Literatur (Zotero/apa)

2359887 YLB2M7DD 1 apa 50 default 34 https://krisenkom.ch/wp-content/plugins/zotpress/
%7B%22status%22%3A%22success%22%2C%22updateneeded%22%3Afalse%2C%22instance%22%3Afalse%2C%22meta%22%3A%7B%22request_last%22%3A50%2C%22request_next%22%3A50%2C%22used_cache%22%3Atrue%7D%2C%22data%22%3A%5B%7B%22key%22%3A%22WZB7U2B8%22%2C%22library%22%3A%7B%22id%22%3A2359887%7D%2C%22meta%22%3A%7B%22creatorSummary%22%3A%22Langner%22%2C%22numChildren%22%3A1%7D%2C%22bib%22%3A%22%26lt%3Bdiv%20class%3D%26quot%3Bcsl-bib-body%26quot%3B%20style%3D%26quot%3Bline-height%3A%202%3B%20padding-left%3A%201em%3B%20text-indent%3A-1em%3B%26quot%3B%26gt%3B%5Cn%20%20%26lt%3Bdiv%20class%3D%26quot%3Bcsl-entry%26quot%3B%26gt%3BLangner%2C%20R.%20%28n.d.%29.%20%26lt%3Bi%26gt%3BSTUXNET%20UND%20DIE%20FOLGEN%26lt%3B%5C%2Fi%26gt%3B.%26lt%3B%5C%2Fdiv%26gt%3B%5Cn%26lt%3B%5C%2Fdiv%26gt%3B%22%2C%22data%22%3A%7B%22itemType%22%3A%22journalArticle%22%2C%22title%22%3A%22STUXNET%20UND%20DIE%20FOLGEN%22%2C%22creators%22%3A%5B%7B%22creatorType%22%3A%22author%22%2C%22firstName%22%3A%22Ralph%22%2C%22lastName%22%3A%22Langner%22%7D%5D%2C%22abstractNote%22%3A%22%22%2C%22date%22%3A%22%22%2C%22language%22%3A%22de%22%2C%22DOI%22%3A%22%22%2C%22ISSN%22%3A%22%22%2C%22url%22%3A%22%22%2C%22collections%22%3A%5B%22YLB2M7DD%22%5D%2C%22dateModified%22%3A%222025–03-18T10%3A03%3A33Z%22%7D%7D%2C%7B%22key%22%3A%22SZENRYHB%22%2C%22library%22%3A%7B%22id%22%3A2359887%7D%2C%22meta%22%3A%7B%22creatorSummary%22%3A%22Grimm%22%2C%22numChildren%22%3A2%7D%2C%22bib%22%3A%22%26lt%3Bdiv%20class%3D%26quot%3Bcsl-bib-body%26quot%3B%20style%3D%26quot%3Bline-height%3A%202%3B%20padding-left%3A%201em%3B%20text-indent%3A-1em%3B%26quot%3B%26gt%3B%5Cn%20%20%26lt%3Bdiv%20class%3D%26quot%3Bcsl-entry%26quot%3B%26gt%3BGrimm%2C%20R.%20%28n.d.%29.%20%26lt%3Bi%26gt%3BPsychological%20Aspects%20of%20Cybercrime%26lt%3B%5C%2Fi%26gt%3B.%26lt%3B%5C%2Fdiv%26gt%3B%5Cn%26lt%3B%5C%2Fdiv%26gt%3B%22%2C%22data%22%3A%7B%22itemType%22%3A%22journalArticle%22%2C%22title%22%3A%22Psychological%20Aspects%20of%20Cybercrime%22%2C%22creators%22%3A%5B%7B%22creatorType%22%3A%22author%22%2C%22firstName%22%3A%22Reto%22%2C%22lastName%22%3A%22Grimm%22%7D%5D%2C%22abstractNote%22%3A%22%22%2C%22date%22%3A%22%22%2C%22language%22%3A%22de%22%2C%22DOI%22%3A%22%22%2C%22ISSN%22%3A%22%22%2C%22url%22%3A%22%22%2C%22collections%22%3A%5B%22YLB2M7DD%22%2C%22P8EH5P66%22%5D%2C%22dateModified%22%3A%222024–08-18T10%3A06%3A58Z%22%7D%7D%2C%7B%22key%22%3A%22XJUQTMKY%22%2C%22library%22%3A%7B%22id%22%3A2359887%7D%2C%22meta%22%3A%7B%22lastModifiedByUser%22%3A%7B%22id%22%3A5893267%2C%22username%22%3A%22Tabaeris%22%2C%22name%22%3A%22Dr.%20Baeriswyl%20Othmar%22%2C%22links%22%3A%7B%22alternate%22%3A%7B%22href%22%3A%22https%3A%5C%2F%5C%2Fwww.zotero.org%5C%2Ftabaeris%22%2C%22type%22%3A%22text%5C%2Fhtml%22%7D%7D%7D%2C%22creatorSummary%22%3A%22Pugnetti%20and%20Casi%5Cu00e1n%22%2C%22numChildren%22%3A1%7D%2C%22bib%22%3A%22%26lt%3Bdiv%20class%3D%26quot%3Bcsl-bib-body%26quot%3B%20style%3D%26quot%3Bline-height%3A%202%3B%20padding-left%3A%201em%3B%20text-indent%3A-1em%3B%26quot%3B%26gt%3B%5Cn%20%20%26lt%3Bdiv%20class%3D%26quot%3Bcsl-entry%26quot%3B%26gt%3BPugnetti%2C%20C.%2C%20%26amp%3B%20Casi%26%23xE1%3Bn%2C%20C.%20%28n.d.%29.%20%26lt%3Bi%26gt%3BCyberrisiken%20und%20Schweizer%20KMU%26%23x202F%3B%3A%20Eine%20Untersuchung%20der%20Einstellungen%20von%20Mitarbeitenden%20und%20verhaltensbedingter%20Anf%26%23xE4%3Blligkeiten%26lt%3B%5C%2Fi%26gt%3B.%2032.%26lt%3B%5C%2Fdiv%26gt%3B%5Cn%26lt%3B%5C%2Fdiv%26gt%3B%22%2C%22data%22%3A%7B%22itemType%22%3A%22journalArticle%22%2C%22title%22%3A%22Cyberrisiken%20und%20Schweizer%20KMU%20%3A%20Eine%20Untersuchung%20der%20Einstellungen%20von%20Mitarbeitenden%20und%20verhaltensbedingter%20Anf%5Cu00e4lligkeiten%22%2C%22creators%22%3A%5B%7B%22creatorType%22%3A%22author%22%2C%22firstName%22%3A%22Carlo%22%2C%22lastName%22%3A%22Pugnetti%22%7D%2C%7B%22creatorType%22%3A%22author%22%2C%22firstName%22%3A%22Carlos%22%2C%22lastName%22%3A%22Casi%5Cu00e1n%22%7D%5D%2C%22abstractNote%22%3A%22%22%2C%22date%22%3A%22%22%2C%22language%22%3A%22de%22%2C%22DOI%22%3A%22%22%2C%22ISSN%22%3A%22%22%2C%22url%22%3A%22%22%2C%22collections%22%3A%5B%22YLB2M7DD%22%5D%2C%22dateModified%22%3A%222023–11-27T09%3A02%3A04Z%22%7D%7D%2C%7B%22key%22%3A%22VIF8SY58%22%2C%22library%22%3A%7B%22id%22%3A2359887%7D%2C%22meta%22%3A%7B%22creatorSummary%22%3A%22Rafi%20and%20Imtiaz%22%2C%22parsedDate%22%3A%222023–05-05%22%2C%22numChildren%22%3A2%7D%2C%22bib%22%3A%22%26lt%3Bdiv%20class%3D%26quot%3Bcsl-bib-body%26quot%3B%20style%3D%26quot%3Bline-height%3A%202%3B%20padding-left%3A%201em%3B%20text-indent%3A-1em%3B%26quot%3B%26gt%3B%5Cn%20%20%26lt%3Bdiv%20class%3D%26quot%3Bcsl-entry%26quot%3B%26gt%3BRafi%2C%20S.%2C%20%26amp%3B%20Imtiaz%2C%20N.%20%282023%29.%20Cyberwar%3A%20Its%20Psychological%20Impact%20on%20Employees%20and%20Consequences%20for%20Organizations.%20In%20F.%20%26%23xD6%3Bzsungur%20%28Ed.%29%2C%20%26lt%3Bi%26gt%3BAdvances%20in%20Digital%20Crime%2C%20Forensics%2C%20and%20Cyber%20Terrorism%26lt%3B%5C%2Fi%26gt%3B%20%28pp.%20108%26%23x2013%3B127%29.%20IGI%20Global.%20https%3A%5C%2F%5C%2Fdoi.org%5C%2F10.4018%5C%2F978‑1–6684-6741–1.ch006%26lt%3B%5C%2Fdiv%26gt%3B%5Cn%26lt%3B%5C%2Fdiv%26gt%3B%22%2C%22data%22%3A%7B%22itemType%22%3A%22bookSection%22%2C%22title%22%3A%22Cyberwar%3A%20Its%20Psychological%20Impact%20on%20Employees%20and%20Consequences%20for%20Organizations%22%2C%22creators%22%3A%5B%7B%22creatorType%22%3A%22editor%22%2C%22firstName%22%3A%22Fahri%22%2C%22lastName%22%3A%22%5Cu00d6zsungur%22%7D%2C%7B%22creatorType%22%3A%22author%22%2C%22firstName%22%3A%22Sumbul%22%2C%22lastName%22%3A%22Rafi%22%7D%2C%7B%22creatorType%22%3A%22author%22%2C%22firstName%22%3A%22Nasheed%22%2C%22lastName%22%3A%22Imtiaz%22%7D%5D%2C%22abstractNote%22%3A%22Invasion%2C%20terrorist%20attacks%2C%20drone%20strikes%2C%20insurgency%20and%20counterinsurgency%2C%20civil%20strife%2C%20and%20foreign%20intervention%20have%20already%20spread%20around%20the%20world%2C%20but%20war%20is%20now%20spreading%20and%20intensifying%20in%20a%20new%20form%20waged%20across%20digital%20networks%3A%20cyberwar.%20This%20war%20is%20fought%20through%20the%20use%20of%20computers%20and%20the%20internet.%20Today%2C%20the%20central%20part%20of%20organizational%20activities%20has%20been%20converted%20to%20digital%20format.%20Cybercriminals%20are%20continually%20developing%20new%20attack%20types%2C%20tools%2C%20and%20strategies%20that%20enable%20them%20to%20access%20settings%20that%20are%20more%20complicated%20or%20well-controlled%2C%20do%20more%20harm%2C%20and%20even%20remain%20undiscovered.%20This%20chapter%20discusses%20the%20history%20of%20cyber%20war%2C%20its%20emergence%2C%20and%20the%20different%20forms%20of%20cyberattacks%20and%20various%20repercussions%20of%20cybercrime%2C%20including%20its%20influence%20on%20the%20health%20of%20organizations%2C%20the%20psychological%20and%20social%20threats%20it%20poses%20to%20workers%2C%20and%20other%20outcomes.%20Cybercrime%20is%20defined%20and%20exposed%20by%20specialist%20literature.%22%2C%22bookTitle%22%3A%22Advances%20in%20Digital%20Crime%2C%20Forensics%2C%20and%20Cyber%20Terrorism%22%2C%22date%22%3A%222023–5‑5%22%2C%22language%22%3A%22en%22%2C%22ISBN%22%3A%22978–1‑66846–741‑1%20978–1‑66846–742‑8%22%2C%22url%22%3A%22https%3A%5C%2F%5C%2Fservices.igi-global.com%5C%2Fresolvedoi%5C%2Fresolve.aspx%3Fdoi%3D10.4018%5C%2F978‑1–6684-6741–1.ch006%22%2C%22collections%22%3A%5B%22YLB2M7DD%22%5D%2C%22dateModified%22%3A%222023–11-08T08%3A54%3A17Z%22%7D%7D%2C%7B%22key%22%3A%22WTB64L2J%22%2C%22library%22%3A%7B%22id%22%3A2359887%7D%2C%22meta%22%3A%7B%22creatorSummary%22%3A%22Rid%20and%20Buchanan%22%2C%22parsedDate%22%3A%222015–01-02%22%2C%22numChildren%22%3A1%7D%2C%22bib%22%3A%22%26lt%3Bdiv%20class%3D%26quot%3Bcsl-bib-body%26quot%3B%20style%3D%26quot%3Bline-height%3A%202%3B%20padding-left%3A%201em%3B%20text-indent%3A-1em%3B%26quot%3B%26gt%3B%5Cn%20%20%26lt%3Bdiv%20class%3D%26quot%3Bcsl-entry%26quot%3B%26gt%3BRid%2C%20T.%2C%20%26amp%3B%20Buchanan%2C%20B.%20%282015%29.%20Attributing%20Cyber%20Attacks.%20%26lt%3Bi%26gt%3BJournal%20of%20Strategic%20Studies%26lt%3B%5C%2Fi%26gt%3B%2C%20%26lt%3Bi%26gt%3B38%26lt%3B%5C%2Fi%26gt%3B%281%26%23x2013%3B2%29%2C%204%26%23x2013%3B37.%20%26lt%3Ba%20class%3D%26%23039%3Bzp-DOIURL%26%23039%3B%20href%3D%26%23039%3Bhttps%3A%5C%2F%5C%2Fdoi.org%5C%2F10.1080%5C%2F01402390.2014.977382%26%23039%3B%26gt%3Bhttps%3A%5C%2F%5C%2Fdoi.org%5C%2F10.1080%5C%2F01402390.2014.977382%26lt%3B%5C%2Fa%26gt%3B%26lt%3B%5C%2Fdiv%26gt%3B%5Cn%26lt%3B%5C%2Fdiv%26gt%3B%22%2C%22data%22%3A%7B%22itemType%22%3A%22journalArticle%22%2C%22title%22%3A%22Attributing%20Cyber%20Attacks%22%2C%22creators%22%3A%5B%7B%22creatorType%22%3A%22author%22%2C%22firstName%22%3A%22Thomas%22%2C%22lastName%22%3A%22Rid%22%7D%2C%7B%22creatorType%22%3A%22author%22%2C%22firstName%22%3A%22Ben%22%2C%22lastName%22%3A%22Buchanan%22%7D%5D%2C%22abstractNote%22%3A%22Who%20did%20it%3F%20Attribution%20is%20fundamental.%20Human%20lives%20and%20the%20security%20of%20the%20state%20may%20depend%20on%20ascribing%20agency%20to%20an%20agent.%20In%20the%20context%20of%20computer%20network%20intrusions%2C%20attribution%20is%20commonly%20seen%20as%20one%20of%20the%20most%20intractable%20technical%20problems%2C%20as%20either%20solvable%20or%20not%20solvable%2C%20and%20as%20dependent%20mainly%20on%20the%20available%20forensic%20evidence.%20But%20is%20it%3F%20Is%20this%20a%20productive%20understanding%20of%20attribution%3F%20%5Cu2014%20This%20article%20argues%20that%20attribution%20is%20what%20states%20make%20of%20it.%20To%20show%20how%2C%20we%20introduce%20the%20Q%20Model%3A%20designed%20to%20explain%2C%20guide%2C%20and%20improve%20the%20making%20of%20attribution.%20Matching%20an%20offender%20to%20an%20offence%20is%20an%20exercise%20in%20minimising%20uncertainty%20on%20three%20levels%3A%20tactically%2C%20attribution%20is%20an%20art%20as%20well%20as%20a%20science%3B%20operationally%2C%20attribution%20is%20a%20nuanced%20process%20not%20a%20blackand-white%20problem%3B%20and%20strategically%2C%20attribution%20is%20a%20function%20of%20what%20is%20at%20stake%20politically.%20Successful%20attribution%20requires%20a%20range%20of%20skills%20on%20all%20levels%2C%20careful%20management%2C%20time%2C%20leadership%2C%20stress-testing%2C%20prudent%20communication%2C%20and%20recognising%20limitations%20and%20challenges.%22%2C%22date%22%3A%222015–01-02%22%2C%22language%22%3A%22en%22%2C%22DOI%22%3A%2210.1080%5C%2F01402390.2014.977382%22%2C%22ISSN%22%3A%220140–2390%2C%201743–937X%22%2C%22url%22%3A%22http%3A%5C%2F%5C%2Fwww.tandfonline.com%5C%2Fdoi%5C%2Fabs%5C%2F10.1080%5C%2F01402390.2014.977382%22%2C%22collections%22%3A%5B%22YLB2M7DD%22%5D%2C%22dateModified%22%3A%222023–11-08T08%3A54%3A15Z%22%7D%7D%2C%7B%22key%22%3A%229TBKB6UG%22%2C%22library%22%3A%7B%22id%22%3A2359887%7D%2C%22meta%22%3A%7B%22creatorSummary%22%3A%22Shamsi%20et%20al.%22%2C%22parsedDate%22%3A%222016%22%2C%22numChildren%22%3A1%7D%2C%22bib%22%3A%22%26lt%3Bdiv%20class%3D%26quot%3Bcsl-bib-body%26quot%3B%20style%3D%26quot%3Bline-height%3A%202%3B%20padding-left%3A%201em%3B%20text-indent%3A-1em%3B%26quot%3B%26gt%3B%5Cn%20%20%26lt%3Bdiv%20class%3D%26quot%3Bcsl-entry%26quot%3B%26gt%3BShamsi%2C%20J.%20A.%2C%20Zeadally%2C%20S.%2C%20Sheikh%2C%20F.%2C%20%26amp%3B%20Flowers%2C%20A.%20%282016%29.%20Attribution%20in%20cyberspace%3A%20techniques%20and%20legal%20implications.%20%26lt%3Bi%26gt%3BSecurity%20and%20Communication%20Networks%26lt%3B%5C%2Fi%26gt%3B%2C%20%26lt%3Bi%26gt%3B9%26lt%3B%5C%2Fi%26gt%3B%2815%29%2C%202886%26%23x2013%3B2900.%20%26lt%3Ba%20class%3D%26%23039%3Bzp-DOIURL%26%23039%3B%20href%3D%26%23039%3Bhttps%3A%5C%2F%5C%2Fdoi.org%5C%2F10.1002%5C%2Fsec.1485%26%23039%3B%26gt%3Bhttps%3A%5C%2F%5C%2Fdoi.org%5C%2F10.1002%5C%2Fsec.1485%26lt%3B%5C%2Fa%26gt%3B%26lt%3B%5C%2Fdiv%26gt%3B%5Cn%26lt%3B%5C%2Fdiv%26gt%3B%22%2C%22data%22%3A%7B%22itemType%22%3A%22journalArticle%22%2C%22title%22%3A%22Attribution%20in%20cyberspace%3A%20techniques%20and%20legal%20implications%22%2C%22creators%22%3A%5B%7B%22creatorType%22%3A%22author%22%2C%22firstName%22%3A%22Jawwad%20A.%22%2C%22lastName%22%3A%22Shamsi%22%7D%2C%7B%22creatorType%22%3A%22author%22%2C%22firstName%22%3A%22Sherali%22%2C%22lastName%22%3A%22Zeadally%22%7D%2C%7B%22creatorType%22%3A%22author%22%2C%22firstName%22%3A%22Fareha%22%2C%22lastName%22%3A%22Sheikh%22%7D%2C%7B%22creatorType%22%3A%22author%22%2C%22firstName%22%3A%22Angelyn%22%2C%22lastName%22%3A%22Flowers%22%7D%5D%2C%22abstractNote%22%3A%22Attribution%20of%20cybercrimes%20is%20significant%20in%20limiting%20the%20rate%20of%20crime%20as%20well%20as%20in%20preparing%20the%20required%20level%20of%20response.%20Motivated%20by%20this%20significance%2C%20we%20introduce%20a%20level-based%20approach%20for%20achieving%20attribution.%20In%20our%20proposed%20approach%2C%20attribution%20consists%20of%20three%20steps%3A%20%281%29%20identification%20of%20the%20cyberweapon%20used%3B%20%282%29%20determination%20of%20the%20origin%20of%20the%20attack%3B%20and%20%283%29%20identification%20of%20the%20actual%20attacker.%20We%20conduct%20an%20in-depth%20analysis%20of%20recently%20proposed%20attribution%20techniques.%20Our%20analysis%20reveals%20that%20indirect%20methods%20of%20attribution%20are%20particularly%20effective%20when%20attributing%20cybercrimes%3B%20many%20of%20them%20remain%20unattributed.%20We%20also%20discuss%20some%20of%20the%20legal%20issues%20pertaining%20to%20attribution%2C%20and%20we%20argue%20that%20well-defined%20international%20laws%20for%20cyberspace%20along%20with%20strong%20cooperation%20among%20governments%20are%20needed%20to%20track%20down%20and%20punish%20cybercriminals.%20Copyright%20%5Cu00a9%202016%20John%20Wiley%20%26amp%3B%20Sons%2C%20Ltd.%22%2C%22date%22%3A%2210%5C%2F2016%22%2C%22language%22%3A%22en%22%2C%22DOI%22%3A%2210.1002%5C%2Fsec.1485%22%2C%22ISSN%22%3A%221939–0114%2C%201939–0122%22%2C%22url%22%3A%22https%3A%5C%2F%5C%2Fonlinelibrary.wiley.com%5C%2Fdoi%5C%2F10.1002%5C%2Fsec.1485%22%2C%22collections%22%3A%5B%22YLB2M7DD%22%5D%2C%22dateModified%22%3A%222023–11-08T08%3A54%3A10Z%22%7D%7D%2C%7B%22key%22%3A%22LP3VD42Q%22%2C%22library%22%3A%7B%22id%22%3A2359887%7D%2C%22meta%22%3A%7B%22creatorSummary%22%3A%22Adejobi%20et%20al.%22%2C%22parsedDate%22%3A%222021%22%2C%22numChildren%22%3A1%7D%2C%22bib%22%3A%22%26lt%3Bdiv%20class%3D%26quot%3Bcsl-bib-body%26quot%3B%20style%3D%26quot%3Bline-height%3A%202%3B%20padding-left%3A%201em%3B%20text-indent%3A-1em%3B%26quot%3B%26gt%3B%5Cn%20%20%26lt%3Bdiv%20class%3D%26quot%3Bcsl-entry%26quot%3B%26gt%3BAdejobi%2C%20J.%20A.%2C%20Carroll%2C%20F.%2C%20Nawaf%2C%20L.%2C%20%26amp%3B%20Montasari%2C%20R.%20%282021%29.%20%26lt%3Bi%26gt%3BPHISHING%2C%20TRUST%20AND%20HUMAN%20WELLBEING%26lt%3B%5C%2Fi%26gt%3B.