2359887
YLB2M7DD
apa
50
34
https://krisenkom.ch/wp-content/plugins/zotpress/
%7B%22status%22%3A%22success%22%2C%22updateneeded%22%3Afalse%2C%22instance%22%3A%22zotpress-f9aba7b3a1965051340b24cd7639ae39%22%2C%22meta%22%3A%7B%22request_last%22%3A50%2C%22request_next%22%3A50%2C%22used_cache%22%3Atrue%7D%2C%22data%22%3A%5B%7B%22key%22%3A%22SZENRYHB%22%2C%22library%22%3A%7B%22id%22%3A2359887%7D%2C%22meta%22%3A%7B%22creatorSummary%22%3A%22Grimm%22%2C%22numChildren%22%3A2%7D%2C%22bib%22%3A%22%3Cdiv%20class%3D%5C%22csl-bib-body%5C%22%20style%3D%5C%22line-height%3A%202%3B%20padding-left%3A%201em%3B%20text-indent%3A-1em%3B%5C%22%3E%5Cn%20%20%3Cdiv%20class%3D%5C%22csl-entry%5C%22%3EGrimm%2C%20R.%20%28n.d.%29.%20%3Ci%3EPsychological%20Aspects%20of%20Cybercrime%3C%5C%2Fi%3E.%3C%5C%2Fdiv%3E%5Cn%3C%5C%2Fdiv%3E%22%2C%22data%22%3A%7B%22itemType%22%3A%22journalArticle%22%2C%22title%22%3A%22Psychological%20Aspects%20of%20Cybercrime%22%2C%22creators%22%3A%5B%7B%22creatorType%22%3A%22author%22%2C%22firstName%22%3A%22Reto%22%2C%22lastName%22%3A%22Grimm%22%7D%5D%2C%22abstractNote%22%3A%22%22%2C%22date%22%3A%22%22%2C%22language%22%3A%22de%22%2C%22DOI%22%3A%22%22%2C%22ISSN%22%3A%22%22%2C%22url%22%3A%22%22%2C%22collections%22%3A%5B%22YLB2M7DD%22%2C%22P8EH5P66%22%5D%2C%22dateModified%22%3A%222024–08-18T10%3A06%3A58Z%22%7D%7D%2C%7B%22key%22%3A%22XJUQTMKY%22%2C%22library%22%3A%7B%22id%22%3A2359887%7D%2C%22meta%22%3A%7B%22lastModifiedByUser%22%3A%7B%22id%22%3A5893267%2C%22username%22%3A%22Tabaeris%22%2C%22name%22%3A%22Dr.%20Baeriswyl%20Othmar%22%2C%22links%22%3A%7B%22alternate%22%3A%7B%22href%22%3A%22https%3A%5C%2F%5C%2Fwww.zotero.org%5C%2Ftabaeris%22%2C%22type%22%3A%22text%5C%2Fhtml%22%7D%7D%7D%2C%22creatorSummary%22%3A%22Pugnetti%20and%20Casi%5Cu00e1n%22%2C%22numChildren%22%3A1%7D%2C%22bib%22%3A%22%3Cdiv%20class%3D%5C%22csl-bib-body%5C%22%20style%3D%5C%22line-height%3A%202%3B%20padding-left%3A%201em%3B%20text-indent%3A-1em%3B%5C%22%3E%5Cn%20%20%3Cdiv%20class%3D%5C%22csl-entry%5C%22%3EPugnetti%2C%20C.%2C%20%26amp%3B%20Casi%26%23xE1%3Bn%2C%20C.%20%28n.d.%29.%20%3Ci%3ECyberrisiken%20und%20Schweizer%20KMU%26%23x202F%3B%3A%20Eine%20Untersuchung%20der%20Einstellungen%20von%20Mitarbeitenden%20und%20verhaltensbedingter%20Anf%26%23xE4%3Blligkeiten%3C%5C%2Fi%3E.%2032.%3C%5C%2Fdiv%3E%5Cn%3C%5C%2Fdiv%3E%22%2C%22data%22%3A%7B%22itemType%22%3A%22journalArticle%22%2C%22title%22%3A%22Cyberrisiken%20und%20Schweizer%20KMU%20%3A%20Eine%20Untersuchung%20der%20Einstellungen%20von%20Mitarbeitenden%20und%20verhaltensbedingter%20Anf%5Cu00e4lligkeiten%22%2C%22creators%22%3A%5B%7B%22creatorType%22%3A%22author%22%2C%22firstName%22%3A%22Carlo%22%2C%22lastName%22%3A%22Pugnetti%22%7D%2C%7B%22creatorType%22%3A%22author%22%2C%22firstName%22%3A%22Carlos%22%2C%22lastName%22%3A%22Casi%5Cu00e1n%22%7D%5D%2C%22abstractNote%22%3A%22%22%2C%22date%22%3A%22%22%2C%22language%22%3A%22de%22%2C%22DOI%22%3A%22%22%2C%22ISSN%22%3A%22%22%2C%22url%22%3A%22%22%2C%22collections%22%3A%5B%22YLB2M7DD%22%5D%2C%22dateModified%22%3A%222023–11-27T09%3A02%3A04Z%22%7D%7D%2C%7B%22key%22%3A%22VIF8SY58%22%2C%22library%22%3A%7B%22id%22%3A2359887%7D%2C%22meta%22%3A%7B%22creatorSummary%22%3A%22Rafi%20and%20Imtiaz%22%2C%22parsedDate%22%3A%222023–05-05%22%2C%22numChildren%22%3A2%7D%2C%22bib%22%3A%22%3Cdiv%20class%3D%5C%22csl-bib-body%5C%22%20style%3D%5C%22line-height%3A%202%3B%20padding-left%3A%201em%3B%20text-indent%3A-1em%3B%5C%22%3E%5Cn%20%20%3Cdiv%20class%3D%5C%22csl-entry%5C%22%3ERafi%2C%20S.%2C%20%26amp%3B%20Imtiaz%2C%20N.%20%282023%29.%20Cyberwar%3A%20Its%20Psychological%20Impact%20on%20Employees%20and%20Consequences%20for%20Organizations.%20In%20F.%20%26%23xD6%3Bzsungur%20%28Ed.%29%2C%20%3Ci%3EAdvances%20in%20Digital%20Crime%2C%20Forensics%2C%20and%20Cyber%20Terrorism%3C%5C%2Fi%3E%20%28pp.%20108%26%23x2013%3B127%29.%20IGI%20Global.%20https%3A%5C%2F%5C%2Fdoi.org%5C%2F10.4018%5C%2F978‑1–6684-6741–1.ch006%3C%5C%2Fdiv%3E%5Cn%3C%5C%2Fdiv%3E%22%2C%22data%22%3A%7B%22itemType%22%3A%22bookSection%22%2C%22title%22%3A%22Cyberwar%3A%20Its%20Psychological%20Impact%20on%20Employees%20and%20Consequences%20for%20Organizations%22%2C%22creators%22%3A%5B%7B%22creatorType%22%3A%22editor%22%2C%22firstName%22%3A%22Fahri%22%2C%22lastName%22%3A%22%5Cu00d6zsungur%22%7D%2C%7B%22creatorType%22%3A%22author%22%2C%22firstName%22%3A%22Sumbul%22%2C%22lastName%22%3A%22Rafi%22%7D%2C%7B%22creatorType%22%3A%22author%22%2C%22firstName%22%3A%22Nasheed%22%2C%22lastName%22%3A%22Imtiaz%22%7D%5D%2C%22abstractNote%22%3A%22Invasion%2C%20terrorist%20attacks%2C%20drone%20strikes%2C%20insurgency%20and%20counterinsurgency%2C%20civil%20strife%2C%20and%20foreign%20intervention%20have%20already%20spread%20around%20the%20world%2C%20but%20war%20is%20now%20spreading%20and%20intensifying%20in%20a%20new%20form%20waged%20across%20digital%20networks%3A%20cyberwar.%20This%20war%20is%20fought%20through%20the%20use%20of%20computers%20and%20the%20internet.%20Today%2C%20the%20central%20part%20of%20organizational%20activities%20has%20been%20converted%20to%20digital%20format.%20Cybercriminals%20are%20continually%20developing%20new%20attack%20types%2C%20tools%2C%20and%20strategies%20that%20enable%20them%20to%20access%20settings%20that%20are%20more%20complicated%20or%20well-controlled%2C%20do%20more%20harm%2C%20and%20even%20remain%20undiscovered.%20This%20chapter%20discusses%20the%20history%20of%20cyber%20war%2C%20its%20emergence%2C%20and%20the%20different%20forms%20of%20cyberattacks%20and%20various%20repercussions%20of%20cybercrime%2C%20including%20its%20influence%20on%20the%20health%20of%20organizations%2C%20the%20psychological%20and%20social%20threats%20it%20poses%20to%20workers%2C%20and%20other%20outcomes.%20Cybercrime%20is%20defined%20and%20exposed%20by%20specialist%20literature.%22%2C%22bookTitle%22%3A%22Advances%20in%20Digital%20Crime%2C%20Forensics%2C%20and%20Cyber%20Terrorism%22%2C%22date%22%3A%222023–5‑5%22%2C%22language%22%3A%22en%22%2C%22ISBN%22%3A%22978–1‑66846–741‑1%20978–1‑66846–742‑8%22%2C%22url%22%3A%22https%3A%5C%2F%5C%2Fservices.igi-global.com%5C%2Fresolvedoi%5C%2Fresolve.aspx%3Fdoi%3D10.4018%5C%2F978‑1–6684-6741–1.ch006%22%2C%22collections%22%3A%5B%22YLB2M7DD%22%5D%2C%22dateModified%22%3A%222023–11-08T08%3A54%3A17Z%22%7D%7D%2C%7B%22key%22%3A%22WTB64L2J%22%2C%22library%22%3A%7B%22id%22%3A2359887%7D%2C%22meta%22%3A%7B%22creatorSummary%22%3A%22Rid%20and%20Buchanan%22%2C%22parsedDate%22%3A%222015–01-02%22%2C%22numChildren%22%3A1%7D%2C%22bib%22%3A%22%3Cdiv%20class%3D%5C%22csl-bib-body%5C%22%20style%3D%5C%22line-height%3A%202%3B%20padding-left%3A%201em%3B%20text-indent%3A-1em%3B%5C%22%3E%5Cn%20%20%3Cdiv%20class%3D%5C%22csl-entry%5C%22%3ERid%2C%20T.