Search Results/Filters    

Filters

Year

Banks



Expert Group











Full-Text


Author(s): 

NASIRI BAHAREH

Journal: 

MEDIA STUDIES

Issue Info: 
  • Year: 

    2015
  • Volume: 

    10
  • Issue: 

    29
  • Pages: 

    123-139
Measures: 
  • Citations: 

    0
  • Views: 

    1614
  • Downloads: 

    0
Abstract: 

In this article From the perspective of the relationship between patriarchy CYBER feminism Discussed in social networks And then, despite the prediction of individual idealism of CYBERspace, With a variety of removal methods, Games with traditional ideas of gender and its destruction in familiar spaces And we find out that a new kind of "patriarchy" and resulted in the clearing of women, Intensified monitoring of women's movements and associations, Consumers of superman Erosion of social life, and reduced resistance strategies against the new manifestations of power is.

Yearly Impact: مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic Resources

View 1614

مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic ResourcesDownload 0 مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic ResourcesCitation 0 مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic ResourcesRefrence 0
Issue Info: 
  • Year: 

    2022
  • Volume: 

    7
  • Issue: 

    2
  • Pages: 

    181-202
Measures: 
  • Citations: 

    0
  • Views: 

    185
  • Downloads: 

    24
Abstract: 

Purpose: The future of the construction industry is increasingly influenced by new TECHNOLOGIES. In order to adopt appropriate strategies in facing new TECHNOLOGIES, it is necessary to know the possible futures of the construction industry. This research was done with the aim of explaining the technological uncertainties and compiling the future scenarios of the construction industry.  Method: The research method is applied and was carried out with a combination of quantitative and qualitative methods. First, the library study was used to determine the technological drivers, then the Structural Analysis was used to explain the technological uncertainties, and finally, the Schwartz method was used to compile the scenarios. The statistical population is experts of construction industry. Findings: Nine technological uncertainties affecting the future of the construction industry have been identified and for each of them, three states of decline, stagnation and progress have been considered. Data analysis by Scenario Wizard shows eight probable scenarios. The portfolio of scenarios including four groups of progress scenarios, towards progress, towards stagnation, and towards wane has been compiled. Conclusion: In the progress scenario, the 89% of uncertainties have developed. In  towards progress, 56% of the factors are in the development status, which indicates the development of the technological factor application. In the stagnation scenario, no progress has been made in the application of uncertainties and they are in a static state. In towards wane, uncertainties have been placed in a situation of reduced use.

Yearly Impact: مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic Resources

View 185

مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic ResourcesDownload 24 مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic ResourcesCitation 0 مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic ResourcesRefrence 0
Journal: 

Energy Law Studies

Issue Info: 
  • Year: 

    2022
  • Volume: 

    8
  • Issue: 

    1
  • Pages: 

    173-193
Measures: 
  • Citations: 

    0
  • Views: 

    71
  • Downloads: 

    26
Abstract: 

The important role of computer and the Internet and the services that these TECHNOLOGIES provide to humanity have made the energy sector dependent on these new TECHNOLOGIES. This dependence has led to risks for the energy sector, the most important of which is directing CYBER-attacks . In the present study, a question has been raised, i.e., what is the need for states to strengthen the CYBER security of their energy sector and what measures should be taken domestically and internationally? Using the descriptive-analytical method, the question has been answered that due to the increasing dependence of the energy sector on CYBER TECHNOLOGIES and the increasing number of actors and perpetrators of CYBER attacks in the world, States need to strengthen their CYBER security in their energy sector. What states can do at the domestic level includes increasing the security of domestic systems, recruiting reliable and specialized personnel, and developing clear and strict rules for CYBERspace. At the international level, drafting a binding international treaty banning CYBER-attacks on the energy sector is the most important measure that they can adopt.

Yearly Impact: مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic Resources

View 71

مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic ResourcesDownload 26 مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic ResourcesCitation 0 مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic ResourcesRefrence 0
Author(s): 

NERCISSIANS E. | LUCAS C.

Issue Info: 
  • Year: 

    2011
  • Volume: 

    7
  • Issue: 

    2
  • Pages: 

    3-6
Measures: 
  • Citations: 

    0
  • Views: 

    294
  • Downloads: 

    93
Abstract: 

The advent of CYBER TECHNOLOGIES has led to radical paradigm shifts in our social, economic, cultural, and psychological conceptualizations. The paper investigates the advent of cyborgs, indeed our transformation into cyborgs, and the impact of this transformation upon identities and face management, which has an important social value since the late modernism. Cyborg is a designation for the inhabitants of the new environment: the CYBERspace. They represent manifold boundary pollutions. The idea of CYBERspace already marks the fusion of the real with the imagined and the fantastic. This new virtual space is being inhabited with a new kind of actors: intelligent agents. A fusion of animal and machine. The boundary between human and non-human is also being transgressed. The problematic concept of selfhood and the related TECHNOLOGIES constitute the subject of this discourse. It is argued that this process of confusion and corruption can be viewed as also a process of breaking down monological communication and totality.