%26lt%3B%5C%2Fdiv%26gt%3B%5Cn%26lt%3B%5C%2Fdiv%26gt%3B%22%2C%22data%22%3A%7B%22itemType%22%3A%22journalArticle%22%2C%22title%22%3A%22PHISHING%2C%20TRUST%20AND%20HUMAN%20WELLBEING%22%2C%22creators%22%3A%5B%7B%22creatorType%22%3A%22author%22%2C%22firstName%22%3A%22John%20Ayooluwa%22%2C%22lastName%22%3A%22Adejobi%22%7D%2C%7B%22creatorType%22%3A%22author%22%2C%22firstName%22%3A%22Fiona%22%2C%22lastName%22%3A%22Carroll%22%7D%2C%7B%22creatorType%22%3A%22author%22%2C%22firstName%22%3A%22Liqaa%22%2C%22lastName%22%3A%22Nawaf%22%7D%2C%7B%22creatorType%22%3A%22author%22%2C%22firstName%22%3A%22Reza%22%2C%22lastName%22%3A%22Montasari%22%7D%5D%2C%22abstractNote%22%3A%22The%20more%20time%20we%20spend%20online%2C%20the%20more%20our%20global%20connections%20grow%20and%20frighteningly%2C%20the%20more%20we%20are%20susceptible%20to%20cyberattacks.%20In%20particular%2C%202020%5C%2F%202021%20has%20seen%20a%20significant%20increase%20in%20successful%20phishing%20attacks%20mainly%20due%20to%20the%20rise%20in%20human%20vulnerabilities%20caused%20by%20the%20global%20COVID-19%20situation.%20In%20this%20paper%2C%20we%20consider%20the%20human%20factors%20of%20the%20phishing%20attack.%20We%20explore%20the%20evolution%20of%20the%20phishing%20attack%20with%20particular%20reference%20to%20its%20many%20different%20guises.%20Following%20that%2C%20the%20paper%20discusses%20the%20concept%20of%20trust%20and%20the%20human%20trust%20issues%20resulting%20from%20a%20phishing%20attack%3B%20it%20will%20focus%20on%20human%20vulnerability%20and%20the%20idea%20of%20phishing%20awareness.%20The%20findings%20from%20the%20study%20show%20that%20people%20feel%20that%20they%20can%20confidently%20recognize%20a%20phishing%20attack%20but%20it%20also%20highlights%20how%20personal%20attitudes%20and%20situational%20influences%20can%20make%20certain%20online%20users%20more%20susceptible%20than%20others.%20The%20findings%20also%20clearly%20detail%20how%20the%20phishing%20attack%20makes%20them%20and%20others%20feel%20and%20they%20assertively%20suggest%20ways%20to%20counter%20the%20attack.%20After%20portraying%20this%20picture%2C%20the%20question%20lies%20around%20the%20degree%20to%20which%20the%20everyday%20person%20is%20adequately%20equipped%20to%20psychologically%20deal%20with%20the%20sophisticated%20and%20contemporary%20phishing%20attack%2C%20and%20whether%20their%20thinking%20and%20methods%20of%20detection%5C%2F%20coping%20are%20so%20outdated%20that%20this%20%28in%20itself%29%20is%20creating%20an%20even%20greater%20risk.%22%2C%22date%22%3A%222021%22%2C%22language%22%3A%22en%22%2C%22DOI%22%3A%22%22%2C%22ISSN%22%3A%22%22%2C%22url%22%3A%22%22%2C%22collections%22%3A%5B%22YLB2M7DD%22%5D%2C%22dateModified%22%3A%222023–11-08T08%3A52%3A36Z%22%7D%7D%2C%7B%22key%22%3A%22B7D53LRR%22%2C%22library%22%3A%7B%22id%22%3A2359887%7D%2C%22meta%22%3A%7B%22creatorSummary%22%3A%22Rafi%20and%20Imtiaz%22%2C%22parsedDate%22%3A%222022%22%2C%22numChildren%22%3A1%7D%2C%22bib%22%3A%22%26lt%3Bdiv%20class%3D%26quot%3Bcsl-bib-body%26quot%3B%20style%3D%26quot%3Bline-height%3A%202%3B%20padding-left%3A%201em%3B%20text-indent%3A-1em%3B%26quot%3B%26gt%3B%5Cn%20%20%26lt%3Bdiv%20class%3D%26quot%3Bcsl-entry%26quot%3B%26gt%3BRafi%2C%20S.%2C%20%26amp%3B%20Imtiaz%2C%20N.%20%282022%29.%20Occupational%20Stress%20and%20Workplace%20Bullying%20Concerning%20Mental%20Health.%20%26lt%3Bi%26gt%3BInternational%20Journal%20of%20Education%26lt%3B%5C%2Fi%26gt%3B.%26lt%3B%5C%2Fdiv%26gt%3B%5Cn%26lt%3B%5C%2Fdiv%26gt%3B%22%2C%22data%22%3A%7B%22itemType%22%3A%22journalArticle%22%2C%22title%22%3A%22Occupational%20Stress%20and%20Workplace%20Bullying%20Concerning%20Mental%20Health%22%2C%22creators%22%3A%5B%7B%22creatorType%22%3A%22author%22%2C%22firstName%22%3A%22Sumbul%22%2C%22lastName%22%3A%22Rafi%22%7D%2C%7B%22creatorType%22%3A%22author%22%2C%22firstName%22%3A%22Nasheed%22%2C%22lastName%22%3A%22Imtiaz%22%7D%5D%2C%22abstractNote%22%3A%22Mental%20health%20is%20a%20universal%20phenomenon%20and%20is%20equally%20studied%20and%20researched%20worldwide.%20It%20is%20considered%20the%20most%20significant%20human%20factor%20that%20highlights%20the%20working%20of%20any%20organisation.%20According%20to%20WHO%20%282019%29%2C%20%26quot%3BIt%20is%20truly%20in%20everyone%26%23039%3Bs%20best%20interests%20employers%26%23039%3B%20and%20employees%20alike%20to%20improve%20our%20team%26%23039%3Bs%20mental%20health.%26quot%3B%20%26quot%3BEmployees%20with%20low%20mental%20pressure%20are%20more%20efficient%20in%20giving%20output%2C%20have%20high%20employee%20turnover%2C%20and%20report%20lesser%20personal%20leaves.%20Occupational%20stress%20is%20a%20sense%20of%20disparity%20faced%20by%20an%20individual%20when%20they%20are%20unable%20to%20meet%20the%20demands%20of%20the%20workplace%20in%20a%20given%20period.%20At%20the%20same%20time%2C%20workplace%20bullying%20can%20be%20explained%20as%20a%20displaying%20series%20of%20negative%20behaviour%20subjected%20towards%20a%20particular%20person%20or%20a%20specific%20group.%20Therefore%2C%20the%20researcher%20grounds%20this%20investigation%20to%20assess%20the%20influence%20of%20occupational%20stress%20and%20workplace%20bullying%20on%20the%20mental%20health%20of%20employees%20and%20to%20study%20the%20relationship%20among%20the%20concerning%20variables.%20The%20sample%20consists%20of%20150%20employees%20of%20the%20private%20bank%20in%20Aligarh%20city.%20The%20online%20survey%20method%20has%20been%20used%20to%20get%20the%20responses%20with%20the%20help%20of%20questionnaires.%20The%20occupational%20stress%20index%20%28Srivastava%20%26amp%3B%20Singh%29%3B%20Negative%20Acts%20Questionnaire-Revised%20%28Einarsen%29%3B%20and%20Mental%20Health%20scale%20%28Imtiaz%29%20were%20used%20as%20tools%20to%20conduct%20research.%20Regression%20analyses%20were%20used%20to%20analyse%20the%20data%20and%20to%20compute%20the%20results.%20The%20outcomes%20of%20the%20study%20show%20that%20Workplace%20bullying%20and%20Occupational%20stress%20emerged%20as%20significant%20predictors%20of%20mental%20health%2C%20and%20there%20is%20a%20highly%20significant%20negative%20relationship%20among%20the%20variables.%20The%20findings%20of%20the%20study%20are%20discussed%20in%20the%20paper%20in%20light%20of%20reviewed%20literature.%22%2C%22date%22%3A%222022%22%2C%22language%22%3A%22en%22%2C%22DOI%22%3A%22%22%2C%22ISSN%22%3A%22%22%2C%22url%22%3A%22%22%2C%22collections%22%3A%5B%22YLB2M7DD%22%5D%2C%22dateModified%22%3A%222023–11-02T07%3A51%3A44Z%22%7D%7D%2C%7B%22key%22%3A%22EV2G69HW%22%2C%22library%22%3A%7B%22id%22%3A2359887%7D%2C%22meta%22%3A%7B%22creatorSummary%22%3A%22Beckerman%22%2C%22parsedDate%22%3A%222022–01-28%22%2C%22numChildren%22%3A1%7D%2C%22bib%22%3A%22%26lt%3Bdiv%20class%3D%26quot%3Bcsl-bib-body%26quot%3B%20style%3D%26quot%3Bline-height%3A%202%3B%20padding-left%3A%201em%3B%20text-indent%3A-1em%3B%26quot%3B%26gt%3B%5Cn%20%20%26lt%3Bdiv%20class%3D%26quot%3Bcsl-entry%26quot%3B%26gt%3BBeckerman%2C%20C.%20E.%20%282022%29.%20Is%20there%20a%20cyber%20security%20dilemma%3F%20%26lt%3Bi%26gt%3BJournal%20of%20Cybersecurity%26lt%3B%5C%2Fi%26gt%3B%2C%20%26lt%3Bi%26gt%3B8%26lt%3B%5C%2Fi%26gt%3B%281%29%2C%20tyac012.%20%26lt%3Ba%20class%3D%26%23039%3Bzp-DOIURL%26%23039%3B%20href%3D%26%23039%3Bhttps%3A%5C%2F%5C%2Fdoi.org%5C%2F10.1093%5C%2Fcybsec%5C%2Ftyac012%26%23039%3B%26gt%3Bhttps%3A%5C%2F%5C%2Fdoi.org%5C%2F10.1093%5C%2Fcybsec%5C%2Ftyac012%26lt%3B%5C%2Fa%26gt%3B%26lt%3B%5C%2Fdiv%26gt%3B%5Cn%26lt%3B%5C%2Fdiv%26gt%3B%22%2C%22data%22%3A%7B%22itemType%22%3A%22journalArticle%22%2C%22title%22%3A%22Is%20there%20a%20cyber%20security%20dilemma%3F%22%2C%22creators%22%3A%5B%7B%22creatorType%22%3A%22author%22%2C%22firstName%22%3A%22Carly%20E%22%2C%22lastName%22%3A%22Beckerman%22%7D%5D%2C%22abstractNote%22%3A%22In%20recent%20years%2C%20scholars%2C%20commentators%20and%20politicians%20have%20discussed%20the%20prospect%20of%20a%20%5Cu2018cyber%20security%20dilemma%5Cu2019.%20If%20states%20race%20to%20develop%20superior%20cyberattacks%2C%20how%20far%20might%20this%20escalate%3F%20Are%20state-led%20cyberattacks%20likely%20to%20provoke%20a%20full%20war%3F%20To%20address%20these%20related%20questions%2C%20I%20apply%20a%20multi-level%20Neoclassical%20Realist%20framework%20that%20progresses%20from%20systemic%20logic%20to%20an%20assessment%20of%20leader%20cues%20and%20cognition.%20This%20contributes%20much-needed%20coherence%20to%20debates%20about%20escalation%20and%20cyber%20warfare%20and%20demonstrates%20the%20framework%5Cu2019s%20utility%20for%20addressing%20contemporary%20and%20evolving%20problems%20in%20international%20affairs.%20The%20framework%20reveals%20that%2C%20according%20to%20both%20a%20systemic%20and%20societal%20cue%20analysis%2C%20fears%20regarding%20unchecked%20escalation%20from%20state%20competition%20in%20cyberspace%20to%20kinetic%20warfare%20are%20largely%20unfounded.%20Nevertheless%2C%20it%20also%20points%20toward%20one%20caveat%20and%20direction%20for%20further%20research%20in%20that%20cyber%20warfare%20directed%20at%20foreign%20leaders%5Cu2019%20political%20survival%20may%20be%20unexpectedly%20provocative%20in%20a%20way%20not%20currently%20addressed%20by%20escalation%20models.%22%2C%22date%22%3A%222022–01-28%22%2C%22language%22%3A%22en%22%2C%22DOI%22%3A%2210.1093%5C%2Fcybsec%5C%2Ftyac012%22%2C%22ISSN%22%3A%222057–2085%2C%202057–2093%22%2C%22url%22%3A%22https%3A%5C%2F%5C%2Facademic.oup.com%5C%2Fcybersecurity%5C%2Farticle%5C%2Fdoi%5C%2F10.1093%5C%2Fcybsec%5C%2Ftyac012%5C%2F6705410%22%2C%22collections%22%3A%5B%22YLB2M7DD%22%5D%2C%22dateModified%22%3A%222023–11-02T07%3A51%3A11Z%22%7D%7D%2C%7B%22key%22%3A%22B2ZFLEP3%22%2C%22library%22%3A%7B%22id%22%3A2359887%7D%2C%22meta%22%3A%7B%22creatorSummary%22%3A%22Maness%20and%20Valeriano%22%2C%22parsedDate%22%3A%222018–01-11%22%2C%22numChildren%22%3A1%7D%2C%22bib%22%3A%22%26lt%3Bdiv%20class%3D%26quot%3Bcsl-bib-body%26quot%3B%20style%3D%26quot%3Bline-height%3A%202%3B%20padding-left%3A%201em%3B%20text-indent%3A-1em%3B%26quot%3B%26gt%3B%5Cn%20%20%26lt%3Bdiv%20class%3D%26quot%3Bcsl-entry%26quot%3B%26gt%3BManess%2C%20R.%20C.%2C%20%26amp%3B%20Valeriano%2C%20B.%20%282018%29.%20%26lt%3Bi%26gt%3BInternational%20Cyber%20Conflict%20and%20National%20Security%26lt%3B%5C%2Fi%26gt%3B%20%28D.%20S.%20Reveron%2C%20N.%20K.%20Gvosdev%2C%20%26amp%3B%20J.%20A.%20Cloud%2C%20Eds.%3B%20Vol.%201%29.%20Oxford%20University%20Press.%20https%3A%5C%2F%5C%2Fdoi.org%5C%2F10.1093%5C%2Foxfordhb%5C%2F9780190680015.013.25%26lt%3B%5C%2Fdiv%26gt%3B%5Cn%26lt%3B%5C%2Fdiv%26gt%3B%22%2C%22data%22%3A%7B%22itemType%22%3A%22book%22%2C%22title%22%3A%22International%20Cyber%20Conflict%20and%20National%20Security%22%2C%22creators%22%3A%5B%7B%22creatorType%22%3A%22editor%22%2C%22firstName%22%3A%22Derek%20S.%22%2C%22lastName%22%3A%22Reveron%22%7D%2C%7B%22creatorType%22%3A%22editor%22%2C%22firstName%22%3A%22Nikolas%20K.%22%2C%22lastName%22%3A%22Gvosdev%22%7D%2C%7B%22creatorType%22%3A%22editor%22%2C%22firstName%22%3A%22John%20A.%22%2C%22lastName%22%3A%22Cloud%22%7D%2C%7B%22creatorType%22%3A%22author%22%2C%22firstName%22%3A%22Ryan%20C.%22%2C%22lastName%22%3A%22Maness%22%7D%2C%7B%22creatorType%22%3A%22author%22%2C%22firstName%22%3A%22Brandon%22%2C%22lastName%22%3A%22Valeriano%22%7D%5D%2C%22abstractNote%22%3A%22Cyber%20conflict%20is%20often%20called%20the%20fifth%20domain%20of%20conflict.%20As%20more%20and%20more%20systems%2C%20networks%2C%20and%20information%20become%20digitized%2C%20there%20is%20contestation%20as%20to%20the%20growing%20nature%20of%20the%20threat%20and%20how%20exactly%20this%20domain%20can%20be%20exploited%20to%20coerce%20the%20enemy%20for%20either%20geopolitical%20or%20financial%20gain.%20Some%20argue%20that%20the%20cyber%20threat%20is%20exponentially%20growing%20and%20that%20offensive%20dominance%20reigns%2C%20making%20cyber%20conflict%20extremely%20unstable.%20Others%20contest%20that%20the%20threat%20is%20overblown%20and%20is%20more%20socially%20constructed.%20In%20this%20chapter%20we%20take%20a%20middle%20ground%20and%20find%20that%20much%20of%20the%20cyber%20conflict%20and%20security%20discourse%20has%20gotten%20it%20wrong%20through%20conjecture%20and%20worst-%20%28or%20best-%29%20case%20scenarios.%20We%20argue%20that%20a%20system%20of%20norms%20must%20be%20built%20upon%20and%20preserved%20to%20keep%20cyberspace%20a%20domain%20of%20relative%20openness%20and%20nonescalation.%20Arms%20races%20and%20deterrence%20strategies%20are%20not%20the%20path%20forward%20for%20a%20secure%2C%20prosperous%20cyberspace.%22%2C%22date%22%3A%222018–01-11%22%2C%22language%22%3A%22en%22%2C%22ISBN%22%3A%22%22%2C%22url%22%3A%22https%3A%5C%2F%5C%2Facademic.oup.com%5C%2Fedited-volume%5C%2F28069%5C%2Fchapter%5C%2F212086513%22%2C%22collections%22%3A%5B%22YLB2M7DD%22%5D%2C%22dateModified%22%3A%222023–11-02T07%3A51%3A07Z%22%7D%7D%2C%7B%22key%22%3A%22KL9RRIV5%22%2C%22library%22%3A%7B%22id%22%3A2359887%7D%2C%22meta%22%3A%7B%22creatorSummary%22%3A%22Morgan%20State%20University%20and%20Buresh%22%2C%22parsedDate%22%3A%222022–03-26%22%2C%22numChildren%22%3A1%7D%2C%22bib%22%3A%22%26lt%3Bdiv%20class%3D%26quot%3Bcsl-bib-body%26quot%3B%20style%3D%26quot%3Bline-height%3A%202%3B%20padding-left%3A%201em%3B%20text-indent%3A-1em%3B%26quot%3B%26gt%3B%5Cn%20%20%26lt%3Bdiv%20class%3D%26quot%3Bcsl-entry%26quot%3B%26gt%3BMorgan%20State%20University%2C%20%26amp%3B%20Buresh%2C%20D.%20L.%20%282022%29.%20In%20Light%20of%20The%20American%20Departure%20From%20Afghanistan%2C%20Does%20Network-Centric%20Warfare%20Adequately%20Prepare%20The%20United%20States%20to%20Address%20Future%20Cyber%20Activities%20by%20The%20Taliban%3F%20%26lt%3Bi%26gt%3BInternational%20Journal%20of%20Social%20Science%20And%20Human%20Research%26lt%3B%5C%2Fi%26gt%3B%2C%20%26lt%3Bi%26gt%3B05%26lt%3B%5C%2Fi%26gt%3B%2803%29.%20%26lt%3Ba%20class%3D%26%23039%3Bzp-DOIURL%26%23039%3B%20href%3D%26%23039%3Bhttps%3A%5C%2F%5C%2Fdoi.org%5C%2F10.47191%5C%2Fijsshr%5C%2Fv5-i3-45%26%23039%3B%26gt%3Bhttps%3A%5C%2F%5C%2Fdoi.org%5C%2F10.47191%5C%2Fijsshr%5C%2Fv5-i3-45%26lt%3B%5C%2Fa%26gt%3B%26lt%3B%5C%2Fdiv%26gt%3B%5Cn%26lt%3B%5C%2Fdiv%26gt%3B%22%2C%22data%22%3A%7B%22itemType%22%3A%22journalArticle%22%2C%22title%22%3A%22In%20Light%20of%20The%20American%20Departure%20From%20Afghanistan%2C%20Does%20Network-Centric%20Warfare%20Adequately%20Prepare%20The%20United%20States%20to%20Address%20Future%20Cyber%20Activities%20by%20The%20Taliban%3F%22%2C%22creators%22%3A%5B%7B%22creatorType%22%3A%22author%22%2C%22name%22%3A%22Morgan%20State%20University%22%7D%2C%7B%22creatorType%22%3A%22author%22%2C%22firstName%22%3A%22Donald%20L.%22%2C%22lastName%22%3A%22Buresh%22%7D%5D%2C%22abstractNote%22%3A%22The%20issue%20considered%20in%20this%20article%20is%20whether%20the%20United%20States%20is%20prepared%20adequately%20to%20address%20the%20cyber%20activities%20of%20the%20Taliban%20in%20the%20future%20in%20light%20of%20the%20recent%20American%20departure%20from%20Afghanistan.%20The%20first%20section%20defines%20and%20discusses%20cyber%20espionage%2C%20cyber%20sabotage%2C%20cyber%20terrorism%2C%20and%20cyber%20warfare.