%2C%20%26amp%3B%20Buchanan%2C%20B.%20%282015%29.%20Attributing%20Cyber%20Attacks.%20%3Ci%3EJournal%20of%20Strategic%20Studies%3C%5C%2Fi%3E%2C%20%3Ci%3E38%3C%5C%2Fi%3E%281%26%23x2013%3B2%29%2C%204%26%23x2013%3B37.%20%3Ca%20href%3D%27https%3A%5C%2F%5C%2Fdoi.org%5C%2F10.1080%5C%2F01402390.2014.977382%27%3Ehttps%3A%5C%2F%5C%2Fdoi.org%5C%2F10.1080%5C%2F01402390.2014.977382%3C%5C%2Fa%3E%3C%5C%2Fdiv%3E%5Cn%3C%5C%2Fdiv%3E%22%2C%22data%22%3A%7B%22itemType%22%3A%22journalArticle%22%2C%22title%22%3A%22Attributing%20Cyber%20Attacks%22%2C%22creators%22%3A%5B%7B%22creatorType%22%3A%22author%22%2C%22firstName%22%3A%22Thomas%22%2C%22lastName%22%3A%22Rid%22%7D%2C%7B%22creatorType%22%3A%22author%22%2C%22firstName%22%3A%22Ben%22%2C%22lastName%22%3A%22Buchanan%22%7D%5D%2C%22abstractNote%22%3A%22Who%20did%20it%3F%20Attribution%20is%20fundamental.%20Human%20lives%20and%20the%20security%20of%20the%20state%20may%20depend%20on%20ascribing%20agency%20to%20an%20agent.%20In%20the%20context%20of%20computer%20network%20intrusions%2C%20attribution%20is%20commonly%20seen%20as%20one%20of%20the%20most%20intractable%20technical%20problems%2C%20as%20either%20solvable%20or%20not%20solvable%2C%20and%20as%20dependent%20mainly%20on%20the%20available%20forensic%20evidence.%20But%20is%20it%3F%20Is%20this%20a%20productive%20understanding%20of%20attribution%3F%20%5Cu2014%20This%20article%20argues%20that%20attribution%20is%20what%20states%20make%20of%20it.%20To%20show%20how%2C%20we%20introduce%20the%20Q%20Model%3A%20designed%20to%20explain%2C%20guide%2C%20and%20improve%20the%20making%20of%20attribution.%20Matching%20an%20offender%20to%20an%20offence%20is%20an%20exercise%20in%20minimising%20uncertainty%20on%20three%20levels%3A%20tactically%2C%20attribution%20is%20an%20art%20as%20well%20as%20a%20science%3B%20operationally%2C%20attribution%20is%20a%20nuanced%20process%20not%20a%20blackand-white%20problem%3B%20and%20strategically%2C%20attribution%20is%20a%20function%20of%20what%20is%20at%20stake%20politically.%20Successful%20attribution%20requires%20a%20range%20of%20skills%20on%20all%20levels%2C%20careful%20management%2C%20time%2C%20leadership%2C%20stress-testing%2C%20prudent%20communication%2C%20and%20recognising%20limitations%20and%20challenges.%22%2C%22date%22%3A%222015–01-02%22%2C%22language%22%3A%22en%22%2C%22DOI%22%3A%2210.1080%5C%2F01402390.2014.977382%22%2C%22ISSN%22%3A%220140–2390%2C%201743–937X%22%2C%22url%22%3A%22http%3A%5C%2F%5C%2Fwww.tandfonline.com%5C%2Fdoi%5C%2Fabs%5C%2F10.1080%5C%2F01402390.2014.977382%22%2C%22collections%22%3A%5B%22YLB2M7DD%22%5D%2C%22dateModified%22%3A%222023–11-08T08%3A54%3A15Z%22%7D%7D%2C%7B%22key%22%3A%229TBKB6UG%22%2C%22library%22%3A%7B%22id%22%3A2359887%7D%2C%22meta%22%3A%7B%22creatorSummary%22%3A%22Shamsi%20et%20al.%22%2C%22parsedDate%22%3A%222016%22%2C%22numChildren%22%3A1%7D%2C%22bib%22%3A%22%3Cdiv%20class%3D%5C%22csl-bib-body%5C%22%20style%3D%5C%22line-height%3A%202%3B%20padding-left%3A%201em%3B%20text-indent%3A-1em%3B%5C%22%3E%5Cn%20%20%3Cdiv%20class%3D%5C%22csl-entry%5C%22%3EShamsi%2C%20J.%20A.%2C%20Zeadally%2C%20S.%2C%20Sheikh%2C%20F.%2C%20%26amp%3B%20Flowers%2C%20A.%20%282016%29.%20Attribution%20in%20cyberspace%3A%20techniques%20and%20legal%20implications.%20%3Ci%3ESecurity%20and%20Communication%20Networks%3C%5C%2Fi%3E%2C%20%3Ci%3E9%3C%5C%2Fi%3E%2815%29%2C%202886%26%23x2013%3B2900.%20%3Ca%20href%3D%27https%3A%5C%2F%5C%2Fdoi.org%5C%2F10.1002%5C%2Fsec.1485%27%3Ehttps%3A%5C%2F%5C%2Fdoi.org%5C%2F10.1002%5C%2Fsec.1485%3C%5C%2Fa%3E%3C%5C%2Fdiv%3E%5Cn%3C%5C%2Fdiv%3E%22%2C%22data%22%3A%7B%22itemType%22%3A%22journalArticle%22%2C%22title%22%3A%22Attribution%20in%20cyberspace%3A%20techniques%20and%20legal%20implications%22%2C%22creators%22%3A%5B%7B%22creatorType%22%3A%22author%22%2C%22firstName%22%3A%22Jawwad%20A.%22%2C%22lastName%22%3A%22Shamsi%22%7D%2C%7B%22creatorType%22%3A%22author%22%2C%22firstName%22%3A%22Sherali%22%2C%22lastName%22%3A%22Zeadally%22%7D%2C%7B%22creatorType%22%3A%22author%22%2C%22firstName%22%3A%22Fareha%22%2C%22lastName%22%3A%22Sheikh%22%7D%2C%7B%22creatorType%22%3A%22author%22%2C%22firstName%22%3A%22Angelyn%22%2C%22lastName%22%3A%22Flowers%22%7D%5D%2C%22abstractNote%22%3A%22Attribution%20of%20cybercrimes%20is%20significant%20in%20limiting%20the%20rate%20of%20crime%20as%20well%20as%20in%20preparing%20the%20required%20level%20of%20response.%20Motivated%20by%20this%20significance%2C%20we%20introduce%20a%20level-based%20approach%20for%20achieving%20attribution.%20In%20our%20proposed%20approach%2C%20attribution%20consists%20of%20three%20steps%3A%20%281%29%20identification%20of%20the%20cyberweapon%20used%3B%20%282%29%20determination%20of%20the%20origin%20of%20the%20attack%3B%20and%20%283%29%20identification%20of%20the%20actual%20attacker.%20We%20conduct%20an%20in-depth%20analysis%20of%20recently%20proposed%20attribution%20techniques.%20Our%20analysis%20reveals%20that%20indirect%20methods%20of%20attribution%20are%20particularly%20effective%20when%20attributing%20cybercrimes%3B%20many%20of%20them%20remain%20unattributed.%20We%20also%20discuss%20some%20of%20the%20legal%20issues%20pertaining%20to%20attribution%2C%20and%20we%20argue%20that%20well-defined%20international%20laws%20for%20cyberspace%20along%20with%20strong%20cooperation%20among%20governments%20are%20needed%20to%20track%20down%20and%20punish%20cybercriminals.%20Copyright%20%5Cu00a9%202016%20John%20Wiley%20%26%20Sons%2C%20Ltd.%22%2C%22date%22%3A%2210%5C%2F2016%22%2C%22language%22%3A%22en%22%2C%22DOI%22%3A%2210.1002%5C%2Fsec.1485%22%2C%22ISSN%22%3A%221939–0114%2C%201939–0122%22%2C%22url%22%3A%22https%3A%5C%2F%5C%2Fonlinelibrary.wiley.com%5C%2Fdoi%5C%2F10.1002%5C%2Fsec.1485%22%2C%22collections%22%3A%5B%22YLB2M7DD%22%5D%2C%22dateModified%22%3A%222023–11-08T08%3A54%3A10Z%22%7D%7D%2C%7B%22key%22%3A%22LP3VD42Q%22%2C%22library%22%3A%7B%22id%22%3A2359887%7D%2C%22meta%22%3A%7B%22creatorSummary%22%3A%22Adejobi%20et%20al.%22%2C%22parsedDate%22%3A%222021%22%2C%22numChildren%22%3A1%7D%2C%22bib%22%3A%22%3Cdiv%20class%3D%5C%22csl-bib-body%5C%22%20style%3D%5C%22line-height%3A%202%3B%20padding-left%3A%201em%3B%20text-indent%3A-1em%3B%5C%22%3E%5Cn%20%20%3Cdiv%20class%3D%5C%22csl-entry%5C%22%3EAdejobi%2C%20J.%20A.%2C%20Carroll%2C%20F.%2C%20Nawaf%2C%20L.