Informacja

Drogi użytkowniku, aplikacja do prawidłowego działania wymaga obsługi JavaScript. Proszę włącz obsługę JavaScript w Twojej przeglądarce.

Wyszukujesz frazę "cyber" wg kryterium: Temat


Tytuł:
Design a robust quantitative feedback theory controller for cyber-physical systems: ship course control problem
Autorzy:
Abadi, Ali Soltani Sharif
Hosseinabadi, Pooyan Alinaghi
Ordys, Andrew
Grimble, Michael
Powiązania:
https://bibliotekanauki.pl/articles/2175111.pdf
Data publikacji:
2022
Wydawca:
Polska Akademia Nauk. Czytelnia Czasopism PAN
Tematy:
quantitative feedback theory
Denial-of-Service
robust control
cyber-physical systems
Opis:
One of the most critical problems in all practical systems is the presence of uncertainties, internal and external disturbances, as well as disturbing noise, which makes the control of the system a challenging task. Another challenge with the physical systems is the possibility of cyber-attacks that the system’s cyber security against them is a critical issue. The systems related to oil and gas industries may also be subjected to cyber-attacks. The subsets of these industries can be mentioned to the oil and gas transmission industry, where ships have a critical role. This paper uses the Quantitative Feedback Theory (QFT) method to design a robust controller for the ship course system, aiming towards desired trajectory tracking. The proposed controller is robust against all uncertainties, internal and external disturbances, noise, and various possible Deception, Stealth, and Denial-of-Service (DOS) attacks. The robust controller for the ship system is designed using the QFT method and the QFTCT toolbox in MATLAB software. Numerical simulations are performed in MATLAB/Simulink for two case studies with disturbances and attacks involving intermittent sinusoidal and random behavior to demonstrate the proposed controller.
Źródło:
Archives of Control Sciences; 2022, 32, 3; 589--605
1230-2384
Pojawia się w:
Archives of Control Sciences
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
Zapewnienie bezpieczeństwa przez semantyczne monitorowanie cyberprzestrzeni
Providing security by using Web monitoring systems
Autorzy:
Abramowicz, Witold
Bukowska, Elżbieta
Filipowska, Agata
Powiązania:
https://bibliotekanauki.pl/articles/426440.pdf
Data publikacji:
2013
Wydawca:
Szkoła Główna Handlowa w Warszawie
Tematy:
security
web monitoring
cyberspace
cyber-threats
malware
phishing
Semantic Monitoring of Cyberspace
Opis:
Security is one of the basic human needs. Due to the increasing citizens’ activity in the cyberspace, a need for security in this area is increasing. The cyber-threats may appear in many forms: from malware and phishing, to fraud or scams attempts. Rapid technological development makes the traditional methods of obtaining information insufficient for an automatic Web monitoring with the aim of detecting potential threats. The paper discusses the problem of monitoring of Web sources and indicates the existing gap between the volume of available information and the decision-making ability. Finally, it presents an example from the field of cyberspace security: Semantic Monitoring of Cyberspace project and achieved results.
Źródło:
e-mentor. Czasopismo naukowe Szkoły Głównej Handlowej w Warszawie; 2013, 3 (50); 11-17
1731-6758
1731-7428
Pojawia się w:
e-mentor. Czasopismo naukowe Szkoły Głównej Handlowej w Warszawie
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
Wywiad Chińskiej Republiki Ludowej – zarys struktur i metod działalności
The intelligence service of People’s Republic of China – an outline of structures and methods of activity
Интеллектуальные службы Китайской Народной Республики – схема структур и методов работы
Autorzy:
Adamczyk, Marcin
Baraniuk, Kamil
Powiązania:
https://bibliotekanauki.pl/articles/2007080.pdf
Data publikacji:
2017-12-31
Wydawca:
Wydawnictwo Adam Marszałek
Tematy:
China
organizational structure of the intelligence service
cyber spying
guanxi
Китай
организационная структура разведывательной службы
кибер-шпионаж
гуаньси
Opis:
Studying Chinese intelligence service brings researchers and their readers together to identify the specific ways in which the state achieves its goals internationally. Intelligence is deeply rooted in the Chinese understanding of interstate competition, and its essential effect, ie knowledge, is a key element in rational decision-making in foreign and security policy. Intelligence is also an important tool for reducing the technological gap between the PRC and Western countries. Years of tradition, size and international status make the intelligence service of the People’s Republic of China have certain characteristics that characterize its operation. Their description may help to understand the philosophy underlying the intelligence work on Chinese characteristics, the role of these institutions in foreign policy and their methodology of action. Authors decided to focus on two aspects: the structures responsible for the interview and the specificity of the approach to collecting information. The main reason for adopting such a perspective is the desire to outline the main differences in Chinese intelligence work in relation to Western countries of cultural or even Russian. A look at the structure of the intelligence and its place in the system brings us closer to understanding what role the Chinese attribute and what they expect from the institutions called to collect information.