%20The%20following%20section%20outlines%20the%20notion%20of%20network-centric%20warfare%20and%20its%20relationship%20to%20the%20various%20cyber-attacks.%20The%20third%20section%20contains%20a%20brief%20history%20of%20the%20Taliban%2C%20cumulating%20in%20assessing%20the%20current%20political%20situation%20in%20Afghanistan.%20The%20paper%5Cu2019s%20final%20section%20describes%20what%20adequate%20preparedness%20means%20for%20individuals%2C%20corporations%2C%20and%20the%20government.%20The%20paper%20concludes%20that%20the%20Taliban%20are%20not%20likely%20to%20be%20a%20cyber%20threat%20to%20the%20United%20States%20in%20the%20short%20term.%20However%2C%20as%20time%20progresses%20and%20the%20Taliban%20consolidates%20their%20political%20power%2C%20effectively%20defeating%20the%20Islamic%20State%20and%20insurgents%20in%20Panjshir%2C%20the%20United%20States%20will%20likely%20experience%20cyber%20attacks%20from%20the%20Taliban.%22%2C%22date%22%3A%222022–03-26%22%2C%22language%22%3A%22en%22%2C%22DOI%22%3A%2210.47191%5C%2Fijsshr%5C%2Fv5-i3-45%22%2C%22ISSN%22%3A%2226440679%2C%2026440695%22%2C%22url%22%3A%22https%3A%5C%2F%5C%2Fijsshr.in%5C%2Fv5i3%5C%2F45.php%22%2C%22collections%22%3A%5B%22YLB2M7DD%22%5D%2C%22dateModified%22%3A%222023–11-02T07%3A51%3A04Z%22%7D%7D%2C%7B%22key%22%3A%22ACEKHK7X%22%2C%22library%22%3A%7B%22id%22%3A2359887%7D%2C%22meta%22%3A%7B%22creatorSummary%22%3A%22Naha%22%2C%22parsedDate%22%3A%222022–05-01%22%2C%22numChildren%22%3A1%7D%2C%22bib%22%3A%22%26lt%3Bdiv%20class%3D%26quot%3Bcsl-bib-body%26quot%3B%20style%3D%26quot%3Bline-height%3A%202%3B%20padding-left%3A%201em%3B%20text-indent%3A-1em%3B%26quot%3B%26gt%3B%5Cn%20%20%26lt%3Bdiv%20class%3D%26quot%3Bcsl-entry%26quot%3B%26gt%3BNaha%2C%20A.%20%282022%29.%20Emerging%20Cyber%20Security%20Threats%3A%20India%26%23x2019%3Bs%20Concerns%20and%20Options.%20%26lt%3Bi%26gt%3BInternational%20Journal%20of%20Politics%20and%20Security%26lt%3B%5C%2Fi%26gt%3B%2C%20%26lt%3Bi%26gt%3B4%26lt%3B%5C%2Fi%26gt%3B%281%29%2C%20170%26%23x2013%3B200.%20%26lt%3Ba%20class%3D%26%23039%3Bzp-DOIURL%26%23039%3B%20href%3D%26%23039%3Bhttps%3A%5C%2F%5C%2Fdoi.org%5C%2F10.53451%5C%2Fijps.996755%26%23039%3B%26gt%3Bhttps%3A%5C%2F%5C%2Fdoi.org%5C%2F10.53451%5C%2Fijps.996755%26lt%3B%5C%2Fa%26gt%3B%26lt%3B%5C%2Fdiv%26gt%3B%5Cn%26lt%3B%5C%2Fdiv%26gt%3B%22%2C%22data%22%3A%7B%22itemType%22%3A%22journalArticle%22%2C%22title%22%3A%22Emerging%20Cyber%20Security%20Threats%3A%20India%5Cu2019s%20Concerns%20and%20Options%22%2C%22creators%22%3A%5B%7B%22creatorType%22%3A%22author%22%2C%22firstName%22%3A%22Al%5Cu0131k%22%2C%22lastName%22%3A%22Naha%22%7D%5D%2C%22abstractNote%22%3A%22It%20has%20been%20believed%20that%20cyber%20power%2C%20along%20with%20conventional%20aspects%20such%20as%20economic%20resources%20and%20political%20will%2C%20is%20becoming%20a%20key%20component%20of%20national%20power.%20According%20to%20this%20logic%2C%20the%20country%20that%20can%20best%20lead%20and%20control%20cyber%20power%20would%20be%20more%20powerful%20than%20others.%20Cyber%20terrorism%20has%20arisen%20as%20a%20new%20phenomenon%20in%20India%20and%20investigations%20about%20terror%20attacks%20revealed%20the%20cyber%20terrorism%20trials.%20Furthermore%2C%20the%20reliance%20of%20government%20organizations%2C%20businesses%2C%20economic%20operations%2C%20and%20military%20affairs%20on%20Information%20and%20Communication%20Technology%20%28ICT%29%20demands%20the%20inclusion%20of%20cyber%20technology%20in%20strategic%20calculations.%20So%2C%20this%20essay%20recons%20to%20building%20cyber%20power%20capacity%20may%20be%20used%20as%20a%20tool%20of%20Indian%20foreign%20policy%2C%20leveraging%20the%20experience%20and%20human%20resources%20in%20the%20area%2C%20as%20well%20as%20enhancing%20local%20and%20global%20cyber%20cooperation.%22%2C%22date%22%3A%222022–05-01%22%2C%22language%22%3A%22en%22%2C%22DOI%22%3A%2210.53451%5C%2Fijps.996755%22%2C%22ISSN%22%3A%222667–8268%22%2C%22url%22%3A%22http%3A%5C%2F%5C%2Fdergipark.org.tr%5C%2Fen%5C%2Fdoi%5C%2F10.53451%5C%2Fijps.996755%22%2C%22collections%22%3A%5B%22YLB2M7DD%22%5D%2C%22dateModified%22%3A%222023–11-02T07%3A51%3A02Z%22%7D%7D%2C%7B%22key%22%3A%22R76XFJDC%22%2C%22library%22%3A%7B%22id%22%3A2359887%7D%2C%22meta%22%3A%7B%22creatorSummary%22%3A%22Rapaccini%22%2C%22numChildren%22%3A1%7D%2C%22bib%22%3A%22%26lt%3Bdiv%20class%3D%26quot%3Bcsl-bib-body%26quot%3B%20style%3D%26quot%3Bline-height%3A%202%3B%20padding-left%3A%201em%3B%20text-indent%3A-1em%3B%26quot%3B%26gt%3B%5Cn%20%20%26lt%3Bdiv%20class%3D%26quot%3Bcsl-entry%26quot%3B%26gt%3BRapaccini%2C%20M.%20%28n.d.%29.%20%26lt%3Bi%26gt%3BCyberwarfare%3A%20definizioni%2C%20casi%20di%20studio%20e%20analisi%26lt%3B%5C%2Fi%26gt%3B.%26lt%3B%5C%2Fdiv%26gt%3B%5Cn%26lt%3B%5C%2Fdiv%26gt%3B%22%2C%22data%22%3A%7B%22itemType%22%3A%22journalArticle%22%2C%22title%22%3A%22Cyberwarfare%3A%20definizioni%2C%20casi%20di%20studio%20e%20analisi%22%2C%22creators%22%3A%5B%7B%22creatorType%22%3A%22author%22%2C%22firstName%22%3A%22Marco%22%2C%22lastName%22%3A%22Rapaccini%22%7D%5D%2C%22abstractNote%22%3A%22%22%2C%22date%22%3A%22%22%2C%22language%22%3A%22it%22%2C%22DOI%22%3A%22%22%2C%22ISSN%22%3A%22%22%2C%22url%22%3A%22%22%2C%22collections%22%3A%5B%22YLB2M7DD%22%5D%2C%22dateModified%22%3A%222023–11-02T07%3A50%3A59Z%22%7D%7D%2C%7B%22key%22%3A%226CG9QXEH%22%2C%22library%22%3A%7B%22id%22%3A2359887%7D%2C%22meta%22%3A%7B%22creatorSummary%22%3A%22Zeadally%20and%20Flowers%22%2C%22parsedDate%22%3A%222014%22%2C%22numChildren%22%3A1%7D%2C%22bib%22%3A%22%26lt%3Bdiv%20class%3D%26quot%3Bcsl-bib-body%26quot%3B%20style%3D%26quot%3Bline-height%3A%202%3B%20padding-left%3A%201em%3B%20text-indent%3A-1em%3B%26quot%3B%26gt%3B%5Cn%20%20%26lt%3Bdiv%20class%3D%26quot%3Bcsl-entry%26quot%3B%26gt%3BZeadally%2C%20S.%2C%20%26amp%3B%20Flowers%2C%20A.%20%282014%29.%20Cyberwar%3A%20The%20What%2C%20When%2C%20Why%2C%20and%20How%20%5BCommentary%5D.%20%26lt%3Bi%26gt%3BIEEE%20Technology%20and%20Society%20Magazine%26lt%3B%5C%2Fi%26gt%3B%2C%20%26lt%3Bi%26gt%3B33%26lt%3B%5C%2Fi%26gt%3B%283%29%2C%2014%26%23x2013%3B21.%20%26lt%3Ba%20class%3D%26%23039%3Bzp-DOIURL%26%23039%3B%20href%3D%26%23039%3Bhttps%3A%5C%2F%5C%2Fdoi.org%5C%2F10.1109%5C%2FMTS.2014.2345196%26%23039%3B%26gt%3Bhttps%3A%5C%2F%5C%2Fdoi.org%5C%2F10.1109%5C%2FMTS.2014.2345196%26lt%3B%5C%2Fa%26gt%3B%26lt%3B%5C%2Fdiv%26gt%3B%5Cn%26lt%3B%5C%2Fdiv%26gt%3B%22%2C%22data%22%3A%7B%22itemType%22%3A%22journalArticle%22%2C%22title%22%3A%22Cyberwar%3A%20The%20What%2C%20When%2C%20Why%2C%20and%20How%20%5BCommentary%5D%22%2C%22creators%22%3A%5B%7B%22creatorType%22%3A%22author%22%2C%22firstName%22%3A%22Sherali%22%2C%22lastName%22%3A%22Zeadally%22%7D%2C%7B%22creatorType%22%3A%22author%22%2C%22firstName%22%3A%22Angelyn%22%2C%22lastName%22%3A%22Flowers%22%7D%5D%2C%22abstractNote%22%3A%22%22%2C%22date%22%3A%2223%5C%2F2014%22%2C%22language%22%3A%22en%22%2C%22DOI%22%3A%2210.1109%5C%2FMTS.2014.2345196%22%2C%22ISSN%22%3A%220278–0097%22%2C%22url%22%3A%22https%3A%5C%2F%5C%2Fieeexplore.ieee.org%5C%2Fdocument%5C%2F6901336%22%2C%22collections%22%3A%5B%22YLB2M7DD%22%5D%2C%22dateModified%22%3A%222023–11-02T07%3A50%3A57Z%22%7D%7D%2C%7B%22key%22%3A%22SMA2JJSX%22%2C%22library%22%3A%7B%22id%22%3A2359887%7D%2C%22meta%22%3A%7B%22creatorSummary%22%3A%22Cornish%20et%20al.%22%2C%22parsedDate%22%3A%222009%22%2C%22numChildren%22%3A1%7D%2C%22bib%22%3A%22%26lt%3Bdiv%20class%3D%26quot%3Bcsl-bib-body%26quot%3B%20style%3D%26quot%3Bline-height%3A%202%3B%20padding-left%3A%201em%3B%20text-indent%3A-1em%3B%26quot%3B%26gt%3B%5Cn%20%20%26lt%3Bdiv%20class%3D%26quot%3Bcsl-entry%26quot%3B%26gt%3BCornish%2C%20P.%2C%20Hughes%2C%20R.%2C%20%26amp%3B%20Livingstone%2C%20D.%20%282009%29.%20%26lt%3Bi%26gt%3BCyberspace%20and%20the%20national%20security%20of%20the%20United%20Kingdom%3A%20threats%20and%20responses%26lt%3B%5C%2Fi%26gt%3B.%20Chatham%20House.%26lt%3B%5C%2Fdiv%26gt%3B%5Cn%26lt%3B%5C%2Fdiv%26gt%3B%22%2C%22data%22%3A%7B%22itemType%22%3A%22book%22%2C%22title%22%3A%22Cyberspace%20and%20the%20national%20security%20of%20the%20United%20Kingdom%3A%20threats%20and%20responses%22%2C%22creators%22%3A%5B%7B%22creatorType%22%3A%22author%22%2C%22firstName%22%3A%22Paul%22%2C%22lastName%22%3A%22Cornish%22%7D%2C%7B%22creatorType%22%3A%22author%22%2C%22firstName%22%3A%22Rex%22%2C%22lastName%22%3A%22Hughes%22%7D%2C%7B%22creatorType%22%3A%22author%22%2C%22firstName%22%3A%22David%22%2C%22lastName%22%3A%22Livingstone%22%7D%5D%2C%22abstractNote%22%3A%22%22%2C%22date%22%3A%222009%22%2C%22language%22%3A%22en%22%2C%22ISBN%22%3A%22978–1‑86203–215‑6%22%2C%22url%22%3A%22%22%2C%22collections%22%3A%5B%22YLB2M7DD%22%5D%2C%22dateModified%22%3A%222023–11-02T07%3A50%3A55Z%22%7D%7D%2C%7B%22key%22%3A%22Q5XW7GTK%22%2C%22library%22%3A%7B%22id%22%3A2359887%7D%2C%22meta%22%3A%7B%22creatorSummary%22%3A%22Csec%22%2C%22numChildren%22%3A1%7D%2C%22bib%22%3A%22%26lt%3Bdiv%20class%3D%26quot%3Bcsl-bib-body%26quot%3B%20style%3D%26quot%3Bline-height%3A%202%3B%20padding-left%3A%201em%3B%20text-indent%3A-1em%3B%26quot%3B%26gt%3B%5Cn%20%20%26lt%3Bdiv%20class%3D%26quot%3Bcsl-entry%26quot%3B%26gt%3BCsec%2C%20T.%20P.%20%28n.d.%29.%20%26lt%3Bi%26gt%3BRunning%20Head%3A%20AFRICA%2C%20EUROPE%2C%20AND%20MIDDLE%20EAST%20THREAT%20ASSESSMENT%26lt%3B%5C%2Fi%26gt%3B.%26lt%3B%5C%2Fdiv%26gt%3B%5Cn%26lt%3B%5C%2Fdiv%26gt%3B%22%2C%22data%22%3A%7B%22itemType%22%3A%22journalArticle%22%2C%22title%22%3A%22Running%20Head%3A%20AFRICA%2C%20EUROPE%2C%20AND%20MIDDLE%20EAST%20THREAT%20ASSESSMENT%22%2C%22creators%22%3A%5B%7B%22creatorType%22%3A%22author%22%2C%22firstName%22%3A%22Tracey%20Petropol%22%2C%22lastName%22%3A%22Csec%22%7D%5D%2C%22abstractNote%22%3A%22Cybersecurity%20threats%20in%20Africa%2C%20Europe%2C%20Middle%20East%2C%20and%20other%20countries%20are%20assessed%20for%20hostile%20activity.%20Global%20security%20cultural%20differences%2C%20influences%2C%20and%20ethical%20principles%20are%20evaluated%20against%20the%20social%20issues%20which%20affect%20regional%20security%20practices.%20These%20threats%20are%20linked%20to%20national%20sources%20as%20described%20in%20this%20paper.%20Global%20cybersecurity%20policy%20practices%20are%20examined%20and%20the%20comprehensive%20role%20international%20organizations%20play%20to%20enhance%20strategies%20over%20the%20next%20decade.%20Nations%20discussed%20in%20this%20paper%20are%20studied%20for%20their%20lack%20of%20willingness%20and%20interest%20to%20engage%20in%20identifying%20domestic%20cybersecurity%20issues.%20Perspectives%20on%20legal%20issues%20and%20privacy%20as%20they%20relate%20to%20why%20some%20countries%20take%20stronger%20action%20against%20entities%20for%20cyber%20threats%20are%20also%20examined.%22%2C%22date%22%3A%22%22%2C%22language%22%3A%22en%22%2C%22DOI%22%3A%22%22%2C%22ISSN%22%3A%22%22%2C%22url%22%3A%22%22%2C%22collections%22%3A%5B%22YLB2M7DD%22%5D%2C%22dateModified%22%3A%222023–11-02T07%3A50%3A49Z%22%7D%7D%2C%7B%22key%22%3A%22VY62ZERW%22%2C%22library%22%3A%7B%22id%22%3A2359887%7D%2C%22meta%22%3A%7B%22creatorSummary%22%3A%22Mukherjee%22%2C%22parsedDate%22%3A%222019%22%2C%22numChildren%22%3A1%7D%2C%22bib%22%3A%22%26lt%3Bdiv%20class%3D%26quot%3Bcsl-bib-body%26quot%3B%20style%3D%26quot%3Bline-height%3A%202%3B%20padding-left%3A%201em%3B%20text-indent%3A-1em%3B%26quot%3B%26gt%3B%5Cn%20%20%26lt%3Bdiv%20class%3D%26quot%3Bcsl-entry%26quot%3B%26gt%3BMukherjee%2C%20S.%20%282019%29.%20Cyber%20Warfare%20and%20Implications.%20%26lt%3Bi%26gt%3BSSRN%20Electronic%20Journal%26lt%3B%5C%2Fi%26gt%3B.%20%26lt%3Ba%20class%3D%26%23039%3Bzp-DOIURL%26%23039%3B%20href%3D%26%23039%3Bhttps%3A%5C%2F%5C%2Fdoi.org%5C%2F10.2139%5C%2Fssrn.3431676%26%23039%3B%26gt%3Bhttps%3A%5C%2F%5C%2Fdoi.org%5C%2F10.2139%5C%2Fssrn.3431676%26lt%3B%5C%2Fa%26gt%3B%26lt%3B%5C%2Fdiv%26gt%3B%5Cn%26lt%3B%5C%2Fdiv%26gt%3B%22%2C%22data%22%3A%7B%22itemType%22%3A%22journalArticle%22%2C%22title%22%3A%22Cyber%20Warfare%20and%20Implications%22%2C%22creators%22%3A%5B%7B%22creatorType%22%3A%22author%22%2C%22firstName%22%3A%22Sourav%22%2C%22lastName%22%3A%22Mukherjee%22%7D%5D%2C%22abstractNote%22%3A%22Cyberwarfare%20encompasses%20the%20actions%20by%20any%20international%20organization%20to%20attack%20and%20try%20to%20cause%20damage%20to%20another%20nation%26%23039%3Bs%20infrastructure%2C%20computers%20or%20information%20systems%20through%20computer%20viruses%20or%20denial-of-service%20%28DOS%29%20attacks.%20Cyberwarfare%20is%20also%20known%20as%20the%20use%20or%20affecting%20in%20a%20battlespace%20or%20warfare%20in%20the%20background%20of%20computers%2C%20online%20control%20systems%20%28IoTs%29%2C%20and%20networks.%20It%20comprises%20both%20aggressive%20and%20distrustful%20operations%20relating%20to%20the%20danger%20of%20cyberattacks%2C%20espionage%2C%20and%20collateral%5C%2F%20other%20damage.%20There%20are%20controversy%20and%20argument%20over%20whether%20such%20operations%20can%20be%20termed%20as%20a%20%26quot%3Bwar%26quot%3B.%20Transnational%20cyber-security%20is%20an%20increasingly%20persistent%20issue%20for%20leading%20national%20world%20powers.%20Existing%20professionals%20are%20not%20wellresourced%20to%20deal%20with%20the%20continuous%20change%20in%20the%20cybersecurity%20field%2C%20due%20to%20an%20absence%20of%20detailed%20knowledge%20in%20the%20field.%20The%20United%20States%20is%20not%20only%20just%20a%20gigantic%20target%20for%20these%20cyber-attacks%20but%20also%20a%20leading%20offender.%20Regardless%20of%20several%20cyberattacks%20also%2C%20the%20nation%20is%20failed%20to%20take%20the%20appropriate%20measures%20to%20defend%20against%20the%20modern%20age%20crime%20-%20cyberwarfare.%22%2C%22date%22%3A%222019%22%2C%22language%22%3A%22en%22%2C%22DOI%22%3A%2210.2139%5C%2Fssrn.3431676%22%2C%22ISSN%22%3A%221556–5068%22%2C%22url%22%3A%22https%3A%5C%2F%5C%2Fwww.ssrn.com%5C%2Fabstract%3D3431676%22%2C%22collections%22%3A%5B%22YLB2M7DD%22%5D%2C%22dateModified%22%3A%222023–11-02T07%3A50%3A47Z%22%7D%7D%2C%7B%22key%22%3A%22JP9LS4JQ%22%2C%22library%22%3A%7B%22id%22%3A2359887%7D%2C%22meta%22%3A%7B%22parsedDate%22%3A%222022–07-31%22%2C%22numChildren%22%3A1%7D%2C%22bib%22%3A%22%26lt%3Bdiv%20class%3D%26quot%3Bcsl-bib-body%26quot%3B%20style%3D%26quot%3Bline-height%3A%202%3B%20padding-left%3A%201em%3B%20text-indent%3A-1em%3B%26quot%3B%26gt%3B%5Cn%20%20%26lt%3Bdiv%20class%3D%26quot%3Bcsl-entry%26quot%3B%26gt%3BCyber%20threats%3A%20taxonomy%2C%20impact%2C%20policies%2C%20and%20way%20forward.%20%282022%29.%20%26lt%3Bi%26gt%3BKSII%20Transactions%20on%20Internet%20and%20Information%20Systems%26lt%3B%5C%2Fi%26gt%3B%2C%20%26lt%3Bi%26gt%3B16%26lt%3B%5C%2Fi%26gt%3B%287%29.%20%26lt%3Ba%20class%3D%26%23039%3Bzp-DOIURL%26%23039%3B%20href%3D%26%23039%3Bhttps%3A%5C%2F%5C%2Fdoi.org%5C%2F10.3837%5C%2Ftiis.2022.07.017%26%23039%3B%26gt%3Bhttps%3A%5C%2F%5C%2Fdoi.org%5C%2F10.3837%5C%2Ftiis.2022.07.017%26lt%3B%5C%2Fa%26gt%3B%26lt%3B%5C%2Fdiv%26gt%3B%5Cn%26lt%3B%5C%2Fdiv%26gt%3B%22%2C%22data%22%3A%7B%22itemType%22%3A%22journalArticle%22%2C%22title%22%3A%22Cyber%20threats%3A%20taxonomy%2C%20impact%2C%20policies%2C%20and%20way%20forward%22%2C%22creators%22%3A%5B%5D%2C%22abstractNote%22%3A%22The%20continuous%20evolution%20and%20proliferation%20of%20computer%20technology%20and%20our%20increasing%20dependence%20on%20computer%20technology%20have%20created%20a%20new%20class%20of%20threats%3A%20%26quot%3Bcyber%20threats.