructures and Information & Communication Technology (ICT), selecting targets that facilitate maximum disruption can significantly influence terrorists. This work provides a baseline for defining the concept of cyber terrorism from motivational perspectives. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=cyber%20terrorism" title="cyber terrorism">cyber terrorism</a>, <a href="https://publications.waset.org/abstracts/search?q=terrorism" title=" terrorism"> terrorism</a>, <a href="https://publications.waset.org/abstracts/search?q=motivation" title=" motivation"> motivation</a>, <a href="https://publications.waset.org/abstracts/search?q=qualitative%20analysis" title=" qualitative analysis"> qualitative analysis</a> </p> <a href="https://publications.waset.org/abstracts/61035/understanding-cyber-terrorism-from-motivational-perspectives-a-qualitative-data-analysis" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/61035.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">422</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">3956</span> Cyber Aggression, Cyber Bullying and the Dark Triad: Effect on Workplace Behavior and Performance</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Anishya%20Obhrai%20Madan">Anishya Obhrai Madan</a> </p> <p class="card-text"><strong>Abstract:</strong></p> In an increasingly connected world, where speed of communication attempts to match the speed of thought and thus intentions; conflict gets actioned faster using media like the internet and telecommunication technology. This has led to a new form of aggression: “cyber bullying”. The present paper attempts to integrate existing theory on bullying, and the dark triad personality traits in a work environment and extrapolate it to the cyber context. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=conflict%20at%20work" title="conflict at work">conflict at work</a>, <a href="https://publications.waset.org/abstracts/search?q=cyber%20bullying" title=" cyber bullying"> cyber bullying</a>, <a href="https://publications.waset.org/abstracts/search?q=dark%20triad%20of%20personality" title=" dark triad of personality"> dark triad of personality</a>, <a href="https://publications.waset.org/abstracts/search?q=toxic%20employee" title=" toxic employee"> toxic employee</a> </p> <a href="https://publications.waset.org/abstracts/11191/cyber-aggression-cyber-bullying-and-the-dark-triad-effect-on-workplace-behavior-and-performance" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/11191.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">230</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">3955</span> Improving Cyber Resilience in Mobile Field Hospitals: Towards an Assessment Model</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Nasir%20Baba%20Ahmed">Nasir Baba Ahmed</a>, <a href="https://publications.waset.org/abstracts/search?q=Nicolas%20Daclin"> Nicolas Daclin</a>, <a href="https://publications.waset.org/abstracts/search?q=Marc%20Olivaux"> Marc Olivaux</a>, <a href="https://publications.waset.org/abstracts/search?q=Gilles%20Dusserre"> Gilles Dusserre</a> </p> <p class="card-text"><strong>Abstract:</strong></p> The Mobile field hospital is critical in terms of managing emergencies in crisis. It is a sub-section of the main hospitals and the health sector, tasked with delivering responsive, immediate, and efficient medical services during a crisis. With the aim to prevent further crisis, the assessment of the cyber assets follows different methods, to distinguish its strengths and weaknesses, and in turn achieve cyber resiliency. The work focuses on assessments of cyber resilience in field hospitals with trends growing in both the field hospital and the health sector in general. This creates opportunities for the adverse attackers and the response improvement objectives for attaining cyber resilience, as the assessments allow users and stakeholders to know the level of risks with regards to its cyber assets. Thus, the purpose is to show the possible threat vectors which open up opportunities, with contrast to current trends in the assessment of the mobile field hospitals&rsquo; cyber assets. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=assessment%20framework" title="assessment framework">assessment framework</a>, <a href="https://publications.waset.org/abstracts/search?q=cyber%20resilience" title=" cyber resilience"> cyber resilience</a>, <a href="https://publications.waset.org/abstracts/search?q=cyber%20security" title=" cyber security"> cyber security</a>, <a href="https://publications.waset.org/abstracts/search?q=mobile%20field%20hospital" title=" mobile field hospital"> mobile field hospital</a> </p> <a href="https://publications.waset.org/abstracts/130214/improving-cyber-resilience-in-mobile-field-hospitals-towards-an-assessment-model" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/130214.