Yearly Impact: مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic Resources

View 294

مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic ResourcesDownload 93 مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic ResourcesCitation 0 مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic ResourcesRefrence 0
Issue Info: 
  • Year: 

    2011
  • Volume: 

    1
  • Issue: 

    4
  • Pages: 

    221-230
Measures: 
  • Citations: 

    1
  • Views: 

    407
  • Downloads: 

    138
Abstract: 

This study draws attention to the ubiquitous and borderless nature of CYBERcrime. It examines the prospect of introducing customized CYBER insurance policy in the Nigerian market. As secondary data was not available, the study conducted a survey by administering three sets of questionnaire to purposively selected top executives in four Trade Groups that rely heavily on Internet transactions for their operations. The study found that the rate of usage of the Internet and the attendant exposures to CYBER-attacks among the various Trade Groups are quite high. Findings also show that the traditional policies have limitations with respect to protection against CYBER risks and that there is a prospect for marketing a specifically designed CYBER insurance policy in Nigeria.

Yearly Impact: مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic Resources

View 407

مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic ResourcesDownload 138 مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic ResourcesCitation 1 مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic ResourcesRefrence 7
Issue Info: 
  • Year: 

    2024
  • Volume: 

    4
  • Issue: 

    14
  • Pages: 

    158-184
Measures: 
  • Citations: 

    0
  • Views: 

    106
  • Downloads: 

    15
Abstract: 

The more information organizations have about the CYBER threats most likely to affect substruction, the better they can reduction CYBER risk. The purpose of this research is to review how the COSO (2013) helps risk management and CYBER risk controls. It also shows the role of Internal auditing in CYBER risk management control for organizations. Based on the library research method, previous researches have been studied and their results have been analyzed and examined. The results of this study indicate that organizations should invest in CYBER risk management and prioritize CYBER risk control, strategic goals and future plans depending on their positions. As the CYBER environment evolves, risk management and internal auditing will need to keep pace. . Indeed, By focusing on the implementation of the 2013 framework, companies will identify their CYBER risks and at the best opportunity, they will show their readiness to react appropriately to face the risks caused by the CYBER world. Finally, creating a culture based on CYBER security, continuous evaluation of all TECHNOLOGIES used, continuous evaluation of vulnerable systems, comprehensive analysis of examples of CYBER attacks carried out in organizations, continuous CYBER risk management activities and CYBER security training, These are the most important things that organizations should consider.

Yearly Impact: مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic Resources

View 106

مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic ResourcesDownload 15 مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic ResourcesCitation 0 مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic ResourcesRefrence 0
Author(s): 

ARQUILLA J. | RONFELD D.

Journal: 

COMPARATIVE STRATEGY

Issue Info: 
  • Year: 

    1993
  • Volume: 

    12
  • Issue: 

    2
  • Pages: 

    141-165
Measures: 
  • Citations: 

    1
  • Views: 

    103
  • Downloads: 

    0
Keywords: 
Abstract: 

Yearly Impact: مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic Resources

View 103

مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic ResourcesDownload 0 مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic ResourcesCitation 1 مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic ResourcesRefrence 0
Author(s): 

Issue Info: 
  • Year: 

    2023
  • Volume: 

    108
  • Issue: 

    -
  • Pages: 

    0-0
Measures: 
  • Citations: 

    1
  • Views: 

    30
  • Downloads: 

    0
Keywords: 
Abstract: 

Yearly Impact: مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic Resources

View 30

مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic ResourcesDownload 0 مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic ResourcesCitation 1 مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic ResourcesRefrence 0
Issue Info: 
  • Year: 

    2021
  • Volume: 

    9
  • Issue: 

    4
  • Pages: 

    125-140
Measures: 
  • Citations: 

    0
  • Views: 

    316
  • Downloads: 

    138
Abstract: 

In recent years, the violation of the privacy of information and communication networks, which are more commonly known as CYBER-attacks, has been increasing exponentially. These network breaches range from direct attacks on government infrastructure to populist activism and theft. This trend has increased the social and political awareness of users. The active CYBER defense is a mechanism to protect computer devices, networks and digital devices against CYBER-attacks and destructive intrusions. The function of active CYBER defense is to actively seek to infiltrate or engage with the perpetrators of CYBER incidents. The reaction of the defenders has always caused an imbalance between their activities and the attackers. Attackers have always used the network as a platform to strengthen their attacks to increase the intensity of attacks. In this study, we have used the Markov model to model and show the inherent difference in the performance of users and network intruders, with the distinction that the proposed model is different from the automatic patch and Moran trend and is more similar to the voter model. The proposed dynamic system model is based on the field average approximation, which purposefully determines the performance of active CYBER defense. The imbalance between defenders and attackers in this proposed model is eliminated and according to the proposed dynamics and network conditions, we have provided a platform for the interaction of defenders and attackers to examine the performance of power functions in different situations. In the simulations, the performance of attackers and defenders is examined and according to the results obtained in the diagrams mentioned in the final part of the article, it is shown how to use the active CYBER defense at the right time so that we can use this defensive approach in the right situation.

Yearly Impact: مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic Resources

View 316

مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic ResourcesDownload 138 مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic ResourcesCitation 0 مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic ResourcesRefrence 0
Author(s): 

Issue Info: 
  • Year: 

    2019
  • Volume: 

    74
  • Issue: 

    -
  • Pages: 

    0-0
Measures: 
  • Citations: 

    1
  • Views: 

    46
  • Downloads: 

    0
Keywords: 
Abstract: 

Yearly Impact: مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic Resources

View 46

مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic ResourcesDownload 0 مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic ResourcesCitation 1 مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic ResourcesRefrence 0
litScript
telegram sharing button
whatsapp sharing button
linkedin sharing button
twitter sharing button
email sharing button
email sharing button
email sharing button
sharethis sharing button