%26quot%3B%20These%20threats%20can%20be%20defined%20as%20activities%20that%20can%20undermine%20a%20society%26%23039%3Bs%20ability%20to%20maintain%20internal%20or%20external%20order%20while%20using%20information%20technology.%20Cyber%20threats%20can%20be%20mainly%20divided%20into%20two%20categories%2C%20namely%20cyber-terrorism%20and%20cyber-warfare.%20A%20variety%20of%20malware%20programs%20are%20often%20used%20as%20a%20primary%20weapon%20in%20these%20cyber%20threats.%20A%20significant%20amount%20of%20research%20work%20has%20been%20published%20covering%20different%20aspects%20of%20cyber%20threats%2C%20their%20countermeasures%2C%20and%20the%20policy-making%20for%20cyber%20laws.%20This%20article%20aims%20to%20review%20the%20research%20conducted%20in%20various%20important%20aspects%20of%20cyber%20threats%20and%20provides%20synthesized%20information%20regarding%20the%20fundamentals%20of%20cyber%20threats%3B%20discusses%20the%20countermeasures%20for%20such%20threats%3B%20provides%20relevant%20details%20of%20high-profile%20cyber-attacks%3B%20discusses%20the%20developments%20in%20global%20policymaking%20for%20cyber%20laws%2C%20and%20lastly%20presents%20promising%20future%20directions%20in%20this%20area.%22%2C%22date%22%3A%222022–7‑31%22%2C%22language%22%3A%22en%22%2C%22DOI%22%3A%2210.3837%5C%2Ftiis.2022.07.017%22%2C%22ISSN%22%3A%2219767277%22%2C%22url%22%3A%22http%3A%5C%2F%5C%2Fitiis.org%5C%2Fdigital-library%5C%2F25850%22%2C%22collections%22%3A%5B%22YLB2M7DD%22%5D%2C%22dateModified%22%3A%222023–11-02T07%3A50%3A45Z%22%7D%7D%2C%7B%22key%22%3A%22XSDG9SBS%22%2C%22library%22%3A%7B%22id%22%3A2359887%7D%2C%22meta%22%3A%7B%22creatorSummary%22%3A%22Hejase%20et%20al.%22%2C%22parsedDate%22%3A%222021–03-10%22%2C%22numChildren%22%3A1%7D%2C%22bib%22%3A%22%26lt%3Bdiv%20class%3D%26quot%3Bcsl-bib-body%26quot%3B%20style%3D%26quot%3Bline-height%3A%202%3B%20padding-left%3A%201em%3B%20text-indent%3A-1em%3B%26quot%3B%26gt%3B%5Cn%20%20%26lt%3Bdiv%20class%3D%26quot%3Bcsl-entry%26quot%3B%26gt%3BHejase%2C%20H.%20J.%2C%20Fayyad-Kazan%2C%20H.%20F.%2C%20Hejase%2C%20A.%20J.%2C%20%26amp%3B%20Moukadem%2C%20I.%20A.%20%282021%29.%20Cyber%20Security%20amid%20COVID-19.%20%26lt%3Bi%26gt%3BComputer%20and%20Information%20Science%26lt%3B%5C%2Fi%26gt%3B%2C%20%26lt%3Bi%26gt%3B14%26lt%3B%5C%2Fi%26gt%3B%282%29%2C%2010.%20%26lt%3Ba%20class%3D%26%23039%3Bzp-DOIURL%26%23039%3B%20href%3D%26%23039%3Bhttps%3A%5C%2F%5C%2Fdoi.org%5C%2F10.5539%5C%2Fcis.v14n2p10%26%23039%3B%26gt%3Bhttps%3A%5C%2F%5C%2Fdoi.org%5C%2F10.5539%5C%2Fcis.v14n2p10%26lt%3B%5C%2Fa%26gt%3B%26lt%3B%5C%2Fdiv%26gt%3B%5Cn%26lt%3B%5C%2Fdiv%26gt%3B%22%2C%22data%22%3A%7B%22itemType%22%3A%22journalArticle%22%2C%22title%22%3A%22Cyber%20Security%20amid%20COVID-19%22%2C%22creators%22%3A%5B%7B%22creatorType%22%3A%22author%22%2C%22firstName%22%3A%22Hussin%20J.%22%2C%22lastName%22%3A%22Hejase%22%7D%2C%7B%22creatorType%22%3A%22author%22%2C%22firstName%22%3A%22Hasan%20F.%22%2C%22lastName%22%3A%22Fayyad-Kazan%22%7D%2C%7B%22creatorType%22%3A%22author%22%2C%22firstName%22%3A%22Ale%20J.%22%2C%22lastName%22%3A%22Hejase%22%7D%2C%7B%22creatorType%22%3A%22author%22%2C%22firstName%22%3A%22Imad%20A.%22%2C%22lastName%22%3A%22Moukadem%22%7D%5D%2C%22abstractNote%22%3A%22COVID-19%20pandemic%20obliged%20thousands%20of%20companies%20pertaining%20to%20all%20economic%20sectors%20to%20undergo%20the%20transformation%20from%20on-board%20work%20to%20working%20from%20home.%20Along%20such%20rush%2C%20the%20probability%20for%20companies%20being%20hacked%20incremented%20many%20folds.%20According%20to%20VMware%20cybersecurity%20strategist%20Tom%20Kellermann%2C%20quoted%20in%20Menn%20%282020%29%2C%20%5Cu2015There%20is%20a%20digitally%20historic%20event%20occurring%20in%20the%20background%20of%20this%20pandemic%2C%20and%20that%20is%20there%20is%20a%20cybercrime%20pandemic%20that%20is%20occurring%5Cu2016%20%28para%205%29.%20In%20fact%2C%20Software%20and%20security%20company%20VMware%20Carbon%20Black%20declared%20during%20April%2C%20%5Cu2015that%20ransomware%20attacks%20it%20monitored%20jumped%20148%25%20in%20March%20from%20the%20previous%20month%2C%20as%20governments%20worldwide%20curbed%20movement%20to%20slow%20the%20spread%20of%20the%20novel%20corona%20virus%5Cu2016%20%28Para%204%29.%20On%20the%20other%20hand%2C%20Anft%20%282020%29%20reported%20that%20%5Cu2015more%20than%20500%20educational%20institutions%2C%20including%20colleges%20and%20K-12%20schools%2C%20faced%20ransom%20attacks%20in%202019%5Cu2016%20%28para%202%29.%20This%20paper%20uses%20a%20descriptive%20qualitative%20approach%20to%20shed%20light%20on%20the%20aforementioned%20subject%20depending%20on%20reported%20secondary%20literature%20about%20the%20topic%2C%20and%20offers%20an%20analysis%20to%20pinpoint%20weaknesses%20and%20barriers%2C%20as%20well%20as%20best%20practices%20to%20counterattack%20the%20breaches%20to%20cybersecurity%20in%20organizations.%20The%20outcomes%20serve%20as%20an%20eye%20opener%20for%20security%20officers%20in%20charge%20of%20the%20safety%20of%20organizational%20intellectual%20properties%20and%20stimulates%20organizations%20to%20adopt%20protection%20systems%20and%20safety%20practices.%22%2C%22date%22%3A%222021–03-10%22%2C%22language%22%3A%22en%22%2C%22DOI%22%3A%2210.5539%5C%2Fcis.v14n2p10%22%2C%22ISSN%22%3A%221913–8997%2C%201913–8989%22%2C%22url%22%3A%22http%3A%5C%2F%5C%2Fwww.ccsenet.org%5C%2Fjournal%5C%2Findex.php%5C%2Fcis%5C%2Farticle%5C%2Fview%5C%2F0%5C%2F44880%22%2C%22collections%22%3A%5B%22YLB2M7DD%22%5D%2C%22dateModified%22%3A%222023–11-02T07%3A50%3A42Z%22%7D%7D%2C%7B%22key%22%3A%224YV6CXIA%22%2C%22library%22%3A%7B%22id%22%3A2359887%7D%2C%22meta%22%3A%7B%22creatorSummary%22%3A%22Nycyk%22%2C%22numChildren%22%3A1%7D%2C%22bib%22%3A%22%26lt%3Bdiv%20class%3D%26quot%3Bcsl-bib-body%26quot%3B%20style%3D%26quot%3Bline-height%3A%202%3B%20padding-left%3A%201em%3B%20text-indent%3A-1em%3B%26quot%3B%26gt%3B%5Cn%20%20%26lt%3Bdiv%20class%3D%26quot%3Bcsl-entry%26quot%3B%26gt%3BNycyk%2C%20M.%20%28n.d.%29.%20%26lt%3Bi%26gt%3BComputer%20Hackers%20and%20Hacking%3A%26lt%3B%5C%2Fi%26gt%3B%26lt%3B%5C%2Fdiv%26gt%3B%5Cn%26lt%3B%5C%2Fdiv%26gt%3B%22%2C%22data%22%3A%7B%22itemType%22%3A%22journalArticle%22%2C%22title%22%3A%22Computer%20Hackers%20and%20Hacking%3A%22%2C%22creators%22%3A%5B%7B%22creatorType%22%3A%22author%22%2C%22firstName%22%3A%22Michael%22%2C%22lastName%22%3A%22Nycyk%22%7D%5D%2C%22abstractNote%22%3A%22%22%2C%22date%22%3A%22%22%2C%22language%22%3A%22en%22%2C%22DOI%22%3A%22%22%2C%22ISSN%22%3A%22%22%2C%22url%22%3A%22%22%2C%22collections%22%3A%5B%22YLB2M7DD%22%5D%2C%22dateModified%22%3A%222023–11-02T07%3A50%3A39Z%22%7D%7D%2C%7B%22key%22%3A%22IMRALT8Y%22%2C%22library%22%3A%7B%22id%22%3A2359887%7D%2C%22meta%22%3A%7B%22creatorSummary%22%3A%22Wilson%22%2C%22numChildren%22%3A1%7D%2C%22bib%22%3A%22%26lt%3Bdiv%20class%3D%26quot%3Bcsl-bib-body%26quot%3B%20style%3D%26quot%3Bline-height%3A%202%3B%20padding-left%3A%201em%3B%20text-indent%3A-1em%3B%26quot%3B%26gt%3B%5Cn%20%20%26lt%3Bdiv%20class%3D%26quot%3Bcsl-entry%26quot%3B%26gt%3BWilson%2C%20C.%20%28n.d.%29.%20%26lt%3Bi%26gt%3BBotnets%2C%20Cybercrime%2C%20and%20Cyberterrorism%3A%20Vulnerabilities%20and%20Policy%20Issues%20for%20Congress%26lt%3B%5C%2Fi%26gt%3B.%26lt%3B%5C%2Fdiv%26gt%3B%5Cn%26lt%3B%5C%2Fdiv%26gt%3B%22%2C%22data%22%3A%7B%22itemType%22%3A%22journalArticle%22%2C%22title%22%3A%22Botnets%2C%20Cybercrime%2C%20and%20Cyberterrorism%3A%20Vulnerabilities%20and%20Policy%20Issues%20for%20Congress%22%2C%22creators%22%3A%5B%7B%22creatorType%22%3A%22author%22%2C%22firstName%22%3A%22Clay%22%2C%22lastName%22%3A%22Wilson%22%7D%5D%2C%22abstractNote%22%3A%22Cybercrime%20is%20becoming%20more%20organized%20and%20established%20as%20a%20transnational%20business.%20High%20technology%20online%20skills%20are%20now%20available%20for%20rent%20to%20a%20variety%20of%20customers%2C%20possibly%20including%20nation%20states%2C%20or%20individuals%20and%20groups%20that%20could%20secretly%20represent%20terrorist%20groups.%20The%20increased%20use%20of%20automated%20attack%20tools%20by%20cybercriminals%20has%20overwhelmed%20some%20current%20methodologies%20used%20for%20tracking%20Internet%20cyberattacks%2C%20and%20vulnerabilities%20of%20the%20U.S.%20critical%20infrastructure%2C%20which%20are%20acknowledged%20openly%20in%20publications%2C%20could%20possibly%20attract%20cyberattacks%20to%20extort%20money%2C%20or%20damage%20the%20U.S.%20economy%20to%20affect%20national%20security.%22%2C%22date%22%3A%22%22%2C%22language%22%3A%22en%22%2C%22DOI%22%3A%22%22%2C%22ISSN%22%3A%22%22%2C%22url%22%3A%22%22%2C%22collections%22%3A%5B%22YLB2M7DD%22%5D%2C%22dateModified%22%3A%222023–11-02T07%3A50%3A33Z%22%7D%7D%2C%7B%22key%22%3A%22HPQUEIFL%22%2C%22library%22%3A%7B%22id%22%3A2359887%7D%2C%22meta%22%3A%7B%22creatorSummary%22%3A%22De%20Matos%20Alves%22%2C%22parsedDate%22%3A%222015–08-20%22%2C%22numChildren%22%3A1%7D%2C%22bib%22%3A%22%26lt%3Bdiv%20class%3D%26quot%3Bcsl-bib-body%26quot%3B%20style%3D%26quot%3Bline-height%3A%202%3B%20padding-left%3A%201em%3B%20text-indent%3A-1em%3B%26quot%3B%26gt%3B%5Cn%20%20%26lt%3Bdiv%20class%3D%26quot%3Bcsl-entry%26quot%3B%26gt%3BDe%20Matos%20Alves%2C%20A.%20%282015%29.%20Between%20the%20%26%23x201C%3BBattlefield%26%23x201D%3B%20Metaphor%20and%20Promises%20of%20Generativity%3A%20Contrasting%20Discourses%20on%20Cyberconflict.%20%26lt%3Bi%26gt%3BCanadian%20Journal%20of%20Communication%26lt%3B%5C%2Fi%26gt%3B%2C%20%26lt%3Bi%26gt%3B40%26lt%3B%5C%2Fi%26gt%3B%283%29%2C%20389%26%23x2013%3B406.%20%26lt%3Ba%20class%3D%26%23039%3Bzp-DOIURL%26%23039%3B%20href%3D%26%23039%3Bhttps%3A%5C%2F%5C%2Fdoi.org%5C%2F10.22230%5C%2Fcjc.2015v40n3a2742%26%23039%3B%26gt%3Bhttps%3A%5C%2F%5C%2Fdoi.org%5C%2F10.22230%5C%2Fcjc.2015v40n3a2742%26lt%3B%5C%2Fa%26gt%3B%26lt%3B%5C%2Fdiv%26gt%3B%5Cn%26lt%3B%5C%2Fdiv%26gt%3B%22%2C%22data%22%3A%7B%22itemType%22%3A%22journalArticle%22%2C%22title%22%3A%22Between%20the%20%5Cu201cBattlefield%5Cu201d%20Metaphor%20and%20Promises%20of%20Generativity%3A%20Contrasting%20Discourses%20on%20Cyberconflict%22%2C%22creators%22%3A%5B%7B%22creatorType%22%3A%22author%22%2C%22firstName%22%3A%22Artur%22%2C%22lastName%22%3A%22De%20Matos%20Alves%22%7D%5D%2C%22abstractNote%22%3A%22This%20article%20proposes%20a%20theoretical%20assessment%20of%20discourses%20on%20cybercon%5Cufb02ict%2C%20and%20of%20their%20relation%20to%20the%20current%20perception%20of%20the%20state%20of%20cyberspace.%20By%20contrasting%20the%20%5Cu201cbattle%5Cufb01eld%5Cu201d%20approaches%20to%20cybercon%5Cufb02ict%20with%20theoretical%20and%20factual%20materials%20on%20its%20social%20and%20political%20impacts%2C%20this%20article%20suggests%20that%20the%20%5Cu201cbattle%5Cufb01eld%5Cu201d%20terminology%20frames%20the%20discussion%20of%20online%20security%20within%20a%20drive%20for%20the%20%5Cu201cmilitarization%5Cu201d%20of%20cyberspace.%20It%20concludes%20by%20presenting%20generativity-based%20perspectives%20as%20a%20contribution%20towards%20addressing%20contemporary%20challenges%20to%20network%20politics%20in%20cybercon%5Cufb02ict%20theoretical%20frameworks.%22%2C%22date%22%3A%222015–08-20%22%2C%22language%22%3A%22en%22%2C%22DOI%22%3A%2210.22230%5C%2Fcjc.2015v40n3a2742%22%2C%22ISSN%22%3A%220705–3657%2C%201499–6642%22%2C%22url%22%3A%22https%3A%5C%2F%5C%2Fcjc.utpjournals.press%5C%2Fdoi%5C%2F10.22230%5C%2Fcjc.2015v40n3a2742%22%2C%22collections%22%3A%5B%22YLB2M7DD%22%5D%2C%22dateModified%22%3A%222023–11-02T07%3A50%3A31Z%22%7D%7D%2C%7B%22key%22%3A%22NB5CEYPH%22%2C%22library%22%3A%7B%22id%22%3A2359887%7D%2C%22meta%22%3A%7B%22creatorSummary%22%3A%22Urquhart%20and%20McAuley%22%2C%22parsedDate%22%3A%222018%22%2C%22numChildren%22%3A1%7D%2C%22bib%22%3A%22%26lt%3Bdiv%20class%3D%26quot%3Bcsl-bib-body%26quot%3B%20style%3D%26quot%3Bline-height%3A%202%3B%20padding-left%3A%201em%3B%20text-indent%3A-1em%3B%26quot%3B%26gt%3B%5Cn%20%20%26lt%3Bdiv%20class%3D%26quot%3Bcsl-entry%26quot%3B%26gt%3BUrquhart%2C%20L.%2C%20%26amp%3B%20McAuley%2C%20D.%20%282018%29.%20Avoiding%20the%20internet%20of%20insecure%20industrial%20things.%20%26lt%3Bi%26gt%3BComputer%20Law%20%26amp%3B%20Security%20Review%26lt%3B%5C%2Fi%26gt%3B%2C%20%26lt%3Bi%26gt%3B34%26lt%3B%5C%2Fi%26gt%3B%283%29%2C%20450%26%23x2013%3B466.%20%26lt%3Ba%20class%3D%26%23039%3Bzp-DOIURL%26%23039%3B%20href%3D%26%23039%3Bhttps%3A%5C%2F%5C%2Fdoi.org%5C%2F10.1016%5C%2Fj.clsr.2017.12.004%26%23039%3B%26gt%3Bhttps%3A%5C%2F%5C%2Fdoi.org%5C%2F10.1016%5C%2Fj.clsr.2017.12.004%26lt%3B%5C%2Fa%26gt%3B%26lt%3B%5C%2Fdiv%26gt%3B%5Cn%26lt%3B%5C%2Fdiv%26gt%3B%22%2C%22data%22%3A%7B%22itemType%22%3A%22journalArticle%22%2C%22title%22%3A%22Avoiding%20the%20internet%20of%20insecure%20industrial%20things%22%2C%22creators%22%3A%5B%7B%22creatorType%22%3A%22author%22%2C%22firstName%22%3A%22Lachlan%22%2C%22lastName%22%3A%22Urquhart%22%7D%2C%7B%22creatorType%22%3A%22author%22%2C%22firstName%22%3A%22Derek%22%2C%22lastName%22%3A%22McAuley%22%7D%5D%2C%22abstractNote%22%3A%22Security%20incidents%20such%20as%20targeted%20distributed%20denial%20of%20service%20%28DDoS%29%20attacks%20on%20power%20grids%20and%20hacking%20of%20factory%20industrial%20control%20systems%20%28ICS%29%20are%20on%20the%20increase.%20This%20paper%20unpacks%20where%20emerging%20security%20risks%20lie%20for%20the%20industrial%20internet%20of%20things%2C%20drawing%20on%20both%20technical%20and%20regulatory%20perspectives.%20Legal%20changes%20are%20being%20ushered%20by%20the%20European%20Union%20%28EU%29%20Network%20and%20Information%20Security%20%28NIS%29%20Directive%202016%20and%20the%20General%20Data%20Protection%20Regulation%202016%20%28GDPR%29%20%28both%20to%20be%20enforced%20from%20May%202018%29.%20We%20use%20the%20case%20study%20of%20the%20emergent%20smart%20energy%20supply%20chain%20to%20frame%2C%20scope%20out%20and%20consolidate%20the%20breadth%20of%20security%20concerns%20at%20play%2C%20and%20the%20regulatory%20responses.%20We%20argue%20the%20industrial%20IoT%20brings%20four%20security%20concerns%20to%20the%20fore%2C%20namely%3A%20appreciating%20the%20shift%20from%20offline%20to%20online%20infrastructure%3B%20managing%20temporal%20dimensions%20of%20security%3B%20addressing%20the%20implementation%20gap%20for%20best%20practice%3B%20and%20engaging%20with%20infrastructural%20complexity.%20Our%20goal%20is%20to%20surface%20risks%20and%20foster%20dialogue%20to%20avoid%20the%20emergence%20of%20an%20Internet%20of%20Insecure%20Industrial%20Things.