%2C%20%26amp%3B%20Montasari%2C%20R.%20%282021%29.%20%3Ci%3EPHISHING%2C%20TRUST%20AND%20HUMAN%20WELLBEING%3C%5C%2Fi%3E.%3C%5C%2Fdiv%3E%5Cn%3C%5C%2Fdiv%3E%22%2C%22data%22%3A%7B%22itemType%22%3A%22journalArticle%22%2C%22title%22%3A%22PHISHING%2C%20TRUST%20AND%20HUMAN%20WELLBEING%22%2C%22creators%22%3A%5B%7B%22creatorType%22%3A%22author%22%2C%22firstName%22%3A%22John%20Ayooluwa%22%2C%22lastName%22%3A%22Adejobi%22%7D%2C%7B%22creatorType%22%3A%22author%22%2C%22firstName%22%3A%22Fiona%22%2C%22lastName%22%3A%22Carroll%22%7D%2C%7B%22creatorType%22%3A%22author%22%2C%22firstName%22%3A%22Liqaa%22%2C%22lastName%22%3A%22Nawaf%22%7D%2C%7B%22creatorType%22%3A%22author%22%2C%22firstName%22%3A%22Reza%22%2C%22lastName%22%3A%22Montasari%22%7D%5D%2C%22abstractNote%22%3A%22The%20more%20time%20we%20spend%20online%2C%20the%20more%20our%20global%20connections%20grow%20and%20frighteningly%2C%20the%20more%20we%20are%20susceptible%20to%20cyberattacks.%20In%20particular%2C%202020%5C%2F%202021%20has%20seen%20a%20significant%20increase%20in%20successful%20phishing%20attacks%20mainly%20due%20to%20the%20rise%20in%20human%20vulnerabilities%20caused%20by%20the%20global%20COVID-19%20situation.%20In%20this%20paper%2C%20we%20consider%20the%20human%20factors%20of%20the%20phishing%20attack.%20We%20explore%20the%20evolution%20of%20the%20phishing%20attack%20with%20particular%20reference%20to%20its%20many%20different%20guises.%20Following%20that%2C%20the%20paper%20discusses%20the%20concept%20of%20trust%20and%20the%20human%20trust%20issues%20resulting%20from%20a%20phishing%20attack%3B%20it%20will%20focus%20on%20human%20vulnerability%20and%20the%20idea%20of%20phishing%20awareness.%20The%20findings%20from%20the%20study%20show%20that%20people%20feel%20that%20they%20can%20confidently%20recognize%20a%20phishing%20attack%20but%20it%20also%20highlights%20how%20personal%20attitudes%20and%20situational%20influences%20can%20make%20certain%20online%20users%20more%20susceptible%20than%20others.%20The%20findings%20also%20clearly%20detail%20how%20the%20phishing%20attack%20makes%20them%20and%20others%20feel%20and%20they%20assertively%20suggest%20ways%20to%20counter%20the%20attack.%20After%20portraying%20this%20picture%2C%20the%20question%20lies%20around%20the%20degree%20to%20which%20the%20everyday%20person%20is%20adequately%20equipped%20to%20psychologically%20deal%20with%20the%20sophisticated%20and%20contemporary%20phishing%20attack%2C%20and%20whether%20their%20thinking%20and%20methods%20of%20detection%5C%2F%20coping%20are%20so%20outdated%20that%20this%20%28in%20itself%29%20is%20creating%20an%20even%20greater%20risk.%22%2C%22date%22%3A%222021%22%2C%22language%22%3A%22en%22%2C%22DOI%22%3A%22%22%2C%22ISSN%22%3A%22%22%2C%22url%22%3A%22%22%2C%22collections%22%3A%5B%22YLB2M7DD%22%5D%2C%22dateModified%22%3A%222023–11-08T08%3A52%3A36Z%22%7D%7D%2C%7B%22key%22%3A%22B7D53LRR%22%2C%22library%22%3A%7B%22id%22%3A2359887%7D%2C%22meta%22%3A%7B%22creatorSummary%22%3A%22Rafi%20and%20Imtiaz%22%2C%22parsedDate%22%3A%222022%22%2C%22numChildren%22%3A1%7D%2C%22bib%22%3A%22%3Cdiv%20class%3D%5C%22csl-bib-body%5C%22%20style%3D%5C%22line-height%3A%202%3B%20padding-left%3A%201em%3B%20text-indent%3A-1em%3B%5C%22%3E%5Cn%20%20%3Cdiv%20class%3D%5C%22csl-entry%5C%22%3ERafi%2C%20S.%2C%20%26amp%3B%20Imtiaz%2C%20N.%20%282022%29.%20Occupational%20Stress%20and%20Workplace%20Bullying%20Concerning%20Mental%20Health.%20%3Ci%3EInternational%20Journal%20of%20Education%3C%5C%2Fi%3E.%3C%5C%2Fdiv%3E%5Cn%3C%5C%2Fdiv%3E%22%2C%22data%22%3A%7B%22itemType%22%3A%22journalArticle%22%2C%22title%22%3A%22Occupational%20Stress%20and%20Workplace%20Bullying%20Concerning%20Mental%20Health%22%2C%22creators%22%3A%5B%7B%22creatorType%22%3A%22author%22%2C%22firstName%22%3A%22Sumbul%22%2C%22lastName%22%3A%22Rafi%22%7D%2C%7B%22creatorType%22%3A%22author%22%2C%22firstName%22%3A%22Nasheed%22%2C%22lastName%22%3A%22Imtiaz%22%7D%5D%2C%22abstractNote%22%3A%22Mental%20health%20is%20a%20universal%20phenomenon%20and%20is%20equally%20studied%20and%20researched%20worldwide.%20It%20is%20considered%20the%20most%20significant%20human%20factor%20that%20highlights%20the%20working%20of%20any%20organisation.%20According%20to%20WHO%20%282019%29%2C%20%5C%22It%20is%20truly%20in%20everyone%27s%20best%20interests%20employers%27%20and%20employees%20alike%20to%20improve%20our%20team%27s%20mental%20health.%5C%22%20%5C%22Employees%20with%20low%20mental%20pressure%20are%20more%20efficient%20in%20giving%20output%2C%20have%20high%20employee%20turnover%2C%20and%20report%20lesser%20personal%20leaves.%20Occupational%20stress%20is%20a%20sense%20of%20disparity%20faced%20by%20an%20individual%20when%20they%20are%20unable%20to%20meet%20the%20demands%20of%20the%20workplace%20in%20a%20given%20period.%20At%20the%20same%20time%2C%20workplace%20bullying%20can%20be%20explained%20as%20a%20displaying%20series%20of%20negative%20behaviour%20subjected%20towards%20a%20particular%20person%20or%20a%20specific%20group.%20Therefore%2C%20the%20researcher%20grounds%20this%20investigation%20to%20assess%20the%20influence%20of%20occupational%20stress%20and%20workplace%20bullying%20on%20the%20mental%20health%20of%20employees%20and%20to%20study%20the%20relationship%20among%20the%20concerning%20variables.%20The%20sample%20consists%20of%20150%20employees%20of%20the%20private%20bank%20in%20Aligarh%20city.%20The%20online%20survey%20method%20has%20been%20used%20to%20get%20the%20responses%20with%20the%20help%20of%20questionnaires.%20The%20occupational%20stress%20index%20%28Srivastava%20%26%20Singh%29%3B%20Negative%20Acts%20Questionnaire-Revised%20%28Einarsen%29%3B%20and%20Mental%20Health%20scale%20%28Imtiaz%29%20were%20used%20as%20tools%20to%20conduct%20research.%20Regression%20analyses%20were%20used%20to%20analyse%20the%20data%20and%20to%20compute%20the%20results.%20The%20outcomes%20of%20the%20study%20show%20that%20Workplace%20bullying%20and%20Occupational%20stress%20emerged%20as%20significant%20predictors%20of%20mental%20health%2C%20and%20there%20is%20a%20highly%20significant%20negative%20relationship%20among%20the%20variables.%20The%20findings%20of%20the%20study%20are%20discussed%20in%20the%20paper%20in%20light%20of%20reviewed%20literature.