Search results for " Cybersecurity"

showing 9 items of 9 documents

Online Expression, Personal Cybersecurity Costs, and the Specter of Cybercrime

2020

The internet is used increasingly as a platform both for free expression and e-commerce. The internet has unique security and privacy risks. Such risks include the threat of criminal cyberattacks, including hacking and doxing. Internet users have a variety of attitudes towards the security and privacy risks involved with using the internet and distinct concerns and behaviors with regard to expressing themselves online. In order to mitigate the security and privacy risks of the internet, some internet users spend valuable time thinking about and configuring the security settings of their devices. They may also have different attitudes towards personal spending of money for cybersecurity prod…

cybersecurityfrustration050801 communication & media studies02 engineering and technologyprivacy concernsComputer securitycomputer.software_genre0508 media and communications020204 information systemsyksityisyys0202 electrical engineering electronic engineering information engineeringkyberturvallisuusonline expressionriskitverkkopalvelutInternetkyberrikollisuustime consumption05 social sciencesitseilmaisukuluttajakäyttäytyminenCybercrimerisk avoidanceExpression (architecture)cybercrimePsychologycomputerpersonal cybersecurity spending
researchProduct

Enhancing the European Cyber Threat Prevention Mechanism

2021

This research will determine how it is possible to implement the national cyber threat prevention system into the EU level Early Warning System. Decision makers have recognized that the lack of cooperation between EU member countries affects public safety at the international level. Separate operational functions and procedures between national cyber situation centers create challenges. One main problem is that the European Union does not have a common cyber ecosystem concerning intrusion detection systems for cyber threats. Also, privacy and citizens’ security as topics are set against each other. The research will comprise a new database for the ECHO Early Warning System concept.

turvajärjestelmätcybersecurityprivacy early warninginformation sharingInformation Sharing Cybersecurity HAVARO Privacy Early Warningkansainvälinen yhteistyöHAVAROtietojenvaihtoinfrastruktuuritkyberturvallisuusturvallisuuspolitiikkatietojärjestelmättiedonhankinta
researchProduct

Il Perimetro di sicurezza nazionale cibernetica

2023

Il presente contributo intende approfondire la disciplina del Perimetro di sicurezza cibernetica istituito dal Decreto-legge 21 settembre 2019 , n. 105. Segnatamente, il lavoro intende approfondire l’architettura di tale sistema attraverso un’analisi del quadro organizzativo, con particolare riferimento alla distribuzione di competenze (e obblighi) dei diversi attori pubblici e privati coinvolti.

perimetro di sicurezza nazionale cibernetica cybersecurity cibersicurezza PSNC sicurezza nazionale sicurezza ciberneticaSettore IUS/09 - Istituzioni Di Diritto Pubblico
researchProduct

National cyber threat prevention mechanism as a part of the E-EWS

2020

The research will find out feature-based functionalities concerning the national cybersecurity system HAVARO and how the system is possible to implement to the EU level early warning system. The research based on interviews, official materials concerning the HAVARO information sharing system, scientific literature and other official published documents. The European level decision-makers have recognized that lack of cooperation between EU member countries effects to completely public safety atmosphere. The only problem does not consist of separate operational functions and procedures between national Cyber situation centers. One main problem is that the European Union does not have a common…

early warningEU-maatcybersecurityinformation sharingkansainvälinen yhteistyöInformation sharing HAVARO cybersecurity early warningHAVAROkansallinen turvallisuuskyberturvallisuusverkkohyökkäykset
researchProduct

La regolazione della cybersecurity in Italia

2023

Il saggio offre una panoramica generale della regolazione e dell'organizzazione della sicurezza cibernetica in Italia. In particolare, dopo una premessa volta a dedicare alcuni cenni all'evoluzione della materia e alla disciplina europea, l'elaborato si sofferma sullo stato dell'arte e sulle future sfide in materia di cybersecurity.