%22%2C%22date%22%3A%2206%5C%2F2018%22%2C%22language%22%3A%22en%22%2C%22DOI%22%3A%2210.1016%5C%2Fj.clsr.2017.12.004%22%2C%22ISSN%22%3A%2202673649%22%2C%22url%22%3A%22https%3A%5C%2F%5C%2Flinkinghub.elsevier.com%5C%2Fretrieve%5C%2Fpii%5C%2FS0267364917303217%22%2C%22collections%22%3A%5B%22YLB2M7DD%22%5D%2C%22dateModified%22%3A%222023–11-02T07%3A50%3A29Z%22%7D%7D%2C%7B%22key%22%3A%22XRDWBU3N%22%2C%22library%22%3A%7B%22id%22%3A2359887%7D%2C%22meta%22%3A%7B%22creatorSummary%22%3A%22Eilstrup-Sangiovanni%22%2C%22parsedDate%22%3A%222018%22%2C%22numChildren%22%3A1%7D%2C%22bib%22%3A%22%26lt%3Bdiv%20class%3D%26quot%3Bcsl-bib-body%26quot%3B%20style%3D%26quot%3Bline-height%3A%202%3B%20padding-left%3A%201em%3B%20text-indent%3A-1em%3B%26quot%3B%26gt%3B%5Cn%20%20%26lt%3Bdiv%20class%3D%26quot%3Bcsl-entry%26quot%3B%26gt%3BEilstrup-Sangiovanni%2C%20M.%20%282018%29.%20Why%20the%20World%20Needs%20an%20International%20Cyberwar%20Convention.%20%26lt%3Bi%26gt%3BPhilosophy%20%26amp%3B%20Technology%26lt%3B%5C%2Fi%26gt%3B%2C%20%26lt%3Bi%26gt%3B31%26lt%3B%5C%2Fi%26gt%3B%283%29%2C%20379%26%23x2013%3B407.%20%26lt%3Ba%20class%3D%26%23039%3Bzp-DOIURL%26%23039%3B%20href%3D%26%23039%3Bhttps%3A%5C%2F%5C%2Fdoi.org%5C%2F10.1007%5C%2Fs13347-017‑0271‑5%26%23039%3B%26gt%3Bhttps%3A%5C%2F%5C%2Fdoi.org%5C%2F10.1007%5C%2Fs13347-017‑0271‑5%26lt%3B%5C%2Fa%26gt%3B%26lt%3B%5C%2Fdiv%26gt%3B%5Cn%26lt%3B%5C%2Fdiv%26gt%3B%22%2C%22data%22%3A%7B%22itemType%22%3A%22journalArticle%22%2C%22title%22%3A%22Why%20the%20World%20Needs%20an%20International%20Cyberwar%20Convention%22%2C%22creators%22%3A%5B%7B%22creatorType%22%3A%22author%22%2C%22firstName%22%3A%22Mette%22%2C%22lastName%22%3A%22Eilstrup-Sangiovanni%22%7D%5D%2C%22abstractNote%22%3A%22States%5Cu2019%20capacity%20for%20using%20modern%20information%20and%20communication%20technology%20to%20inflict%20grave%20harm%20on%20enemies%20has%20been%20amply%20demonstrated%20in%20recent%20years%2C%20with%20many%20countries%20reporting%20large-scale%20cyberattacks%20against%20their%20military%20defense%20systems%2C%20water%20supply%2C%20and%20other%20critical%20infrastructure.%20Currently%2C%20no%20agreed-upon%20international%20rules%20or%20norms%20exist%20to%20govern%20international%20conflict%20in%20cyberspace.%20Many%20governments%20prefer%20to%20keep%20it%20that%20way.%20They%20argue%20that%20difficulties%20of%20verifiability%20and%20challenges%20posed%20by%20rapid%20technological%20change%20rule%20out%20agreement%20on%20an%20international%20cyber%20convention.%20Instead%2C%20they%20prefer%20to%20rely%20on%20informal%20cooperation%20and%20strategic%20deterrence%20to%20limit%20direct%20conflict.%20In%20this%20article%2C%20I%20seek%20to%20rebut%20some%20of%20the%20main%20objections%20to%20seeking%20an%20international%20convention%20on%20the%20use%20of%20cyber%20weapons.%20While%20there%20are%20significant%20obstacles%20to%20achieving%20effective%20arms%20control%20in%20the%20cyber%20domain%2C%20historical%20experience%20from%20other%20areas%20of%20international%20arms%20control%20suggests%20that%20none%20of%20these%20obstacles%20are%20insurmountable.%20Furthermore%2C%20while%20most%20critics%20of%20cyberarms%20control%20assume%20that%20cyberspace%20favors%20offensive%20strategies%2C%20closer%20inspection%20reveals%20the%20dominance%20of%20cyber-defensive%20strategies.%20This%20in%20turn%20improves%20prospects%20for%20striking%20an%20effective%20international%20agreement%20on%20cyberarms%20control.%22%2C%22date%22%3A%229%5C%2F2018%22%2C%22language%22%3A%22en%22%2C%22DOI%22%3A%2210.1007%5C%2Fs13347-017‑0271‑5%22%2C%22ISSN%22%3A%222210–5433%2C%202210–5441%22%2C%22url%22%3A%22http%3A%5C%2F%5C%2Flink.springer.com%5C%2F10.1007%5C%2Fs13347-017‑0271‑5%22%2C%22collections%22%3A%5B%22YLB2M7DD%22%5D%2C%22dateModified%22%3A%222023–11-02T07%3A50%3A21Z%22%7D%7D%2C%7B%22key%22%3A%22TQEH7758%22%2C%22library%22%3A%7B%22id%22%3A2359887%7D%2C%22meta%22%3A%7B%22creatorSummary%22%3A%22Ghionis%22%2C%22numChildren%22%3A1%7D%2C%22bib%22%3A%22%26lt%3Bdiv%20class%3D%26quot%3Bcsl-bib-body%26quot%3B%20style%3D%26quot%3Bline-height%3A%202%3B%20padding-left%3A%201em%3B%20text-indent%3A-1em%3B%26quot%3B%26gt%3B%5Cn%20%20%26lt%3Bdiv%20class%3D%26quot%3Bcsl-entry%26quot%3B%26gt%3BGhionis%2C%20A.%20A.%20%28n.d.%29.%20%26lt%3Bi%26gt%3BThe%20Limits%20of%20Deterrence%20in%20the%20Cyber%20World%26lt%3B%5C%2Fi%26gt%3B.%26lt%3B%5C%2Fdiv%26gt%3B%5Cn%26lt%3B%5C%2Fdiv%26gt%3B%22%2C%22data%22%3A%7B%22itemType%22%3A%22journalArticle%22%2C%22title%22%3A%22The%20Limits%20of%20Deterrence%20in%20the%20Cyber%20World%22%2C%22creators%22%3A%5B%7B%22creatorType%22%3A%22author%22%2C%22firstName%22%3A%22A%20A%22%2C%22lastName%22%3A%22Ghionis%22%7D%5D%2C%22abstractNote%22%3A%22%22%2C%22date%22%3A%22%22%2C%22language%22%3A%22en%22%2C%22DOI%22%3A%22%22%2C%22ISSN%22%3A%22%22%2C%22url%22%3A%22%22%2C%22collections%22%3A%5B%22YLB2M7DD%22%5D%2C%22dateModified%22%3A%222023–11-02T07%3A50%3A15Z%22%7D%7D%2C%7B%22key%22%3A%22VFQE4GDF%22%2C%22library%22%3A%7B%22id%22%3A2359887%7D%2C%22meta%22%3A%7B%22creatorSummary%22%3A%22Karimov%22%2C%22numChildren%22%3A1%7D%2C%22bib%22%3A%22%26lt%3Bdiv%20class%3D%26quot%3Bcsl-bib-body%26quot%3B%20style%3D%26quot%3Bline-height%3A%202%3B%20padding-left%3A%201em%3B%20text-indent%3A-1em%3B%26quot%3B%26gt%3B%5Cn%20%20%26lt%3Bdiv%20class%3D%26quot%3Bcsl-entry%26quot%3B%26gt%3BKarimov%2C%20N.%20%28n.d.%29.%20%26lt%3Bi%26gt%3BThe%20European%20Union%20Cyber%20Security%20and%20Protection%20of%20Human%20Rights%26lt%3B%5C%2Fi%26gt%3B.%26lt%3B%5C%2Fdiv%26gt%3B%5Cn%26lt%3B%5C%2Fdiv%26gt%3B%22%2C%22data%22%3A%7B%22itemType%22%3A%22journalArticle%22%2C%22title%22%3A%22The%20European%20Union%20Cyber%20Security%20and%20Protection%20of%20Human%20Rights%22%2C%22creators%22%3A%5B%7B%22creatorType%22%3A%22author%22%2C%22firstName%22%3A%22Nurlan%22%2C%22lastName%22%3A%22Karimov%22%7D%5D%2C%22abstractNote%22%3A%22%22%2C%22date%22%3A%22%22%2C%22language%22%3A%22en%22%2C%22DOI%22%3A%22%22%2C%22ISSN%22%3A%22%22%2C%22url%22%3A%22%22%2C%22collections%22%3A%5B%22YLB2M7DD%22%5D%2C%22dateModified%22%3A%222023–11-02T07%3A50%3A13Z%22%7D%7D%2C%7B%22key%22%3A%22VCV5EE25%22%2C%22library%22%3A%7B%22id%22%3A2359887%7D%2C%22meta%22%3A%7B%22creatorSummary%22%3A%22Warf%20and%20Fekete%22%2C%22parsedDate%22%3A%222016–05-03%22%2C%22numChildren%22%3A1%7D%2C%22bib%22%3A%22%26lt%3Bdiv%20class%3D%26quot%3Bcsl-bib-body%26quot%3B%20style%3D%26quot%3Bline-height%3A%202%3B%20padding-left%3A%201em%3B%20text-indent%3A-1em%3B%26quot%3B%26gt%3B%5Cn%20%20%26lt%3Bdiv%20class%3D%26quot%3Bcsl-entry%26quot%3B%26gt%3BWarf%2C%20B.%2C%20%26amp%3B%20Fekete%2C%20E.%20%282016%29.%20Relational%20geographies%20of%20cyberterrorism%20and%20cyberwar.%20%26lt%3Bi%26gt%3BSpace%20and%20Polity%26lt%3B%5C%2Fi%26gt%3B%2C%20%26lt%3Bi%26gt%3B20%26lt%3B%5C%2Fi%26gt%3B%282%29%2C%20143%26%23x2013%3B157.%20%26lt%3Ba%20class%3D%26%23039%3Bzp-DOIURL%26%23039%3B%20href%3D%26%23039%3Bhttps%3A%5C%2F%5C%2Fdoi.org%5C%2F10.1080%5C%2F13562576.2015.1112113%26%23039%3B%26gt%3Bhttps%3A%5C%2F%5C%2Fdoi.org%5C%2F10.1080%5C%2F13562576.2015.1112113%26lt%3B%5C%2Fa%26gt%3B%26lt%3B%5C%2Fdiv%26gt%3B%5Cn%26lt%3B%5C%2Fdiv%26gt%3B%22%2C%22data%22%3A%7B%22itemType%22%3A%22journalArticle%22%2C%22title%22%3A%22Relational%20geographies%20of%20cyberterrorism%20and%20cyberwar%22%2C%22creators%22%3A%5B%7B%22creatorType%22%3A%22author%22%2C%22firstName%22%3A%22Barney%22%2C%22lastName%22%3A%22Warf%22%7D%2C%7B%22creatorType%22%3A%22author%22%2C%22firstName%22%3A%22Emily%22%2C%22lastName%22%3A%22Fekete%22%7D%5D%2C%22abstractNote%22%3A%22%22%2C%22date%22%3A%222016–05-03%22%2C%22language%22%3A%22en%22%2C%22DOI%22%3A%2210.1080%5C%2F13562576.2015.1112113%22%2C%22ISSN%22%3A%221356–2576%2C%201470–1235%22%2C%22url%22%3A%22http%3A%5C%2F%5C%2Fwww.tandfonline.com%5C%2Fdoi%5C%2Ffull%5C%2F10.1080%5C%2F13562576.2015.1112113%22%2C%22collections%22%3A%5B%22YLB2M7DD%22%5D%2C%22dateModified%22%3A%222023–11-02T07%3A50%3A11Z%22%7D%7D%2C%7B%22key%22%3A%22GE92CYV7%22%2C%22library%22%3A%7B%22id%22%3A2359887%7D%2C%22meta%22%3A%7B%22creatorSummary%22%3A%22Sigholm%22%2C%22parsedDate%22%3A%222013–12-01%22%2C%22numChildren%22%3A1%7D%2C%22bib%22%3A%22%26lt%3Bdiv%20class%3D%26quot%3Bcsl-bib-body%26quot%3B%20style%3D%26quot%3Bline-height%3A%202%3B%20padding-left%3A%201em%3B%20text-indent%3A-1em%3B%26quot%3B%26gt%3B%5Cn%20%20%26lt%3Bdiv%20class%3D%26quot%3Bcsl-entry%26quot%3B%26gt%3BSigholm%2C%20J.%20%282013%29.%20Non-State%20Actors%20in%20Cyberspace%20Operations.%20%26lt%3Bi%26gt%3BJournal%20of%20Military%20Studies%26lt%3B%5C%2Fi%26gt%3B%2C%20%26lt%3Bi%26gt%3B4%26lt%3B%5C%2Fi%26gt%3B%281%29%2C%201%26%23x2013%3B37.%20%26lt%3Ba%20class%3D%26%23039%3Bzp-DOIURL%26%23039%3B%20href%3D%26%23039%3Bhttps%3A%5C%2F%5C%2Fdoi.org%5C%2F10.1515%5C%2Fjms-2016–0184%26%23039%3B%26gt%3Bhttps%3A%5C%2F%5C%2Fdoi.org%5C%2F10.1515%5C%2Fjms-2016–0184%26lt%3B%5C%2Fa%26gt%3B%26lt%3B%5C%2Fdiv%26gt%3B%5Cn%26lt%3B%5C%2Fdiv%26gt%3B%22%2C%22data%22%3A%7B%22itemType%22%3A%22journalArticle%22%2C%22title%22%3A%22Non-State%20Actors%20in%20Cyberspace%20Operations%22%2C%22creators%22%3A%5B%7B%22creatorType%22%3A%22author%22%2C%22firstName%22%3A%22Johan%22%2C%22lastName%22%3A%22Sigholm%22%7D%5D%2C%22abstractNote%22%3A%22The%20growing%20importance%20of%20cyberspace%20to%20modern%20society%2C%20and%20its%20increasing%20use%20as%20an%20arena%20for%20dispute%2C%20is%20becoming%20a%20national%20security%20concern%20for%20governments%20and%20armed%20forces%20globally.%20The%20special%20characteristics%20of%20cyberspace%2C%20such%20as%20its%20asymmetric%20nature%2C%20the%20lack%20of%20attribution%2C%20the%20low%20cost%20of%20entry%2C%20the%20legal%20ambiguity%2C%20and%20its%20role%20as%20an%20efficient%20medium%20for%20protest%2C%20crime%2C%20espionage%20and%20military%20aggression%2C%20makes%20it%20an%20attractive%20domain%20for%20nation-states%20as%20well%20as%20nonstate%20actors%20in%20cyber%20conflict.%22%2C%22date%22%3A%222013–12‑1%22%2C%22language%22%3A%22en%22%2C%22DOI%22%3A%2210.1515%5C%2Fjms-2016–0184%22%2C%22ISSN%22%3A%221799–3350%22%2C%22url%22%3A%22https%3A%5C%2F%5C%2Fwww.sciendo.com%5C%2Farticle%5C%2F10.1515%5C%2Fjms-2016–0184%22%2C%22collections%22%3A%5B%22YLB2M7DD%22%5D%2C%22dateModified%22%3A%222023–11-02T07%3A50%3A07Z%22%7D%7D%2C%7B%22key%22%3A%22WYGXSC8T%22%2C%22library%22%3A%7B%22id%22%3A2359887%7D%2C%22meta%22%3A%7B%22creatorSummary%22%3A%22Burton%22%2C%22parsedDate%22%3A%222015–10-02%22%2C%22numChildren%22%3A2%7D%2C%22bib%22%3A%22%26lt%3Bdiv%20class%3D%26quot%3Bcsl-bib-body%26quot%3B%20style%3D%26quot%3Bline-height%3A%202%3B%20padding-left%3A%201em%3B%20text-indent%3A-1em%3B%26quot%3B%26gt%3B%5Cn%20%20%26lt%3Bdiv%20class%3D%26quot%3Bcsl-entry%26quot%3B%26gt%3BBurton%2C%20J.%20%282015%29.%20NATO%26%23x2019%3Bs%20cyber%20defence%3A%20strategic%20challenges%20and%20institutional%20adaptation.%20%26lt%3Bi%26gt%3BDefence%20Studies%26lt%3B%5C%2Fi%26gt%3B%2C%20%26lt%3Bi%26gt%3B15%26lt%3B%5C%2Fi%26gt%3B%284%29%2C%20297%26%23x2013%3B319.%20%26lt%3Ba%20class%3D%26%23039%3Bzp-DOIURL%26%23039%3B%20href%3D%26%23039%3Bhttps%3A%5C%2F%5C%2Fdoi.org%5C%2F10.1080%5C%2F14702436.2015.1108108%26%23039%3B%26gt%3Bhttps%3A%5C%2F%5C%2Fdoi.org%5C%2F10.1080%5C%2F14702436.2015.1108108%26lt%3B%5C%2Fa%26gt%3B%26lt%3B%5C%2Fdiv%26gt%3B%5Cn%26lt%3B%5C%2Fdiv%26gt%3B%22%2C%22data%22%3A%7B%22itemType%22%3A%22journalArticle%22%2C%22title%22%3A%22NATO%5Cu2019s%20cyber%20defence%3A%20strategic%20challenges%20and%20institutional%20adaptation%22%2C%22creators%22%3A%5B%7B%22creatorType%22%3A%22author%22%2C%22firstName%22%3A%22Joe%22%2C%22lastName%22%3A%22Burton%22%7D%5D%2C%22abstractNote%22%3A%22%22%2C%22date%22%3A%222015–10-02%22%2C%22language%22%3A%22en%22%2C%22DOI%22%3A%2210.1080%5C%2F14702436.2015.1108108%22%2C%22ISSN%22%3A%221470–2436%2C%201743–9698%22%2C%22url%22%3A%22http%3A%5C%2F%5C%2Fwww.tandfonline.com%5C%2Fdoi%5C%2Ffull%5C%2F10.1080%5C%2F14702436.2015.1108108%22%2C%22collections%22%3A%5B%22YLB2M7DD%22%5D%2C%22dateModified%22%3A%222023–11-02T07%3A50%3A05Z%22%7D%7D%2C%7B%22key%22%3A%22Y9C9HA26%22%2C%22library%22%3A%7B%22id%22%3A2359887%7D%2C%22meta%22%3A%7B%22creatorSummary%22%3A%22Lindstrom%22%2C%22numChildren%22%3A1%7D%2C%22bib%22%3A%22%26lt%3Bdiv%20class%3D%26quot%3Bcsl-bib-body%26quot%3B%20style%3D%26quot%3Bline-height%3A%202%3B%20padding-left%3A%201em%3B%20text-indent%3A-1em%3B%26quot%3B%26gt%3B%5Cn%20%20%26lt%3Bdiv%20class%3D%26quot%3Bcsl-entry%26quot%3B%26gt%3BLindstrom%2C%20G.%20%28n.d.%29.%20%26lt%3Bi%26gt%3BMeeting%20the%20Cyber%20Security%20Challenge%26lt%3B%5C%2Fi%26gt%3B.%26lt%3B%5C%2Fdiv%26gt%3B%5Cn%26lt%3B%5C%2Fdiv%26gt%3B%22%2C%22data%22%3A%7B%22itemType%22%3A%22journalArticle%22%2C%22title%22%3A%22Meeting%20the%20Cyber%20Security%20Challenge%22%2C%22creators%22%3A%5B%7B%22creatorType%22%3A%22author%22%2C%22firstName%22%3A%22Gustav%22%2C%22lastName%22%3A%22Lindstrom%22%7D%5D%2C%22abstractNote%22%3A%22%22%2C%22date%22%3A%22%22%2C%22language%22%3A%22en%22%2C%22DOI%22%3A%22%22%2C%22ISSN%22%3A%22%22%2C%22url%22%3A%22%22%2C%22collections%22%3A%5B%22YLB2M7DD%22%5D%2C%22dateModified%22%3A%222023–11-02T07%3A50%3A02Z%22%7D%7D%2C%7B%22key%22%3A%22WWU5PX8D%22%2C%22library%22%3A%7B%22id%22%3A2359887%7D%2C%22meta%22%3A%7B%22creatorSummary%22%3A%22Kaschner%22%2C%22parsedDate%22%3A%222020%22%2C%22numChildren%22%3A1%7D%2C%22bib%22%3A%22%26lt%3Bdiv%20class%3D%26quot%3Bcsl-bib-body%26quot%3B%20style%3D%26quot%3Bline-height%3A%202%3B%20padding-left%3A%201em%3B%20text-indent%3A-1em%3B%26quot%3B%26gt%3B%5Cn%20%20%26lt%3Bdiv%20class%3D%26quot%3Bcsl-entry%26quot%3B%26gt%3BKaschner%2C%20H.%20%282020%29.%20%26lt%3Bi%26gt%3BCyber%20Crisis%20Management%3A%20Das%20Praxishandbuch%20zu%20Krisenmanagement%20und%20Krisenkommunikation%26lt%3B%5C%2Fi%26gt%3B.%20Springer%20Fachmedien%20Wiesbaden.%20https%3A%5C%2F%5C%2Fdoi.org%5C%2F10.1007%5C%2F978‑3–658-27914–1%26lt%3B%5C%2Fdiv%26gt%3B%5Cn%26lt%3B%5C%2Fdiv%26gt%3B%22%2C%22data%22%3A%7B%22itemType%22%3A%22book%22%2C%22title%22%3A%22Cyber%20Crisis%20Management%3A%20Das%20Praxishandbuch%20zu%20Krisenmanagement%20und%20Krisenkommunikation%22%2C%22creators%22%3A%5B%7B%22creatorType%22%3A%22author%22%2C%22firstName%22%3A%22Holger%22%2C%22lastName%22%3A%22Kaschner%22%7D%5D%2C%22abstractNote%22%3A%22%22%2C%22date%22%3A%222020%22%2C%22language%22%3A%22de%22%2C%22ISBN%22%3A%22978–3‑658–27913‑4%20978–3‑658–27914‑1%22%2C%22url%22%3A%22http%3A%5C%2F%5C%2Flink.springer.com%5C%2F10.1007%5C%2F978‑3–658-27914–1%22%2C%22collections%22%3A%5B%22YLB2M7DD%22%5D%2C%22dateModified%22%3A%222023–07-21T15%3A55%3A49Z%22%7D%7D%2C%7B%22key%22%3A%22LZSQBZUX%22%2C%22library%22%3A%7B%22id%22%3A2359887%7D%2C%22meta%22%3A%7B%22creatorSummary%22%3A%22Rosenberger%20et%20al.%22%2C%22parsedDate%22%3A%222023%22%2C%22numChildren%22%3A3%7D%2C%22bib%22%3A%22%26lt%3Bdiv%20class%3D%26quot%3Bcsl-bib-body%26quot%3B%20style%3D%26quot%3Bline-height%3A%202%3B%20padding-left%3A%201em%3B%20text-indent%3A-1em%3B%26quot%3B%26gt%3B%5Cn%20%20%26lt%3Bdiv%20class%3D%26quot%3Bcsl-entry%26quot%3B%26gt%3BRosenberger%2C%20N.%2C%20Niederh%26%23xE4%3Buser%2C%20M.%2C%20%26amp%3B%20Kr%26%23xE4%3Bmer%2C%20K.%20%282023%29.