%22%2C%22date%22%3A%222022%22%2C%22language%22%3A%22en%22%2C%22DOI%22%3A%22%22%2C%22ISSN%22%3A%22%22%2C%22url%22%3A%22%22%2C%22collections%22%3A%5B%22YLB2M7DD%22%5D%2C%22dateModified%22%3A%222023–11-02T07%3A51%3A44Z%22%7D%7D%2C%7B%22key%22%3A%22EV2G69HW%22%2C%22library%22%3A%7B%22id%22%3A2359887%7D%2C%22meta%22%3A%7B%22creatorSummary%22%3A%22Beckerman%22%2C%22parsedDate%22%3A%222022–01-28%22%2C%22numChildren%22%3A1%7D%2C%22bib%22%3A%22%3Cdiv%20class%3D%5C%22csl-bib-body%5C%22%20style%3D%5C%22line-height%3A%202%3B%20padding-left%3A%201em%3B%20text-indent%3A-1em%3B%5C%22%3E%5Cn%20%20%3Cdiv%20class%3D%5C%22csl-entry%5C%22%3EBeckerman%2C%20C.%20E.%20%282022%29.%20Is%20there%20a%20cyber%20security%20dilemma%3F%20%3Ci%3EJournal%20of%20Cybersecurity%3C%5C%2Fi%3E%2C%20%3Ci%3E8%3C%5C%2Fi%3E%281%29%2C%20tyac012.%20%3Ca%20href%3D%27https%3A%5C%2F%5C%2Fdoi.org%5C%2F10.1093%5C%2Fcybsec%5C%2Ftyac012%27%3Ehttps%3A%5C%2F%5C%2Fdoi.org%5C%2F10.1093%5C%2Fcybsec%5C%2Ftyac012%3C%5C%2Fa%3E%3C%5C%2Fdiv%3E%5Cn%3C%5C%2Fdiv%3E%22%2C%22data%22%3A%7B%22itemType%22%3A%22journalArticle%22%2C%22title%22%3A%22Is%20there%20a%20cyber%20security%20dilemma%3F%22%2C%22creators%22%3A%5B%7B%22creatorType%22%3A%22author%22%2C%22firstName%22%3A%22Carly%20E%22%2C%22lastName%22%3A%22Beckerman%22%7D%5D%2C%22abstractNote%22%3A%22In%20recent%20years%2C%20scholars%2C%20commentators%20and%20politicians%20have%20discussed%20the%20prospect%20of%20a%20%5Cu2018cyber%20security%20dilemma%5Cu2019.%20If%20states%20race%20to%20develop%20superior%20cyberattacks%2C%20how%20far%20might%20this%20escalate%3F%20Are%20state-led%20cyberattacks%20likely%20to%20provoke%20a%20full%20war%3F%20To%20address%20these%20related%20questions%2C%20I%20apply%20a%20multi-level%20Neoclassical%20Realist%20framework%20that%20progresses%20from%20systemic%20logic%20to%20an%20assessment%20of%20leader%20cues%20and%20cognition.%20This%20contributes%20much-needed%20coherence%20to%20debates%20about%20escalation%20and%20cyber%20warfare%20and%20demonstrates%20the%20framework%5Cu2019s%20utility%20for%20addressing%20contemporary%20and%20evolving%20problems%20in%20international%20affairs.%20The%20framework%20reveals%20that%2C%20according%20to%20both%20a%20systemic%20and%20societal%20cue%20analysis%2C%20fears%20regarding%20unchecked%20escalation%20from%20state%20competition%20in%20cyberspace%20to%20kinetic%20warfare%20are%20largely%20unfounded.%20Nevertheless%2C%20it%20also%20points%20toward%20one%20caveat%20and%20direction%20for%20further%20research%20in%20that%20cyber%20warfare%20directed%20at%20foreign%20leaders%5Cu2019%20political%20survival%20may%20be%20unexpectedly%20provocative%20in%20a%20way%20not%20currently%20addressed%20by%20escalation%20models.%22%2C%22date%22%3A%222022–01-28%22%2C%22language%22%3A%22en%22%2C%22DOI%22%3A%2210.1093%5C%2Fcybsec%5C%2Ftyac012%22%2C%22ISSN%22%3A%222057–2085%2C%202057–2093%22%2C%22url%22%3A%22https%3A%5C%2F%5C%2Facademic.oup.com%5C%2Fcybersecurity%5C%2Farticle%5C%2Fdoi%5C%2F10.1093%5C%2Fcybsec%5C%2Ftyac012%5C%2F6705410%22%2C%22collections%22%3A%5B%22YLB2M7DD%22%5D%2C%22dateModified%22%3A%222023–11-02T07%3A51%3A11Z%22%7D%7D%2C%7B%22key%22%3A%22B2ZFLEP3%22%2C%22library%22%3A%7B%22id%22%3A2359887%7D%2C%22meta%22%3A%7B%22creatorSummary%22%3A%22Maness%20and%20Valeriano%22%2C%22parsedDate%22%3A%222018–01-11%22%2C%22numChildren%22%3A1%7D%2C%22bib%22%3A%22%3Cdiv%20class%3D%5C%22csl-bib-body%5C%22%20style%3D%5C%22line-height%3A%202%3B%20padding-left%3A%201em%3B%20text-indent%3A-1em%3B%5C%22%3E%5Cn%20%20%3Cdiv%20class%3D%5C%22csl-entry%5C%22%3EManess%2C%20R.%20C.%2C%20%26amp%3B%20Valeriano%2C%20B.%20%282018%29.%20%3Ci%3EInternational%20Cyber%20Conflict%20and%20National%20Security%3C%5C%2Fi%3E%20%28D.%20S.%20Reveron%2C%20N.%20K.%20Gvosdev%2C%20%26amp%3B%20J.%20A.%20Cloud%2C%20Eds.%3B%20Vol.%201%29.%20Oxford%20University%20Press.%20https%3A%5C%2F%5C%2Fdoi.org%5C%2F10.1093%5C%2Foxfordhb%5C%2F9780190680015.013.25%3C%5C%2Fdiv%3E%5Cn%3C%5C%2Fdiv%3E%22%2C%22data%22%3A%7B%22itemType%22%3A%22book%22%2C%22title%22%3A%22International%20Cyber%20Conflict%20and%20National%20Security%22%2C%22creators%22%3A%5B%7B%22creatorType%22%3A%22editor%22%2C%22firstName%22%3A%22Derek%20S.%22%2C%22lastName%22%3A%22Reveron%22%7D%2C%7B%22creatorType%22%3A%22editor%22%2C%22firstName%22%3A%22Nikolas%20K.%22%2C%22lastName%22%3A%22Gvosdev%22%7D%2C%7B%22creatorType%22%3A%22editor%22%2C%22firstName%22%3A%22John%20A.%22%2C%22lastName%22%3A%22Cloud%22%7D%2C%7B%22creatorType%22%3A%22author%22%2C%22firstName%22%3A%22Ryan%20C.%22%2C%22lastName%22%3A%22Maness%22%7D%2C%7B%22creatorType%22%3A%22author%22%2C%22firstName%22%3A%22Brandon%22%2C%22lastName%22%3A%22Valeriano%22%7D%5D%2C%22abstractNote%22%3A%22Cyber%20conflict%20is%20often%20called%20the%20fifth%20domain%20of%20conflict.%20As%20more%20and%20more%20systems%2C%20networks%2C%20and%20information%20become%20digitized%2C%20there%20is%20contestation%20as%20to%20the%20growing%20nature%20of%20the%20threat%20and%20how%20exactly%20this%20domain%20can%20be%20exploited%20to%20coerce%20the%20enemy%20for%20either%20geopolitical%20or%20financial%20gain.%20Some%20argue%20that%20the%20cyber%20threat%20is%20exponentially%20growing%20and%20that%20offensive%20dominance%20reigns%2C%20making%20cyber%20conflict%20extremely%20unstable.%20Others%20contest%20that%20the%20threat%20is%20overblown%20and%20is%20more%20socially%20constructed.%20In%20this%20chapter%20we%20take%20a%20middle%20ground%20and%20find%20that%20much%20of%20the%20cyber%20conflict%20and%20security%20discourse%20has%20gotten%20it%20wrong%20through%20conjecture%20and%20worst-%20%28or%20best-%29%20case%20scenarios.%20We%20argue%20that%20a%20system%20of%20norms%20must%20be%20built%20upon%20and%20preserved%20to%20keep%20cyberspace%20a%20domain%20of%20relative%20openness%20and%20nonescalation.%20Arms%20races%20and%20deterrence%20strategies%20are%20not%20the%20path%20forward%20for%20a%20secure%2C%20prosperous%20cyberspace.%22%2C%22date%22%3A%222018–01-11%22%2C%22language%22%3A%22en%22%2C%22ISBN%22%3A%22%22%2C%22url%22%3A%22https%3A%5C%2F%5C%2Facademic.oup.com%5C%2Fedited-volume%5C%2F28069%5C%2Fchapter%5C%2F212086513%22%2C%22collections%22%3A%5B%22YLB2M7DD%22%5D%2C%22dateModified%22%3A%222023–11-02T07%3A51%3A07Z%22%7D%7D%2C%7B%22key%22%3A%22KL9RRIV5%22%2C%22library%22%3A%7B%22id%22%3A2359887%7D%2C%22meta%22%3A%7B%22creatorSummary%22%3A%22Morgan%20State%20University%20and%20Buresh%22%2C%22parsedDate%22%3A%222022–03-26%22%2C%22numChildren%22%3A1%7D%2C%22bib%22%3A%22%3Cdiv%20class%3D%5C%22csl-bib-body%5C%22%20style%3D%5C%22line-height%3A%202%3B%20padding-left%3A%201em%3B%20text-indent%3A-1em%3B%5C%22%3E%5Cn%20%20%3Cdiv%20class%3D%5C%22csl-entry%5C%22%3EMorgan%20State%20University%2C%20%26amp%3B%20Buresh%2C%20D.