首页 > 最新文献

Computer Fraud and Security最新文献

英文 中文
Busting the biggest myths about digital identities 打破关于数字身份的最大神话
Q1 Social Sciences Pub Date : 2023-07-01 DOI: 10.12968/s1361-3723(23)70029-8
J. Cullen
Digital identity technology has a lot to offer, both in improving security and enabling more-effective and efficient services. So why is there so much reluctance to adopt the technology, both from organisations and users?
数字身份技术在提高安全性和实现更有效和高效的服务方面提供了很多东西。那么,为什么组织和用户都如此不愿意采用这项技术呢?
{"title":"Busting the biggest myths about digital identities","authors":"J. Cullen","doi":"10.12968/s1361-3723(23)70029-8","DOIUrl":"https://doi.org/10.12968/s1361-3723(23)70029-8","url":null,"abstract":"Digital identity technology has a lot to offer, both in improving security and enabling more-effective and efficient services. So why is there so much reluctance to adopt the technology, both from organisations and users?","PeriodicalId":35636,"journal":{"name":"Computer Fraud and Security","volume":"8 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2023-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"75356725","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Information risk management – the gaps between expectation and reality 信息风险管理——期望与现实之间的差距
Q1 Social Sciences Pub Date : 2023-07-01 DOI: 10.12968/s1361-3723(23)70034-1
Chris Vaughan
Is our understanding of risk keeping pace with the evolution of technology, major changes to IT infrastructure and the ever-changing threat landscape? Organisations are having to change their approaches to risk, otherwise they are in danger of facing an existential thread from the gap between their understanding of the issues they face and the reality.
我们对风险的理解是否与科技的发展、资讯科技基础架构的重大变化和不断变化的威胁形势同步?组织必须改变他们应对风险的方法,否则他们就有可能面临存在的危险,因为他们对所面临问题的理解与现实之间存在差距。
{"title":"Information risk management – the gaps between expectation and reality","authors":"Chris Vaughan","doi":"10.12968/s1361-3723(23)70034-1","DOIUrl":"https://doi.org/10.12968/s1361-3723(23)70034-1","url":null,"abstract":"Is our understanding of risk keeping pace with the evolution of technology, major changes to IT infrastructure and the ever-changing threat landscape? Organisations are having to change their approaches to risk, otherwise they are in danger of facing an existential thread from the gap between their understanding of the issues they face and the reality.","PeriodicalId":35636,"journal":{"name":"Computer Fraud and Security","volume":"15 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2023-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"87077127","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Is cyber security too hard? 网络安全太难了吗?
Q1 Social Sciences Pub Date : 2023-06-01 DOI: 10.12968/s1361-3723(23)70027-4
Steve Mansfield-Devine
The threat landscape is growing, attacks are becoming more frequent and more sophisticated and security budgets are being squeezed. Is information security becoming just too difficult for some organisations? In this interview, Srinivas Mukkamala, chief product officer at Ivanti, explains that there are ways to overcome these challenges.
威胁形势正在增长,攻击变得越来越频繁和复杂,安全预算正在受到挤压。对某些机构而言,资讯保安是否变得过于困难?在这次采访中,Ivanti的首席产品官Srinivas Mukkamala解释说,有一些方法可以克服这些挑战。
{"title":"Is cyber security too hard?","authors":"Steve Mansfield-Devine","doi":"10.12968/s1361-3723(23)70027-4","DOIUrl":"https://doi.org/10.12968/s1361-3723(23)70027-4","url":null,"abstract":"The threat landscape is growing, attacks are becoming more frequent and more sophisticated and security budgets are being squeezed. Is information security becoming just too difficult for some organisations? In this interview, Srinivas Mukkamala, chief product officer at Ivanti, explains that there are ways to overcome these challenges.","PeriodicalId":35636,"journal":{"name":"Computer Fraud and Security","volume":"41 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2023-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"77357141","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Changing the law to deliver crypto asset certainty 修改法律以确保加密资产的确定性
Q1 Social Sciences Pub Date : 2023-06-01 DOI: 10.12968/s1361-3723(23)70024-9
Akber Datoo, Simon Maharaj
Clarity around the legal status of digital objects is crucial of digital assets, such as crypto currency, are to be seen as mature enough to be taken seriously by financial markets. Changes to the law in England and Wales could help with that.
