Computer Fraud and Security最新文献

筛选
英文 中文
Busting the biggest myths about digital identities 打破关于数字身份的最大神话
Computer Fraud and Security Pub Date : 2023-07-01 DOI: 10.12968/s1361-3723(23)70029-8
J. Cullen
{"title":"Busting the biggest myths about digital identities","authors":"J. Cullen","doi":"10.12968/s1361-3723(23)70029-8","DOIUrl":"https://doi.org/10.12968/s1361-3723(23)70029-8","url":null,"abstract":"Digital identity technology has a lot to offer, both in improving security and enabling more-effective and efficient services. So why is there so much reluctance to adopt the technology, both from organisations and users?","PeriodicalId":35636,"journal":{"name":"Computer Fraud and Security","volume":"8 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2023-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"75356725","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Information risk management – the gaps between expectation and reality 信息风险管理——期望与现实之间的差距
Computer Fraud and Security Pub Date : 2023-07-01 DOI: 10.12968/s1361-3723(23)70034-1
Chris Vaughan
{"title":"Information risk management – the gaps between expectation and reality","authors":"Chris Vaughan","doi":"10.12968/s1361-3723(23)70034-1","DOIUrl":"https://doi.org/10.12968/s1361-3723(23)70034-1","url":null,"abstract":"Is our understanding of risk keeping pace with the evolution of technology, major changes to IT infrastructure and the ever-changing threat landscape? Organisations are having to change their approaches to risk, otherwise they are in danger of facing an existential thread from the gap between their understanding of the issues they face and the reality.","PeriodicalId":35636,"journal":{"name":"Computer Fraud and Security","volume":"15 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2023-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"87077127","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Is cyber security too hard? 网络安全太难了吗?
Computer Fraud and Security Pub Date : 2023-06-01 DOI: 10.12968/s1361-3723(23)70027-4
Steve Mansfield-Devine
{"title":"Is cyber security too hard?","authors":"Steve Mansfield-Devine","doi":"10.12968/s1361-3723(23)70027-4","DOIUrl":"https://doi.org/10.12968/s1361-3723(23)70027-4","url":null,"abstract":"The threat landscape is growing, attacks are becoming more frequent and more sophisticated and security budgets are being squeezed. Is information security becoming just too difficult for some organisations? In this interview, Srinivas Mukkamala, chief product officer at Ivanti, explains that there are ways to overcome these challenges.","PeriodicalId":35636,"journal":{"name":"Computer Fraud and Security","volume":"41 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2023-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"77357141","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Changing the law to deliver crypto asset certainty 修改法律以确保加密资产的确定性
Computer Fraud and Security Pub Date : 2023-06-01 DOI: 10.12968/s1361-3723(23)70024-9
Akber Datoo, Simon Maharaj
{"title":"Changing the law to deliver crypto asset certainty","authors":"Akber Datoo, Simon Maharaj","doi":"10.12968/s1361-3723(23)70024-9","DOIUrl":"https://doi.org/10.12968/s1361-3723(23)70024-9","url":null,"abstract":"Clarity around the legal status of digital objects is crucial of digital assets, such as crypto currency, are to be seen as mature enough to be taken seriously by financial markets. Changes to the law in England and Wales could help with that.","PeriodicalId":35636,"journal":{"name":"Computer Fraud and Security","volume":"24 2 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2023-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"82684135","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Security maturity is a journey, not a destination 安全成熟是一段旅程,而不是终点
Computer Fraud and Security Pub Date : 2023-06-01 DOI: 10.12968/s1361-3723(23)70026-2
Matias Madou
{"title":"Security maturity is a journey, not a destination","authors":"Matias Madou","doi":"10.12968/s1361-3723(23)70026-2","DOIUrl":"https://doi.org/10.12968/s1361-3723(23)70026-2","url":null,"abstract":"It's unlikely you will ever reach a stage of complete ‘security maturity’. Even as your systems, processes and skills improve, the goal posts are being shifted by innovative attackers and fresh vulnerabilities. But that's not a reason to give up on security maturity – shooting for that goal will still leave you better off.","PeriodicalId":35636,"journal":{"name":"Computer Fraud and Security","volume":"24 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2023-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"82727761","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Normalising radical transparency in cyber security 使网络安全的极度透明正常化
Computer Fraud and Security Pub Date : 2023-06-01 DOI: 10.12968/s1361-3723(23)70025-0
Niklas J. Hellemann