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">158</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">3954</span> The Relationship between Adolescent Self Well Being and Cyber Bully/Victim Being</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Nesrin%20Demir">Nesrin Demir</a>, <a href="https://publications.waset.org/abstracts/search?q=Bet%C3%BCl%20Demirba%C4%9F"> Betül Demirbağ</a> </p> <p class="card-text"><strong>Abstract:</strong></p> In recent years, the type and content of bullying in schools changes together with technological development. Many studies attribute bullying movement to virtual platform to the widespread use of social media and internet. The main goal of this research is to determine if there is a correlation between subjective well-being as a popular conception of Positive Psychology and being cyber bully/victim. For this purpose, 287 students from various public high schools in Malatya have reached. As assessment tool, Cyber Bully/Victim Scale and Self Well Being Scale for Adolescents were used. Results were discussed in the relevant literature. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=cyber%20bully" title="cyber bully">cyber bully</a>, <a href="https://publications.waset.org/abstracts/search?q=cyber%20victim" title=" cyber victim"> cyber victim</a>, <a href="https://publications.waset.org/abstracts/search?q=school%20counseling" title=" school counseling"> school counseling</a>, <a href="https://publications.waset.org/abstracts/search?q=subjective%20well-being" title=" subjective well-being"> subjective well-being</a> </p> <a href="https://publications.waset.org/abstracts/25591/the-relationship-between-adolescent-self-well-being-and-cyber-bullyvictim-being" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/25591.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">414</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">3953</span> A Reasoning Method of Cyber-Attack Attribution Based on Threat Intelligence</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Li%20Qiang">Li Qiang</a>, <a href="https://publications.waset.org/abstracts/search?q=Yang%20Ze-Ming"> Yang Ze-Ming</a>, <a href="https://publications.waset.org/abstracts/search?q=Liu%20Bao-Xu"> Liu Bao-Xu</a>, <a href="https://publications.waset.org/abstracts/search?q=Jiang%20Zheng-Wei"> Jiang Zheng-Wei</a> </p> <p class="card-text"><strong>Abstract:</strong></p> With the increasing complexity of cyberspace security, the cyber-attack attribution has become an important challenge of the security protection systems. The difficult points of cyber-attack attribution were forced on the problems of huge data handling and key data missing. According to this situation, this paper presented a reasoning method of cyber-attack attribution based on threat intelligence. The method utilizes the intrusion kill chain model and Bayesian network to build attack chain and evidence chain of cyber-attack on threat intelligence platform through data calculation, analysis and reasoning. Then, we used a number of cyber-attack events which we have observed and analyzed to test the reasoning method and demo system, the result of testing indicates that the reasoning method can provide certain help in cyber-attack attribution. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=reasoning" title="reasoning">reasoning</a>, <a href="https://publications.waset.org/abstracts/search?q=Bayesian%20networks" title=" Bayesian networks"> Bayesian networks</a>, <a href="https://publications.waset.org/abstracts/search?q=cyber-attack%20attribution" title=" cyber-attack attribution"> cyber-attack attribution</a>, <a href="https://publications.waset.org/abstracts/search?q=Kill%20Chain" title=" Kill Chain"> Kill Chain</a>, <a href="https://publications.waset.org/abstracts/search?q=threat%20intelligence" title=" threat intelligence"> threat intelligence</a> </p> <a href="https://publications.waset.org/abstracts/50175/a-reasoning-method-of-cyber-attack-attribution-based-on-threat-intelligence" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/50175.