Search

Your search keyword '"Alana Maurushat"' showing total 45 results

Search Constraints

Start Over You searched for: Author "Alana Maurushat" Remove constraint Author: "Alana Maurushat"
45 results on '"Alana Maurushat"'

Search Results

1. The Role of User Behaviour in Improving Cyber Security Management

2. Factors Affecting Reputational Damage to Organisations Due to Cyberattacks

3. The Impact of Social Networks and Mobile Technologies on the Revolutions in the Arab World—A Study of Egypt and Tunisia

10. The legal obligation to provide timely security patching and automatic updates

11. Security Risks and User Perception towards Adopting Wearable Internet of Medical Things

12. Synthesis of Evidence on Existing and Emerging Social Engineering Ransomware Attack Vectors

15. SETTING A POSITIVE AGENDA FOR INTERNET GOVERNANCE AT THE WORLD SUMMIT ON THE INFORMATION SOCIETY (WSIS): OF TECHNOLOGY AND HUMANKIND

17. Contributors

22. Incorporating psychology into cyber security education: A pedagogical approach

23. Technical and Behavioural Training and Awareness Solutions for Mitigating Ransomware Attacks

24. Response to Issues Paper on Data Sharing and Release

25. Financial Cryptography and Data Security : FC 2020 International Workshops, AsiaUSEC, CoDeFi, VOTING, and WTSC, Kota Kinabalu, Malaysia, February 14, 2020, Revised Selected Papers

26. Ethical Hacking

28. From cybercrime to cyberwar: security through obscurity or security through absurdity?

29. 'Good' worms and human rights

30. Using 'big' metadata for criminal intelligence

31. Hacktivism and Whistleblowing in the Era of Forced Transparency?

32. Disclosure of Security Vulnerabilities : Legal and Ethical Issues

34. Criminal Offences: Unauthorised Access, Modification or Interference Comprovisions

35. Discovery and Dissemination of Discovering Security Vulnerabilities

36. Other Legal and Ethical Issues

37. Types of Disclosure

39. Addressing identity crime in crime management information systems : definitions, classification, and empirics

41. Anti-Censorship, Benevolent Payloads and Human Rights

42. The

43. Not a Fair Trade: Australia's TPM Protection and AUSFTA-Inspired Reforms

44. The benevolent health worm : comparing Western human rights-based ethics and Confucian duty-based moral philosophy.

45. Secure Email -- A Usability Study

Catalog

Books, media, physical & digital resources