%20L.%20%282022%29.%20In%20Light%20of%20The%20American%20Departure%20From%20Afghanistan%2C%20Does%20Network-Centric%20Warfare%20Adequately%20Prepare%20The%20United%20States%20to%20Address%20Future%20Cyber%20Activities%20by%20The%20Taliban%3F%20%3Ci%3EInternational%20Journal%20of%20Social%20Science%20And%20Human%20Research%3C%5C%2Fi%3E%2C%20%3Ci%3E05%3C%5C%2Fi%3E%2803%29.%20%3Ca%20href%3D%27https%3A%5C%2F%5C%2Fdoi.org%5C%2F10.47191%5C%2Fijsshr%5C%2Fv5-i3-45%27%3Ehttps%3A%5C%2F%5C%2Fdoi.org%5C%2F10.47191%5C%2Fijsshr%5C%2Fv5-i3-45%3C%5C%2Fa%3E%3C%5C%2Fdiv%3E%5Cn%3C%5C%2Fdiv%3E%22%2C%22data%22%3A%7B%22itemType%22%3A%22journalArticle%22%2C%22title%22%3A%22In%20Light%20of%20The%20American%20Departure%20From%20Afghanistan%2C%20Does%20Network-Centric%20Warfare%20Adequately%20Prepare%20The%20United%20States%20to%20Address%20Future%20Cyber%20Activities%20by%20The%20Taliban%3F%22%2C%22creators%22%3A%5B%7B%22creatorType%22%3A%22author%22%2C%22name%22%3A%22Morgan%20State%20University%22%7D%2C%7B%22creatorType%22%3A%22author%22%2C%22firstName%22%3A%22Donald%20L.%22%2C%22lastName%22%3A%22Buresh%22%7D%5D%2C%22abstractNote%22%3A%22The%20issue%20considered%20in%20this%20article%20is%20whether%20the%20United%20States%20is%20prepared%20adequately%20to%20address%20the%20cyber%20activities%20of%20the%20Taliban%20in%20the%20future%20in%20light%20of%20the%20recent%20American%20departure%20from%20Afghanistan.%20The%20first%20section%20defines%20and%20discusses%20cyber%20espionage%2C%20cyber%20sabotage%2C%20cyber%20terrorism%2C%20and%20cyber%20warfare.%20The%20following%20section%20outlines%20the%20notion%20of%20network-centric%20warfare%20and%20its%20relationship%20to%20the%20various%20cyber-attacks.%20The%20third%20section%20contains%20a%20brief%20history%20of%20the%20Taliban%2C%20cumulating%20in%20assessing%20the%20current%20political%20situation%20in%20Afghanistan.%20The%20paper%5Cu2019s%20final%20section%20describes%20what%20adequate%20preparedness%20means%20for%20individuals%2C%20corporations%2C%20and%20the%20government.%20The%20paper%20concludes%20that%20the%20Taliban%20are%20not%20likely%20to%20be%20a%20cyber%20threat%20to%20the%20United%20States%20in%20the%20short%20term.%20However%2C%20as%20time%20progresses%20and%20the%20Taliban%20consolidates%20their%20political%20power%2C%20effectively%20defeating%20the%20Islamic%20State%20and%20insurgents%20in%20Panjshir%2C%20the%20United%20States%20will%20likely%20experience%20cyber%20attacks%20from%20the%20Taliban.%22%2C%22date%22%3A%222022–03-26%22%2C%22language%22%3A%22en%22%2C%22DOI%22%3A%2210.47191%5C%2Fijsshr%5C%2Fv5-i3-45%22%2C%22ISSN%22%3A%2226440679%2C%2026440695%22%2C%22url%22%3A%22https%3A%5C%2F%5C%2Fijsshr.in%5C%2Fv5i3%5C%2F45.php%22%2C%22collections%22%3A%5B%22YLB2M7DD%22%5D%2C%22dateModified%22%3A%222023–11-02T07%3A51%3A04Z%22%7D%7D%2C%7B%22key%22%3A%22ACEKHK7X%22%2C%22library%22%3A%7B%22id%22%3A2359887%7D%2C%22meta%22%3A%7B%22creatorSummary%22%3A%22Naha%22%2C%22parsedDate%22%3A%222022–05-01%22%2C%22numChildren%22%3A1%7D%2C%22bib%22%3A%22%3Cdiv%20class%3D%5C%22csl-bib-body%5C%22%20style%3D%5C%22line-height%3A%202%3B%20padding-left%3A%201em%3B%20text-indent%3A-1em%3B%5C%22%3E%5Cn%20%20%3Cdiv%20class%3D%5C%22csl-entry%5C%22%3ENaha%2C%20A.%20%282022%29.%20Emerging%20Cyber%20Security%20Threats%3A%20India%26%23x2019%3Bs%20Concerns%20and%20Options.%20%3Ci%3EInternational%20Journal%20of%20Politics%20and%20Security%3C%5C%2Fi%3E%2C%20%3Ci%3E4%3C%5C%2Fi%3E%281%29%2C%20170%26%23x2013%3B200.%20%3Ca%20href%3D%27https%3A%5C%2F%5C%2Fdoi.org%5C%2F10.53451%5C%2Fijps.996755%27%3Ehttps%3A%5C%2F%5C%2Fdoi.org%5C%2F10.53451%5C%2Fijps.996755%3C%5C%2Fa%3E%3C%5C%2Fdiv%3E%5Cn%3C%5C%2Fdiv%3E%22%2C%22data%22%3A%7B%22itemType%22%3A%22journalArticle%22%2C%22title%22%3A%22Emerging%20Cyber%20Security%20Threats%3A%20India%5Cu2019s%20Concerns%20and%20Options%22%2C%22creators%22%3A%5B%7B%22creatorType%22%3A%22author%22%2C%22firstName%22%3A%22Al%5Cu0131k%22%2C%22lastName%22%3A%22Naha%22%7D%5D%2C%22abstractNote%22%3A%22It%20has%20been%20believed%20that%20cyber%20power%2C%20along%20with%20conventional%20aspects%20such%20as%20economic%20resources%20and%20political%20will%2C%20is%20becoming%20a%20key%20component%20of%20national%20power.%20According%20to%20this%20logic%2C%20the%20country%20that%20can%20best%20lead%20and%20control%20cyber%20power%20would%20be%20more%20powerful%20than%20others.%20Cyber%20terrorism%20has%20arisen%20as%20a%20new%20phenomenon%20in%20India%20and%20investigations%20about%20terror%20attacks%20revealed%20the%20cyber%20terrorism%20trials.%20Furthermore%2C%20the%20reliance%20of%20government%20organizations%2C%20businesses%2C%20economic%20operations%2C%20and%20military%20affairs%20on%20Information%20and%20Communication%20Technology%20%28ICT%29%20demands%20the%20inclusion%20of%20cyber%20technology%20in%20strategic%20calculations.%20So%2C%20this%20essay%20recons%20to%20building%20cyber%20power%20capacity%20may%20be%20used%20as%20a%20tool%20of%20Indian%20foreign%20policy%2C%20leveraging%20the%20experience%20and%20human%20resources%20in%20the%20area%2C%20as%20well%20as%20enhancing%20local%20and%20global%20cyber%20cooperation.%22%2C%22date%22%3A%222022–05-01%22%2C%22language%22%3A%22en%22%2C%22DOI%22%3A%2210.53451%5C%2Fijps.996755%22%2C%22ISSN%22%3A%222667–8268%22%2C%22url%22%3A%22http%3A%5C%2F%5C%2Fdergipark.org.tr%5C%2Fen%5C%2Fdoi%5C%2F10.53451%5C%2Fijps.996755%22%2C%22collections%22%3A%5B%22YLB2M7DD%22%5D%2C%22dateModified%22%3A%222023–11-02T07%3A51%3A02Z%22%7D%7D%2C%7B%22key%22%3A%22R76XFJDC%22%2C%22library%22%3A%7B%22id%22%3A2359887%7D%2C%22meta%22%3A%7B%22creatorSummary%22%3A%22Rapaccini%22%2C%22numChildren%22%3A1%7D%2C%22bib%22%3A%22%3Cdiv%20class%3D%5C%22csl-bib-body%5C%22%20style%3D%5C%22line-height%3A%202%3B%20padding-left%3A%201em%3B%20text-indent%3A-1em%3B%5C%22%3E%5Cn%20%20%3Cdiv%20class%3D%5C%22csl-entry%5C%22%3ERapaccini%2C%20M.%20%28n.d.%29.%20%3Ci%3ECyberwarfare%3A%20definizioni%2C%20casi%20di%20studio%20e%20analisi%3C%5C%2Fi%3E.