Search Results
Cybersecurity, Privacy, & Networks eJournal

4,196 Total downloads | Link to this page | Subscribe to this eJournal (requires login)
Search Within

Viewing: 1 - 50 of 125 papers

1.

Informed Trading and Cybersecurity Breaches

Harvard Business Law Review, Vol. 8, 2018, Columbia Law and Economics Working Paper No. 580
Number of pages: 49 Posted: 17 Feb 2018 Last Revised: 12 Jun 2018
Accepted Paper Series
Columbia Law School and Columbia University - School of Law
Downloads 615
2.

A Framework for Strategic Intra- and Inter-Organizational Adoption of the Blockchain Technology

Number of pages: 6 Posted: 22 Jul 2017
Working Paper Series
Leiden University - Leiden Institute of Advanced Computer Science (LIACS)
Downloads 307
3.

Timber Tracking: Reducing Complexity of Due Diligence by Using Blockchain Technology

Number of pages: 6 Posted: 08 Aug 2017
Working Paper Series
University of Copenhagen - Faculty of Science and University of Copenhagen
Downloads 254
4.

The Use of Big Data Analytics by the IRS: What Tax Practitioners Need to Know

Houser, Kimberly and Sanders, Debra, The Use of Big Data Analytics by the IRS: What Tax Practitioners Need to Know (February, 2018). Journal of Taxation, Vol. 128, No. 2, 2018. Thomas Reuters/Tax & Accounting.
Number of pages: 16 Posted: 01 Mar 2018 Last Revised: 24 Jun 2018
Accepted Paper Series
Oklahoma State University
Downloads 236
5.

The Insurance Business in Transition to the Cyber-Physical Market: Communication, Coordination and Harmonization of Cyber Risk Coverages

Number of pages: 33 Posted: 28 Jun 2018
Working Paper Series
School of Risk Management, St. John's University
Downloads 232
6.

The Use of Big Data Analytics by the IRS: Efficient Solution or the End of Privacy as We Know it?

Vanderbilt Journal of Entertainment & Technology Law, Vol. 19, No. 4, 2017
Number of pages: 67 Posted: 06 Apr 2017 Last Revised: 24 Jun 2018
Accepted Paper Series
Oklahoma State University and Washington State University
Downloads 196
7.

Information and Communication Technologies, Protests, and Censorship

Number of pages: 49 Posted: 02 Jun 2017 Last Revised: 08 Jun 2017
Working Paper Series
University of California, Los Angeles (UCLA) - Department of Political Science, University of Mannheim and Institute for Political Economy and Governance, Barcelona
Downloads 132
8.

Social Media Giveth, Social Media Taketh Away: Facebook, Friendships, and APIs

International Journal of Communication, Forthcoming
Number of pages: 20 Posted: 11 Dec 2017
Accepted Paper Series
University of Oxford - Oxford Internet Institute
Downloads 130
10.

Understanding the Human Dimension of Cyber Security

Indian Journal of Criminology & Criminalistics (ISSN 0970 – 4345), Vol .34 No. 1 Jan- June,2015, p.141-152,
Number of pages: 12 Posted: 31 May 2017
Accepted Paper Series
Member, Indian Police Service
Downloads 97
11.
Downloads 96
12.

Block Chain Based Security Mechanism for Internet of Vehicles (IoV)

Proceedings of 3rd International Conference on Internet of Things and Connected Technologies (ICIoTCT), 2018 held at Malaviya National Institute of Technology, Jaipur (India) on March 26-27, 2018
Number of pages: 6 Posted: 03 May 2018
Working Paper Series
Indira Gandhi Delhi Technical University for Women and Indira Gandhi Institute of Technology
Downloads 96
13.

Privacy Harms

Hastings Law Journal, Vol. 69, 2018
Number of pages: 60 Posted: 19 Apr 2018 Last Revised: 11 Jun 2018
Accepted Paper Series
NYU School of Law and University of Toronto - Faculty of Law
Downloads 83
14.

Deterring Cybercrime: Focus on Intermediaries

32(3) Berkeley Technology Law Journal 1093 (2017), UC Berkeley Public Law Research Paper
Number of pages: 41 Posted: 17 May 2018
Accepted Paper Series
University of California, Berkeley - Jurisprudence and Social Policy Program, University of California, Berkeley - School of Information and New York University (NYU) - NYU Tandon School of Engineering
Downloads 80
15.

The Cyber Security Ecosystem: Defining a Taxonomy of Existing, Emerging and Future Cyber Threats

SWIFT Institute Working Paper No. 2016-002
Number of pages: 39 Posted: 05 Oct 2017
Accepted Paper Series
Independent and Coventry University - Business School
Downloads 74
16.

