با سلام خدمت کاربران در صورتی که با خطای سیستم پرداخت بانکی مواجه شدید از طریق کارت به کارت (6037997535328901 بانک ملی ناصر خنجری ) مقاله خود را دریافت کنید (تا مشکل رفع گردد).
ردیف | عنوان | نوع |
---|---|---|
1 |
A cybercrime incident architecture with adaptive response policy
معماری حوادث سایبری با سیاست واکنش تطبیقی-2019 Handling and mitigating the cybercrime incidents (CIs) have attracted significant research
attention, over the last years, due to their increasing frequency of occurrence. However,
the term cybercrime is often used interchangeably with other technology-linked malicious
acts, such as cyberwarfare, and cyberterrorism, leading to misconceptions. In addition, there
does not exist a management framework which would classify CIs, qualitatively and quantitatively
evaluate their occurrence and promptly align them with appropriate measures
and policies. This work introduces a Cybercrime Incident Architecture that enables a comprehensive
cybercrime embodiment through feature identification, offence classification
mechanisms, threats’ severity labeling and a completely novel Adaptive Response Policy
(ARP) that identifies and interconnects the relevant stakeholders with preventive measures
and response actions. The proposed architecture consists of four separate complementary
components that lead to a manually – and in the future automatically – generated ARP. The
idea is to build a holistic framework toward automated cybercrime handling. A criminal
case study is selected to validate the introduced framework and highlight its potentiality to
evolve into a CI expert system. Keywords: Cybercrime incident | Offence classification system | Cyber-security | Threat severity | Security and privacy | Investigation techniques | Social engineering attacks | Malware/spyware crime |
مقاله انگلیسی |
2 |
Self-control, organizational context, and rational choice in Internet abuses at work
خود-کنترلی، زمینه سازمانی، و انتخاب منطقی در سوء استفاده های اینترنتی در کار-2018 Cyber criminals use the Internet as a major platform to launch malware and social engineering attacks. Employees’ violation of Internet use policy (IUP) elevates a firm’s security risks from cyber-attacks. In the literature, such deviant behavior is generally considered to be the result of a cost-benefit calculus. However, this study shows that dispositional factors such as self-control and procedural justice moderate the cost-benefit calculus. We conclude that self-control and procedural justice need to be integrated with the Rational Choice Theory to better explain Internet abuses at work.
keywords: Internet abuses| Rational choice| Self-control| Justice |
مقاله انگلیسی |