2011
DOI: 10.1080/00396338.2011.571016
|View full text |Cite
|
Sign up to set email alerts
|

Ten Rules for Cyber Security

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
10
0

Year Published

2012
2012
2019
2019

Publication Types

Select...
5
2
1

Relationship

0
8

Authors

Journals

citations
Cited by 17 publications
(11 citation statements)
references
References 0 publications
0
10
0
Order By: Relevance
“…Filesharing systems can be used to exchange any kind of computer data, including music, movies, ebooks and software. Historically, file-sharing systems have been used mainly to exchange music, but the exchange of videos is becoming more and more important [9].…”
Section: Distributed Systemmentioning
confidence: 99%
“…Filesharing systems can be used to exchange any kind of computer data, including music, movies, ebooks and software. Historically, file-sharing systems have been used mainly to exchange music, but the exchange of videos is becoming more and more important [9].…”
Section: Distributed Systemmentioning
confidence: 99%
“…The second concern focuses on technical appliances to the social use of cyberspace, and how it could be used against national interests and governments by criminal or terrorist networks. The third and most recent concern is the idea of cyber warfare (Hansen and Nissenbaum 2009;Manjikian 2010;Tikk 2011). Such an attack can occur if there are weaknesses in the infrastructure or through the programming of viruses.…”
Section: Transnational Public-private Interaction Against Cybercrimementioning
confidence: 99%
“…Such threats can be of various natures. For instance, cyber-terrorism can be used to create fear of violence for political purposes and as a means to gather support for violent groups (Trim, 2003), while cyber-attacks can be launched with state support to sabotage or spy on other entities (Claver, 2018;Tikk, 2011). Next, malicious criminals and activists may hack into computer systems of companies and governments to disrupt their functioning or steal valuable assets (Stouder & Gallagher, 2013;Trim, 2003).…”
Section: Introductionmentioning
confidence: 99%