• Refine Query
  • Source
  • Publication year
  • to
  • Language
  • 32
  • 4
  • 4
  • 2
  • 1
  • 1
  • 1
  • 1
  • 1
  • 1
  • 1
  • 1
  • 1
  • Tagged with
  • 63
  • 38
  • 25
  • 22
  • 14
  • 9
  • 9
  • 9
  • 9
  • 7
  • 7
  • 7
  • 6
  • 6
  • 6
  • About
  • The Global ETD Search service is a free service for researchers to find electronic theses and dissertations. This service is provided by the Networked Digital Library of Theses and Dissertations.
    Our metadata is collected from universities around the world. If you manage a university/consortium/country archive and want to be added, details can be found on the NDLTD website.
51

Signalspaning : Helgar ändamålet medlen?

Edwertz, Gunilla January 2009 (has links)
Debatten om den kontroversiella signalspaningslagen är högst aktuell och det diskuteras öppet och intensivt om huruvida den är ett skydd mot hot utifrån eller om den hotar medborgarna i det svenska samhället. När uppsatsen avslutas har lagen trätt i kraft den 1 januari 2009, men kommer inte att träda i full kraft förrän i oktober 2009. Terrorism är ett fenomen som har fått en ny betydelse för människor i det globala samhället. Det har alltid funnits i samtid som det demokratiskt politiska samhället, men betydelsen av detta fenomen, detta begrepp har varierat. Den har skiftat under åren från att vara en terrorism där grupper som IRA och ETA figurerade för att frigöra territorium från de stora länderna till att handla om att påverka politiska beslut genom att skrämma civila. Cyberterrorism är ett nyare fenomen inom begreppet och har en annan verkan då den riktar sig mot det nya informationstekniska samhället som har blivit allt mer sårbart ju längre utvecklingen går. Syftet med uppsatsen har varit att undersöka vilket sorts inflytande som cyberterrorism har haft i utformandet av lagen, om lagen är ett hot mot Sverige eller ett skydd för Sverige samt huruvida signalspaning rättfärdigas av ändamålet, det vill säga att ge Sverige ett fungerande säkerhetsskydd. Slutsatsen av denna uppsats är att cyberterrorism har ett visst samband med hur lagen har utformats, men det är inte en avgörande eller ensam faktor. Huruvida lagen är ett hot mot Sverige eller ett skydd för och om ändamålet helgar medlen har det kommit fram till att den till viss del kan vara ett hot, men att ändamålet att politikerna vill  kunna ge Sverige ett fungerande säkerhetsskydd väger upp till en viss del vad lagen vill stå för. Det är fortfarande en hel del motsättningar mot lagen och det kommer det alltid att vara. / This thesis has its origins in the controversial debate about the signals intelligence law that has been a highly intensive debate since the law was passed on June 18 2008. The debate mainly is about whether or not the law is a protection against threat towards the Swedish nation-state or if the law is at threat against the citizen of the Swedish society. The law will have been put in to force on January 1 2009, but won't be in full force until October 2009. Terrorism is not a phenomena that is new, but it has gotten a new meaning to people in the global society. Though it has always existed with the democratic political society, it's meaning has been a target for change. The meaning has shifted from being about groups like IRA and ETA that fight for their own territories to be about influencing political decisions through scarring civilians. One of the more newer phenomena within terrorism is cyber terrorism and it has another effect because it directs itself towards the information technology of the modern society. The IT society has become more vulnerable because of the development and that is what cyber terrorism is attacking the vulnerability. The purpose of this thesis is to examine what kind of influence that cyber terrorism has had in the design of the law, if the law is a threat against Sweden or a protection for Sweden, that is what arguments surrounds this case, and do the aim, that is protecting the society, justify the means, that is signals intelligence in giving Sweden a functional security. The conclusion in this thesis is that cyber terrorism has had an indirect connection to how the law has been designed, but the threat of cyber terrorism has not been a deal breaking or alone factor. Whether the law is a threat or not depends on who you talk to, but it might be a threat to a certain extent if the lawmakers don't hear the critics and change the law to the extent that it involves a fully protection for the privacy of the citizens. In the end it is partly true that the aim does justify the means. / Presentation av uppsats har redan ägt rum.
52

Boj s terorismem v EU - "kyberterorismus" jako nová bezpečnostní hrozba / EU fight against terrorism - "cyberterrorism" as a new security threat