Изучение китайских разведывательных служб объединяет исследователей и их читателей, чтобы понять специфику того, как государство достигает своих целей на международном уровне. Интеллект глубоко укоренен в китайском понимании межгосударственной конкуренции, и его существенный эффект, то есть знания, является ключевым элементом рационального принятия решений в области внешней политики и политики безопасности. Интеллект также является важным инструментом для сокращения технологического разрыва между КНР и Западом. Годы традиций, размеров и международного статуса делают разведывательные службы Китайской Народной Республики определенными характеристиками, характеризующими ее деятельность. Их описание может помочь понять философию, лежащую в основе разведывательной работы по китайским особенностям, роль этих институтов во внешней политике и их методологию действий. Авторы решили сосредоточиться на двух аспектах: структурах, ответственных за интервью, и специфике подхода к сбору информации. Основной причиной принятия такой перспективы является стремление наметить основные различия в работе китайской разведки в отношении западных стран культурного или даже русского языка. Взгляд на структуру интеллекта и его место в системе приближает нас к пониманию роли, которую китайцы приписывают и чего они ожидают от институтов, призванных собирать информацию.
Źródło:
Studia Orientalne; 2017, 2(12); 34-58
2299-1999
Pojawia się w:
Studia Orientalne
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
Artificial Intelligence for Cybersecurity: Offensive Tactics, Mitigation Techniques and Future Directions
Autorzy:
Adi, Erwin
Baig, Zubair
Zeadally, Sherali
Powiązania:
https://bibliotekanauki.pl/articles/27272018.pdf
Data publikacji:
2022
Wydawca:
NASK - National Research Institute
Tematy:
artificial intelligence
AI
cyber infrastructures
data analysis
supply chain
sztuczna inteligencja
cybernetyczne infrastruktury
analiza danych
łańcuch dostaw
Opis:
Cybersecurity has benefitted from Artificial Intelligence (AI) technologies for attack detection. However, recent advances in AI techniques, in tandem with their misuse, have outpaced parallel advancements in cyberattack classification methods that have been achieved through academic and industry-led efforts. We describe the shift in the evolution of AI techniques, and we show how recent AI approaches are effective in helping an adversary attain his/her objectives appertaining to cyberattacks. We also discuss how the current architecture of computer communications enables the development of AI-based adversarial threats against heterogeneous computing platforms and infrastructures.
Źródło:
Applied Cybersecurity & Internet Governance; 2022, 1, 1; 1-23
2956-3119
2956-4395
Pojawia się w:
Applied Cybersecurity & Internet Governance
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
Keynote Address. Tales From the Field: Reflections on Four Decades of Ethnography
Autorzy:
Adler, Patricia A.
Adler, Peter
Powiązania:
https://bibliotekanauki.pl/articles/2108235.pdf
Data publikacji:
2012-04-30
Wydawca:
Uniwersytet Łódzki. Wydawnictwo Uniwersytetu Łódzkiego
Tematy:
Ethnography
Epistemology
Ethics
Cyber-Ethnography
Qualitative Research
Self-Injury
Deviance
Sport
Socialization
Youth
Opis:
Drawing on careers spanning over 35 years in the field of ethnography, we reflect on the research in which we’ve engaged and how the practice and epistemology of ethnography has evolved over this period. We begin by addressing the problematic nature of ethical issues in conducting qualitative research, highlighting the non-uniform nature of standards, the difficulty of applying mainstream or medical criteria to field research, and the issues raised by the new area of cyber research, drawing particularly on our recent cyberethnography of self-injury. We then discuss the challenge of engagement, highlighting pulls that draw ethnographers between the ideals of involvement and objectivity. Finally, we address the challenges and changing landscapes of qualitative analysis, and how its practice and legitimation are impacted by contemporary trends in sociology. We conclude by discussing how epistemological decisions in the field of qualitative research are framed in political, ethical, and disciplinary struggles over disciplinary hegemony
Źródło:
Qualitative Sociology Review; 2012, 8, 1; 10-32
1733-8077
Pojawia się w:
Qualitative Sociology Review
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
The Social Transformation of Self-Injury
Autorzy:
Adler, Patricia A.