Sicurezza informatica sicurezza cibernetica cybersecurity strategia nazionale direttiva NIS direttiva NIS II Agenzia per la Cybersecurity Nazionale ACNSettore IUS/10 - Diritto Amministrativo
researchProduct

Artificial Intelligence for Cybersecurity: A Systematic Mapping of Literature

2020

Due to the ever-increasing complexities in cybercrimes, there is the need for cybersecurity methods to be more robust and intelligent. This will make defense mechanisms to be capable of making real-time decisions that can effectively respond to sophisticated attacks. To support this, both researchers and practitioners need to be familiar with current methods of ensuring cybersecurity (CyberSec). In particular, the use of artificial intelligence for combating cybercrimes. However, there is lack of summaries on artificial intelligent methods for combating cybercrimes. To address this knowledge gap, this study sampled 131 articles from two main scholarly databases (ACM digital library and IEEE…

Artificial intelligence and cybersecuritycybersecurityGeneral Computer ScienceComputer scienceinformation securitysystematic reviewsprotocols02 engineering and technologyIntrusion detection systemtekoälyComputer securitycomputer.software_genre01 natural sciencesDomain (software engineering)systematic reviewGeneral Materials Sciencekirjallisuuskatsauksettietoturvakyberturvallisuussystemaattiset kirjallisuuskatsauksettietoverkkorikoksetkyberrikollisuusbusiness.industry010401 analytical chemistryGeneral Engineeringartificial intelligence021001 nanoscience & nanotechnology0104 chemical sciencesSupport vector machinekoneoppiminenmachine learningcomputer crimeArtificial intelligencelcsh:Electrical engineering. Electronics. Nuclear engineeringSystematic mappingIntrusion prevention system0210 nano-technologybusinesscomputerlcsh:TK1-9971Qualitative researchIEEE Access
researchProduct

Online expression and spending on personal cybersecurity

2019

The Internet is used increasingly as a platform both for free expression and e-commerce. Internet users have a variety of attitudes towards the security and privacy risks involved with using the Internet; and distinct concerns and behaviors with regard to expressing themselves online. Users may have controversial viewpoints that they may express online in various ways. Controversial viewpoints or artwork by their nature may not be as well received as positive or polite expressions. In the online environment, users with controversial viewpoints may be reluctant to express the viewpoints due to concern about possible consequences resulting from the expressions. Consequences may be imposed by …

risk avoidanceverkkoyhteisötyksityisyysonline expression reluctanceprivacy concernskuluttajakäyttäytyminenpersonal cybersecurity spendingriskitonline spendingverkkopalvelut
researchProduct

On Attacking Future 5G Networks with Adversarial Examples : Survey

2022

The introduction of 5G technology along with the exponential growth in connected devices is expected to cause a challenge for the efficient and reliable network resource allocation. Network providers are now required to dynamically create and deploy multiple services which function under various requirements in different vertical sectors while operating on top of the same physical infrastructure. The recent progress in artificial intelligence and machine learning is theorized to be a potential answer to the arising resource allocation challenges. It is therefore expected that future generation mobile networks will heavily depend on its artificial intelligence components which may result in …

deep learning5G-tekniikkaGeneral Medicinematkaviestinverkottekoälyartificial intelligenceadversarial machine learning5G networkskoneoppiminenmatkaviestinpalvelut (telepalvelut)algoritmit5G cybersecurity knowledge basetietoturvakyberturvallisuusverkkohyökkäyksetverkkopalvelut
researchProduct

The emergence of liminal cyberspace : challenges for the ontological work in cybersecurity

2022

This philosophy-oriented paper examines cybersecurity and its ontological work in relation to spaces which are created by conventional perimeter security model and Zero Trust model. We argue that security works by a code of inclusion and exclusion, e.g., an individual user seeking access is either included or excluded in relation to the system. Therefore, cybersecurity divides the space through employing the code of inclusion/exclusion which directly affects the agency of users. We examine how the growing complexity of network environment makes information and cybersecurity to struggle with the simplicity of the inclusion/exclusion code. The simplified bifurcation is held by maintaining a s…

zero trustpääsynvalvontaliminalityspatialitykyberavaruusontological workontologia (filosofia)liminaalisuustoimijuuskäyttäjäpsykologiauser-centric cybersecuritykyberturvallisuustietojärjestelmät
researchProduct