%3C%5C%2Fdiv%3E%5Cn%3C%5C%2Fdiv%3E%22%2C%22data%22%3A%7B%22itemType%22%3A%22journalArticle%22%2C%22title%22%3A%22Cyberwarfare%3A%20definizioni%2C%20casi%20di%20studio%20e%20analisi%22%2C%22creators%22%3A%5B%7B%22creatorType%22%3A%22author%22%2C%22firstName%22%3A%22Marco%22%2C%22lastName%22%3A%22Rapaccini%22%7D%5D%2C%22abstractNote%22%3A%22%22%2C%22date%22%3A%22%22%2C%22language%22%3A%22it%22%2C%22DOI%22%3A%22%22%2C%22ISSN%22%3A%22%22%2C%22url%22%3A%22%22%2C%22collections%22%3A%5B%22YLB2M7DD%22%5D%2C%22dateModified%22%3A%222023–11-02T07%3A50%3A59Z%22%7D%7D%2C%7B%22key%22%3A%226CG9QXEH%22%2C%22library%22%3A%7B%22id%22%3A2359887%7D%2C%22meta%22%3A%7B%22creatorSummary%22%3A%22Zeadally%20and%20Flowers%22%2C%22parsedDate%22%3A%222014%22%2C%22numChildren%22%3A1%7D%2C%22bib%22%3A%22%3Cdiv%20class%3D%5C%22csl-bib-body%5C%22%20style%3D%5C%22line-height%3A%202%3B%20padding-left%3A%201em%3B%20text-indent%3A-1em%3B%5C%22%3E%5Cn%20%20%3Cdiv%20class%3D%5C%22csl-entry%5C%22%3EZeadally%2C%20S.%2C%20%26amp%3B%20Flowers%2C%20A.%20%282014%29.%20Cyberwar%3A%20The%20What%2C%20When%2C%20Why%2C%20and%20How%20%5BCommentary%5D.%20%3Ci%3EIEEE%20Technology%20and%20Society%20Magazine%3C%5C%2Fi%3E%2C%20%3Ci%3E33%3C%5C%2Fi%3E%283%29%2C%2014%26%23x2013%3B21.%20%3Ca%20href%3D%27https%3A%5C%2F%5C%2Fdoi.org%5C%2F10.1109%5C%2FMTS.2014.2345196%27%3Ehttps%3A%5C%2F%5C%2Fdoi.org%5C%2F10.1109%5C%2FMTS.2014.2345196%3C%5C%2Fa%3E%3C%5C%2Fdiv%3E%5Cn%3C%5C%2Fdiv%3E%22%2C%22data%22%3A%7B%22itemType%22%3A%22journalArticle%22%2C%22title%22%3A%22Cyberwar%3A%20The%20What%2C%20When%2C%20Why%2C%20and%20How%20%5BCommentary%5D%22%2C%22creators%22%3A%5B%7B%22creatorType%22%3A%22author%22%2C%22firstName%22%3A%22Sherali%22%2C%22lastName%22%3A%22Zeadally%22%7D%2C%7B%22creatorType%22%3A%22author%22%2C%22firstName%22%3A%22Angelyn%22%2C%22lastName%22%3A%22Flowers%22%7D%5D%2C%22abstractNote%22%3A%22%22%2C%22date%22%3A%2223%5C%2F2014%22%2C%22language%22%3A%22en%22%2C%22DOI%22%3A%2210.1109%5C%2FMTS.2014.2345196%22%2C%22ISSN%22%3A%220278–0097%22%2C%22url%22%3A%22https%3A%5C%2F%5C%2Fieeexplore.ieee.org%5C%2Fdocument%5C%2F6901336%22%2C%22collections%22%3A%5B%22YLB2M7DD%22%5D%2C%22dateModified%22%3A%222023–11-02T07%3A50%3A57Z%22%7D%7D%2C%7B%22key%22%3A%22SMA2JJSX%22%2C%22library%22%3A%7B%22id%22%3A2359887%7D%2C%22meta%22%3A%7B%22creatorSummary%22%3A%22Cornish%20et%20al.%22%2C%22parsedDate%22%3A%222009%22%2C%22numChildren%22%3A1%7D%2C%22bib%22%3A%22%3Cdiv%20class%3D%5C%22csl-bib-body%5C%22%20style%3D%5C%22line-height%3A%202%3B%20padding-left%3A%201em%3B%20text-indent%3A-1em%3B%5C%22%3E%5Cn%20%20%3Cdiv%20class%3D%5C%22csl-entry%5C%22%3ECornish%2C%20P.%2C%20Hughes%2C%20R.%2C%20%26amp%3B%20Livingstone%2C%20D.%20%282009%29.%20%3Ci%3ECyberspace%20and%20the%20national%20security%20of%20the%20United%20Kingdom%3A%20threats%20and%20responses%3C%5C%2Fi%3E.%20Chatham%20House.%3C%5C%2Fdiv%3E%5Cn%3C%5C%2Fdiv%3E%22%2C%22data%22%3A%7B%22itemType%22%3A%22book%22%2C%22title%22%3A%22Cyberspace%20and%20the%20national%20security%20of%20the%20United%20Kingdom%3A%20threats%20and%20responses%22%2C%22creators%22%3A%5B%7B%22creatorType%22%3A%22author%22%2C%22firstName%22%3A%22Paul%22%2C%22lastName%22%3A%22Cornish%22%7D%2C%7B%22creatorType%22%3A%22author%22%2C%22firstName%22%3A%22Rex%22%2C%22lastName%22%3A%22Hughes%22%7D%2C%7B%22creatorType%22%3A%22author%22%2C%22firstName%22%3A%22David%22%2C%22lastName%22%3A%22Livingstone%22%7D%5D%2C%22abstractNote%22%3A%22%22%2C%22date%22%3A%222009%22%2C%22language%22%3A%22en%22%2C%22ISBN%22%3A%22978–1‑86203–215‑6%22%2C%22url%22%3A%22%22%2C%22collections%22%3A%5B%22YLB2M7DD%22%5D%2C%22dateModified%22%3A%222023–11-02T07%3A50%3A55Z%22%7D%7D%2C%7B%22key%22%3A%22Q5XW7GTK%22%2C%22library%22%3A%7B%22id%22%3A2359887%7D%2C%22meta%22%3A%7B%22creatorSummary%22%3A%22Csec%22%2C%22numChildren%22%3A1%7D%2C%22bib%22%3A%22%3Cdiv%20class%3D%5C%22csl-bib-body%5C%22%20style%3D%5C%22line-height%3A%202%3B%20padding-left%3A%201em%3B%20text-indent%3A-1em%3B%5C%22%3E%5Cn%20%20%3Cdiv%20class%3D%5C%22csl-entry%5C%22%3ECsec%2C%20T.%20P.%20%28n.d.%29.%20%3Ci%3ERunning%20Head%3A%20AFRICA%2C%20EUROPE%2C%20AND%20MIDDLE%20EAST%20THREAT%20ASSESSMENT%3C%5C%2Fi%3E.%3C%5C%2Fdiv%3E%5Cn%3C%5C%2Fdiv%3E%22%2C%22data%22%3A%7B%22itemType%22%3A%22journalArticle%22%2C%22title%22%3A%22Running%20Head%3A%20AFRICA%2C%20EUROPE%2C%20AND%20MIDDLE%20EAST%20THREAT%20ASSESSMENT%22%2C%22creators%22%3A%5B%7B%22creatorType%22%3A%22author%22%2C%22firstName%22%3A%22Tracey%20Petropol%22%2C%22lastName%22%3A%22Csec%22%7D%5D%2C%22abstractNote%22%3A%22Cybersecurity%20threats%20in%20Africa%2C%20Europe%2C%20Middle%20East%2C%20and%20other%20countries%20are%20assessed%20for%20hostile%20activity.%20Global%20security%20cultural%20differences%2C%20influences%2C%20and%20ethical%20principles%20are%20evaluated%20against%20the%20social%20issues%20which%20affect%20regional%20security%20practices.%20These%20threats%20are%20linked%20to%20national%20sources%20as%20described%20in%20this%20paper.%20Global%20cybersecurity%20policy%20practices%20are%20examined%20and%20the%20comprehensive%20role%20international%20organizations%20play%20to%20enhance%20strategies%20over%20the%20next%20decade.%20Nations%20discussed%20in%20this%20paper%20are%20studied%20for%20their%20lack%20of%20willingness%20and%20interest%20to%20engage%20in%20identifying%20domestic%20cybersecurity%20issues.%20Perspectives%20on%20legal%20issues%20and%20privacy%20as%20they%20relate%20to%20why%20some%20countries%20take%20stronger%20action%20against%20entities%20for%20cyber%20threats%20are%20also%20examined.%22%2C%22date%22%3A%22%22%2C%22language%22%3A%22en%22%2C%22DOI%22%3A%22%22%2C%22ISSN%22%3A%22%22%2C%22url%22%3A%22%22%2C%22collections%22%3A%5B%22YLB2M7DD%22%5D%2C%22dateModified%22%3A%222023–11-02T07%3A50%3A49Z%22%7D%7D%2C%7B%22key%22%3A%22VY62ZERW%22%2C%22library%22%3A%7B%22id%22%3A2359887%7D%2C%22meta%22%3A%7B%22creatorSummary%22%3A%22Mukherjee%22%2C%22parsedDate%22%3A%222019%22%2C%22numChildren%22%3A1%7D%2C%22bib%22%3A%22%3Cdiv%20class%3D%5C%22csl-bib-body%5C%22%20style%3D%5C%22line-height%3A%202%3B%20padding-left%3A%201em%3B%20text-indent%3A-1em%3B%5C%22%3E%5Cn%20%20%3Cdiv%20class%3D%5C%22csl-entry%5C%22%3EMukherjee%2C%20S.%20%282019%29.%20Cyber%20Warfare%20and%20Implications.%20%3Ci%3ESSRN%20Electronic%20Journal%3C%5C%2Fi%3E.%20%3Ca%20href%3D%27https%3A%5C%2F%5C%2Fdoi.org%5C%2F10.2139%5C%2Fssrn.3431676%27%3Ehttps%3A%5C%2F%5C%2Fdoi.org%5C%2F10.2139%5C%2Fssrn.3431676%3C%5C%2Fa%3E%3C%5C%2Fdiv%3E%5Cn%3C%5C%2Fdiv%3E%22%2C%22data%22%3A%7B%22itemType%22%3A%22journalArticle%22%2C%22title%22%3A%22Cyber%20Warfare%20and%20Implications%22%2C%22creators%22%3A%5B%7B%22creatorType%22%3A%22author%22%2C%22firstName%22%3A%22Sourav%22%2C%22lastName%22%3A%22Mukherjee%22%7D%5D%2C%22abstractNote%22%3A%22Cyberwarfare%20encompasses%20the%20actions%20by%20any%20international%20organization%20to%20attack%20and%20try%20to%20cause%20damage%20to%20another%20nation%27s%20infrastructure%2C%20computers%20or%20information%20systems%20through%20computer%20viruses%20or%20denial-of-service%20%28DOS%29%20attacks.