Adler, Peter
Powiązania:
https://bibliotekanauki.pl/articles/32222580.pdf
Data publikacji:
2022
Wydawca:
Uniwersytet Łódzki. Wydawnictwo Uniwersytetu Łódzkiego
Tematy:
Deviance
Medical
Self-Injury
Ethnography
Cyber-Ethnography
Opis:
This research offers a description and analysis of the relatively hidden practice of self-injury: cutting, burning, branding, and bone breaking. Drawing on over 150 in-depth interviews and tens of thousands of website postings, e-mail communications, and Internet groups, we challenge the psycho-medical depiction of this phenomenon and discuss ways that the contemporary sociological practice of self-injury has evolved to challenge images of the population, etiology, practice, and social meanings associated with this behavior. We conclude by suggesting that self-injury, for some, is in the process of undergoing a moral passage from the realm of medicalized to voluntarily chosen deviant behavior in which participants’ actions may be understood with a greater understanding of the sociological factors that contribute to the prevalence of these actions.
Źródło:
Qualitative Sociology Review; 2022, 18, 4; 64-91
1733-8077
Pojawia się w:
Qualitative Sociology Review
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
Parental Technology Governance: Teenagers’ Understandings and Responses to Parental Digital Mediation
Autorzy:
Adorjan, Michael
Ricciardelli, Rosemary
Saleh, Tina
Powiązania:
https://bibliotekanauki.pl/articles/2106792.pdf
Data publikacji:
2022-04-30
Wydawca:
Uniwersytet Łódzki. Wydawnictwo Uniwersytetu Łódzkiego
Tematy:
Digital Parenting
Parental Online Governance and Mediation
Information Communications Technologies
Youth and Teenagers
Cyber Risk
Opis:
Research on parental mediation of children’s online engagements situate historically longstanding anxieties within the dynamics of present-day information communications technologies (i.e., concerns over new “cyber risks,” as well as opportunities). Yet, there remains a lack of emphasis on children’s reactions to and experiences with parental strategies and responses. In the current article, we highlight research involving semi-structured focus groups (n=35) with Canadian teenagers (n=115). We highlight themes directly related to parental digital mediation, including the role of ICTs in driving addictive behaviors, social connection, differences in parental responses between sons and daughters, and differences concerning age and birth order. Disrupting cultural discourses of young people who lack agency in relation to their use of ICTs, our discussions with teens reveal qualified support, even degrees of sympathy, for parental efforts to restrict access and use of digital technologies, but illuminate multifaceted reasons for resistance: their vital role not only for social connection but access to crucial information and knowledge.
Źródło:
Qualitative Sociology Review; 2022, 18, 2; 112-130
1733-8077
Pojawia się w:
Qualitative Sociology Review
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
Safe information exchange on board of the ship
Autorzy:
Ahvenjärvi, S.
Czarnowski, I.
Kåla, J.
Kyster, A.
Meyer, I.
Mogensen, J.
Szyman, P.
Powiązania:
https://bibliotekanauki.pl/articles/116173.pdf
Data publikacji:
2019
Wydawca:
Uniwersytet Morski w Gdyni. Wydział Nawigacyjny
Tematy:
information exchange
navigation safety
autonomous ship
autonomous ships navigation
information technology (IT)
safe information exchange
maritime education and training (MET)
cyber security
Opis:
The first ever attempt at fully autonomous dock-to-dock operation has been tested and demonstrated successfully at the end of 2018. The revolutionary shift is feared to have a negative impact on the safety of navigation and the getting of real-time situation awareness. Especially, the centralized context onboard could be changed to a distributed context. In navigation safety domain, monitoring, control, assessment of dangerous situations, support of operators of decision-making support system should be implemented in real time. In the context of autonomous ships, decision-making processes will play an important role under such ocean autonomy, therefore the same technologies should consist of adequate system intelligence. At the same time, situation awareness is the key element of the decision-making processes. Although there is substantial research on situation awareness measurement techniques, they are not suitable to directly execute quantitative processing for the situation awareness of autonomous ships navigation. Hence, a novel quantitative model of situation awareness is firstly proposed based on the system safety control structure of remotely controlled vessel. The data source is greatly limited, but the main result still indicates that the probability of operator lose adequate situation awareness of the autonomous ship is significantly higher than the conventional ship. Finally, the paper provides a probabilistic theory and model for high-level abstractions of situation awareness to guide future evaluation of the navigation safety of autonomous ships.