%20%26lt%3Bi%26gt%3BKommunikation%20in%20der%20digitalen%20Transformation%26%23x202F%3B%3A%20Trendstudie%20Schweiz%202022%26lt%3B%5C%2Fi%26gt%3B.%20%26lt%3Ba%20class%3D%26%23039%3Bzp-DOIURL%26%23039%3B%20href%3D%26%23039%3Bhttps%3A%5C%2F%5C%2Fdoi.org%5C%2F10.21256%5C%2FZHAW-2808%26%23039%3B%26gt%3Bhttps%3A%5C%2F%5C%2Fdoi.org%5C%2F10.21256%5C%2FZHAW-2808%26lt%3B%5C%2Fa%26gt%3B%26lt%3B%5C%2Fdiv%26gt%3B%5Cn%26lt%3B%5C%2Fdiv%26gt%3B%22%2C%22data%22%3A%7B%22itemType%22%3A%22journalArticle%22%2C%22title%22%3A%22Kommunikation%20in%20der%20digitalen%20Transformation%20%3A%20Trendstudie%20Schweiz%202022%22%2C%22creators%22%3A%5B%7B%22creatorType%22%3A%22author%22%2C%22firstName%22%3A%22Nicole%22%2C%22lastName%22%3A%22Rosenberger%22%7D%2C%7B%22creatorType%22%3A%22author%22%2C%22firstName%22%3A%22Markus%22%2C%22lastName%22%3A%22Niederh%5Cu00e4user%22%7D%2C%7B%22creatorType%22%3A%22author%22%2C%22firstName%22%3A%22Katharina%22%2C%22lastName%22%3A%22Kr%5Cu00e4mer%22%7D%5D%2C%22abstractNote%22%3A%22Das%20Forschungsprojekt%20%5Cu00abKommunikation%20in%20der%20digitalen%20Transformation%5Cu00bb%20ist%20als%20Trendstudie%20angelegt%20und%20untersucht%20seit%202018%20alle%20zwei%20Jahre%20den%20Zustand%20und%20den%20Entwicklungsbedarf%20der%20Unternehmenskommunikation%20in%20der%20digitalen%20Transformation.%20Leitend%20ist%20dabei%20ein%20in%20der%20Erststudie%202018%20entwickeltes%20Framework%2C%20welches%20die%20Rolle%20von%20Corporate%20Communications%20in%20der%20digitalen%20Transformation%20auf%20drei%20Ebenen%20beschreibt%20%28Niederh%5Cu00e4user%20%26amp%3B%20Rosenberger%2C%202018%29.%20Auf%20der%20Mikroebene%20fokussiert%20die%20Untersuchung%20auf%20die%20digitale%20Transformation%20der%20Kommunikationsabteilung%2C%20auf%20der%20Mesoebene%20auf%20die%20Funktion%20der%20Unternehmenskommunikation%20im%20Transformationsprozess%20der%20gesamten%20Organisation%20und%20auf%20der%20Makroebene%20auf%20das%20Schaffen%20von%20Akzeptanz%20f%5Cu00fcr%20den%20Transformationsprozess%20in%20Markt%20und%20Gesellschaft.%20Die%20vorliegende%20dritte%20Studie%202022%20basiert%20auf%20einer%20Online-Befragung%20von%20133%20Kommunikationsverantwortlichen%20%28CCOs%29%20in%20der%20Deutschschweiz%20und%20auf%2012%20vertiefenden%20Interviews%20mit%20Expert%3Ainnen.%20Zur%20Einordnung%20wurde%20ein%20%5Cu00dcberblick%20zum%20aktuellen%20Forschungsstand%20erarbeitet.%20Die%20Studie%20zeigt%20auf%2C%20dass%20einschneidende%20Ereignisse%20wie%20die%20Pandemie%20oder%20der%20Ukraine-Krieg%20weniger%20die%20Richtung%20als%20die%20Geschwindigkeit%20der%20digitalen%20Transformation%20ver%5Cu00e4ndert%20haben.%20Die%20%5Cu00abAgenda%20f%5Cu00fcr%20die%20Kommunikation%20in%20der%20digitalen%20Transformation%5Cu00bb%20aus%20der%20Erststudie%20wurde%20mit%20den%20Ergebnissen%20der%20beiden%20Folgestudien%20abgeglichen%2C%20angepasst%20und%20erweitert.%20Sie%20zeigt%20Kommunikationsverantwortlichen%20auf%2C%20in%20welche%20Richtung%20sie%20die%20Unternehmenskommunikation%20entwickeln%20sollten.%22%2C%22date%22%3A%222023%22%2C%22language%22%3A%22de%22%2C%22DOI%22%3A%2210.21256%5C%2FZHAW-2808%22%2C%22ISSN%22%3A%22%22%2C%22url%22%3A%22https%3A%5C%2F%5C%2Fdigitalcollection.zhaw.ch%5C%2Fhandle%5C%2F11475%5C%2F26695%22%2C%22collections%22%3A%5B%22YLB2M7DD%22%2C%22PF4P4483%22%5D%2C%22dateModified%22%3A%222023–07-20T18%3A08%3A02Z%22%7D%7D%2C%7B%22key%22%3A%229L3ABNUY%22%2C%22library%22%3A%7B%22id%22%3A2359887%7D%2C%22meta%22%3A%7B%22creatorSummary%22%3A%22Lerch%20and%20Tanner%22%2C%22parsedDate%22%3A%222022%22%2C%22numChildren%22%3A1%7D%2C%22bib%22%3A%22%26lt%3Bdiv%20class%3D%26quot%3Bcsl-bib-body%26quot%3B%20style%3D%26quot%3Bline-height%3A%202%3B%20padding-left%3A%201em%3B%20text-indent%3A-1em%3B%26quot%3B%26gt%3B%5Cn%20%20%26lt%3Bdiv%20class%3D%26quot%3Bcsl-entry%26quot%3B%26gt%3BLerch%2C%20K.%20M.%2C%20%26amp%3B%20Tanner%2C%20M.%20%282022%29.%20%26lt%3Bi%26gt%3BSchweizerische%20Mobiliar%20Versicherungsgesellschaft%20AG%20Digitalswitzerland%20Allianz%20Digitale%20Sicherheit%20Schweiz%20Fachhochschule%20Nordwestschweiz%20FHNW%2C%20Kompetenzzentrum%20Digitale%20Transformation%20Schweizerische%20Akademie%20der%20Technischen%20Wissenschaften%20SATW%26lt%3B%5C%2Fi%26gt%3B.%26lt%3B%5C%2Fdiv%26gt%3B%5Cn%26lt%3B%5C%2Fdiv%26gt%3B%22%2C%22data%22%3A%7B%22itemType%22%3A%22journalArticle%22%2C%22title%22%3A%22Schweizerische%20Mobiliar%20Versicherungsgesellschaft%20AG%20Digitalswitzerland%20Allianz%20Digitale%20Sicherheit%20Schweiz%20Fachhochschule%20Nordwestschweiz%20FHNW%2C%20Kompetenzzentrum%20Digitale%20Transformation%20Schweizerische%20Akademie%20der%20Technischen%20Wissenschaften%20SATW%22%2C%22creators%22%3A%5B%7B%22creatorType%22%3A%22author%22%2C%22firstName%22%3A%22Karin%20M%5Cu00e4ndli%22%2C%22lastName%22%3A%22Lerch%22%7D%2C%7B%22creatorType%22%3A%22author%22%2C%22firstName%22%3A%22Mara%22%2C%22lastName%22%3A%22Tanner%22%7D%5D%2C%22abstractNote%22%3A%22%22%2C%22date%22%3A%222022%22%2C%22language%22%3A%22de%22%2C%22DOI%22%3A%22%22%2C%22ISSN%22%3A%22%22%2C%22url%22%3A%22%22%2C%22collections%22%3A%5B%22YLB2M7DD%22%5D%2C%22dateModified%22%3A%222023–04-27T06%3A15%3A46Z%22%7D%7D%2C%7B%22key%22%3A%222PK2VF9U%22%2C%22library%22%3A%7B%22id%22%3A2359887%7D%2C%22meta%22%3A%7B%22creatorSummary%22%3A%22Frick%22%2C%22parsedDate%22%3A%222022%22%2C%22numChildren%22%3A1%7D%2C%22bib%22%3A%22%26lt%3Bdiv%20class%3D%26quot%3Bcsl-bib-body%26quot%3B%20style%3D%26quot%3Bline-height%3A%202%3B%20padding-left%3A%201em%3B%20text-indent%3A-1em%3B%26quot%3B%26gt%3B%5Cn%20%20%26lt%3Bdiv%20class%3D%26quot%3Bcsl-entry%26quot%3B%26gt%3BFrick%2C%20J.-C.%20%282022%29.%20%26lt%3Bi%26gt%3BComparis-%20Datenvertrauens-%20studie%202022%26lt%3B%5C%2Fi%26gt%3B.%26lt%3B%5C%2Fdiv%26gt%3B%5Cn%26lt%3B%5C%2Fdiv%26gt%3B%22%2C%22data%22%3A%7B%22itemType%22%3A%22journalArticle%22%2C%22title%22%3A%22Comparis-%20Datenvertrauens-%20studie%202022%22%2C%22creators%22%3A%5B%7B%22creatorType%22%3A%22author%22%2C%22firstName%22%3A%22Jean-Claude%22%2C%22lastName%22%3A%22Frick%22%7D%5D%2C%22abstractNote%22%3A%22%22%2C%22date%22%3A%222022%22%2C%22language%22%3A%22de%22%2C%22DOI%22%3A%22%22%2C%22ISSN%22%3A%22%22%2C%22url%22%3A%22%22%2C%22collections%22%3A%5B%22YLB2M7DD%22%5D%2C%22dateModified%22%3A%222023–04-27T06%3A15%3A33Z%22%7D%7D%2C%7B%22key%22%3A%228ZYTZDCI%22%2C%22library%22%3A%7B%22id%22%3A2359887%7D%2C%22meta%22%3A%7B%22creatorSummary%22%3A%22Knoll%22%2C%22parsedDate%22%3A%222017%22%2C%22numChildren%22%3A1%7D%2C%22bib%22%3A%22%26lt%3Bdiv%20class%3D%26quot%3Bcsl-bib-body%26quot%3B%20style%3D%26quot%3Bline-height%3A%202%3B%20padding-left%3A%201em%3B%20text-indent%3A-1em%3B%26quot%3B%26gt%3B%5Cn%20%20%26lt%3Bdiv%20class%3D%26quot%3Bcsl-entry%26quot%3B%26gt%3BKnoll%2C%20M.%20%282017%29.%20IT-Risi­ko­ma­nage­ment%20im%20Zeitalter%20der%20Digitalisierung.%20%26lt%3Bi%26gt%3BHMD%20Praxis%20der%20Wirtschaftsinformatik%26lt%3B%5C%2Fi%26gt%3B%2C%20%26lt%3Bi%26gt%3B54%26lt%3B%5C%2Fi%26gt%3B%281%29%2C%204%26%23x2013%3B20.%20%26lt%3Ba%20class%3D%26%23039%3Bzp-DOIURL%26%23039%3B%20href%3D%26%23039%3Bhttps%3A%5C%2F%5C%2Fdoi.org%5C%2F10.1365%5C%2Fs40702-017‑0287‑4%26%23039%3B%26gt%3Bhttps%3A%5C%2F%5C%2Fdoi.org%5C%2F10.1365%5C%2Fs40702-017‑0287‑4%26lt%3B%5C%2Fa%26gt%3B%26lt%3B%5C%2Fdiv%26gt%3B%5Cn%26lt%3B%5C%2Fdiv%26gt%3B%22%2C%22data%22%3A%7B%22itemType%22%3A%22journalArticle%22%2C%22title%22%3A%22IT-Risi­ko­ma­nage­ment%20im%20Zeitalter%20der%20Digitalisierung%22%2C%22creators%22%3A%5B%7B%22creatorType%22%3A%22author%22%2C%22firstName%22%3A%22Matthias%22%2C%22lastName%22%3A%22Knoll%22%7D%5D%2C%22abstractNote%22%3A%22In%20the%20age%20of%20digital%20transformation%20IT%20gains%20more%20and%20more%20importance%20in%20our%20life%20and%20work%2C%20and%20therefore%20requires%20increased%20interdisciplinary%20focus%20on%20new%20and%20upcoming%20risks.%20More%20than%20ever%20new%20products%20and%20business%20models%20are%20combined%20with%20a%20high%20potential%20to%20collect%20and%20process%20own%20and%20external%20data%2C%20to%20observe%20and%20to%20attack%20companies%20as%20well%20as%20households.%20This%20article%20introduces%20the%20basics%20of%20it%20risk%20management%2C%20addresses%20current%20topics%20and%20drafts%20ideas%20for%20further%20discussion.%22%2C%22date%22%3A%222%5C%2F2017%22%2C%22language%22%3A%22de%22%2C%22DOI%22%3A%2210.1365%5C%2Fs40702-017‑0287‑4%22%2C%22ISSN%22%3A%221436–3011%2C%202198–2775%22%2C%22url%22%3A%22http%3A%5C%2F%5C%2Flink.springer.com%5C%2F10.1365%5C%2Fs40702-017‑0287‑4%22%2C%22collections%22%3A%5B%22YLB2M7DD%22%5D%2C%22dateModified%22%3A%222022–10-12T11%3A12%3A20Z%22%7D%7D%2C%7B%22key%22%3A%229EWJ3LEX%22%2C%22library%22%3A%7B%22id%22%3A2359887%7D%2C%22meta%22%3A%7B%22creatorSummary%22%3A%22Horten%20and%20Gr%5Cu00e4ber%22%2C%22parsedDate%22%3A%222020%22%2C%22numChildren%22%3A1%7D%2C%22bib%22%3A%22%26lt%3Bdiv%20class%3D%26quot%3Bcsl-bib-body%26quot%3B%20style%3D%26quot%3Bline-height%3A%202%3B%20padding-left%3A%201em%3B%20text-indent%3A-1em%3B%26quot%3B%26gt%3B%5Cn%20%20%26lt%3Bdiv%20class%3D%26quot%3Bcsl-entry%26quot%3B%26gt%3BHorten%2C%20B.%2C%20%26amp%3B%20Gr%26%23xE4%3Bber%2C%20M.%20%282020%29.%20Cyberkriminalit%26%23xE4%3Bt%3A%20%26%23xDC%3Bbersicht%20zu%20aktuellen%20und%20k%26%23xFC%3Bnftigen%20Erscheinungsformen.%20%26lt%3Bi%26gt%3BForensische%20Psychiatrie%2C%20Psychologie%2C%20Kriminologie%26lt%3B%5C%2Fi%26gt%3B%2C%20%26lt%3Bi%26gt%3B14%26lt%3B%5C%2Fi%26gt%3B%283%29%2C%20233%26%23x2013%3B241.%20%26lt%3Ba%20class%3D%26%23039%3Bzp-DOIURL%26%23039%3B%20href%3D%26%23039%3Bhttps%3A%5C%2F%5C%2Fdoi.org%5C%2F10.1007%5C%2Fs11757-020–00605‑0%26%23039%3B%26gt%3Bhttps%3A%5C%2F%5C%2Fdoi.org%5C%2F10.1007%5C%2Fs11757-020–00605‑0%26lt%3B%5C%2Fa%26gt%3B%26lt%3B%5C%2Fdiv%26gt%3B%5Cn%26lt%3B%5C%2Fdiv%26gt%3B%22%2C%22data%22%3A%7B%22itemType%22%3A%22journalArticle%22%2C%22title%22%3A%22Cyberkriminalit%5Cu00e4t%3A%20%5Cu00dcbersicht%20zu%20aktuellen%20und%20k%5Cu00fcnftigen%20Erscheinungsformen%22%2C%22creators%22%3A%5B%7B%22creatorType%22%3A%22author%22%2C%22firstName%22%3A%22Barbara%22%2C%22lastName%22%3A%22Horten%22%7D%2C%7B%22creatorType%22%3A%22author%22%2C%22firstName%22%3A%22Marleen%22%2C%22lastName%22%3A%22Gr%5Cu00e4ber%22%7D%5D%2C%22abstractNote%22%3A%22The%20possibilities%20for%20cybercriminals%20and%20the%20manifestations%20of%20cybercrime%20have%20signi%5Cufb01cantly%20increased%20in%20recent%20years%20due%20to%20the%20digitalization%20and%20spread%20of%20internet-enabled%20devices.%20The%20term%20cybercrime%20describes%20criminal%20acts%20committed%20via%20internet%2C%20but%20there%20are%20numerous%20manifestations%20which%20are%20classi%5Cufb01ed%20differently%20depending%20on%20the%20context%20of%20cybercrime.%20The%20prevalence%20of%20cybercrime%20is%20presented%20in%20the%20annual%20Federal%20Management%20Report%20of%20the%20German%20Federal%20Criminal%20Police%20Of%5Cufb01ce%20%28BKA%29.%20This%20report%20identi%5Cufb01es%20challenges%20by%2C%20among%20others%2C%20new%20methods%20of%20distributing%20malware%20and%20identity%20theft.%20Ransomware%2C%20an%20increased%20danger%20potential%20from%20the%20Internet%20of%20things%20and%20attacks%20on%20so-called%20critical%20infrastructures%20must%20also%20be%20perceived%20as%20cybercriminal%20threats.%20In%20addition%2C%20sexually%20motivated%20crimes%2C%20such%20as%20child%20pornography%2C%20also%20spread%20faster%20in%20the%20virtual%20space.%20The%20German%20Police%20Crime%20Statistics%20for%202019%20showed%20a%2015.4%25%20increase%20in%20cybercrime%20compared%20to%20the%20previous%20year.%20An%20increase%20in%20identity%20theft%20via%20platforms%2C%20such%20as%20darknet%20as%20well%20as%20a%20growing%20potential%20threat%20from%20developments%2C%20such%20as%20smart%20homes%2C%20cloud%20computing%20or%20big%20data%20is%20predicted.%20Empirical%20studies%20on%20the%20victimization%20experiences%20of%20cyberattacks%20are%20available%20for%20private%20individuals%20and%20industrial%20companies.%20The%20offenders%20were%20mostly%20young%20male%20adults.%22%2C%22date%22%3A%2208%5C%2F2020%22%2C%22language%22%3A%22de%22%2C%22DOI%22%3A%2210.1007%5C%2Fs11757-020–00605‑0%22%2C%22ISSN%22%3A%221862–7072%2C%201862–7080%22%2C%22url%22%3A%22https%3A%5C%2F%5C%2Flink.springer.com%5C%2F10.1007%5C%2Fs11757-020–00605‑0%22%2C%22collections%22%3A%5B%22YLB2M7DD%22%5D%2C%22dateModified%22%3A%222022–10-12T11%3A12%3A13Z%22%7D%7D%2C%7B%22key%22%3A%22SCF48LU2%22%2C%22library%22%3A%7B%22id%22%3A2359887%7D%2C%22meta%22%3A%7B%22creatorSummary%22%3A%22Kasprowicz%20and%20Rieger%22%2C%22parsedDate%22%3A%222020%22%2C%22numChildren%22%3A1%7D%2C%22bib%22%3A%22%26lt%3Bdiv%20class%3D%26quot%3Bcsl-bib-body%26quot%3B%20style%3D%26quot%3Bline-height%3A%202%3B%20padding-left%3A%201em%3B%20text-indent%3A-1em%3B%26quot%3B%26gt%3B%5Cn%20%20%26lt%3Bdiv%20class%3D%26quot%3Bcsl-entry%26quot%3B%26gt%3BKasprowicz%2C%20D.%2C%20%26amp%3B%20Rieger%2C%20S.%20%28Eds.%29.%20%282020%29.%20%26lt%3Bi%26gt%3BHandbuch%20Virtualit%26%23xE4%3Bt%26lt%3B%5C%2Fi%26gt%3B.%20Springer%20Fachmedien%20Wiesbaden.%20https%3A%5C%2F%5C%2Fdoi.org%5C%2F10.1007%5C%2F978‑3–658-16342–6%26lt%3B%5C%2Fdiv%26gt%3B%5Cn%26lt%3B%5C%2Fdiv%26gt%3B%22%2C%22data%22%3A%7B%22itemType%22%3A%22book%22%2C%22title%22%3A%22Handbuch%20Virtualit%5Cu00e4t%22%2C%22creators%22%3A%5B%7B%22creatorType%22%3A%22editor%22%2C%22firstName%22%3A%22Dawid%22%2C%22lastName%22%3A%22Kasprowicz%22%7D%2C%7B%22creatorType%22%3A%22editor%22%2C%22firstName%22%3A%22Stefan%22%2C%22lastName%22%3A%22Rieger%22%7D%5D%2C%22abstractNote%22%3A%22%22%2C%22date%22%3A%222020%22%2C%22language%22%3A%22de%22%2C%22ISBN%22%3A%22978–3‑658–16341‑9%20978–3‑658–16342‑6%22%2C%22url%22%3A%22http%3A%5C%2F%5C%2Flink.springer.com%5C%2F10.1007%5C%2F978‑3–658-16342–6%22%2C%22collections%22%3A%5B%22YLB2M7DD%22%5D%2C%22dateModified%22%3A%222022–10-12T11%3A12%3A03Z%22%7D%7D%2C%7B%22key%22%3A%227SZ2VVP2%22%2C%22library%22%3A%7B%22id%22%3A2359887%7D%2C%22meta%22%3A%7B%22creatorSummary%22%3A%22Bartsch%20and%20Frey%22%2C%22parsedDate%22%3A%222017%22%2C%22numChildren%22%3A1%7D%2C%22bib%22%3A%22%26lt%3Bdiv%20class%3D%26quot%3Bcsl-bib-body%26quot%3B%20style%3D%26quot%3Bline-height%3A%202%3B%20padding-left%3A%201em%3B%20text-indent%3A-1em%3B%26quot%3B%26gt%3B%5Cn%20%20%26lt%3Bdiv%20class%3D%26quot%3Bcsl-entry%26quot%3B%26gt%3BBartsch%2C%20M.%2C%20%26amp%3B%20Frey%2C%20S.%20%282017%29.%20%26lt%3Bi%26gt%3BCyberstrategien%20f%26%23xFC%3Br%20Unternehmen%20und%20Beh%26%23xF6%3Brden%26lt%3B%5C%2Fi%26gt%3B.%20Springer%20Fachmedien%20Wiesbaden.