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">450</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">3952</span> Defence Industry in the Political Economy of State and Business Relations</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Hatice%20Idil%20Gorgen">Hatice Idil Gorgen</a> </p> <p class="card-text"><strong>Abstract:</strong></p> Turkey has been investing in its national defence industrial base since the 1980s. State’s role in defence industry showed differences in Turkey. Parallel with this, ruling group’s attitude toward companies in defence sector varied. These changes in policies and behaviors of the state have occurred throughout such milestones as political and economic turmoil in domestic and international level. Hence, it is argued that state’s role, relations with private companies in defense sector and its policies towards the defense industry has shown differences due to the international system, political institutions, ideas and political coalitions in Turkey since the 1980s. Therefore, in order to see changes in the role of the state in defence sector, this paper aims to indicate first, history of state’s role in production and defence industry in the post-1980s era. Secondly, to comprehend the changes in the state’s role in defence industry, Stephan Haggard’s sources of policy change will be provided in the theoretical ground. Thirdly, state cooperated, and joint venture defence firms, state’s actions toward them will be observed. The remaining part will explore the underlying reasons for the changes in the role of the state in defence industry, and it implicitly or explicitly impacts on state business relations. Major findings illustrate that targeted idea of self-sufficient or autarky Turkey to attract domestic audience and to raise the prestige through defence system; ruling elites can regard defence industry and involved business groups as a mean for their ends. State dominant value, sensitive perception which has been ever since Ottoman Empire, prioritizes business groups in defence industry compared to others and push the ruling elites to pursue hard power in defence sectors. Through the globally structural transformation in defence industry, integration of Turkey to liberal bloc deepened and widened interdependence among states. Although it is a qualitative study, it involves the numerated data and descriptive statistics. Data will be collected by searching secondary sources from the literature, examining official documents of ministry of defence, and other appropriate ministries. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=defense%20industry" title="defense industry">defense industry</a>, <a href="https://publications.waset.org/abstracts/search?q=state%20and%20business%20relations" title=" state and business relations"> state and business relations</a>, <a href="https://publications.waset.org/abstracts/search?q=public%20private%20relations" title=" public private relations"> public private relations</a>, <a href="https://publications.waset.org/abstracts/search?q=arm%20industry" title=" arm industry"> arm industry</a> </p> <a href="https://publications.waset.org/abstracts/80519/defence-industry-in-the-political-economy-of-state-and-business-relations" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/80519.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">315</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">3951</span> Analysis on Cyber Threat Actors Targeting Automated Border Security Systems</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Mirko%20Sailio">Mirko Sailio</a> </p> <p class="card-text"><strong>Abstract:</strong></p> Border crossing automatization reduces required human resources in handling people crossing borders. As technology replaces and augments the work done by border officers, new cyber threats arise to threaten border security. This research analyses the current cyber threat actors and their capabilities. The analysis is conducted by gathering the threat actor data from a wide range of public sources. A model for a general border automatization system is presented, and its most significant cyber-security attributes are then compared to threat actor activity and capabilities in order to predict priorities in securing such systems. Organized crime and nation-state actors present the clearest threat to border cyber-security, and additional focus is given to their motivations and activities. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=border%20automation" title="border automation">border automation</a>, <a href="https://publications.waset.org/abstracts/search?q=cyber-security" title=" cyber-security"> cyber-security</a>, <a href="https://publications.waset.org/abstracts/search?q=threat%20actors" title=" threat actors"> threat actors</a>, <a href="https://publications.waset.org/abstracts/search?q=border%20cyber-security" title=" border cyber-security"> border cyber-security</a> </p> <a href="https://publications.waset.org/abstracts/136134/analysis-on-cyber-threat-actors-targeting-automated-border-security-systems" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/136134.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">203</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">3950</span> An Examination of Criminology and Cyber Crime in Contemporary Society</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Uche%20A.