scholarly journals NATIONAL CYBERSECURITY POLICY IN THE U.S AND INDONESIA

2019 ◽  
Vol 3 (1) ◽  
pp. 71
Author(s):  
Anang Setiyawan

Cyber attacks are a dangerous threat to a country that has a high dependence on communication and information technology. Cyber attacks can be used systematically to disrupt and dysfunction an infrastructure and network so that it can cause not only physical damage but also fatalities. Cyber attacks are complex and multidomain; consequently, they require comprehensive and targeted policies. Indonesia in the early stages of developing cyber policies, therefore it can learn from America in developing policies in dealing with cyber threats.

2019 ◽  
Vol 7 (1) ◽  
pp. 14-26
Author(s):  
Ruti Gafni ◽  
Tal Pavel

Small and Medium Businesses (SMB) use Internet and computer-based tools in their daily processes, sometimes without being aware to the cyber threats, or without knowing how to be prepared in case of a cyber-attack, although they are a major target for cyber-attacks. Specific information about cybersecurity needed by SMBs, in order to cope with cyber threats, is not always available or easily accessible. In this study, a vast search of different types of information about SMBs’ cybersecurity was performed, in order to find whether a hole of accessible information exists in this area. This exploratory research covered general mass communication media channels, technological and professional cybersecurity websites, and academic journals, and found that indeed very few studies, articles and news items were published in this matter. Leveraging knowledge and awareness, diminishing the shame for reporting cyber-attacks, and increasing mass communication media interest and public attention, may be activities to cover this “invisible hole”.


1999 ◽  
Vol 25 (2-3) ◽  
pp. 387-402
Author(s):  
Arti K. Rai

Over the last few decades, the U.S. health care system has been the beneficiary of tremendous growth in the power and sheer quantity of useful medical technology. As a consequence, our society has, for some time, had to make cost-benefit tradeoffs in health care. The alternative—funding all health care interventions that would produce some health benefit for some patient—is not feasible, because it would effectively consume all of our resources.


2020 ◽  
pp. 53-60
Author(s):  
Mohammed I. Alghamdi ◽  

Our economy, infrastructure and societies rely to a large extent on information technology and computer networks solutions. Increasing dependency on information technologies has also multiplied the potential hazards of cyber-attacks. The prime goal of this study is to critically examine how the sufficient knowledge of cyber security threats plays a vital role in detection of any intrusion in simple networks and preventing the attacks. The study has evaluated various literatures and peer reviewed articles to examine the findings obtained by consolidating the outcomes of different studies and present the final findings into a simplified solution.


2021 ◽  
Author(s):  
Emily J. Smail ◽  
Kira E. Riehm ◽  
Cindy B. Veldhuis ◽  
Renee M. Johnson ◽  
Calliope Holingue ◽  
...  

2021 ◽  
Vol 59 (1) ◽  
pp. 287-289

Andreas Grein of Zicklin School of Business, Baruch College, City University of New York reviews “Outside the Box: How Globalization Changed from Moving Stuff to Spreading Ideas,” by Marc Levinson. The Econlit abstract of this book begins: “Explores the development of globalization in the early twenty-first century, focusing on the role of transportation, communication, and information technology in enabling firms to organize their businesses around long-distance value chains.”


Author(s):  
Ana Kovacevic ◽  
Dragana Nikolic

We are facing the expansion of cyber incidents, and they are becoming more severe. This results in the necessity to improve security, especially in the vulnerable field of critical infrastructure. One of the problems in the security of critical infrastructures is the level of awareness related to the effect of cyberattacks. The threat to critical infrastructure is real, so it is necessary to be aware of it and anticipate, predict, and prepare against a cyber attack. The main reason for the escalation of cyberattacks in the field of Critical Infrastructure (CI) may be that most control systems used for CI do not utilise propriety protocols and software anymore; they instead utilise standard solutions. As a result, critical infrastructure systems are more than ever before becoming vulnerable and exposed to cyber threats. It is important to get an insight into what attack types occur, as this may help direct cyber security efforts. In this chapter, the authors present vulnerabilities of SCADA systems against cyber attack, analyse and classify existing cyber attacks, and give future directions to achieve better security of SCADA systems.


2018 ◽  
Vol 7 (1) ◽  
pp. 66-86
Author(s):  
Winda Primasari ◽  
Yudha Asmara Dwi Aksa

The development of communication and information technology is not only changing the economic, social, political, and cultural practices, but it is also changing the religious practices, including for da’wah activities called as E-da’wah (Electronic da’wah). This study attempts to investigate the construction of da’wah message used by Ustadz Felix Y. Siaw dan Ustadz Yusuf Mansur in his facebook fanpage. Using Pan and Kosicki’s framing analysis and in doing so utilizing in-depth-interview in collecting the data, this research has revealed that the most da’wah messages shared on both ustadz’s facebook fanpages are carefully constructed to encourage religious discussion amongst followers, and to increase their critical thinking and their piety.


Sign in / Sign up

Export Citation Format

Share Document