Źródło:
TransNav : International Journal on Marine Navigation and Safety of Sea Transportation; 2019, 13, 1; 165-171
2083-6473
2083-6481
Pojawia się w:
TransNav : International Journal on Marine Navigation and Safety of Sea Transportation
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
OPSEC Model and Applications
Autorzy:
Akman, M. Kubilay
Powiązania:
https://bibliotekanauki.pl/articles/1835821.pdf
Data publikacji:
2018-08-23
Wydawca:
Wyższa Szkoła Bezpieczeństwa Publicznego i Indywidualnego Apeiron w Krakowie
Tematy:
OPSEC
security studies
sociology of security
security management
information security
cyber security
risk society
Opis:
OPSEC (Operations Security) model was developed during the Vietnam War era as a part of military strategies to protect critical information, analyzing vulnerabilities and threats, assessing risks and applying proper countermeasures. 5 steps OPSEC model have been functional for US Army’s operational security and used by other NATO members as well. When threats have spread widely in 21 st Century OPSEC began to be used and applied in a more general context of security world. Today even in cyber security this model serves practically for protection of critical data and information. In this paper we are going to proceed in two levels: on the one hand we will explain the OPSEC principles, steps and conceptual aspects through the main sources of this field; on the other hand we will discuss applications of the model in real world (military, politics, industry, etc.) via some explanatory examples and its potential usages for securing modern life and societies. Our approach will be based on an interdisciplinary view with references to sociology, security studies and management.
Źródło:
Security Dimensions; 2018, 25(25); 60-81
2353-7000
Pojawia się w:
Security Dimensions
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
Social Media and OPSEC / An Analysis through Sociology of Security
Autorzy:
Akman, M. Kubilay
Powiązania:
https://bibliotekanauki.pl/articles/1808145.pdf
Data publikacji:
2018-11-07
Wydawca:
Wyższa Szkoła Bezpieczeństwa Publicznego i Indywidualnego Apeiron w Krakowie
Tematy:
sociology of security
cyber security
OPSEC
social media
cybercrime
Opis:
When virtual social relations and online interactions have increased in our age media also had a transformation. Social media is a phenomenon which came with wide usage of internet by modern society and individuals. On the one hand it has created opportunities for a more democratic way of communication, participation and dialogue between members of different socio-cultural groups, communities, friends and family members, colleagues, Etc.; on the other hand this new version of media has caused criminal risks, security gaps and vulnerabilities to contemporary threats varied from fraud to cyber-attacks, terrorism, identity theft, ransomwares and so on. Even “old types” of crimes in real life can begin from social media and virtual reality. All these problems are related to several subdisciplines of sociology: sociology of communication, sociology of crime, sociology of security are among them. In this paper we will analyze the topic though sociology of security’s prism. Also, we will discuss what can be the functionality of OPSEC as a measure, which has military background and widely used later on by civilian sectors including corporate security as well.
Źródło:
Security Dimensions; 2018, 26(26); 160-172
2353-7000
Pojawia się w:
Security Dimensions
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
The main challenges and barriers to the successful “smart shipping”
Autorzy:
Alop, A.
Powiązania:
https://bibliotekanauki.pl/articles/116779.pdf
Data publikacji:
2019
Wydawca:
Uniwersytet Morski w Gdyni. Wydział Nawigacyjny
Tematy:
smart shipping
maritime affairs
intelligent ship
no records
autonomous ship
cyber security
artificial intelligence (AI)
SWOT analyze
Opis:
As with the powerful digitalization of the world in the 21st century, maritime affairs, like all other areas, are facing not only new opportunities, but also new big challenges and problems. From the point of view of the development of new technologies, it seems that everything is possible, for example the bringing of so-called "intelligent ships" and “smart ports” into one global system on base of internet of things and big data applications. However, if to look at the matter further, a number of factors and obstacles may appear which could be major threats to the normal functioning of such a system. While it is clear that systems with such high degree of complexity are even technically vulnerable, it seems to the author of this paper that questions that are no less difficult are in the field of human relations. For example, when ships and ports are becoming more and more "smarter" and need less and less people to intervene in their interactions, who at the end will be responsible for everything that can and definitely will happened at sea or in the port? What about liability of cargo carrier if “carrier” is an autonomous ship without any person on-board during the entire journey? How to ensure cyber security? How to be secured against the risks of so-called artificial intelligence systemic errors? It is possible that only new non-trivial approaches can lead to acceptable results in this area, but what they may be and whether these approaches are possible at all - these questions are still waiting for answers.