%20Nnawulezi">Uche A. Nnawulezi</a> </p> <p class="card-text"><strong>Abstract:</strong></p> The evolving global environment has as of late seen formative difficulties bordering on cyber crime and its attendant effects. This paper looks at what constitutes an offense of cyber crime under the tenets of International Law as no nation can lay bona-fide claim in managing cyber crime as a criminal phenomenon. Therefore, there has been a plethora of ideological, conceptual and mental propositions of policies aimed at domesticating cyber crimes – an international crime. These policies were as a result of parochial consideration and social foundations which negate the spirit of internationally accepted procedures. The study also noted that the non-domestication of cyber crime laws by most countries has led to an increase in cyber crimes and its attendant effects have remained unabated. The author has pointed out emerging international rules as a panacea for a sustainable cyber crime-free society. The paper relied on documentary evidence and hence scooped much of the data from secondary sources such as text books, journals, articles and periodicals and more so, opinion papers, emanating from international criminal court. It concludes that the necessary recommendations made in this paper, if fully adopted, shall go a long way in maintaining a cyber crime-free society. Ultimately, the domestic and international law mechanisms capable of dealing with cyber crime offenses should be expanded and be made proactive in order to deal with the demands of modern day challenges. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=criminology" title="criminology">criminology</a>, <a href="https://publications.waset.org/abstracts/search?q=cyber%20crime" title=" cyber crime"> cyber crime</a>, <a href="https://publications.waset.org/abstracts/search?q=domestic%20law" title=" domestic law"> domestic law</a>, <a href="https://publications.waset.org/abstracts/search?q=international%20law" title=" international law"> international law</a> </p> <a href="https://publications.waset.org/abstracts/82819/an-examination-of-criminology-and-cyber-crime-in-contemporary-society" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/82819.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">194</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">3949</span> Examining Cyber Crime and Its Impacts on E-Banking in Nigeria</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Auwal%20Nata%27ala">Auwal Nata&#039;ala</a> </p> <p class="card-text"><strong>Abstract:</strong></p> The Information and Communication Technology (ICT) has had impacts in almost every area human endeavor. From business, industries, banks to none profit organizations. ICT has simplified business process such as sorting, summarizing, coding, updating and generating a report in a real-time processing mode. However, the use of these ICT facilities such as computer and internet has also brought unintended consequences of criminal activities such as spamming, credit card frauds, ATM frauds, phishing, identity theft, denial of services and other related cyber crimes. This study sought to examined cyber-crime and its impact on the banking institution in Nigeria. It also examined the existing policy framework and assessed the success of the institutional countermeasures in combating cyber crime in the banking industry. This paper X-ray’s cyber crimes, policies issues and provides insight from a Nigeria perspective. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=cyber%20crimes" title="cyber crimes">cyber crimes</a>, <a href="https://publications.waset.org/abstracts/search?q=e-banking" title=" e-banking"> e-banking</a>, <a href="https://publications.waset.org/abstracts/search?q=policies" title=" policies"> policies</a>, <a href="https://publications.waset.org/abstracts/search?q=ICT" title=" ICT"> ICT</a> </p> <a href="https://publications.waset.org/abstracts/18051/examining-cyber-crime-and-its-impacts-on-e-banking-in-nigeria" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/18051.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">407</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">3948</span> Enhancing Digi-Parenting Strategies to Mitigate Children’s Cyber-Aggression</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Misha%20Teimouri">Misha Teimouri</a> </p> <p class="card-text"><strong>Abstract:</strong></p> Our world has been transformed by the use of the internet and the constant flow of information. While this transmission has its benefits, it has also added significant challenges to family relations, primarily in the field of parenting and children's digital lives. Screens, speed, and connectedness are the words that characterize the lives of today's digital generation; it's as if the entire world is in their pockets at all times. Parents attempt to regulate and control their children's internet use in the hopes of maximizing the advantages and minimizing the disadvantages