明确数字对象的法律地位至关重要,因为加密货币等数字资产要被视为足够成熟,才能得到金融市场的重视。英格兰和威尔士对法律的修改可能会有所帮助。
{"title":"Changing the law to deliver crypto asset certainty","authors":"Akber Datoo, Simon Maharaj","doi":"10.12968/s1361-3723(23)70024-9","DOIUrl":"https://doi.org/10.12968/s1361-3723(23)70024-9","url":null,"abstract":"Clarity around the legal status of digital objects is crucial of digital assets, such as crypto currency, are to be seen as mature enough to be taken seriously by financial markets. Changes to the law in England and Wales could help with that.","PeriodicalId":35636,"journal":{"name":"Computer Fraud and Security","volume":"24 2 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2023-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"82684135","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Security maturity is a journey, not a destination 安全成熟是一段旅程,而不是终点
Q1 Social Sciences Pub Date : 2023-06-01 DOI: 10.12968/s1361-3723(23)70026-2
Matias Madou
It's unlikely you will ever reach a stage of complete ‘security maturity’. Even as your systems, processes and skills improve, the goal posts are being shifted by innovative attackers and fresh vulnerabilities. But that's not a reason to give up on security maturity – shooting for that goal will still leave you better off.
您不太可能达到完全“安全成熟”的阶段。即使您的系统、流程和技能得到改进,目标柱也会被创新的攻击者和新的漏洞所改变。但这并不是放弃安全成熟度的理由——努力实现这一目标仍然会让您的情况更好。
{"title":"Security maturity is a journey, not a destination","authors":"Matias Madou","doi":"10.12968/s1361-3723(23)70026-2","DOIUrl":"https://doi.org/10.12968/s1361-3723(23)70026-2","url":null,"abstract":"It's unlikely you will ever reach a stage of complete ‘security maturity’. Even as your systems, processes and skills improve, the goal posts are being shifted by innovative attackers and fresh vulnerabilities. But that's not a reason to give up on security maturity – shooting for that goal will still leave you better off.","PeriodicalId":35636,"journal":{"name":"Computer Fraud and Security","volume":"24 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2023-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"82727761","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Normalising radical transparency in cyber security 使网络安全的极度透明正常化
Q1 Social Sciences Pub Date : 2023-06-01 DOI: 10.12968/s1361-3723(23)70025-0
Niklas J. Hellemann
All organisations are under cyber attack and many are breached each day. And given that there's a high likelihood that you will suffer a cyber incident, the question then becomes what do you do about it? Communication – to staff, investors and the public – is a critical step and a high level of transparency here is key to enabling everyone to respond appropriately and effectively.
所有组织都受到网络攻击,而且每天都有许多组织被攻破。考虑到你很有可能遭遇网络事件,那么问题就变成了你该怎么做?与员工、投资者和公众的沟通是至关重要的一步,这里的高度透明度是使每个人都能适当有效地作出反应的关键。
{"title":"Normalising radical transparency in cyber security","authors":"Niklas J. Hellemann","doi":"10.12968/s1361-3723(23)70025-0","DOIUrl":"https://doi.org/10.12968/s1361-3723(23)70025-0","url":null,"abstract":"All organisations are under cyber attack and many are breached each day. And given that there's a high likelihood that you will suffer a cyber incident, the question then becomes what do you do about it? Communication – to staff, investors and the public – is a critical step and a high level of transparency here is key to enabling everyone to respond appropriately and effectively.","PeriodicalId":35636,"journal":{"name":"Computer Fraud and Security","volume":"1 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2023-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"81387924","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
New approaches to fighting fraud 打击欺诈的新方法
Q1 Social Sciences Pub Date : 2023-06-01 DOI: 10.12968/s1361-3723(23)70028-6
Fergal Parkinson
{"title":"New approaches to fighting fraud","authors":"Fergal Parkinson","doi":"10.12968/s1361-3723(23)70028-6","DOIUrl":"https://doi.org/10.12968/s1361-3723(23)70028-6","url":null,"abstract":"","PeriodicalId":35636,"journal":{"name":"Computer Fraud and Security","volume":"50 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2023-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"83187084","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Looking back to the future 回首未来
Q1 Social Sciences Pub Date : 2023-05-01 DOI: 10.12968/s1361-3723(23)70023-7
Bernard Montel
3 Looking Back to the Future: A Recursive Retrospective WILLIAM E. DOLL JR University of Victoria I, now a newly minted Canadian resident, am indebted both to Deborah Osberg and the Canadian Association for Curriculum Studies for honoring me with a retrospective on my work in the curriculum studies field. This is not something I ever expected, especially back in the 1980s when I began searching for a new curriculum model to the one then prominent, the Tyler Rationale (1950). At the time I was much engaged in reading Jean Piaget, and while I had great difficulty with the usual American interpretation of his work – “ages and stages” – I did feel his biological sense of cognition (Biology and Knowledge, 1971) and his actual work in the fields of biology and zoology provided a framework the Rationale did not consider. This framework, that of an organism’s inherent self‐organizing powers,1 became clearer to me as I was introduced to Ilya Prigogine and his work on becoming. As I noted in my 1986 article, reprinted in this volume, I found a strong connection between Piaget and Prigogine and bringing this connection to the fore, with the paradigm in which it is encased, could “stand as an alternative