Why Quantum Computing Will Not Destabilize International Security: The Political Logic of Cryptology

Number of pages: 53 Posted: 10 Jul 2018
Working Paper Series
Munk School of Global Affairs & Public Policy and Department of Political Science, University of Toronto
Downloads 70
17.

A Formal Approach Towards Assessing the Effectiveness of Anti-Spam Procedures

Proceedings of the 39th Annual Hawaii International Conference on System Sciences (HICSS'06) Track 6, 2006
Number of pages: 10 Posted: 24 Apr 2007
Accepted Paper Series
RWTH Aachen University
Downloads 58
18.

Individual Cyber Security: Empowering Employees to Resist Spear Phishing to Prevent Identity Theft and Ransomware Attacks

Thomas, J. E. (2018). Individual cyber security: Empowering employees to resist spear phishing to prevent identity theft and ransomware attacks. International Journal of Business Management, 12(3). 1-23. doi:10.5539/ijbm.v13n6p1
Number of pages: 24 Posted: 24 May 2018
Accepted Paper Series
Bush School of Government and Public Service
Downloads 58
19.

Regulating New Weapons Technology

New Technologies and the Law of Armed Conflict (Eric Talbot Jensen, ed.) (2018 Forthcoming)
Number of pages: 30 Posted: 02 Jul 2018
Accepted Paper Series
Yale University - Yale Information Society Project
Downloads 53
20.

An Exploration of Strict Products Liability and the Internet of Things

Number of pages: 21 Posted: 22 Jun 2018
Working Paper Series
Center for Democracy and Technology
Downloads 49
21.

Publishing Privacy Logs to Facilitate Transparency and Accountability

Journal of Web Semantics First Look
Number of pages: 28 Posted: 26 Jun 2018
Working Paper Series
McMaster University - Department of Computing and Software and University of Toronto - Department of Mechanical and Industrial Engineering
Downloads 48
22.

Towards a Conceptualisation of Cloud (Cyber) Crime

Number of pages: 11 Posted: 20 Sep 2017
Working Paper Series
University of Leeds, Centre for Criminal Justice Studies
Downloads 43
23.

Who Stole Me? Identity Theft on Social Media in the UAE

Journal of Management and Marketing Review (JMMR), Vol. 2(1), p. 79 – 86, 2017,
Number of pages: 8 Posted: 14 Aug 2017
Accepted Paper Series
University of Wollongong in Dubai, University of Wollongong - Dubai Campus and University of Wollongong - Dubai Campus
Downloads 40
24.

Cybercrime and Data Breach: Privacy Protection through the Regulation of Voluntary Notification

Prepared for the Korea Legislation Research Institute (KLRI), 2017 Legal Scholar Roundtable, How Law Operates in the Wired Society, Seoul, Korea, 2017
Number of pages: 9 Posted: 11 Dec 2017 Last Revised: 11 Dec 2017
Working Paper Series
School of Regulation & Global Governance (RegNet) and ANU Cybercrime Observatory, Australian National University
Downloads 36
25.

A Survey on Digital Image Steganography: Current Trends and Challenges

Proceedings of 3rd International Conference on Internet of Things and Connected Technologies (ICIoTCT), 2018 held at Malaviya National Institute of Technology, Jaipur (India) on March 26-27, 2018
Number of pages: 17 Posted: 08 May 2018 Last Revised: 19 May 2018
Working Paper Series
National Institute of Technology, Nagaland - Department of Computer Science and Engineering and National Institute of Technology, Nagaland - Department of Computer Science and Engineering
Downloads 35
26.

An Overview on Security Issues in Modern Cryptographic Techniques

Proceedings of 3rd International Conference on Internet of Things and Connected Technologies (ICIoTCT), 2018 held at Malaviya National Institute of Technology, Jaipur (India) on March 26-27, 2018
Number of pages: 6 Posted: 07 May 2018
Working Paper Series
Chaibasa Engineering College - Techno India Group, Techno India University, Indian Institute of Engineering Science and Technology, Shibpur and Indian Institute of Engineering Science and Technology, Shibpur
Downloads 29
27.

Automatic Multi Model Cyber Bullying Detection from Social Networks

Proceedings of the International Conference on Intelligent Computing Systems (ICICS 2017 – Dec 15th - 16th 2017) organized by Sona College of Technology, Salem, Tamilnadu, India,
Number of pages: 7 Posted: 22 Feb 2018
Working Paper Series
Pondicherry Engineering College - Department of Computer Science and Engineering, Students, Pondicherry Engineering College, Pondicherry Engineering College - Department of Information Technology, Students and Christ College of Engineering and Technology
Downloads 29
28.