of their children's internet use; however, given that children spend more time online, particularly ever since the pandemic, children's cyber-aggression has become an issue for them. Children may externalize their behavior online, bully others, send anger/hatred/resist messages, share violent and bloody content, and engage in sexting. These types of online aggression make parenting more difficult, especially for digital immigrant parents compared to digital native parents. In response to these challenges, this study investigated the level of cyber aggression among children, as well as the effects of digi-parenting (active, monitoring, restrictive, and warm and supportive) on children's cyber-aggression (sexual, verbal, visual) as victims or aggressors. The study also determined whether there were any differences in parenting styles between digital natives (DN) and digital immigrants. In accordance with the study, boys and older children are more likely to engage in cyber aggression as aggressors, whereas girls and younger children are more likely to engage as victims. Warmth and supportive digiparenting have a greater impact on children's cyber-aggression (sexual, verbal, and visual) as victims or aggressors. This study also found that, when compared to DI parents, DN parents are more successful at digi-parenting and reducing their children's exposure to cyber-aggression. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=digi-parenting" title="digi-parenting">digi-parenting</a>, <a href="https://publications.waset.org/abstracts/search?q=cyber-aggression" title=" cyber-aggression"> cyber-aggression</a>, <a href="https://publications.waset.org/abstracts/search?q=digital%20natives" title=" digital natives"> digital natives</a>, <a href="https://publications.waset.org/abstracts/search?q=digital%20immigrants" title=" digital immigrants"> digital immigrants</a>, <a href="https://publications.waset.org/abstracts/search?q=children%27s%20cyber-aggression%20%28sexual" title=" children&#039;s cyber-aggression (sexual"> children&#039;s cyber-aggression (sexual</a>, <a href="https://publications.waset.org/abstracts/search?q=verbal" title=" verbal"> verbal</a>, <a href="https://publications.waset.org/abstracts/search?q=visual%29" title=" visual)"> visual)</a> </p> <a href="https://publications.waset.org/abstracts/181909/enhancing-digi-parenting-strategies-to-mitigate-childrens-cyber-aggression" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/181909.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">52</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">3947</span> A Systematic Approach for Analyzing Multiple Cyber-Physical Attacks on the Smart Grid</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Yatin%20Wadhawan">Yatin Wadhawan</a>, <a href="https://publications.waset.org/abstracts/search?q=Clifford%20Neuman"> Clifford Neuman</a>, <a href="https://publications.waset.org/abstracts/search?q=Anas%20Al%20Majali"> Anas Al Majali</a> </p> <p class="card-text"><strong>Abstract:</strong></p> In this paper, we evaluate the resilience of the smart grid system in the presence of multiple cyber-physical attacks on its distinct functional components. We discuss attack-defense scenarios and their effect on smart grid resilience. Through contingency simulations in the Network and PowerWorld Simulator, we analyze multiple cyber-physical attacks that propagate from the cyber domain to power systems and discuss how such attacks destabilize the underlying power grid. The analysis of such simulations helps system administrators develop more resilient systems and improves the response of the system in the presence of cyber-physical attacks. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=smart%20grid" title="smart grid">smart grid</a>, <a href="https://publications.waset.org/abstracts/search?q=gas%20pipeline" title=" gas pipeline"> gas pipeline</a>, <a href="https://publications.waset.org/abstracts/search?q=cyber-%20physical%20attack" title=" cyber- physical attack"> cyber- physical attack</a>, <a href="https://publications.waset.org/abstracts/search?q=security" title=" security"> security</a>, <a href="https://publications.waset.org/abstracts/search?q=resilience" title=" resilience"> resilience</a> </p> <a href="https://publications.waset.org/abstracts/90242/a-systematic-approach-for-analyzing-multiple-cyber-physical-attacks-on-the-smart-grid" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/90242.