%20https%3A%5C%2F%5C%2Fdoi.org%5C%2F10.1007%5C%2F978‑3–658-16139–2%26lt%3B%5C%2Fdiv%26gt%3B%5Cn%26lt%3B%5C%2Fdiv%26gt%3B%22%2C%22data%22%3A%7B%22itemType%22%3A%22book%22%2C%22title%22%3A%22Cyberstrategien%20f%5Cu00fcr%20Unternehmen%20und%20Beh%5Cu00f6rden%22%2C%22creators%22%3A%5B%7B%22creatorType%22%3A%22author%22%2C%22firstName%22%3A%22Michael%22%2C%22lastName%22%3A%22Bartsch%22%7D%2C%7B%22creatorType%22%3A%22author%22%2C%22firstName%22%3A%22Stefanie%22%2C%22lastName%22%3A%22Frey%22%7D%5D%2C%22abstractNote%22%3A%22%22%2C%22date%22%3A%222017%22%2C%22language%22%3A%22de%22%2C%22ISBN%22%3A%22978–3‑658–16138‑5%20978–3‑658–16139‑2%22%2C%22url%22%3A%22http%3A%5C%2F%5C%2Flink.springer.com%5C%2F10.1007%5C%2F978‑3–658-16139–2%22%2C%22collections%22%3A%5B%22YLB2M7DD%22%5D%2C%22dateModified%22%3A%222022–10-12T11%3A11%3A54Z%22%7D%7D%2C%7B%22key%22%3A%224X9485DU%22%2C%22library%22%3A%7B%22id%22%3A2359887%7D%2C%22meta%22%3A%7B%22creatorSummary%22%3A%22Peter%20et%20al.%22%2C%22numChildren%22%3A1%7D%2C%22bib%22%3A%22%26lt%3Bdiv%20class%3D%26quot%3Bcsl-bib-body%26quot%3B%20style%3D%26quot%3Bline-height%3A%202%3B%20padding-left%3A%201em%3B%20text-indent%3A-1em%3B%26quot%3B%26gt%3B%5Cn%20%20%26lt%3Bdiv%20class%3D%26quot%3Bcsl-entry%26quot%3B%26gt%3BPeter%2C%20M.%20K.%2C%20H%26%23xF6%3Blzli%2C%20A.%2C%20Kaelin%2C%20A.%20W.%2C%20Lerch%2C%20K.%20M.%2C%20Vifian%2C%20P.%2C%20%26amp%3B%20Wettstein%2C%20N.%20%28n.d.%29.%20%26lt%3Bi%26gt%3BHomeoffice%20und%20Cybers%26%23xAD%3B%20icherheit%20in%20Schweizer%20KMU%26lt%3B%5C%2Fi%26gt%3B.%2030.%26lt%3B%5C%2Fdiv%26gt%3B%5Cn%26lt%3B%5C%2Fdiv%26gt%3B%22%2C%22data%22%3A%7B%22itemType%22%3A%22journalArticle%22%2C%22title%22%3A%22Homeoffice%20und%20Cybers%5Cu00ad%20icherheit%20in%20Schweizer%20KMU%22%2C%22creators%22%3A%5B%7B%22creatorType%22%3A%22author%22%2C%22firstName%22%3A%22Marc%20K%22%2C%22lastName%22%3A%22Peter%22%7D%2C%7B%22creatorType%22%3A%22author%22%2C%22firstName%22%3A%22Andreas%22%2C%22lastName%22%3A%22H%5Cu00f6lzli%22%7D%2C%7B%22creatorType%22%3A%22author%22%2C%22firstName%22%3A%22Andreas%20W%22%2C%22lastName%22%3A%22Kaelin%22%7D%2C%7B%22creatorType%22%3A%22author%22%2C%22firstName%22%3A%22Karin%20M%5Cu00e4ndli%22%2C%22lastName%22%3A%22Lerch%22%7D%2C%7B%22creatorType%22%3A%22author%22%2C%22firstName%22%3A%22Patric%22%2C%22lastName%22%3A%22Vifian%22%7D%2C%7B%22creatorType%22%3A%22author%22%2C%22firstName%22%3A%22Nicole%22%2C%22lastName%22%3A%22Wettstein%22%7D%5D%2C%22abstractNote%22%3A%22%22%2C%22date%22%3A%22%22%2C%22language%22%3A%22de%22%2C%22DOI%22%3A%22%22%2C%22ISSN%22%3A%22%22%2C%22url%22%3A%22%22%2C%22collections%22%3A%5B%22YLB2M7DD%22%5D%2C%22dateModified%22%3A%222022–07-01T08%3A16%3A34Z%22%7D%7D%2C%7B%22key%22%3A%22QNG9BN33%22%2C%22library%22%3A%7B%22id%22%3A2359887%7D%2C%22meta%22%3A%7B%22creatorSummary%22%3A%22Newman%22%2C%22numChildren%22%3A1%7D%2C%22bib%22%3A%22%26lt%3Bdiv%20class%3D%26quot%3Bcsl-bib-body%26quot%3B%20style%3D%26quot%3Bline-height%3A%202%3B%20padding-left%3A%201em%3B%20text-indent%3A-1em%3B%26quot%3B%26gt%3B%5Cn%20%20%26lt%3Bdiv%20class%3D%26quot%3Bcsl-entry%26quot%3B%26gt%3BNewman%2C%20N.%20%28n.d.%29.%20%26lt%3Bi%26gt%3BReuters%20Institute%20Digital%20News%20Report%202020%26lt%3B%5C%2Fi%26gt%3B%20%28p.%20112%29.%26lt%3B%5C%2Fdiv%26gt%3B%5Cn%26lt%3B%5C%2Fdiv%26gt%3B%22%2C%22data%22%3A%7B%22itemType%22%3A%22report%22%2C%22title%22%3A%22Reuters%20Institute%20Digital%20News%20Report%202020%22%2C%22creators%22%3A%5B%7B%22creatorType%22%3A%22author%22%2C%22firstName%22%3A%22Nic%22%2C%22lastName%22%3A%22Newman%22%7D%5D%2C%22abstractNote%22%3A%22%22%2C%22reportNumber%22%3A%22%22%2C%22reportType%22%3A%22%22%2C%22institution%22%3A%22%22%2C%22date%22%3A%22%22%2C%22language%22%3A%22en%22%2C%22url%22%3A%22%22%2C%22collections%22%3A%5B%22YLB2M7DD%22%5D%2C%22dateModified%22%3A%222022–05-23T09%3A10%3A21Z%22%7D%7D%2C%7B%22key%22%3A%222KDPJWAW%22%2C%22library%22%3A%7B%22id%22%3A2359887%7D%2C%22meta%22%3A%7B%22creatorSummary%22%3A%22Deloitte%22%2C%22numChildren%22%3A1%7D%2C%22bib%22%3A%22%26lt%3Bdiv%20class%3D%26quot%3Bcsl-bib-body%26quot%3B%20style%3D%26quot%3Bline-height%3A%202%3B%20padding-left%3A%201em%3B%20text-indent%3A-1em%3B%26quot%3B%26gt%3B%5Cn%20%20%26lt%3Bdiv%20class%3D%26quot%3Bcsl-entry%26quot%3B%26gt%3BDeloitte.%20%28n.d.%29.%20%26lt%3Bi%26gt%3BCyber%20survey%202020%26lt%3B%5C%2Fi%26gt%3B.%20Retrieved%20May%2023%2C%202022%2C%20from%20%26lt%3Ba%20class%3D%26%23039%3Bzp-ItemURL%26%23039%3B%20href%3D%26%23039%3Bhttps%3A%5C%2F%5C%2Fwww2.deloitte.com%5C%2Fcontent%5C%2Fdam%5C%2FDeloitte%5C%2Fdk%5C%2FDocuments%5C%2FCyber%5C%2Fcyberreport%5C%2FCyber_survey_.pdf%26%23039%3B%26gt%3Bhttps%3A%5C%2F%5C%2Fwww2.deloitte.com%5C%2Fcontent%5C%2Fdam%5C%2FDeloitte%5C%2Fdk%5C%2FDocuments%5C%2FCyber%5C%2Fcyberreport%5C%2FCyber_survey_.pdf%26lt%3B%5C%2Fa%26gt%3B%26lt%3B%5C%2Fdiv%26gt%3B%5Cn%26lt%3B%5C%2Fdiv%26gt%3B%22%2C%22data%22%3A%7B%22itemType%22%3A%22webpage%22%2C%22title%22%3A%22Cyber%20survey%202020%22%2C%22creators%22%3A%5B%7B%22creatorType%22%3A%22author%22%2C%22firstName%22%3A%22%22%2C%22lastName%22%3A%22Deloitte%22%7D%5D%2C%22abstractNote%22%3A%22%22%2C%22date%22%3A%22%22%2C%22url%22%3A%22https%3A%5C%2F%5C%2Fwww2.deloitte.com%5C%2Fcontent%5C%2Fdam%5C%2FDeloitte%5C%2Fdk%5C%2FDocuments%5C%2FCyber%5C%2Fcyberreport%5C%2FCyber_survey_.pdf%22%2C%22language%22%3A%22%22%2C%22collections%22%3A%5B%22YLB2M7DD%22%5D%2C%22dateModified%22%3A%222022–05-23T09%3A04%3A58Z%22%7D%7D%2C%7B%22key%22%3A%22VL38YCCD%22%2C%22library%22%3A%7B%22id%22%3A2359887%7D%2C%22meta%22%3A%7B%22creatorSummary%22%3A%22Deloitte%22%2C%22parsedDate%22%3A%222019%22%2C%22numChildren%22%3A1%7D%2C%22bib%22%3A%22%26lt%3Bdiv%20class%3D%26quot%3Bcsl-bib-body%26quot%3B%20style%3D%26quot%3Bline-height%3A%202%3B%20padding-left%3A%201em%3B%20text-indent%3A-1em%3B%26quot%3B%26gt%3B%5Cn%20%20%26lt%3Bdiv%20class%3D%26quot%3Bcsl-entry%26quot%3B%26gt%3BDeloitte.%20%282019%29.%20%26lt%3Bi%26gt%3BCyber%20Security%20Report%202019.%20Teil%201%20Deutschland%26lt%3B%5C%2Fi%26gt%3B.%20%26lt%3Ba%20class%3D%26%23039%3Bzp-ItemURL%26%23039%3B%20href%3D%26%23039%3Bhttps%3A%5C%2F%5C%2Fwww2.deloitte.com%5C%2Fcontent%5C%2Fdam%5C%2FDeloitte%5C%2Fde%5C%2FDocuments%5C%2Frisk%5C%2FCyber-Security-Report-2019-Teil‑1.pdf%26%23039%3B%26gt%3Bhttps%3A%5C%2F%5C%2Fwww2.deloitte.com%5C%2Fcontent%5C%2Fdam%5C%2FDeloitte%5C%2Fde%5C%2FDocuments%5C%2Frisk%5C%2FCyber-Security-Report-2019-Teil‑1.pdf%26lt%3B%5C%2Fa%26gt%3B%26lt%3B%5C%2Fdiv%26gt%3B%5Cn%26lt%3B%5C%2Fdiv%26gt%3B%22%2C%22data%22%3A%7B%22itemType%22%3A%22report%22%2C%22title%22%3A%22Cyber%20Security%20Report%202019.%20Teil%201%20Deutschland%22%2C%22creators%22%3A%5B%7B%22creatorType%22%3A%22author%22%2C%22firstName%22%3A%22%22%2C%22lastName%22%3A%22Deloitte%22%7D%5D%2C%22abstractNote%22%3A%22%22%2C%22reportNumber%22%3A%22%22%2C%22reportType%22%3A%22%22%2C%22institution%22%3A%22%22%2C%22date%22%3A%222019%22%2C%22language%22%3A%22d%22%2C%22url%22%3A%22https%3A%5C%2F%5C%2Fwww2.deloitte.com%5C%2Fcontent%5C%2Fdam%5C%2FDeloitte%5C%2Fde%5C%2FDocuments%5C%2Frisk%5C%2FCyber-Security-Report-2019-Teil‑1.pdf%22%2C%22collections%22%3A%5B%22YLB2M7DD%22%5D%2C%22dateModified%22%3A%222022–05-23T09%3A02%3A04Z%22%7D%7D%2C%7B%22key%22%3A%22NIKLGACZ%22%2C%22library%22%3A%7B%22id%22%3A2359887%7D%2C%22meta%22%3A%7B%22creatorSummary%22%3A%22Deloitte%22%2C%22numChildren%22%3A1%7D%2C%22bib%22%3A%22%26lt%3Bdiv%20class%3D%26quot%3Bcsl-bib-body%26quot%3B%20style%3D%26quot%3Bline-height%3A%202%3B%20padding-left%3A%201em%3B%20text-indent%3A-1em%3B%26quot%3B%26gt%3B%5Cn%20%20%26lt%3Bdiv%20class%3D%26quot%3Bcsl-entry%26quot%3B%26gt%3BDeloitte.%20%28n.d.%29.%20%26lt%3Bi%26gt%3BDeloitte%20Cyber%20Security%20Report-2021%20Deutschland%26lt%3B%5C%2Fi%26gt%3B.%20Retrieved%20May%2023%2C%202022%2C%20from%20%26lt%3Ba%20class%3D%26%23039%3Bzp-ItemURL%26%23039%3B%20href%3D%26%23039%3Bhttps%3A%5C%2F%5C%2Fwww2.deloitte.com%5C%2Fcontent%5C%2Fdam%5C%2FDeloitte%5C%2Fde%5C%2FDocuments%5C%2Frisk%5C%2FDeloitte-Cyber-Security-Report-2021.pdf%26%23039%3B%26gt%3Bhttps%3A%5C%2F%5C%2Fwww2.deloitte.com%5C%2Fcontent%5C%2Fdam%5C%2FDeloitte%5C%2Fde%5C%2FDocuments%5C%2Frisk%5C%2FDeloitte-Cyber-Security-Report-2021.pdf%26lt%3B%5C%2Fa%26gt%3B%26lt%3B%5C%2Fdiv%26gt%3B%5Cn%26lt%3B%5C%2Fdiv%26gt%3B%22%2C%22data%22%3A%7B%22itemType%22%3A%22report%22%2C%22title%22%3A%22Deloitte%20Cyber%20Security%20Report-2021%20Deutschland%22%2C%22creators%22%3A%5B%7B%22creatorType%22%3A%22author%22%2C%22firstName%22%3A%22%22%2C%22lastName%22%3A%22Deloitte%22%7D%5D%2C%22abstractNote%22%3A%22%22%2C%22reportNumber%22%3A%22%22%2C%22reportType%22%3A%22%22%2C%22institution%22%3A%22%22%2C%22date%22%3A%22%22%2C%22language%22%3A%22%22%2C%22url%22%3A%22https%3A%5C%2F%5C%2Fwww2.deloitte.com%5C%2Fcontent%5C%2Fdam%5C%2FDeloitte%5C%2Fde%5C%2FDocuments%5C%2Frisk%5C%2FDeloitte-Cyber-Security-Report-2021.pdf%22%2C%22collections%22%3A%5B%22YLB2M7DD%22%5D%2C%22dateModified%22%3A%222022–05-23T09%3A01%3A55Z%22%7D%7D%2C%7B%22key%22%3A%2253WX4CP4%22%2C%22library%22%3A%7B%22id%22%3A2359887%7D%2C%22meta%22%3A%7B%22numChildren%22%3A1%7D%2C%22bib%22%3A%22%26lt%3Bdiv%20class%3D%26quot%3Bcsl-bib-body%26quot%3B%20style%3D%26quot%3Bline-height%3A%202%3B%20padding-left%3A%201em%3B%20text-indent%3A-1em%3B%26quot%3B%26gt%3B%5Cn%20%20%26lt%3Bdiv%20class%3D%26quot%3Bcsl-entry%26quot%3B%26gt%3B%26lt%3Bi%26gt%3BTechnology%20Solutions%20for%20Complying%20with%20the%20GDPR%20and%20Data%20Privacy%20Laws%26lt%3B%5C%2Fi%26gt%3B.%20%28n.d.%29.%20Retrieved%20May%2015%2C%202022%2C%20from%20%26lt%3Ba%20class%3D%26%23039%3Bzp-ItemURL%26%23039%3B%20href%3D%26%23039%3Bhttps%3A%5C%2F%5C%2Fwww.shrm.org%5C%2Fresourcesandtools%5C%2Fhr-topics%5C%2Ftechnology%5C%2Fpages%5C%2Ftechnology-solutions-gdpr-data-privacy-laws.aspx%26%23039%3B%26gt%3Bhttps%3A%5C%2F%5C%2Fwww.shrm.org%5C%2Fresourcesandtools%5C%2Fhr-topics%5C%2Ftechnology%5C%2Fpages%5C%2Ftechnology-solutions-gdpr-data-privacy-laws.aspx%26lt%3B%5C%2Fa%26gt%3B%26lt%3B%5C%2Fdiv%26gt%3B%5Cn%26lt%3B%5C%2Fdiv%26gt%3B%22%2C%22data%22%3A%7B%22itemType%22%3A%22webpage%22%2C%22title%22%3A%22Technology%20Solutions%20for%20Complying%20with%20the%20GDPR%20and%20Data%20Privacy%20Laws%22%2C%22creators%22%3A%5B%5D%2C%22abstractNote%22%3A%22%22%2C%22date%22%3A%22%22%2C%22url%22%3A%22https%3A%5C%2F%5C%2Fwww.shrm.org%5C%2Fresourcesandtools%5C%2Fhr-topics%5C%2Ftechnology%5C%2Fpages%5C%2Ftechnology-solutions-gdpr-data-privacy-laws.aspx%22%2C%22language%22%3A%22%22%2C%22collections%22%3A%5B%22YLB2M7DD%22%5D%2C%22dateModified%22%3A%222022–05-15T14%3A30%3A46Z%22%7D%7D%2C%7B%22key%22%3A%22E4IKYQ2G%22%2C%22library%22%3A%7B%22id%22%3A2359887%7D%2C%22meta%22%3A%7B%22numChildren%22%3A0%7D%2C%22bib%22%3A%22%26lt%3Bdiv%20class%3D%26quot%3Bcsl-bib-body%26quot%3B%20style%3D%26quot%3Bline-height%3A%202%3B%20padding-left%3A%201em%3B%20text-indent%3A-1em%3B%26quot%3B%26gt%3B%5Cn%20%20%26lt%3Bdiv%20class%3D%26quot%3Bcsl-entry%26quot%3B%26gt%3B%26lt%3Bi%26gt%3BExclusive%3A%20Senior%20EU%20officials%20were%20targeted%20with%20Israeli%20spyware%20%7C%20Reuters%26lt%3B%5C%2Fi%26gt%3B.%20%28n.d.%29.%20Retrieved%20May%2015%2C%202022%2C%20from%20%26lt%3Ba%20class%3D%26%23039%3Bzp-ItemURL%26%23039%3B%20href%3D%26%23039%3Bhttps%3A%5C%2F%5C%2Fwww.reuters.com%5C%2Ftechnology%5C%2Fexclusive-senior-eu-officials-were-targeted-with-israeli-spy­wa­re-sources-2022–04-11%5C%2F%26%23039%3B%26gt%3Bhttps%3A%5C%2F%5C%2Fwww.reuters.com%5C%2Ftechnology%5C%2Fexclusive-senior-eu-officials-were-targeted-with-israeli-spy­wa­re-sources-2022–04-11%5C%2F%26lt%3B%5C%2Fa%26gt%3B%26lt%3B%5C%2Fdiv%26gt%3B%5Cn%26lt%3B%5C%2Fdiv%26gt%3B%22%2C%22data%22%3A%7B%22itemType%22%3A%22webpage%22%2C%22title%22%3A%22Exclusive%3A%20Senior%20EU%20officials%20were%20targeted%20with%20Israeli%20spyware%20%7C%20Reuters%22%2C%22creators%22%3A%5B%5D%2C%22abstractNote%22%3A%22%22%2C%22date%22%3A%22%22%2C%22url%22%3A%22https%3A%5C%2F%5C%2Fwww.reuters.com%5C%2Ftechnology%5C%2Fexclusive-senior-eu-officials-were-targeted-with-israeli-spy­wa­re-sources-2022–04-11%5C%2F%22%2C%22language%22%3A%22%22%2C%22collections%22%3A%5B%22YLB2M7DD%22%5D%2C%22dateModified%22%3A%222022–05-15T14%3A30%3A20Z%22%7D%7D%2C%7B%22key%22%3A%22G2WKIWWE%22%2C%22library%22%3A%7B%22id%22%3A2359887%7D%2C%22meta%22%3A%7B%22creatorSummary%22%3A%22Raaflaub%29%22%2C%22numChildren%22%3A1%7D%2C%22bib%22%3A%22%26lt%3Bdiv%20class%3D%26quot%3Bcsl-bib-body%26quot%3B%20style%3D%26quot%3Bline-height%3A%202%3B%20padding-left%3A%201em%3B%20text-indent%3A-1em%3B%26quot%3B%26gt%3B%5Cn%20%20%26lt%3Bdiv%20class%3D%26quot%3Bcsl-entry%26quot%3B%26gt%3BRaaflaub%29%2C%20%26lt%3BKaty%20Romy%26gt%3B%2C%20%28%26%23xDC%3Bbertragung%20aus%20dem%20Franz%26%23xF6%3Bsischen%3A%20Christian.%20%28n.d.%29.%20%26lt%3Bi%26gt%3BHomeoffice%20%26%23x2013%3B%20Einfallstor%20f%26%23xFC%3Br%20Cyberkriminelle%26lt%3B%5C%2Fi%26gt%3B.%20SWI%20swissinfo.ch.%20Retrieved%20May%2015%2C%202022%2C%20from%20%26lt%3Ba%20class%3D%26%23039%3Bzp-ItemURL%26%23039%3B%20href%3D%26%23039%3Bhttps%3A%5C%2F%5C%2Fwww.swissinfo.ch%5C%2Fger%5C%2Fgesellschaft%5C%2Fhomeoffice—einfallstor-fuer-cyberkriminelle%5C%2F46155880%26%23039%3B%26gt%3Bhttps%3A%5C%2F%5C%2Fwww.swissinfo.ch%5C%2Fger%5C%2Fgesellschaft%5C%2Fhomeoffice—einfallstor-fuer-cyberkriminelle%5C%2F46155880%26lt%3B%5C%2Fa%26gt%3B%26lt%3B%5C%2Fdiv%26gt%3B%5Cn%26lt%3B%5C%2Fdiv%26gt%3B%22%2C%22data%22%3A%7B%22itemType%22%3A%22webpage%22%2C%22title%22%3A%22Homeoffice%20%5Cu2013%20Einfallstor%20f%5Cu00fcr%20Cyberkriminelle%22%2C%22creators%22%3A%5B%7B%22creatorType%22%3A%22author%22%2C%22firstName%22%3A%22%3CKaty%20Romy%3E%2C%20%28%5Cu00dcbertragung%20aus%20dem%20Franz%5Cu00f6sischen%3A%20Christian%22%2C%22lastName%22%3A%22Raaflaub%29%22%7D%5D%2C%22abstractNote%22%3A%22Viele%20Firmen%20sind%20immer%20noch%20schlecht%20ger%5Cu00fcstet.%22%2C%22date%22%3A%22%22%2C%22url%22%3A%22https%3A%5C%2F%5C%2Fwww.swissinfo.ch%5C%2Fger%5C%2Fgesellschaft%5C%2Fhomeoffice—einfallstor-fuer-cyberkriminelle%5C%2F46155880%22%2C%22language%22%3A%22de%22%2C%22collections%22%3A%5B%22YLB2M7DD%22%5D%2C%22dateModified%22%3A%222022–05-15T14%3A28%3A18Z%22%7D%7D%2C%7B%22key%22%3A%22PYQ4NNZK%22%2C%22library%22%3A%7B%22id%22%3A2359887%7D%2C%22meta%22%3A%7B%22numChildren%22%3A1%7D%2C%22bib%22%3A%22%26lt%3Bdiv%20class%3D%26quot%3Bcsl-bib-body%26quot%3B%20style%3D%26quot%3Bline-height%3A%202%3B%20padding-left%3A%201em%3B%20text-indent%3A-1em%3B%26quot%3B%26gt%3B%5Cn%20%20%26lt%3Bdiv%20class%3D%26quot%3Bcsl-entry%26quot%3B%26gt%3B%26lt%3Bi%26gt%3BWas%20ist%20Cyberkriminalit%26%23xE4%3Bt%20und%20wie%20l%26%23xE4%3Bsst%20sie%20sich%20verhindern%3F%26lt%3B%5C%2Fi%26gt%3B%20%28n.d.%29.%20Was%20ist%20Cyberkriminalit%26%23xE4%3Bt%20und%20wie%20l%26%23xE4%3Bsst%20sie%20sich%20verhindern%3F%20Retrieved%20May%2015%2C%202022%2C%20from%20%26lt%3Ba%20class%3D%26%23039%3Bzp-ItemURL%26%23039%3B%20href%3D%26%23039%3Bhttps%3A%5C%2F%5C%2Fwww.avast.com%5C%2Fde-de%5C%2Fc-cybercrime%26%23039%3B%26gt%3Bhttps%3A%5C%2F%5C%2Fwww.avast.com%5C%2Fde-de%5C%2Fc-cybercrime%26lt%3B%5C%2Fa%26gt%3B%26lt%3B%5C%2Fdiv%26gt%3B%5Cn%26lt%3B%5C%2Fdiv%26gt%3B%22%2C%22data%22%3A%7B%22itemType%22%3A%22webpage%22%2C%22title%22%3A%22Was%20ist%20Cyberkriminalit%5Cu00e4t%20und%20wie%20l%5Cu00e4sst%20sie%20sich%20verhindern%3F%22%2C%22creators%22%3A%5B%5D%2C%22abstractNote%22%3A%22Jedes%20Jahr%20kostet%20Cyberkriminalit%5Cu00e4t%20Einzelpersonen%20und%20Unternehmen%20Milliarden%20von%20Dollar%2C%20Tendenz%20steigend.