Malware Detection Using Online Information Sharing Platforms and Behavior Based Analysis

Proceedings of 3rd International Conference on Internet of Things and Connected Technologies (ICIoTCT), 2018 held at Malaviya National Institute of Technology, Jaipur (India) on March 26-27, 2018
Number of pages: 4 Posted: 09 May 2018
Working Paper Series
Jaypee Institute of Information Technology (JIIT), Jaypee Institute of Information Technology (JIIT), Jaypee Institute of Information Technology (JIIT), Jaypee Institute of Information Technology (JIIT) and JIIT
Downloads 29
29.

Experimental Privacy Studies - An Initial Review of the Literature

Number of pages: 14 Posted: 16 May 2018
Working Paper Series
Humboldt University of Berlin, Humboldt University of Berlin and University of Potsdam
Downloads 26
30.

Respect for Sovereignty in Cyberspace

Texas Law Review, Vol. 95, 2017
Number of pages: 32 Posted: 31 May 2018
Accepted Paper Series
Naval War College - Stockton Center for the Study of International Law and NATO Cooperative Cyber Defence Centre of Excellence
Downloads 25
31.

Are Cryptocurrencies Securities?

Number of pages: 7 Posted: 12 Jul 2018
Working Paper Series
University of New South Wales (UNSW), UNSW Business School
Downloads 24
32.

Cryptanalysis of Knapsack Cipher Using Ant Colony Optimization

Smart Application and Data Analysis for Smart Cities (SADASC'18)
Number of pages: 6 Posted: 12 Jun 2018 Last Revised: 19 Jun 2018
Working Paper Series
University of Chouaib Doukkali - LAROSERI Lab, University of Chouaib Doukkali - LAROSERI Lab, University of Chouaib Doukkali - LAROSERI Lab, Université Internationale de Rabat - Faculty of Computer Science and Logistic and Université Bourgogne Franche Comté
Downloads 24
33.

Data Centric Security Approach: A Way to Achieve Security & Privacy in Cloud Computing

Proceedings of 3rd International Conference on Internet of Things and Connected Technologies (ICIoTCT), 2018 held at Malaviya National Institute of Technology, Jaipur (India) on March 26-27, 2018
Number of pages: 3 Posted: 07 May 2018 Last Revised: 21 May 2018
Working Paper Series
Amity University, Amity University and Guru Gobind Singh Indraprastha (GGSIP) University
Downloads 24
34.

Phishing and Spam: A Pilot Experiment

Number of pages: 36 Posted: 31 Oct 2017
Working Paper Series
Australian National University (ANU), Australian National University (ANU) - Cybercrime Observatory, (ANU) - Cybercrime Observatory, (ANU) - Cybercrime Observatory, (ANU) - Cybercrime Observatory and Independent
Downloads 24
35.

A Comparative Study on Fingerprint Hash Code, OTP, and Password Based Multifactor Authentication Model with an Ideal System and Existing Systems

International Journal of Applied and Advanced Scientific Research (IJAASR), 3(1), 18-32. ISSN (Online): 2456 - 3080, 2018
Number of pages: 15 Posted: 19 Jan 2018
Accepted Paper Series
Srinivas Institute of Management Studies and Srinivas Institute of Management Studies, Srinivas University, INDIA
Downloads 23
36.

Cloud Service Providers Under the NIS Directive – The UK's Implementation (With GDPR Comparisons)

Number of pages: 14 Posted: 29 Jun 2018
Working Paper Series
Imperial College London
Downloads 23
37.

To Disconnect or Not: A Cybersecurity Game

Number of pages: 42 Posted: 19 Jul 2018
Working Paper Series
Ulsan National Institute of Science and Technology (UNIST), University of Texas at Austin - Department of Computer Science, University of British Columbia (UBC) - Sauder School of Business and University of Texas at Austin - Department of Information, Risk and Operations Management
Downloads 23
38.

Law, Borders, and Speech Conference: Proceedings and Materials

Number of pages: 77 Posted: 14 Jun 2018
Working Paper Series
Stanford Law School Center for Internet and Society, Independent, Independent, Bird & Bird LLP, University of Idaho, University of Amsterdam - Institute for Information Law (IViR), University of Palermo, Stanford University, Bond University, Aberystwyth University and University of North Carolina (UNC) at Charlotte
Downloads 22
39.