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">314</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">3946</span> Cyber Supply Chain Resilient: Enhancing Security through Leadership to Protect National Security</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Katie%20Wood">Katie Wood</a> </p> <p class="card-text"><strong>Abstract:</strong></p> Cyber criminals are constantly on the lookout for new opportunities to exploit organisation and cause destruction. This could lead to significant cause of economic loss for organisations in the form of destruction in finances, reputation and even the overall survival of the organization. Additionally, this leads to serious consequences on national security. The threat of possible cyber attacks places further pressure on organisations to ensure they are secure, at a time where international scale cyber attacks have occurred in a range of sectors. Stakeholders are wanting confidence that their data is protected. This is only achievable if a business fosters a resilient supply chain strategy which is implemented throughout its supply chain by having a strong cyber leadership culture. This paper will discuss the essential role and need for organisations to adopt a cyber leadership culture and direction to learn about own internal processes to ensure mitigating systemic vulnerability of its supply chains. This paper outlines that to protect national security there is an urgent need for cyber awareness culture change. This is required in all organisations, regardless of their sector or size, to implementation throughout the whole supplier chain to support and protect economic prosperity to make the UK more resilient to cyber-attacks. Through businesses understanding the supply chain and risk management cycle of their own operates has to be the starting point to ensure effective cyber migration strategies. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=cyber%20leadership" title="cyber leadership">cyber leadership</a>, <a href="https://publications.waset.org/abstracts/search?q=cyber%20migration%20strategies" title=" cyber migration strategies"> cyber migration strategies</a>, <a href="https://publications.waset.org/abstracts/search?q=resilient%20supply%20chain%20strategy" title=" resilient supply chain strategy"> resilient supply chain strategy</a>, <a href="https://publications.waset.org/abstracts/search?q=cybersecurity" title=" cybersecurity"> cybersecurity</a> </p> <a href="https://publications.waset.org/abstracts/76977/cyber-supply-chain-resilient-enhancing-security-through-leadership-to-protect-national-security" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/76977.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">242</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">3945</span> Cybercrimes in Nigeria: Its Causes, Effects and Solutions</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Uzoma%20Igboji">Uzoma Igboji</a> </p> <p class="card-text"><strong>Abstract:</strong></p> Cybercrimes involves crimes committed on the internet using the computer as a tool or targeted victim. In Nigeria today, there are many varieties of crimes that are committed on the internet daily, some are directed to the computers while the others are directed to the computer users. Cyber terrorism, identity theft, internet chat room, piracy and hacking are identified as types of cyber crimes. Usually, these crimes are perpetrated in forms of like sending of fraudulent and bogus financial proposals from cyber crimes to innocent internet users. The increasing rates of cyber crimes have become strong threats to the society, organizations and country’s reputation, E-commerce growth, denial of innocent Nigerian opportunity abroad and reduced productivity. This study identified some of the causes of cybercrimes to include urbanization, high rate of unemployment, corruption, easy accessibility to internet and weak implementation of cyber crimes in Nigeria. Therefore, internet users should inculcate the habit of continuously updating their knowledge about the ever changing ICTs through this, they can be well informed about the current trends in cybercrimes and how the cybercrimes carryout their dubious activities. Thus, how they can devise means of protecting their information from cyber criminals. Internet users should be security conscious at all times .Recommendations were proposed on how these crimes can be minimized if not completely eradicated. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=cyber-crimes" title="cyber-crimes">cyber-crimes</a>, <a href="https://publications.waset.org/abstracts/search?q=cyber-terrorism" title=" cyber-terrorism"> cyber-terrorism</a>, <a href="https://publications.waset.org/abstracts/search?q=cyber-criminals" title=" cyber-criminals"> cyber-criminals</a>, <a href="https://publications.waset.org/abstracts/search?q=Nigeria" title=" Nigeria"> Nigeria</a> </p> <a href="https://publications.waset.org/abstracts/22647/cybercrimes-in-nigeria-its-causes-effects-and-solutions" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/22647.