783 resultados para Cyber-rencontre


Relevância:

20.00% 20.00%

Publicador:

Resumo:

....est l’expression d’une communauté humaine, laquelle se caractérise par le partage d’un territoire, d’une culture vivante, de modes de vie et d’activités communes...Il est enfin un outil dynamique du développement de cette communauté, dont le mat´riau principal est le patrimoine au sens le plus large... (Hugues de Varine, Les Racines du futur, 2002). «Celui qui rassemble, autour d’activités culturelles et muséales, des personnes de la communauté, suffisament représentatives, désireuss de réfléchir, par une démarche démocratique (l’action communautaire) orientée vers l’action, sur l’identité collective, sur les problèmes d’épanouissement collectif, sur la recherche de pistes de solution fondées sur l’esprit coopératif (P.Mayrand).

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Cybersecurity is a complex challenge that has emerged alongside the evolving global socio-technical environment of social networks that feature connectivity across time and space in ways unimaginable even a decade ago. This paper reports on the preliminary findings of a NATO funded project that investigates the nature of innovation in open collaborative communities and its implications for cyber security. In this paper, the authors describe the framing of relevant issues, the articulation of the research questions, and the derivation of a conceptual framework based on open collaborative innovation that has emerged from preliminary field research in Russia and the UK.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Robotics is a key theme in many of the degrees offered in Systems Engineering. The topic has proved useful in attracting students to the University, and it also provides the basis of much practical and project work throughout the degrees. This paper focuses on one aspect, a Part 2 project in which students doing various degrees work together to develop a mobile robot which is controlled remotely to navigate an environment and perform specific tasks. In addition to providing practical experience of relevant academic topics, this project helps to contribute to key teaching and learning priorities including problem based learning, motivation and important employability skills.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

This chapter evaluates the potential for legal regulation of the resort to cyber warfare between states under the ‘jus ad bellum’ (the law on the use of force). Debate in the literature has largely concerned whether cyber warfare falls within the scope of Article 2(4) UNC. The first part of this chapter sets out this debate. It then goes on to argue that the ‘Article 2(4) debate’ often misses the fact that an act of cyber warfare can be considered a breach of a different legal rule: the principle of non-intervention. The chapter further considers some of the issues in applying either the prohibition of the use of force or the principle of non-intervention to cyber warfare, and then concludes by arguing that the debate should be reoriented to focus on another existing international legal obligation: the duty to prevent cyber-attacks.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Cyber warfare is an increasingly important emerging phenomenon in international relations. The focus of this edited volume is on this notion of cyber warfare, meaning interstate cyber aggression, as distinct from cyber-terrorism or cyber-crime. Waging warfare in cyberspace has the capacity to be as devastating as any conventional means of conducting armed conflict. However, while there is a growing amount of literature on the subject within disciplines, there has been very little work done on cyber warfare across disciplines, which necessarily limits our understanding of it. This book is a major multidisciplinary analysis of cyber warfare, featuring contributions by world-leading experts from a mixture of academic and professional backgrounds.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Earlier research shows that breast augmentation is positively correlated with positive psychological states. The aim of this study was to explore the shared values, feelings, and thoughts within the culture of breast enlargement among women visiting Internet-based forums when considering and/or undergoing esthetic plastic surgery. The study used a netnographic method for gathering and analyzing data. The findings show that the women used the Internet forum to provide emotional support to other women. Through electronic postings, they cared for and nursed each others’ anxiety and feelings throughout the whole process. Apart from the process, another central issue was that the women's relationships were frequently discussed; specifically their relationship to themselves, their environment, and with the surgeons. The findings suggest that Internet forums represent a channel through which posters can share values, feelings, and thoughts from the position of an agent of action as well as from a position as the object of action. These dual positions and the medium endow the women with a virtual nursing competence that would otherwise be unavailable. By introducing the concept of torrenting as a means of sharing important self-care information, the authors provide a concept that can be further explored in relation to post modern self-care strategies within contemporary nursing theories and practice.

Relevância:

20.00% 20.00%

Publicador:

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Information security is now recognised as critical factor within the healthcare industry. With the gradual move from paper -based to electronic information there is an even greater need for protection. However, financial and operational constraints often exist which influence the practicality of developing a secure system. A new baseline security standard, the Health Information Security Management Implementation Guide, has been drafted which applies specifically to the unique information security requirements of the healthcare industry. The aim of this paper is to look at the effectiveness of the health information security standard and the development of information security within the Australian healthcare industry.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Peoples' need to socialize with others and greed for power can be best captured with Aristotle's description of human beings as "political animals"/"social animals." This paper reports on observations of how cyber communities, such as Web-based forums and mailing lists, manifest themselves through social interactions and shared values, membership and friendship, and commitments and loyalty. The paper highlights the importance of power relations in these communities, how they are formed, exercised and evolve. This paper explores power relations as they emerge in two online Vietnamese communities and suggests a new understanding of the formation and evolution of power in virtual societies.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Terrorist groups are in theory currently using information and communication technologies (ICTs) to orchestrate their conventional attacks. More recently, terrorists have been developing a new form of capability within the cyber arena to coordinate cyber based attacks. This paper examines a proposed cyber-terrorism SCADA risk framework concept. The paper proposes a conceptual framework which is designed to measure and protect the threat of cyber-terrorism against SCADA systems within Australia. The findings and results of a focus group will be examined to help validate the framework concept.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

This study shows that cyber crime is a recent addition to the list of crimes that can adversely affec tbusinesses directly or indirectly. This phenomenon was not directly prosecutable in South Africa until the enactment of the ECT Act in July 2002. However this Act also prevents businesses to fully prosecute a hacker due to incompleteness. Any kind of commercially related crime can be duplicated as cyber crime. Therefore very little research appears or has been documented about cyber crime in South African companies before 2003. The motivation to do this study was
that businesses often loose millions in cyber attacks, not necessarily through direct theft but by the loss of service and damage to the image of the company. Most of the companies that were approached for interviews on cyber crime were reluctant to share the fact that they were hacked
or that cyber crime occurred at their company as it violates their security policies and may expose their fragile security platforms.
The purpose of this study was to attempt to get an overall view on how South African businesses are affected by cyber crime in the banking and short term insurance sector of the South African industry and also to determine what legislation exist in this country to protect them.
The case study approach was used to determine the affect of cyber crime on businesses like banks and insurance companies and higher education institutions. Each case was interviewed, monitored and was observed over a period of a year. This study discloses the evaluation of the results of how cyber crime affected the cases, which were part of this study. The banks and higher education institutions felt that they were at an increased risk both externally and internally, which is likely to increase as the migration towards electronic commerce occurs. The insurance industry felt that they are not yet affected by external cyber crime attacks in this country.