%20Cyberwarfare%20is%20also%20known%20as%20the%20use%20or%20affecting%20in%20a%20battlespace%20or%20warfare%20in%20the%20background%20of%20computers%2C%20online%20control%20systems%20%28IoTs%29%2C%20and%20networks.%20It%20comprises%20both%20aggressive%20and%20distrustful%20operations%20relating%20to%20the%20danger%20of%20cyberattacks%2C%20espionage%2C%20and%20collateral%5C%2F%20other%20damage.%20There%20are%20controversy%20and%20argument%20over%20whether%20such%20operations%20can%20be%20termed%20as%20a%20%5C%22war%5C%22.%20Transnational%20cyber-security%20is%20an%20increasingly%20persistent%20issue%20for%20leading%20national%20world%20powers.%20Existing%20professionals%20are%20not%20wellresourced%20to%20deal%20with%20the%20continuous%20change%20in%20the%20cybersecurity%20field%2C%20due%20to%20an%20absence%20of%20detailed%20knowledge%20in%20the%20field.%20The%20United%20States%20is%20not%20only%20just%20a%20gigantic%20target%20for%20these%20cyber-attacks%20but%20also%20a%20leading%20offender.%20Regardless%20of%20several%20cyberattacks%20also%2C%20the%20nation%20is%20failed%20to%20take%20the%20appropriate%20measures%20to%20defend%20against%20the%20modern%20age%20crime%20-%20cyberwarfare.%22%2C%22date%22%3A%222019%22%2C%22language%22%3A%22en%22%2C%22DOI%22%3A%2210.2139%5C%2Fssrn.3431676%22%2C%22ISSN%22%3A%221556–5068%22%2C%22url%22%3A%22https%3A%5C%2F%5C%2Fwww.ssrn.com%5C%2Fabstract%3D3431676%22%2C%22collections%22%3A%5B%22YLB2M7DD%22%5D%2C%22dateModified%22%3A%222023–11-02T07%3A50%3A47Z%22%7D%7D%2C%7B%22key%22%3A%22JP9LS4JQ%22%2C%22library%22%3A%7B%22id%22%3A2359887%7D%2C%22meta%22%3A%7B%22parsedDate%22%3A%222022–07-31%22%2C%22numChildren%22%3A1%7D%2C%22bib%22%3A%22%3Cdiv%20class%3D%5C%22csl-bib-body%5C%22%20style%3D%5C%22line-height%3A%202%3B%20padding-left%3A%201em%3B%20text-indent%3A-1em%3B%5C%22%3E%5Cn%20%20%3Cdiv%20class%3D%5C%22csl-entry%5C%22%3ECyber%20threats%3A%20taxonomy%2C%20impact%2C%20policies%2C%20and%20way%20forward.%20%282022%29.%20%3Ci%3EKSII%20Transactions%20on%20Internet%20and%20Information%20Systems%3C%5C%2Fi%3E%2C%20%3Ci%3E16%3C%5C%2Fi%3E%287%29.%20%3Ca%20href%3D%27https%3A%5C%2F%5C%2Fdoi.org%5C%2F10.3837%5C%2Ftiis.2022.07.017%27%3Ehttps%3A%5C%2F%5C%2Fdoi.org%5C%2F10.3837%5C%2Ftiis.2022.07.017%3C%5C%2Fa%3E%3C%5C%2Fdiv%3E%5Cn%3C%5C%2Fdiv%3E%22%2C%22data%22%3A%7B%22itemType%22%3A%22journalArticle%22%2C%22title%22%3A%22Cyber%20threats%3A%20taxonomy%2C%20impact%2C%20policies%2C%20and%20way%20forward%22%2C%22creators%22%3A%5B%5D%2C%22abstractNote%22%3A%22The%20continuous%20evolution%20and%20proliferation%20of%20computer%20technology%20and%20our%20increasing%20dependence%20on%20computer%20technology%20have%20created%20a%20new%20class%20of%20threats%3A%20%5C%22cyber%20threats.%5C%22%20These%20threats%20can%20be%20defined%20as%20activities%20that%20can%20undermine%20a%20society%27s%20ability%20to%20maintain%20internal%20or%20external%20order%20while%20using%20information%20technology.%20Cyber%20threats%20can%20be%20mainly%20divided%20into%20two%20categories%2C%20namely%20cyber-terrorism%20and%20cyber-warfare.%20A%20variety%20of%20malware%20programs%20are%20often%20used%20as%20a%20primary%20weapon%20in%20these%20cyber%20threats.%20A%20significant%20amount%20of%20research%20work%20has%20been%20published%20covering%20different%20aspects%20of%20cyber%20threats%2C%20their%20countermeasures%2C%20and%20the%20policy-making%20for%20cyber%20laws.%20This%20article%20aims%20to%20review%20the%20research%20conducted%20in%20various%20important%20aspects%20of%20cyber%20threats%20and%20provides%20synthesized%20information%20regarding%20the%20fundamentals%20of%20cyber%20threats%3B%20discusses%20the%20countermeasures%20for%20such%20threats%3B%20provides%20relevant%20details%20of%20high-profile%20cyber-attacks%3B%20discusses%20the%20developments%20in%20global%20policymaking%20for%20cyber%20laws%2C%20and%20lastly%20presents%20promising%20future%20directions%20in%20this%20area.%22%2C%22date%22%3A%222022–7‑31%22%2C%22language%22%3A%22en%22%2C%22DOI%22%3A%2210.3837%5C%2Ftiis.2022.07.017%22%2C%22ISSN%22%3A%2219767277%22%2C%22url%22%3A%22http%3A%5C%2F%5C%2Fitiis.org%5C%2Fdigital-library%5C%2F25850%22%2C%22collections%22%3A%5B%22YLB2M7DD%22%5D%2C%22dateModified%22%3A%222023–11-02T07%3A50%3A45Z%22%7D%7D%2C%7B%22key%22%3A%22XSDG9SBS%22%2C%22library%22%3A%7B%22id%22%3A2359887%7D%2C%22meta%22%3A%7B%22creatorSummary%22%3A%22Hejase%20et%20al.%22%2C%22parsedDate%22%3A%222021–03-10%22%2C%22numChildren%22%3A1%7D%2C%22bib%22%3A%22%3Cdiv%20class%3D%5C%22csl-bib-body%5C%22%20style%3D%5C%22line-height%3A%202%3B%20padding-left%3A%201em%3B%20text-indent%3A-1em%3B%5C%22%3E%5Cn%20%20%3Cdiv%20class%3D%5C%22csl-entry%5C%22%3EHejase%2C%20H.%20J.%2C%20Fayyad-Kazan%2C%20H.%20F.%2C%20Hejase%2C%20A.%20J.%2C%20%26amp%3B%20Moukadem%2C%20I.%20A.%20%282021%29.%20Cyber%20Security%20amid%20COVID-19.%20%3Ci%3EComputer%20and%20Information%20Science%3C%5C%2Fi%3E%2C%20%3Ci%3E14%3C%5C%2Fi%3E%282%29%2C%2010.%20%3Ca%20href%3D%27https%3A%5C%2F%5C%2Fdoi.org%5C%2F10.5539%5C%2Fcis.v14n2p10%27%3Ehttps%3A%5C%2F%5C%2Fdoi.org%5C%2F10.5539%5C%2Fcis.v14n2p10%3C%5C%2Fa%3E%3C%5C%2Fdiv%3E%5Cn%3C%5C%2Fdiv%3E%22%2C%22data%22%3A%7B%22itemType%22%3A%22journalArticle%22%2C%22title%22%3A%22Cyber%20Security%20amid%20COVID-19%22%2C%22creators%22%3A%5B%7B%22creatorType%22%3A%22author%22%2C%22firstName%22%3A%22Hussin%20J.%22%2C%22lastName%22%3A%22Hejase%22%7D%2C%7B%22creatorType%22%3A%22author%22%2C%22firstName%22%3A%22Hasan%20F.%22%2C%22lastName%22%3A%22Fayyad-Kazan%22%7D%2C%7B%22creatorType%22%3A%22author%22%2C%22firstName%22%3A%22Ale%20J.%22%2C%22lastName%22%3A%22Hejase%22%7D%2C%7B%22creatorType%22%3A%22author%22%2C%22firstName%22%3A%22Imad%20A.%22%2C%22lastName%22%3A%22Moukadem%22%7D%5D%2C%22abstractNote%22%3A%22COVID-19%20pandemic%20obliged%20thousands%20of%20companies%20pertaining%20to%20all%20economic%20sectors%20to%20undergo%20the%20transformation%20from%20on-board%20work%20to%20working%20from%20home.%20Along%20such%20rush%2C%20the%20probability%20for%20companies%20being%20hacked%20incremented%20many%20folds.