Mollifying the Web in Ethiopia: Matching Practice to Policy

Horn Africa Bulletin Vol. 29, No.2
Number of pages: 5 Posted: 18 May 2017
Accepted Paper Series
University of Melbourne, Law School
Downloads 22
40.

Systematization of a 256-Bit Lightweight Block Cipher Marvin

Number of pages: 12 Posted: 26 Dec 2017
Working Paper Series
Maulana Abul Kalam Azad University of Technology - School of Information Technology, Krishnendu and Maulana Abul Kalam Azad University of Technology - School of Information Technology
Downloads 22
41.

The 'Sovereigns of Cyberspace' and State Action: The First Amendment's Application (or Lack Thereof) to Third-Party Platforms

32 Berkeley Tech. L.J. 989 (2017), University of Georgia School of Law Legal Studies Research Paper No. 2018-23
Number of pages: 39 Posted: 15 May 2018 Last Revised: 16 May 2018
Accepted Paper Series
University of Georgia School of Law
Downloads 20
42.

Responsibly Innovating Data Mining and Profiling Tools: A New Approach to Discrimination Sensitive and Privacy Sensitive Attributes

Custers B.H.M. & Schermer B.W. (2014), Responsibly Innovating Data Mining and Profiling Tools: A New Approach to Discrimination Sensitive and Privacy Sensitive Attributes. In: Hoven van den J., Doorn, N., Swierstra T., Koops B-J., Romijn H. (red.) Responsible innovation 1: innovative solutions for g
Number of pages: 16 Posted: 05 Oct 2017
Accepted Paper Series
Leiden University - Center for Law and Digital Technologies and Leiden Law School
Downloads 19
43.

Review: 2017 Strategic Trends in the Global Cyber Conflict

Number of pages: 15 Posted: 08 Jul 2018
Working Paper Series
Tel Aviv University, Tel Aviv University, Independent, Tel Aviv University, Independent and Tel Aviv University
Downloads 19
44.

Trust Based Ciphertext Policy Attribute Based Encryption Techniques for Decentralized Disruption Tolerant Networks

Aust. J. Basic & Appl. Sci., 10(2): 18-26, 2016
Number of pages: 9 Posted: 12 Jul 2017
Accepted Paper Series
Anna University - Department of Computer Science and Engineering, Anna University - Department of Computer Science and Engineering, Anna University - Department of Computer Science and Engineering and Anna University - Department of Computer Science and Engineering
Downloads 19
45.

Who Did It? Attribution of Cyber Intrusions and the Jus in Bello.

The Impact of Emerging Technologies on the Law of Armed Conflict (Lieber Series 3) (Oxford University Press, 2019, Forthcoming)
Number of pages: 75 Posted: 22 Jun 2018
Accepted Paper Series
Syracuse University College of Law - Maxwell School of Citizenship & Public Affairs
Downloads 19
46.

The Consequences of Data Breach Disclosure Laws and Disclosed Breaches on Corporate Cash Holdings and Performance

Number of pages: 53 Posted: 20 Jun 2018
Working Paper Series
Victoria University of Wellington - School of Economics and Finance and Victoria University of Wellington
Downloads 18
47.

Identifying Anonymous Online Message Senders: A Proposal Toward a Linguistic Fingerprint Biometric Database (LFBD)

Number of pages: 55 Posted: 27 Dec 2017
Working Paper Series
Freelance Researcher and Lecturer
Downloads 17
48.

Peacetime Cyber Responses and Wartime Cyber Operations Under International Law: An Analytical Vade Mecum

8 Harvard National Security Journal 239 (2017)
Number of pages: 44 Posted: 31 May 2018
Accepted Paper Series
Naval War College - Stockton Center for the Study of International Law
Downloads 17
49.

Countering the Proliferation of Malware: Targeting the Vulnerability Lifecycle

Belfer Cyber Security Project White Paper Series
Number of pages: 34 Posted: 27 Oct 2017 Last Revised: 28 Oct 2017
Accepted Paper Series
Harvard Kennedy School (HKS), Belfer Center for Science and International Affairs (BCSIA)
Downloads 15
50.

A Specified Security Comparison for Various Encryption Techniques in Cloud Computing

Proceedings of 3rd International Conference on Internet of Things and Connected Technologies (ICIoTCT), 2018 held at Malaviya National Institute of Technology, Jaipur (India) on March 26-27, 2018
Number of pages: 6 Posted: 03 May 2018
Working Paper Series
Oriental Institute of Technology, Jaipur Engineering College & Research Centre, Srikalahasteeswara Institute of Technology (SKIT) and IIS University
Downloads 14