Źródło:
TransNav : International Journal on Marine Navigation and Safety of Sea Transportation; 2019, 13, 3; 521-528
2083-6473
2083-6481
Pojawia się w:
TransNav : International Journal on Marine Navigation and Safety of Sea Transportation
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
Self-Adaptation Driven by SysML and Goal Models – A Literature Review
Autorzy:
Andaa, Amal Ahmed
Amyot, Daniel
Powiązania:
https://bibliotekanauki.pl/articles/2060912.pdf
Data publikacji:
2022
Wydawca:
Politechnika Wrocławska. Oficyna Wydawnicza Politechniki Wrocławskiej
Tematy:
adaptation
cyber-physical systems
goal modeling
sociotechnical system
SysML
traceability
uncertainty
Opis:
Background: Socio-cyber-physical systems (SCPSs) are a type of cyber-physical systems with social concerns. Many SCPSs, such as smart homes, must be able to adapt to reach an optimal symbiosis with users and their contexts. The Systems Modeling Language (SysML) is frequently used to specify ordinary CPSs, whereas goal modeling is a requirements engineering approach used to describe and reason about social concerns. Objective: This paper aims to assess existing modeling techniques that support adaptation in SCPSs, and in particular those that integrate SysML with goal modeling. Method: A systematic literature review presents the main contributions of 52 English articles selected from five databases that use both SysML and goal models (17 techniques), SysML models only (11 techniques), or goal models only (8 techniques) for analysis and self-adaptation. Result: Existing techniques have provided increasingly better modeling support for adaptation in a SCPS context, but overall analysis support remains weak. The techniques that combine SysML and goal modeling offer interesting benefits by tracing goals to SysML (requirements) diagrams and influencing the generation of predefined adaptation strategies for expected contexts, but few target adaptation explicitly and most still suffer from a partial coverage of important goal modeling concepts and of traceability management issues.
Źródło:
e-Informatica Software Engineering Journal; 2022, 16, 1; art. no. 220101
1897-7979
Pojawia się w:
e-Informatica Software Engineering Journal
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
„Lajki” i „followersi” na portalach społecznościowych sposobem na poszukiwanie własnej tożsamości
"Likes" and "followers" on social portals as a way of searching for personal identity
Autorzy:
Andrzejewski, Adam
Powiązania:
https://bibliotekanauki.pl/articles/893728.pdf
Data publikacji:
2018-03-07
Wydawca:
Akademia Pedagogiki Specjalnej im. Marii Grzegorzewskiej. Wydawnictwo APS
Tematy:
(cyber-)identity
likes
followers
social portals
ultimate selfie
tożsamość
lajki
followersi
portale społecznościowe
ostateczne selfie
Opis:
The publication focuses on the connection between humans' personal identity and activity on social networks. Facebook and Instagram are a kind of (cyber-communication) sphere in which we are able to communicate with everyone who belongs to these (cyber-)communities. It allows us to publish our photos, memories, current activities, and videos while simultaneously allowing the portal’s other users to observe our life and expression of our Self. In this (cyber-)social space, people are able to create their image and (cyber-)identity in a psychological and social context, encounter a variety of (personal) experiences, but also gain popularity – sometimes at all cost, at the expense of their health and life. The following issues are discussed in the publication: 1. (People's cyber-)identity created on the social networks: Facebook and Instagram. 2. Self-esteem depending on the number of "likes." 3. "Ultimate selfie" - the popularity for which you pay with your life.
W publikacji skoncentrowano się nad związkiem ludzkiej tożsamości z aktywnością na portalach społecznościowych. Facebook i Instagram to przestrzeń, w której możemy komunikować się z każdym, kto należy do tych społeczności. Pozwala nam na publikowanie własnych zdjęć, wspomnień, bieżących aktywności, filmików przy jednoczesnym przyzwoleniu dla innych użytkowników portalu do obserwowania naszego życia i ekspresji własnego ja. W tej społecznej przestrzeni ludzie kreują swój wizerunek oraz tożsamość w kontekście psychologicznym i społecznym, doświadczają różnorodnych przeżyć, ale także czasem za wszelką cenę zdobywają popularność, kosztem swojego zdrowia i życia. Przedmiotem analiz w publikacji uczyniono następujące zagadnienia: 1. Tożsamość kreowana na portalach społecznościowych Facebook i Instagram. 2. Poczucie własnej wartości uzależnione od liczby „lajków”. 3. „Ostateczne selfie” – popularność, za którą płaci się życiem.