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">538</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">3944</span> Cybercrime Stage Based Intervention: Through the Eyes of a Cyber Threat Actor</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Jonathan%20W.%20Z.%20Lim">Jonathan W. Z. Lim</a>, <a href="https://publications.waset.org/abstracts/search?q=Vrizlynn%20L.%20L.%20Thing"> Vrizlynn L. L. Thing</a> </p> <p class="card-text"><strong>Abstract:</strong></p> Cybercrimes are on the rise, in part due to technological advancements, as well as increased avenues of exploitation. Sophisticated threat actors are leveraging on such advancements to execute their malicious intentions. The increase in cybercrimes is prevalent, and it seems unlikely that they can be easily eradicated. A more serious concern is that the community may come to accept the notion that this will become the trend. As such, the key question revolves around how we can reduce cybercrime in this evolving landscape. In our paper, we propose to build a systematic framework through the lens of a cyber threat actor. We explore the motivation factors behind the crimes and the crime stages of the threat actors. We then formulate intervention plans so as to discourage the act of committing malicious cyber activities and also aim to integrate ex-cyber offenders back into society. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=crime%20motivations" title="crime motivations">crime motivations</a>, <a href="https://publications.waset.org/abstracts/search?q=crime%20prevention" title=" crime prevention"> crime prevention</a>, <a href="https://publications.waset.org/abstracts/search?q=cybercrime" title=" cybercrime"> cybercrime</a>, <a href="https://publications.waset.org/abstracts/search?q=ex-cyber%20criminals" title=" ex-cyber criminals"> ex-cyber criminals</a> </p> <a href="https://publications.waset.org/abstracts/143415/cybercrime-stage-based-intervention-through-the-eyes-of-a-cyber-threat-actor" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/143415.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">138</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">3943</span> Cyber-Bullying Beyond Parental Control in High Schools</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Eke%20Chidi%20Idi">Eke Chidi Idi</a> </p> <p class="card-text"><strong>Abstract:</strong></p> School violence is a global phenomenon that affects one of the core institutions of modern society to some degree across many countries, and on a global scale. Within this context, this study explores the impact of parental control on perpetrators of cyber bullying as a form of school-based violence in high schools in uMgungundlovu district of KwaZulu-Natal province in South Africa. Insights for this study were drawn from 18 in-depth interviews and two (2) focus group forums. The key themes that emerged from the findings include: (1) Parents are ignorant of their children involvement in cyber-crimes (2) Parents cannot adequately monitor what their children do on their cell phones (3) Female learners are the most affected as victims of cyber-crime. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=school" title="school">school</a>, <a href="https://publications.waset.org/abstracts/search?q=violence" title=" violence"> violence</a>, <a href="https://publications.waset.org/abstracts/search?q=parental%20control" title=" parental control"> parental control</a>, <a href="https://publications.waset.org/abstracts/search?q=cyber%20bullying" title=" cyber bullying"> cyber bullying</a> </p> <a href="https://publications.waset.org/abstracts/143776/cyber-bullying-beyond-parental-control-in-high-schools" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/143776.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">152</span> </span> </div> </div> <ul class="pagination"> <li class="page-item disabled"><span class="page-link">&lsaquo;</span></li> <li class="page-item active"><span class="page-link">1</span></li> <li class="page-item"><a class="page-link" href="https://publications.waset.org/abstracts/search?q=active%20cyber%20defence&amp;page=2">2</a></li> <li class="page-item"><a class="page-link" href="https://publications.waset.org/abstracts/search?q=active%20cyber%20defence&amp;page=3">3</a></li> <li class="page-item"><a class="page-link" href="https://publications.waset.org/abstracts/search?q=active%20cyber%20defence&amp;page=4">4</a></li> <li class="page-item"><a class="page-link" href="https://publications.waset.org/abstracts/search?q=active%20cyber%20defence&amp;page=5">5</a></li> <li class="page-item"><a class="page-link" href="https://publications.waset.org/abstracts/search?q=active%20cyber%20defence&amp;page=6">6</a></li> <li class="page-item"><a class="page-link" href="https://publications.waset.org/abstracts/search?q=active%20cyber%20defence&amp;page=7">7</a></li> <li class="page-item"><a class="page-link" href="https://publications.waset.org/abstracts/search?q=active%20cyber%20defence&amp;page=8">8</a></li> <li class="page-item"><a class="page-link" href="https://publications.waset.org/abstracts/search?q=active%20cyber%20defence&amp;page=9">9</a></li> <li class="page-item"><a class="page-link" href="https://publications.waset.org/abstracts/search?q=active%20cyber%20defence&amp;page=10">10</a></li> <li class="page-item disabled"><span class="page-link">...