我现在是加拿大的新居民,非常感谢德博拉·奥斯伯格和加拿大课程研究协会向我致敬,让我回顾我在课程研究领域的工作。这是我从未预料到的,尤其是在20世纪80年代,当我开始寻找一种新的课程模式,以取代当时著名的泰勒理论(Tyler Rationale, 1950)。当时我正忙于阅读让·皮亚杰的作品,虽然我很难理解美国人对他的作品的通常解释——“年龄和阶段”——但我确实感受到了他的生物学认知感(《生物学与知识》,1971),他在生物学和动物学领域的实际工作提供了一个《理论基础》没有考虑到的框架。当我被介绍给伊利亚·普里高津和他关于生命形成的著作时,有机体固有的自我组织能力的框架对我来说变得更加清晰。正如我在1986年的一篇文章中指出的那样,我发现皮亚杰和普里高津之间有很强的联系,把这种联系与它所包含的范式联系起来,可以“作为一种选择”
{"title":"Looking back to the future","authors":"Bernard Montel","doi":"10.12968/s1361-3723(23)70023-7","DOIUrl":"https://doi.org/10.12968/s1361-3723(23)70023-7","url":null,"abstract":"3 Looking Back to the Future: A Recursive Retrospective WILLIAM E. DOLL JR University of Victoria I, now a newly minted Canadian resident, am indebted both to Deborah Osberg and the Canadian Association for Curriculum Studies for honoring me with a retrospective on my work in the curriculum studies field. This is not something I ever expected, especially back in the 1980s when I began searching for a new curriculum model to the one then prominent, the Tyler Rationale (1950). At the time I was much engaged in reading Jean Piaget, and while I had great difficulty with the usual American interpretation of his work – “ages and stages” – I did feel his biological sense of cognition (Biology and Knowledge, 1971) and his actual work in the fields of biology and zoology provided a framework the Rationale did not consider. This framework, that of an organism’s inherent self‐organizing powers,1 became clearer to me as I was introduced to Ilya Prigogine and his work on becoming. As I noted in my 1986 article, reprinted in this volume, I found a strong connection between Piaget and Prigogine and bringing this connection to the fore, with the paradigm in which it is encased, could “stand as an alternative","PeriodicalId":35636,"journal":{"name":"Computer Fraud and Security","volume":"24 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2023-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"91103760","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Consumer trust and perspectives on cyber security 消费者信任和对网络安全的看法
Q1 Social Sciences Pub Date : 2023-05-01 DOI: 10.12968/s1361-3723(23)70020-1
Chris Dimitriadis
When your networks are breached, you may lose more than your data. Customers are increasingly wary of doing business with organisations that have been hacked. The reputational damage can last a long time – perhaps longer than the business itself.
当你的网络被破坏时,你可能失去的不仅仅是数据。客户对与遭受黑客攻击的机构做生意越来越谨慎。声誉受损可能会持续很长时间——或许比企业本身还要长。
{"title":"Consumer trust and perspectives on cyber security","authors":"Chris Dimitriadis","doi":"10.12968/s1361-3723(23)70020-1","DOIUrl":"https://doi.org/10.12968/s1361-3723(23)70020-1","url":null,"abstract":"When your networks are breached, you may lose more than your data. Customers are increasingly wary of doing business with organisations that have been hacked. The reputational damage can last a long time – perhaps longer than the business itself.","PeriodicalId":35636,"journal":{"name":"Computer Fraud and Security","volume":"5 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2023-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"82848123","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Don't turn a blind eye to cyber security 不要对网络安全视而不见
Q1 Social Sciences Pub Date : 2023-05-01 DOI: 10.12968/s1361-3723(23)70022-5
Fabien Rech
There's often a gap between security threats as understood by the C-suite and the day-to-day threats faced by security professionals. This can condemn the latter to working with outdated and inadequate solutions. Executives need to understand that cyber security is an area crying out for investment.
在高级管理层所理解的安全威胁与安全专业人员所面临的日常威胁之间往往存在差距。这可能会迫使后者使用过时和不充分的解决方案。高管们需要明白,网络安全是一个亟需投资的领域。
{"title":"Don't turn a blind eye to cyber security","authors":"Fabien Rech","doi":"10.12968/s1361-3723(23)70022-5","DOIUrl":"https://doi.org/10.12968/s1361-3723(23)70022-5","url":null,"abstract":"There's often a gap between security threats as understood by the C-suite and the day-to-day threats faced by security professionals. This can condemn the latter to working with outdated and inadequate solutions. Executives need to understand that cyber security is an area crying out for investment.","PeriodicalId":35636,"journal":{"name":"Computer Fraud and Security","volume":"2012 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2023-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"74217035","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
Computer Fraud and Security
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1