Snížková, Žaneta January 2013 (has links)
This diploma thesis deals with European Union and current security threats, concretely with Cyberterrorism. Cyberspace and internet became essential parts of our living over the last decades due to rapid development of information and communication technology. The increased dependency on cyberspace is visible in all governmental operations, public-private sector, financial and business operations, as well as communications between individuals and groups. As a result our society is facing new threats. On one hand cyberspace is a place for economic growth and innovation, on the other hand criminals, spies and terrorist use cyberspace as a place for their activities. Our society should be aware of these negative impacts as well. Cyberterrorism by its nature is considered to be a very dynamic phenomenon. Regarding this fact this thesis provides a dynamic way how to define Cyberterrorism and reveals main perspectives of Cyberterrorism. Tracking the European Unions Convention on Cybercrime and main means to fight Cyberterrorism, this thesis analysis whether European Union disposes of appropriate means to engulf the dynamic nature of this phenomenon.
53

A context-aware collaborative decision making framework for combating terrorism in Africa

Odhiambo, Nancy Achieng 19 June 2020 (has links)
PhD (Business Information Systems) / Department of Business Information Systems / Collaborative Decision Making (CDM) is a never-ending challenge in complex-problem situations where multiple actors are involved. Complex-problem situations involve problems that are ill-defined, ill-structured and wicked such as terrorism. Problems of this nature usually warrant a collaborative effort between actors (organizations) with multiple skill-sets and expertise that at times might be at variance with each other. In order to address this gap, three sub-objectives were postulated from the main research objective, “To determine how optimal/effective CDM can be realized amongst counter-terrorism organizations through context-aware technologies.” Using the theory of synergetics and following deductive thematic analysis, the socio-technical nature of the terrorism problem was depicted by postulating a Digital Terrorism Ecology that consists of Open Digital Infrastructure (ODI), Digital Information Ecosystem (DIE), Digital Terrorism Enactment (DTE), Digital Capability and Digital Enslavement. Based on institutional theory and using PLS-SEM technique, Group/departmental relationships, Organizational co-operation, Organizational form, Technical infrastructure and interoperability, Information and knowledge sharing were identified as the factors influencing attainment of Optimal/effective CDM amongst counter-terrorism organizations. In order to explicate the role of context-aware technologies in enhancing CDM amongst counter-terrorism organizations, a context-aware CDM framework was developed following Design Science Research (DSR) methodology. In this study it was evident from the findings that attainment of OCDM in counter-terrorism contexts is challenging even though it is essential. Among the factors considered as possible influencers of attainment of OCDM, Organizational form (OF) was found to influence Organizational cooperation (OC) and Technical infrastructure and inter-operability (TI). Group/departmental relationships (GDR) were found to influence OF and OC. TI was found to influence OC and GDR and further, Information and knowledge sharing (IKS) was found to influence Optimal/effective CDM (OCDM). Of the three pillars of institutional theory, the regulative pillar offered more insights on issues related to rules, discourse and practice and hence the challenges of OCDM attainment. Practically, this study aims to re-orient the thinking of counter-terrorism organizations by presenting the socio-technical nature of the terrorism problem as well as explicating the role of digital technologies in terrorism. / NRF
54