%20Aber%20was%20genau%20hat%20man%20sich%20darunter%20vorzustellen%3F%20Hier%20herausfinden.%22%2C%22date%22%3A%22%22%2C%22url%22%3A%22https%3A%5C%2F%5C%2Fwww.avast.com%5C%2Fde-de%5C%2Fc-cybercrime%22%2C%22language%22%3A%22de-de%22%2C%22collections%22%3A%5B%22YLB2M7DD%22%5D%2C%22dateModified%22%3A%222022–05-15T14%3A27%3A52Z%22%7D%7D%2C%7B%22key%22%3A%22ASCKGCWR%22%2C%22library%22%3A%7B%22id%22%3A2359887%7D%2C%22meta%22%3A%7B%22numChildren%22%3A1%7D%2C%22bib%22%3A%22%26lt%3Bdiv%20class%3D%26quot%3Bcsl-bib-body%26quot%3B%20style%3D%26quot%3Bline-height%3A%202%3B%20padding-left%3A%201em%3B%20text-indent%3A-1em%3B%26quot%3B%26gt%3B%5Cn%20%20%26lt%3Bdiv%20class%3D%26quot%3Bcsl-entry%26quot%3B%26gt%3B%26lt%3Bi%26gt%3BCyberkriminelle%20zur%20Bek%26%23xE4%3Bmpfung%20von%20Cyberkriminalit%26%23xE4%3Bt%20im%20Visier%26lt%3B%5C%2Fi%26gt%3B.%20%28n.d.%29.%20FireEye.%20Retrieved%20May%2015%2C%202022%2C%20from%20%26lt%3Ba%20class%3D%26%23039%3Bzp-ItemURL%26%23039%3B%20href%3D%26%23039%3Bhttps%3A%5C%2F%5C%2Fwww.fireeye.de%5C%2Fcurrent-threats%5C%2Fstopping-todays-cyber-attacks.html%26%23039%3B%26gt%3Bhttps%3A%5C%2F%5C%2Fwww.fireeye.de%5C%2Fcurrent-threats%5C%2Fstopping-todays-cyber-attacks.html%26lt%3B%5C%2Fa%26gt%3B%26lt%3B%5C%2Fdiv%26gt%3B%5Cn%26lt%3B%5C%2Fdiv%26gt%3B%22%2C%22data%22%3A%7B%22itemType%22%3A%22webpage%22%2C%22title%22%3A%22Cyberkriminelle%20zur%20Bek%5Cu00e4mpfung%20von%20Cyberkriminalit%5Cu00e4t%20im%20Visier%22%2C%22creators%22%3A%5B%5D%2C%22abstractNote%22%3A%22Cyberkriminalit%5Cu00e4t%20und%20Cyberangriffe%20nehmen%20weiter%20zu.%20Informieren%20Sie%20sich%2C%20wie%20Cyberkriminelle%20die%20Sicherheitsma%5Cu00dfnahmen%20von%20Unternehmen%20rasch%20%5Cu00fcberwinden%20und%20wie%20Sie%20sie%20stoppen%20k%5Cu00f6nnen.%22%2C%22date%22%3A%22%22%2C%22url%22%3A%22https%3A%5C%2F%5C%2Fwww.fireeye.de%5C%2Fcurrent-threats%5C%2Fstopping-todays-cyber-attacks.html%22%2C%22language%22%3A%22de%22%2C%22collections%22%3A%5B%22YLB2M7DD%22%5D%2C%22dateModified%22%3A%222022–05-15T14%3A27%3A27Z%22%7D%7D%2C%7B%22key%22%3A%22N62QBC8V%22%2C%22library%22%3A%7B%22id%22%3A2359887%7D%2C%22meta%22%3A%7B%22numChildren%22%3A1%7D%2C%22bib%22%3A%22%26lt%3Bdiv%20class%3D%26quot%3Bcsl-bib-body%26quot%3B%20style%3D%26quot%3Bline-height%3A%202%3B%20padding-left%3A%201em%3B%20text-indent%3A-1em%3B%26quot%3B%26gt%3B%5Cn%20%20%26lt%3Bdiv%20class%3D%26quot%3Bcsl-entry%26quot%3B%26gt%3B%26lt%3Bi%26gt%3BCyberkriminalit%26%23xE4%3Bt%20%26%23x2013%3B%20die%20Gefahr%20aus%20dem%20Home%20Office%26lt%3B%5C%2Fi%26gt%3B.%20%28n.d.%29.%20Deloitte%20Schweiz.%20Retrieved%20May%2015%2C%202022%2C%20from%20%26lt%3Ba%20class%3D%26%23039%3Bzp-ItemURL%26%23039%3B%20href%3D%26%23039%3Bhttps%3A%5C%2F%5C%2Fwww2.deloitte.com%5C%2Fch%5C%2Fde%5C%2Fpages%5C%2Frisk%5C%2Farticles%5C%2Fcovid-19-cyber-crime-working-from-home.html%26%23039%3B%26gt%3Bhttps%3A%5C%2F%5C%2Fwww2.deloitte.com%5C%2Fch%5C%2Fde%5C%2Fpages%5C%2Frisk%5C%2Farticles%5C%2Fcovid-19-cyber-crime-working-from-home.html%26lt%3B%5C%2Fa%26gt%3B%26lt%3B%5C%2Fdiv%26gt%3B%5Cn%26lt%3B%5C%2Fdiv%26gt%3B%22%2C%22data%22%3A%7B%22itemType%22%3A%22webpage%22%2C%22title%22%3A%22Cyberkriminalit%5Cu00e4t%20%5Cu2013%20die%20Gefahr%20aus%20dem%20Home%20Office%22%2C%22creators%22%3A%5B%5D%2C%22abstractNote%22%3A%22Die%20Arbeit%20aus%20dem%20Home%20Office%20stellt%20f%5Cu00fcr%20Unternehmen%20aufgrund%20der%20steigenden%20Anzahl%20von%20Cyberkriminellen%2C%20die%20COVID-19-bedingte%20%5Cu00c4ngste%20ausn%5Cu00fctzen%2C%20schlechter%20technologischer%20Infrastruktur%20und%20vor%20allem%20unzureichender%20Cyber-%20und%20Datensicherheit%20ein%20grosses%20Cyberrisiko%20dar.%22%2C%22date%22%3A%22%22%2C%22url%22%3A%22https%3A%5C%2F%5C%2Fwww2.deloitte.com%5C%2Fch%5C%2Fde%5C%2Fpages%5C%2Frisk%5C%2Farticles%5C%2Fcovid-19-cyber-crime-working-from-home.html%22%2C%22language%22%3A%22de%22%2C%22collections%22%3A%5B%22YLB2M7DD%22%5D%2C%22dateModified%22%3A%222022–05-15T14%3A27%3A03Z%22%7D%7D%2C%7B%22key%22%3A%229J5KDV3R%22%2C%22library%22%3A%7B%22id%22%3A2359887%7D%2C%22meta%22%3A%7B%22creatorSummary%22%3A%22Hillig%22%2C%22parsedDate%22%3A%222021–03-15%22%2C%22numChildren%22%3A1%7D%2C%22bib%22%3A%22%26lt%3Bdiv%20class%3D%26quot%3Bcsl-bib-body%26quot%3B%20style%3D%26quot%3Bline-height%3A%202%3B%20padding-left%3A%201em%3B%20text-indent%3A-1em%3B%26quot%3B%26gt%3B%5Cn%20%20%26lt%3Bdiv%20class%3D%26quot%3Bcsl-entry%26quot%3B%26gt%3BHillig%2C%20J.%20%282021%2C%20March%2015%29.%20%26lt%3Bi%26gt%3BSo%20leicht%20konnte%20Luzernerin%20%26%23xFC%3Bber%20150%26%23x2019%3B000%20Kameras%20hacken%26lt%3B%5C%2Fi%26gt%3B.%20Blick.%20%26lt%3Ba%20class%3D%26%23039%3Bzp-ItemURL%26%23039%3B%20href%3D%26%23039%3Bhttps%3A%5C%2F%5C%2Fwww.blick.ch%5C%2Fschweiz%5C%2Fsicherheits-skan­dal-in-den-usa-so-leicht-konnte-luzerner-ueber-150000-kameras-hacken-id16401940.html%26%23039%3B%26gt%3Bhttps%3A%5C%2F%5C%2Fwww.blick.ch%5C%2Fschweiz%5C%2Fsicherheits-skan­dal-in-den-usa-so-leicht-konnte-luzerner-ueber-150000-kameras-hacken-id16401940.html%26lt%3B%5C%2Fa%26gt%3B%26lt%3B%5C%2Fdiv%26gt%3B%5Cn%26lt%3B%5C%2Fdiv%26gt%3B%22%2C%22data%22%3A%7B%22itemType%22%3A%22webpage%22%2C%22title%22%3A%22So%20leicht%20konnte%20Luzernerin%20%5Cu00fcber%20150%27000%20Kameras%20hacken%22%2C%22creators%22%3A%5B%7B%22creatorType%22%3A%22author%22%2C%22firstName%22%3A%22Johannes%22%2C%22lastName%22%3A%22Hillig%22%7D%5D%2C%22abstractNote%22%3A%22Ein%20Schweizer%20Hacker-Kollektiv%20knackte%20rund%20150%26%23039%3B000%20%5Cu00dcberwachungskameras%20einer%20US-Firma%2C%20die%20in%20Gef%5Cu00e4ngnissen%20und%20Spit%5Cu00e4lern%20genutzt%20werden.%20Daf%5Cu00fcr%20brauchte%20es%20kein%20Super-Genie%2C%20erkl%5Cu00e4rt%20Berufshacker%20Cyrill%20Brunschwiler.%22%2C%22date%22%3A%222021–03-15T17%3A51%3A57.5757%2B01%3A00%22%2C%22url%22%3A%22https%3A%5C%2F%5C%2Fwww.blick.ch%5C%2Fschweiz%5C%2Fsicherheits-skan­dal-in-den-usa-so-leicht-konnte-luzerner-ueber-150000-kameras-hacken-id16401940.html%22%2C%22language%22%3A%22de-CH%22%2C%22collections%22%3A%5B%22YLB2M7DD%22%5D%2C%22dateModified%22%3A%222022–05-15T09%3A26%3A14Z%22%7D%7D%5D%7D
Lang­ner, R. (n.d.). STUXNET UND DIE FOLGEN.
Grimm, R. (n.d.). Psy­cho­lo­gi­cal Aspects of Cyber­crime.
Pug­net­ti, C., & Casián, C. (n.d.). Cyber­ri­si­ken und Schwei­zer KMU : Eine Unter­su­chung der Ein­stel­lun­gen von Mit­ar­bei­ten­den und ver­hal­tens­be­ding­ter Anfäl­lig­kei­ten. 32.
Rafi, S., & Imtiaz, N. (2023). Cyber­war: Its Psy­cho­lo­gi­cal Impact on Employees and Con­se­quen­ces for Orga­nizati­ons. In F. Özsun­gur (Ed.), Advan­ces in Digi­tal Crime, Foren­sics, and Cyber Ter­ro­rism (pp. 108–127). IGI Glo­bal. https://doi.org/10.4018/978–1‑6684–6741‑1.ch006
Rid, T., & Buchanan, B. (2015). Attri­bu­ting Cyber Attacks. Jour­nal of Stra­te­gic Stu­dies, 38(1–2), 4–37. https://doi.org/10.1080/01402390.2014.977382
Sham­si, J. A., Zea­dal­ly, S., Sheikh, F., & Flowers, A. (2016). Attri­bu­ti­on in cyber­space: tech­ni­ques and legal impli­ca­ti­ons. Secu­ri­ty and Com­mu­ni­ca­ti­on Net­works, 9(15), 2886–2900. https://doi.org/10.1002/sec.1485
Ade­jobi, J. A., Car­roll, F., Nawaf, L., & Mon­ta­sa­ri, R. (2021). PHISHING, TRUST AND HUMAN WELLBEING.
Rafi, S., & Imtiaz, N. (2022). Occu­pa­tio­nal Stress and Work­place Bul­ly­ing Con­cer­ning Men­tal Health. Inter­na­tio­nal Jour­nal of Edu­ca­ti­on.
Becker­man, C. E. (2022). Is the­re a cyber secu­ri­ty dilem­ma? Jour­nal of Cyber­se­cu­ri­ty, 8(1), tyac012. https://doi.org/10.1093/cybsec/tyac012
Maness, R. C., & Vale­ria­no, B. (2018). Inter­na­tio­nal Cyber Con­flict and Natio­nal Secu­ri­ty (D. S. Reve­ron, N. K. Gvos­dev, & J. A. Cloud, Eds.; Vol. 1). Oxford Uni­ver­si­ty Press. https://doi.org/10.1093/oxfordhb/9780190680015.013.25
Mor­gan Sta­te Uni­ver­si­ty, & Buresh, D. L. (2022). In Light of The Ame­ri­can Depar­tu­re From Afgha­ni­stan, Does Net­work-Cen­tric War­fa­re Ade­qua­te­ly Prepa­re The United Sta­tes to Address Future Cyber Acti­vi­ties by The Tali­ban? Inter­na­tio­nal Jour­nal of Social Sci­ence And Human Rese­arch, 05(03). https://doi.org/10.47191/ijsshr/v5-i3-45
Naha, A. (2022). Emer­ging Cyber Secu­ri­ty Thre­ats: India’s Con­cerns and Opti­ons. Inter­na­tio­nal Jour­nal of Poli­tics and Secu­ri­ty, 4(1), 170–200. https://doi.org/10.53451/ijps.996755
Rapac­ci­ni, M. (n.d.). Cyber­war­fa­re: defi­ni­zio­ni, casi di stu­dio e ana­li­si.
Zea­dal­ly, S., & Flowers, A. (2014). Cyber­war: The What, When, Why, and How [Com­men­ta­ry]. IEEE Tech­no­lo­gy and Socie­ty Maga­zi­ne, 33(3), 14–21. https://doi.org/10.1109/MTS.2014.2345196
Cor­nish, P., Hug­hes, R., & Living­stone, D. (2009). Cyber­space and the natio­nal secu­ri­ty of the United King­dom: thre­ats and respon­ses. Chat­ham House.
Csec, T. P. (n.d.). Run­ning Head: AFRICA, EUROPE, AND MIDDLE EAST THREAT ASSESSMENT.
Muk­her­jee, S. (2019). Cyber War­fa­re and Impli­ca­ti­ons. SSRN Elec­tro­nic Jour­nal. https://doi.org/10.2139/ssrn.3431676
Cyber thre­ats: taxo­no­my, impact, poli­ci­es, and way for­ward. (2022). KSII Tran­sac­tions on Inter­net and Infor­ma­ti­on Systems, 16(7). https://doi.org/10.3837/tiis.2022.07.017
Heja­se, H. J., Fay­yad-Kazan, H. F., Heja­se, A. J., & Mou­ka­dem, I. A. (2021). Cyber Secu­ri­ty amid COVID-19. Com­pu­ter and Infor­ma­ti­on Sci­ence, 14(2), 10. https://doi.org/10.5539/cis.v14n2p10
Nycyk, M. (n.d.). Com­pu­ter Hackers and Hacking:
Wil­son, C. (n.d.). Bot­nets, Cyber­crime, and Cyber­ter­ro­rism: Vul­nerabi­li­ties and Poli­cy Issues for Con­gress.
De Matos Alves, A. (2015). Bet­ween the “Batt­le­field” Meta­phor and Pro­mi­ses of Gene­ra­ti­vi­ty: Con­tra­sting Dis­cour­ses on Cyber­con­flict. Cana­di­an Jour­nal of Com­mu­ni­ca­ti­on, 40(3), 389–406. https://doi.org/10.22230/cjc.2015v40n3a2742
Urquhart, L., & McAu­ley, D. (2018). Avo­i­ding the inter­net of inse­cu­re indu­stri­al things. Com­pu­ter Law & Secu­ri­ty Review, 34(3), 450–466. https://doi.org/10.1016/j.clsr.2017.12.004
Eils­trup-San­gio­van­ni, M. (2018). Why the World Needs an Inter­na­tio­nal Cyber­war Con­ven­ti­on. Phi­lo­so­phy & Tech­no­lo­gy, 31(3), 379–407. https://doi.org/10.1007/s13347-017‑0271‑5
Ghio­nis, A. A. (n.d.). The Limits of Deter­rence in the Cyber World.
Kari­mov, N. (n.d.). The Euro­pean Uni­on Cyber Secu­ri­ty and Pro­tec­tion of Human Rights.
Warf, B., & Feke­te, E. (2016). Rela­tio­nal geo­gra­phies of cyber­ter­ro­rism and cyber­war. Space and Poli­ty, 20(2), 143–157. https://doi.org/10.1080/13562576.2015.1112113
Sig­holm, J. (2013). Non-Sta­te Actors in Cyber­space Ope­ra­ti­ons. Jour­nal of Mili­ta­ry Stu­dies, 4(1), 1–37. https://doi.org/10.1515/jms-2016–0184
Bur­ton, J. (2015). NATO’s cyber defence: stra­te­gic chal­lenges and insti­tu­tio­nal adap­t­ati­on. Defence Stu­dies, 15(4), 297–319. https://doi.org/10.1080/14702436.2015.1108108
Lind­strom, G. (n.d.). Mee­ting the Cyber Secu­ri­ty Chall­enge.
Kasch­ner, H. (2020). Cyber Cri­sis Manage­ment: Das Pra­xis­hand­buch zu Kri­sen­ma­nage­ment und Kri­sen­kom­mu­ni­ka­ti­on. Sprin­ger Fach­me­di­en Wies­ba­den. https://doi.org/10.1007/978–3‑658–27914‑1
Rosen­ber­ger, N., Nie­der­häu­ser, M., & Krä­mer, K. (2023). Kom­mu­ni­ka­ti­on in der digi­ta­len Trans­for­ma­ti­on : Trend­stu­die Schweiz 2022. https://doi.org/10.21256/ZHAW-2808
Lerch, K. M., & Tan­ner, M. (2022). Schwei­ze­ri­sche Mobi­li­ar Ver­si­che­rungs­ge­sell­schaft AG Digi­tals­witz­er­land Alli­anz Digi­ta­le Sicher­heit Schweiz Fach­hoch­schu­le Nord­west­schweiz FHNW, Kom­pe­tenz­zen­trum Digi­ta­le Trans­for­ma­ti­on Schwei­ze­ri­sche Aka­de­mie der Tech­ni­schen Wis­sen­schaf­ten SATW.
Frick, J.-C. (2022). Com­pa­ris- Daten­ver­trau­ens- stu­die 2022.
Knoll, M. (2017). IT-Risi­ko­ma­nage­ment im Zeit­al­ter der Digi­ta­li­sie­rung. HMD Pra­xis der Wirt­schafts­in­for­ma­tik, 54(1), 4–20. https://doi.org/10.1365/s40702-017‑0287‑4
Hor­ten, B., & Grä­ber, M. (2020). Cyber­kri­mi­na­li­tät: Über­sicht zu aktu­el­len und künf­ti­gen Erschei­nungs­for­men. Foren­si­sche Psych­ia­trie, Psy­cho­lo­gie, Kri­mi­no­lo­gie, 14(3), 233–241. https://doi.org/10.1007/s11757-020–00605‑0
Kas­pro­wicz, D., & Rie­ger, S. (Eds.). (2020). Hand­buch Vir­tua­li­tät. Sprin­ger Fach­me­di­en Wies­ba­den. https://doi.org/10.1007/978–3‑658–16342‑6
Bartsch, M., & Frey, S. (2017). Cyber­stra­te­gien für Unter­neh­men und Behör­den. Sprin­ger Fach­me­di­en Wies­ba­den. https://doi.org/10.1007/978–3‑658–16139‑2
Peter, M. K., Hölz­li, A., Kae­lin, A. W., Lerch, K. M., Vifi­an, P., & Wett­stein, N. (n.d.). Home­of­fice und Cybers­ icher­heit in Schwei­zer KMU. 30.
New­man, N. (n.d.). Reu­ters Insti­tu­te Digi­tal News Report 2020 (p. 112).
Deloit­te. (n.d.). Cyber sur­vey 2020. Retrie­ved May 23, 2022, from https://www2.deloitte.com/content/dam/Deloitte/dk/Documents/Cyber/cyberreport/Cyber_survey_.pdf
Deloit­te. (2019). Cyber Secu­ri­ty Report 2019. Teil 1 Deutsch­land. https://www2.deloitte.com/content/dam/Deloitte/de/Documents/risk/Cyber-Security-Report-2019-Teil‑1.pdf
Deloit­te. (n.d.). Deloit­te Cyber Secu­ri­ty Report-2021 Deutsch­land. Retrie­ved May 23, 2022, from https://www2.deloitte.com/content/dam/Deloitte/de/Documents/risk/Deloitte-Cyber-Security-Report-2021.pdf
Tech­no­lo­gy Solu­ti­ons for Com­ply­ing with the GDPR and Data Pri­va­cy Laws. (n.d.). Retrie­ved May 15, 2022, from https://www.shrm.org/resourcesandtools/hr-topics/technology/pages/technology-solutions-gdpr-data-privacy-laws.aspx
Exclu­si­ve: Seni­or EU offi­ci­als were tar­ge­ted with Israe­li spy­wa­re | Reu­ters. (n.d.). Retrie­ved May 15, 2022, from https://www.reuters.com/technology/exclusive-senior-eu-officials-were-targeted-with-israeli-spyware-sources-2022–04-11/
Raaf­laub), , (Über­tra­gung aus dem Fran­zö­si­schen: Chri­sti­an. (n.d.). Home­of­fice – Ein­falls­tor für Cyber­kri­mi­nel­le. SWI swissinfo.ch. Retrie­ved May 15, 2022, from https://www.swissinfo.ch/ger/gesellschaft/homeoffice—einfallstor-fuer-cyberkriminelle/46155880
Was ist Cyber­kri­mi­na­li­tät und wie lässt sie sich ver­hin­dern? (n.d.). Was ist Cyber­kri­mi­na­li­tät und wie lässt sie sich ver­hin­dern? Retrie­ved May 15, 2022, from https://www.avast.com/de-de/c‑cybercrime
Cyber­kri­mi­nel­le zur Bekämp­fung von Cyber­kri­mi­na­li­tät im Visier. (n.d.). FireEye. Retrie­ved May 15, 2022, from https://www.fireeye.de/current-threats/stopping-todays-cyber-attacks.html
Cyber­kri­mi­na­li­tät – die Gefahr aus dem Home Office. (n.d.). Deloit­te Schweiz. Retrie­ved May 15, 2022, from https://www2.deloitte.com/ch/de/pages/risk/articles/covid-19-cyber-crime-working-from-home.html
Hil­lig, J. (2021, March 15). So leicht konn­te Luzer­ne­rin über 150’000 Kame­ras hacken. Blick. https://www.blick.ch/schweiz/sicherheits-skandal-in-den-usa-so-leicht-konnte-luzerner-ueber-150000-kameras-hacken-id16401940.html
  • 2359887 100 apa crea­tor asc top­le­vel 1
    Top Level Items