</span></li> <li class="page-item"><a class="page-link" href="https://publications.waset.org/abstracts/search?q=active%20cyber%20defence&amp;page=132">132</a></li> <li class="page-item"><a class="page-link" href="https://publications.waset.org/abstracts/search?q=active%20cyber%20defence&amp;page=133">133</a></li> <li class="page-item"><a class="page-link" href="https://publications.waset.org/abstracts/search?q=active%20cyber%20defence&amp;page=2" rel="next">&rsaquo;</a></li> </ul> </div> </main> <footer> <div id="infolinks" class="pt-3 pb-2"> <div class="container"> <div style="background-color:#f5f5f5;" class="p-3"> <div class="row"> <div class="col-md-2"> <ul class="list-unstyled"> About <li><a href="https://waset.org/page/support">About Us</a></li> <li><a href="https://waset.org/page/support#legal-information">Legal</a></li> <li><a target="_blank" rel="nofollow" href="https://publications.waset.org/static/files/WASET-16th-foundational-anniversary.pdf">WASET celebrates its 16th foundational anniversary</a></li> </ul> </div> <div class="col-md-2"> <ul class="list-unstyled"> Account <li><a href="https://waset.org/profile">My Account</a></li> </ul> </div> <div class="col-md-2"> <ul class="list-unstyled"> Explore <li><a href="https://waset.org/disciplines">Disciplines</a></li> <li><a href="https://waset.org/conferences">Conferences</a></li> <li><a href="https://waset.org/conference-programs">Conference Program</a></li> <li><a href="https://waset.org/committees">Committees</a></li> <li><a href="https://publications.waset.org">Publications</a></li> </ul> </div> <div class="col-md-2"> <ul class="list-unstyled"> Research <li><a href="https://publications.waset.org/abstracts">Abstracts</a></li> <li><a href="https://publications.waset.org">Periodicals</a></li> <li><a href="https://publications.waset.org/archive">Archive</a></li> </ul> </div> <div class="col-md-2"> <ul class="list-unstyled"> Open Science <li><a target="_blank" rel="nofollow" href="https://publications.waset.org/static/files/Open-Science-Philosophy.pdf">Open Science Philosophy</a></li> <li><a target="_blank" rel="nofollow" href="https://publications.waset.org/static/files/Open-Science-Award.pdf">Open Science Award</a></li> <li><a target="_blank" rel="nofollow" href="https://publications.waset.org/static/files/Open-Society-Open-Science-and-Open-Innovation.pdf">Open Innovation</a></li> <li><a target="_blank" rel="nofollow" href="https://publications.waset.org/static/files/Postdoctoral-Fellowship-Award.pdf">Postdoctoral Fellowship Award</a></li> <li><a target="_blank" rel="nofollow" href="https://publications.waset.org/static/files/Scholarly-Research-Review.pdf">Scholarly Research Review</a></li> </ul> </div> <div class="col-md-2"> <ul class="list-unstyled"> Support <li><a href="https://waset.org/page/support">Support</a></li> <li><a href="https://waset.org/profile/messages/create">Contact Us</a></li> <li><a href="https://waset.org/profile/messages/create">Report Abuse</a></li> </ul> </div> </div> </div> </div> </div> <div class="container text-center"> <hr style="margin-top:0;margin-bottom:.3rem;"> <a href="https://creativecommons.org/licenses/by/4.0/" target="_blank" class="text-muted small">Creative Commons Attribution 4.0 International License</a> <div id="copy" class="mt-2">&copy; 2024 World Academy of Science, Engineering and Technology</div> </div> </footer> <a href="javascript:" id="return-to-top"><i class="fas fa-arrow-up"></i></a> <div class="modal" id="modal-template"> <div class="modal-dialog"> <div class="modal-content"> <div class="row m-0 mt-1"> <div class="col-md-12"> <button type="button" class="close" data-dismiss="modal" aria-label="Close"><span aria-hidden="true">&times;</span></button> </div> </div> <div class="modal-body"></div> </div> </div> </div> <script src="https://cdn.waset.org/static/plugins/jquery-3.3.1.min.js"></script> <script src="https://cdn.waset.org/static/plugins/bootstrap-4.2.1/js/bootstrap.bundle.min.js"></script> <script src="https://cdn.waset.org/static/js/site.js?v=150220211556"></script> <script> jQuery(document).ready(function() { /*jQuery.get("https://publications.waset.org/xhr/user-menu", function (response) { jQuery('#mainNavMenu').append(response); });*/ jQuery.get({ url: "https://publications.waset.org/xhr/user-menu", cache: false }).then(function(response){ jQuery('#mainNavMenu').append(response); }); }); </script> </body> </html>

Pages: 1 2 3 4 5 6 7 8 9 10