網路恐怖主義與美國防治政策 / Cyberterrorism and the U.S. Prevention Policies

黃書賢, Huang, Shu Hsien Unknown Date (has links)
網路恐怖主義(Cyberterrorism)為「網際網路」(Internet)與「恐怖主義」(terrorism)相互結合之產物,指恐怖份子為求引發嚴重破壞,並造成平民死傷,透過網際網路入侵國家關鍵基礎設施(critical infrastructures),並以之要脅政府或人民完成其政治性、宗教性或社會性目標。至2012年7月為止,對於網路恐怖主義相關議題之討論雖已持續約30年之久,然而各界對於網路恐怖主義之「定義」及「威脅性」兩項基本問題,仍然眾說紛紜,無法取得一致共識,而全球各地缺乏網路恐怖攻擊之實際案例之情況,亦使爭辯益加激烈。   在美國政府方面,經過2001年911事件的重大衝擊,其對於恐怖主義相關議題之敏感程度已大幅提高,並陸續制定多項反恐政策。美國是當前國際反恐行動的領導者,既為軍事與科技大國,同時也是諸多國際恐怖組織策劃攻擊之主要目標,有鑑於此,美國政府致力於防治網路恐怖主義,保護國內關鍵基礎設施不受侵襲,以維持社會安定及國家安全,其因應方式足以成為世界各國制定類似政策之重要參考對象。   本論文經由探討網路恐怖主義之基本意涵,比較「網路恐怖主義」、「網路犯罪」及「網路戰爭」三個概念之間的差異,嘗試針對網路恐怖主義形成明確之界定;接著綜整各界針對網路恐怖主義威脅性之爭論,以了解網路恐怖主義之真實威脅程度;最後觀察美國自柯林頓(Clinton)政府至今,有關防治網路恐怖主義政策之一系列發展、美國政府如何評估網路恐怖主義之威脅,以及在當前的政策架構之下,為保護國內關鍵基礎設施,其相對應之具體措施為何,試圖對於其整體政策建立客觀評價。 / Cyberterrorism, the convergence of “Internet” and “terrorism,” refers to the specific terrorist activities that were intended to cause massive destruction and casualties, proceeded by intruding the supervisory control and data acquisition (SCADA) systems of national critical infrastructures via the Internet. Even though the discussion of the related issues of Cyberterrorism has continued for nearly 30 years now, neither the definition nor the evaluation of potential threat concerning Cyberterrorism has been settled. No consensus has been achieved. Furthermore, the lack of actual cases of Cyberterrorism attack around the world makes the debates even more intense. After the significant impact of September 11, 2001, the U.S. government has substantially raised the degree of sensitivity of the issues related to terrorism and developed a number of counter-terrorism policies. As the leader of the Global War on Terror and the greatest Power in the world, the U.S. is also the main target of many terrorist groups. With its military and scientific capabilities, the practices of the U.S. government on preventing Cyberterrorism, protecting its domestic critical infrastructures from intrusion, and maintaining social stability and national security would be excellent examples to other nations for the development of their own policies. To clarify the explicit definition of Cyberterrorism, this research refined the basic meaning of Cyberterrorism and distinguished differences among three related concepts: Cyberterrorism, Cybercrime, and Cyberwar. Moreover, this research sought to induct major arguments brought up by scholars in many intense debates on the extent of Cyberterrorism threat. Last but not least, by observing development of the U.S. related policy frameworks, how the U.S. government evaluates the extent of Cyberterrorism threat, and the corresponding measures for protecting the U.S. domestic critical infrastructures, this research presented an objective assessment on the U.S. overall counter-Cyberterrorism policies.
55

Global Village, Global Marketplace, Global War on Terror: Metaphorical Reinscription and Global Internet Governance

Shah, Nisha 28 September 2009 (has links)
My thesis examines how metaphors of globalization shape the global governance of the Internet. I consider how, in a short span of time, discussions of the Internet’s globalizing potential have gone from the optimism of the global village to the penchant of the global marketplace to the anxiety of the global war on terror. Building upon Rorty’s theory of metaphors and Foucault’s notion of productive power, I investigate how the shifts in these prevailing metaphors have produced and legitimated different frameworks of global governance. In considering how these patterns of governance have been shaped in the context of a familiar example of globalization, I demonstrate that globalization has an important discursive dimension that works as a constitutive force – not only in Internet governance, but in global governance more generally. By illuminating globalization’s discursive dimensions, this thesis makes an original theoretical contribution to the study of globalization and global governance. It demonstrates that globalization is more than a set of empirical flows: equally important, globalization exists as a set of discourses that reconstitute political legitimacy in more ‘global’ terms. This recasts the conventional understanding of global governance: rather than a response to the challenges posed by the empirical transcendence of territorial borders or the visible proliferation of non-state actors, the aims, institutions and policies of global governance are shaped and enabled by discourses of globalization, and evolve as these discourses change. In short, this thesis provides further insight into globalization’s transformations of state-based political order. It links these transformations to the discursive processes by which systems of global governance are produced and legitimated as sites of power and authority.
56

Global Village, Global Marketplace, Global War on Terror: Metaphorical Reinscription and Global Internet Governance

