Special Issue on Cyber Security

2016 ◽  
Vol 66 (6) ◽  
pp. 557
Author(s):  
Indivar Gupta ◽  
P.R. Mishra

<p>In the present cyber age, public services are getting more and more dependent on use of Information and communication technologies (ICT) day by day. A number of applications viz., Internet of Things, PDF, cloud computing and virtualization and machine to machine (M2M) system usage are sneaking deeply into our everyday life. The more we depend on ICT, the more deepens our concern about IT security or cyber security. Cyber security protects the data and integrity of assets that belong to or connect to a network. It is meant to defend those assets against all sorts of threat actors throughout the life cycle of a cyber attack. It is quite unsurprising that cyber security industry is growing at the same pace as ICT is doing.</p>

2021 ◽  
Vol 50 (1) ◽  
pp. 3-11
Author(s):  
Barbara Schulte ◽  
Marina Svensson

This special issue approaches information and communication technologies (ICT) visions and their realisation/implementation at various levels, among different actors and from various perspectives. Conceptually, we distinguish three different dimensions, even though those overlap in the individual contributions as well as in empirical reality – namely ideational, instrumental, and relational. The different contributions address both visions formulated by the Chinese state and by individual actors such as entrepreneurs. Even though the conditions for the use of ICT in China are deeply affected by state governance, this governance is in no way tantamount to one single government. As this issue’s contributions show, state attempts at building a stable cyber-governance are in need of allies and, depending on the allies’ visions and other, competitive visions, the outcomes of these dynamics are seldom truthful realisations of one original grand masterplan.


2021 ◽  
Vol 16 (1) ◽  
pp. 47-60
Author(s):  
Michaela Šimonová ◽  

The arrival of information and communication technologies is nothing new. The number of people using these technologies and moving in cyberspace is growing, and therefore it is an important role of the state to respond sufficiently to such developments. A fundamental role of the state is to create a stable security system consisting of complex legislation as well as creation of a legislative environment capable of responding flexibly to the growing number of diverse incidents in cyberspace. Sufficient legal regulation consisting of unambiguous determination of competencies and tasks of individual subjects represents the basic pillar for the creation of a stable security system. The role of the state is also to maintain existing and create new partnerships with organizations that are able to provide relevant information and knowledge in the field of cyber security.


Author(s):  
Wojciech Dudek ◽  
Wojciech Szynkiewicz

A review of the known and an indication of the new threats for cyber-physical robotic systems, caused by cybernetic attacks, serves, in this paper, as a basis for the analysis of the known methods relied upon to detect and mitigate consequences of such attacks. A particular emphasis is placed on threats specific for cyber-physical systems, as they are a feature distinguishing these systems from their traditional Information and Communication Technologies (ICT) counterparts. Based on the review of literature and own analyses, unresolved issues regarding the cyber-security of robot systems are presented and discussed.


Author(s):  
Eric Luiijf

Advancements of information and communication technologies (ICT) cause infrastructure owners to augment current infrastructures with such ICT. The creation of more efficient and effective end-user services provides economical benefits and increases customer satisfaction. Concurrently, ICT advancements allow governmental and industrial sectors to develop complete new infrastructures and infrastructure services, the so called Next Generation Infrastructures (NGI). NGI will offer new services to society, end-users and the supply-chain of organisations and linked, dependent infrastructural services. For over fifty years, the introduction of new ICT-based services and infrastructures has been tightly coupled with failures in ICT-security. This chapter on NGI discusses the root causes of these security failures. Based on historical experiences, this chapter predicts threats and cyber security failures alike for the envisioned NGI such as smart (energy) grids, smart road transport infrastructure, smart cities, and e-health. This prediction will become reality unless fundamental changes in the approach to security of ICT-based and ICT-controlled infrastructures are taken.


2022 ◽  
pp. 489-505
Author(s):  
Ethem Merdan

Technology is present in every moment of our lives and has become a part of our lives. Developments in information and communication technologies affect and facilitate social life and business life day by day. Although the positive aspects of technological developments are generally mentioned, it also brings many negativities. One of these downsides is cyberbullying. Cyberbullying can be expressed as behaviors that hurt, humiliate, disturb, frighten, exclude, and cause victimization by using information and communication technologies of the individual. These behaviors can cause an individual's job and life satisfaction to decrease anxiety, sadness, tension, and loss of motivation. In this case, it becomes difficult for the individual to be effective and efficient in his/her business and social life. For this, it is useful to combat cyberbullying, and it is important to develop combat strategies for it. Otherwise, cyberbullying cannot be prevented. With the precautions, most cyberbullying can be prevented before it happens.


Sign in / Sign up

Export Citation Format

Share Document