{"title":"Normalising radical transparency in cyber security","authors":"Niklas J. Hellemann","doi":"10.12968/s1361-3723(23)70025-0","DOIUrl":"https://doi.org/10.12968/s1361-3723(23)70025-0","url":null,"abstract":"All organisations are under cyber attack and many are breached each day. And given that there's a high likelihood that you will suffer a cyber incident, the question then becomes what do you do about it? Communication – to staff, investors and the public – is a critical step and a high level of transparency here is key to enabling everyone to respond appropriately and effectively.","PeriodicalId":35636,"journal":{"name":"Computer Fraud and Security","volume":"1 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2023-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"81387924","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
New approaches to fighting fraud 打击欺诈的新方法
Computer Fraud and Security Pub Date : 2023-06-01 DOI: 10.12968/s1361-3723(23)70028-6
Fergal Parkinson
{"title":"New approaches to fighting fraud","authors":"Fergal Parkinson","doi":"10.12968/s1361-3723(23)70028-6","DOIUrl":"https://doi.org/10.12968/s1361-3723(23)70028-6","url":null,"abstract":"","PeriodicalId":35636,"journal":{"name":"Computer Fraud and Security","volume":"50 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2023-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"83187084","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Looking back to the future 回首未来
Computer Fraud and Security Pub Date : 2023-05-01 DOI: 10.12968/s1361-3723(23)70023-7
Bernard Montel
{"title":"Looking back to the future","authors":"Bernard Montel","doi":"10.12968/s1361-3723(23)70023-7","DOIUrl":"https://doi.org/10.12968/s1361-3723(23)70023-7","url":null,"abstract":"3 Looking Back to the Future: A Recursive Retrospective WILLIAM E. DOLL JR University of Victoria I, now a newly minted Canadian resident, am indebted both to Deborah Osberg and the Canadian Association for Curriculum Studies for honoring me with a retrospective on my work in the curriculum studies field. This is not something I ever expected, especially back in the 1980s when I began searching for a new curriculum model to the one then prominent, the Tyler Rationale (1950). At the time I was much engaged in reading Jean Piaget, and while I had great difficulty with the usual American interpretation of his work – “ages and stages” – I did feel his biological sense of cognition (Biology and Knowledge, 1971) and his actual work in the fields of biology and zoology provided a framework the Rationale did not consider. This framework, that of an organism’s inherent self‐organizing powers,1 became clearer to me as I was introduced to Ilya Prigogine and his work on becoming. As I noted in my 1986 article, reprinted in this volume, I found a strong connection between Piaget and Prigogine and bringing this connection to the fore, with the paradigm in which it is encased, could “stand as an alternative","PeriodicalId":35636,"journal":{"name":"Computer Fraud and Security","volume":"24 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2023-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"91103760","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Consumer trust and perspectives on cyber security 消费者信任和对网络安全的看法
Computer Fraud and Security Pub Date : 2023-05-01 DOI: 10.12968/s1361-3723(23)70020-1
Chris Dimitriadis
{"title":"Consumer trust and perspectives on cyber security","authors":"Chris Dimitriadis","doi":"10.12968/s1361-3723(23)70020-1","DOIUrl":"https://doi.org/10.12968/s1361-3723(23)70020-1","url":null,"abstract":"When your networks are breached, you may lose more than your data. Customers are increasingly wary of doing business with organisations that have been hacked. The reputational damage can last a long time – perhaps longer than the business itself.","PeriodicalId":35636,"journal":{"name":"Computer Fraud and Security","volume":"5 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2023-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"82848123","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Don't turn a blind eye to cyber security 不要对网络安全视而不见
Computer Fraud and Security Pub Date : 2023-05-01 DOI: 10.12968/s1361-3723(23)70022-5
Fabien Rech
{"title":"Don't turn a blind eye to cyber security","authors":"Fabien Rech","doi":"10.12968/s1361-3723(23)70022-5","DOIUrl":"https://doi.org/10.12968/s1361-3723(23)70022-5","url":null,"abstract":"There's often a gap between security threats as understood by the C-suite and the day-to-day threats faced by security professionals. This can condemn the latter to working with outdated and inadequate solutions. Executives need to understand that cyber security is an area crying out for investment.","PeriodicalId":35636,"journal":{"name":"Computer Fraud and Security","volume":"2012 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2023-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"74217035","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信