Shah, Nisha 28 September 2009 (has links)
My thesis examines how metaphors of globalization shape the global governance of the Internet. I consider how, in a short span of time, discussions of the Internet’s globalizing potential have gone from the optimism of the global village to the penchant of the global marketplace to the anxiety of the global war on terror. Building upon Rorty’s theory of metaphors and Foucault’s notion of productive power, I investigate how the shifts in these prevailing metaphors have produced and legitimated different frameworks of global governance. In considering how these patterns of governance have been shaped in the context of a familiar example of globalization, I demonstrate that globalization has an important discursive dimension that works as a constitutive force – not only in Internet governance, but in global governance more generally. By illuminating globalization’s discursive dimensions, this thesis makes an original theoretical contribution to the study of globalization and global governance. It demonstrates that globalization is more than a set of empirical flows: equally important, globalization exists as a set of discourses that reconstitute political legitimacy in more ‘global’ terms. This recasts the conventional understanding of global governance: rather than a response to the challenges posed by the empirical transcendence of territorial borders or the visible proliferation of non-state actors, the aims, institutions and policies of global governance are shaped and enabled by discourses of globalization, and evolve as these discourses change. In short, this thesis provides further insight into globalization’s transformations of state-based political order. It links these transformations to the discursive processes by which systems of global governance are produced and legitimated as sites of power and authority.
57

The Effect of Cyber Security on Citizens Adoption of e-Commerce Services: The Case of Vhembe District in Limpopo Province of South Africa

Netshirando, Vusani 18 May 2019 (has links)
MCom (Business Information Systems) / Department of Business Information Systems / Today, information and communication technologies (ICT) have become an integral part of humans lives more especially in business, be it those in developed or developing countries. The evolution of ICT’s has also led to the introduction of e-Commerce services. Both the public and private sectors, develop these technologies with customer satisfaction in mind. Out of all the efforts by businesses and ICT experts, e-commerce systems continue to fail because of low user acceptance and user attitude, especially in developing nations. Security issues are known to be of top most concern for online shoppers. A survey was administered to 161 respondents, to find out how cyber security affects consumer’s intentions and actual use of e-commerce systems. The study encompasses both users of e-commerce systems and non-users of e-commerce systems across Vhembe district of Limpopo Province in South Africa. A quantitative research approach was used. The findings revealed that perceived security was the main concern for non-users of e-commerce intentions to use e-commerce systems because of lack of information and lack of trust on e-commerce systems. The study also revealed that users of e-commerce systems are still concerned about security, even though they intend to continue using e-commerce systems. For the success of e-commerce in rural communities, government needs to join hands with retailers and SME’s to start awareness campaigns that will clarify how e-commerce systems work and eradicate negative perception on e-commerce systems. / NRF
58

Bezpečnost práce s elektronickými daty v průmyslových podnicích / Security of Work with Electronic Data in Industrial Enterprises

Žáčková, Eliška January 2013 (has links)
The aim of this thesis is not only to characterise the key terms related to this field, but also to analyse the possible solutions to the area in a particular industrial enterprise in the Czech Republic by means of a case study which is a reliable method of qualitative research. The thesis is divided into theoretical and practical part. In the theoretical part the terms such as information, electronic data, know-how, enterprise information systems, cybercrime, and cyberterrorism are defined. The practical part drawing on the theoretical part gives a thorough analysis of the initial state of an industrial enterprise in food industry. Furthermore, it deals with the implementation of the ECM (Enterprise Content Management) which is considered a possible solution to the security of work with electronic data in industrial enterprise.
59

Developing a Cyberterrorism Policy: Incorporating Individual Values

Rabie, Osama Bassam J. 01 January 2018 (has links)
Preventing cyberterrorism is becoming a necessity for individuals, organizations, and governments. However, current policies focus on technical and managerial aspects without asking for experts and non-experts values and preferences for preventing cyberterrorism. This study employs value focused thinking and public value forum to bare strategic measures and alternatives for complex policy decisions for preventing cyberterrorism. The strategic measures and alternatives are per socio-technical process.
60

Advancing cyber security with a semantic path merger packet classification algorithm

Thames, John Lane 30 October 2012 (has links)
This dissertation investigates and introduces novel algorithms, theories, and supporting frameworks to significantly improve the growing problem of Internet security. A distributed firewall and active response architecture is introduced that enables any device within a cyber environment to participate in the active discovery and response of cyber attacks. A theory of semantic association systems is developed for the general problem of knowledge discovery in data. The theory of semantic association systems forms the basis of a novel semantic path merger packet classification algorithm. The theoretical aspects of the semantic path merger packet classification algorithm are investigated, and the algorithm's hardware-based implementation is evaluated along with comparative analysis versus content addressable memory. Experimental results show that the hardware implementation of the semantic path merger algorithm significantly outperforms content addressable memory in terms of energy consumption and operational timing.

Page generated in 0.1078 seconds