Źródło:
Problemy Opiekuńczo-Wychowawcze; 2018, 566(1); 21-29
0552-2188
Pojawia się w:
Problemy Opiekuńczo-Wychowawcze
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
Corporate finance management in a turbulent environment
Autorzy:
Antczak, Joanna
Powiązania:
https://bibliotekanauki.pl/articles/27313328.pdf
Data publikacji:
2023
Wydawca:
Politechnika Śląska. Wydawnictwo Politechniki Śląskiej
Tematy:
finance management
cyber-attack
financial analysis
zarządzanie finansami
cyberatak
analiza finansowa
Opis:
Purpose: The changing market conditions in which an economic entity operates requires its executives to choose management support tools, in particular in the area of locating the company's "bottlenecks". The knowledge of the financial situation of an economic entity becomes indispensable in making decisions at both operational and strategic levels. The aim of the article was to indicate that finance management is one of the most important areas in both current and long-term management of the company's operations in a turbulent environment. Design/methodology/approach: CD PROJEKT Group operating on the global video game market, which is one of the most dynamic sectors of the world economy, was selected for research through purposive sampling. The solutions were developed on the basis of the following research methods: analysis of the literature on the subject, case study, analysis of documents. The financial analysis was conducted on the basis of the inductive inference method, consisting in the examination of the details in the first order, followed by generalizing them in the form of conclusions, synthetic assessment and diagnosis. Trend analysis was used to estimate the likelihood of improvement or deterioration of the financial situation. The temporal scope of the research covered in the period of 2017-2021. During the analytical procedure, selected detailed methods were used, which depended on the issues under consideration as well as problems: balance sheet method, comparative method, indicator method, descriptive methods supported by tables and graphs. Findings: The study confirmed that a turbulent environment has a direct impact on the management, functioning and financial performance of the company. Originality/value: The value of the article is in the analysis of the financial situation of CD PROJEKT Group over the five years and indication of the impact of the turbulent environment on the company's operations. The article is addressed to executive staff in order to make them realize the necessity of conducting ongoing financial analysis in order to locate weak areas of activity and properly adjust the strategy to the capabilities and objectives of the company.
Źródło:
Zeszyty Naukowe. Organizacja i Zarządzanie / Politechnika Śląska; 2023, 168; 7--24
1641-3466
Pojawia się w:
Zeszyty Naukowe. Organizacja i Zarządzanie / Politechnika Śląska
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
Costs of Cyber-Security in a Business Entity
Autorzy:
Antczak, Joanna
Powiązania:
https://bibliotekanauki.pl/articles/1194144.pdf
Data publikacji:
2020
Wydawca:
Szkoła Główna Handlowa w Warszawie
Tematy:
costs
costs of cyber-security
cyber threats
direct costs of cyber-security
indirect costs
of cyber-security
Opis:
Operation in the cyberspace of every business unit is unavoidable. Most commercial transactions, marketing activities, e-mail contact with employees or contractors are carried out using virtual space. The purpose of the article is to identify and analyze selected costs for cybersecurity of an enterprise. Costs related to cybersecurity constitute a new category in the management of an enterprise. Considering the costs at the enterprise level, two areas should be discussed: on the one hand, those incurred to prevent cyber threats and on the other one, the costs of offsetting the negative effects of cyber-attacks. For the sake of stable operation and at the same time development in the future, the management should strengthen activities in the field of information security, which is related to costs that will minimize the risk of cyber-attacks.
Źródło:
Edukacja Ekonomistów i Menedżerów; 2020, 55, 1; 82-94
1734-087X
Pojawia się w:
Edukacja Ekonomistów i Menedżerów
Dostawca treści:
Biblioteka Nauki
Artykuł

Ta witryna wykorzystuje pliki cookies do przechowywania informacji na Twoim komputerze. Pliki cookies stosujemy w celu świadczenia usług na najwyższym poziomie, w tym w sposób dostosowany do indywidualnych potrzeb. Korzystanie z witryny bez zmiany ustawień dotyczących cookies oznacza, że będą one zamieszczane w Twoim komputerze. W każdym momencie możesz dokonać zmiany ustawień dotyczących cookies