%20According%20to%20VMware%20cybersecurity%20strategist%20Tom%20Kellermann%2C%20quoted%20in%20Menn%20%282020%29%2C%20%5Cu2015There%20is%20a%20digitally%20historic%20event%20occurring%20in%20the%20background%20of%20this%20pandemic%2C%20and%20that%20is%20there%20is%20a%20cybercrime%20pandemic%20that%20is%20occurring%5Cu2016%20%28para%205%29.%20In%20fact%2C%20Software%20and%20security%20company%20VMware%20Carbon%20Black%20declared%20during%20April%2C%20%5Cu2015that%20ransomware%20attacks%20it%20monitored%20jumped%20148%25%20in%20March%20from%20the%20previous%20month%2C%20as%20governments%20worldwide%20curbed%20movement%20to%20slow%20the%20spread%20of%20the%20novel%20corona%20virus%5Cu2016%20%28Para%204%29.%20On%20the%20other%20hand%2C%20Anft%20%282020%29%20reported%20that%20%5Cu2015more%20than%20500%20educational%20institutions%2C%20including%20colleges%20and%20K-12%20schools%2C%20faced%20ransom%20attacks%20in%202019%5Cu2016%20%28para%202%29.%20This%20paper%20uses%20a%20descriptive%20qualitative%20approach%20to%20shed%20light%20on%20the%20aforementioned%20subject%20depending%20on%20reported%20secondary%20literature%20about%20the%20topic%2C%20and%20offers%20an%20analysis%20to%20pinpoint%20weaknesses%20and%20barriers%2C%20as%20well%20as%20best%20practices%20to%20counterattack%20the%20breaches%20to%20cybersecurity%20in%20organizations.%20The%20outcomes%20serve%20as%20an%20eye%20opener%20for%20security%20officers%20in%20charge%20of%20the%20safety%20of%20organizational%20intellectual%20properties%20and%20stimulates%20organizations%20to%20adopt%20protection%20systems%20and%20safety%20practices.%22%2C%22date%22%3A%222021–03-10%22%2C%22language%22%3A%22en%22%2C%22DOI%22%3A%2210.5539%5C%2Fcis.v14n2p10%22%2C%22ISSN%22%3A%221913–8997%2C%201913–8989%22%2C%22url%22%3A%22http%3A%5C%2F%5C%2Fwww.ccsenet.org%5C%2Fjournal%5C%2Findex.php%5C%2Fcis%5C%2Farticle%5C%2Fview%5C%2F0%5C%2F44880%22%2C%22collections%22%3A%5B%22YLB2M7DD%22%5D%2C%22dateModified%22%3A%222023–11-02T07%3A50%3A42Z%22%7D%7D%2C%7B%22key%22%3A%224YV6CXIA%22%2C%22library%22%3A%7B%22id%22%3A2359887%7D%2C%22meta%22%3A%7B%22creatorSummary%22%3A%22Nycyk%22%2C%22numChildren%22%3A1%7D%2C%22bib%22%3A%22%3Cdiv%20class%3D%5C%22csl-bib-body%5C%22%20style%3D%5C%22line-height%3A%202%3B%20padding-left%3A%201em%3B%20text-indent%3A-1em%3B%5C%22%3E%5Cn%20%20%3Cdiv%20class%3D%5C%22csl-entry%5C%22%3ENycyk%2C%20M.%20%28n.d.%29.%20%3Ci%3EComputer%20Hackers%20and%20Hacking%3A%3C%5C%2Fi%3E%3C%5C%2Fdiv%3E%5Cn%3C%5C%2Fdiv%3E%22%2C%22data%22%3A%7B%22itemType%22%3A%22journalArticle%22%2C%22title%22%3A%22Computer%20Hackers%20and%20Hacking%3A%22%2C%22creators%22%3A%5B%7B%22creatorType%22%3A%22author%22%2C%22firstName%22%3A%22Michael%22%2C%22lastName%22%3A%22Nycyk%22%7D%5D%2C%22abstractNote%22%3A%22%22%2C%22date%22%3A%22%22%2C%22language%22%3A%22en%22%2C%22DOI%22%3A%22%22%2C%22ISSN%22%3A%22%22%2C%22url%22%3A%22%22%2C%22collections%22%3A%5B%22YLB2M7DD%22%5D%2C%22dateModified%22%3A%222023–11-02T07%3A50%3A39Z%22%7D%7D%2C%7B%22key%22%3A%22IMRALT8Y%22%2C%22library%22%3A%7B%22id%22%3A2359887%7D%2C%22meta%22%3A%7B%22creatorSummary%22%3A%22Wilson%22%2C%22numChildren%22%3A1%7D%2C%22bib%22%3A%22%3Cdiv%20class%3D%5C%22csl-bib-body%5C%22%20style%3D%5C%22line-height%3A%202%3B%20padding-left%3A%201em%3B%20text-indent%3A-1em%3B%5C%22%3E%5Cn%20%20%3Cdiv%20class%3D%5C%22csl-entry%5C%22%3EWilson%2C%20C.%20%28n.d.%29.%20%3Ci%3EBotnets%2C%20Cybercrime%2C%20and%20Cyberterrorism%3A%20Vulnerabilities%20and%20Policy%20Issues%20for%20Congress%3C%5C%2Fi%3E.%3C%5C%2Fdiv%3E%5Cn%3C%5C%2Fdiv%3E%22%2C%22data%22%3A%7B%22itemType%22%3A%22journalArticle%22%2C%22title%22%3A%22Botnets%2C%20Cybercrime%2C%20and%20Cyberterrorism%3A%20Vulnerabilities%20and%20Policy%20Issues%20for%20Congress%22%2C%22creators%22%3A%5B%7B%22creatorType%22%3A%22author%22%2C%22firstName%22%3A%22Clay%22%2C%22lastName%22%3A%22Wilson%22%7D%5D%2C%22abstractNote%22%3A%22Cybercrime%20is%20becoming%20more%20organized%20and%20established%20as%20a%20transnational%20business.%20High%20technology%20online%20skills%20are%20now%20available%20for%20rent%20to%20a%20variety%20of%20customers%2C%20possibly%20including%20nation%20states%2C%20or%20individuals%20and%20groups%20that%20could%20secretly%20represent%20terrorist%20groups.%20The%20increased%20use%20of%20automated%20attack%20tools%20by%20cybercriminals%20has%20overwhelmed%20some%20current%20methodologies%20used%20for%20tracking%20Internet%20cyberattacks%2C%20and%20vulnerabilities%20of%20the%20U.S.%20critical%20infrastructure%2C%20which%20are%20acknowledged%20openly%20in%20publications%2C%20could%20possibly%20attract%20cyberattacks%20to%20extort%20money%2C%20or%20damage%20the%20U.S.%20economy%20to%20affect%20national%20security.%22%2C%22date%22%3A%22%22%2C%22language%22%3A%22en%22%2C%22DOI%22%3A%22%22%2C%22ISSN%22%3A%22%22%2C%22url%22%3A%22%22%2C%22collections%22%3A%5B%22YLB2M7DD%22%5D%2C%22dateModified%22%3A%222023–11-02T07%3A50%3A33Z%22%7D%7D%2C%7B%22key%22%3A%22HPQUEIFL%22%2C%22library%22%3A%7B%22id%22%3A2359887%7D%2C%22meta%22%3A%7B%22creatorSummary%22%3A%22De%20Matos%20Alves%22%2C%22parsedDate%22%3A%222015–08-20%22%2C%22numChildren%22%3A1%7D%2C%22bib%22%3A%22%3Cdiv%20class%3D%5C%22csl-bib-body%5C%22%20style%3D%5C%22line-height%3A%202%3B%20padding-left%3A%201em%3B%20text-indent%3A-1em%3B%5C%22%3E%5Cn%20%20%3Cdiv%20class%3D%5C%22csl-entry%5C%22%3EDe%20Matos%20Alves%2C%20A.%20%282015%29.%20Between%20the%20%26%23x201C%3BBattlefield%26%23x201D%3B%20Metaphor%20and%20Promises%20of%20Generativity%3A%20Contrasting%20Discourses%20on%20Cyberconflict.%20%3Ci%3ECanadian%20Journal%20of%20Communication%3C%5C%2Fi%3E%2C%20%3Ci%3E40%3C%5C%2Fi%3E%283%29%2C%20389%26%23x2013%3B406.%20%3Ca%20href%3D%27https%3A%5C%2F%5C%2Fdoi.org%5C%2F10.22230%5C%2Fcjc.2015v40n3a2742%27%3Ehttps%3A%5C%2F%5C%2Fdoi.org%5C%2F10.22230%5C%2Fcjc.2015v40n3a2742%3C%5C%2Fa%3E%3C%5C%2Fdiv%3E%5Cn%3C%5C%2Fdiv%3E%22%2C%22data%22%3A%7B%22itemType%22%3A%22journalArticle%22%2C%22title%22%3A%22Between%20the%20%5Cu201cBattlefield%5Cu201d%20Metaphor%20and%20Promises%20of%20Generativity%3A%20Contrasting%20Discourses%20on%20Cyberconflict%22%2C%22creators%22%3A%5B%7B%22creatorType%22%3A%22author%22%2C%22firstName%22%3A%22Artur%22%2C%22lastName%22%3A%22De%20Matos%20Alves%22%7D%5D%2C%22abstractNote%22%3A%22This%20article%20proposes%20a%20theoretical%20assessment%20of%20discourses%20on%20cybercon%5Cufb02ict%2C%20and%20of%20their%20relation%20to%20the%20current%20perception%20of%20the%20state%20of%20cyberspace.%20By%20contrasting%20the%20%5Cu201cbattle%5Cufb01eld%5Cu201d%20approaches%20to%20cybercon%5Cufb02ict%20with%20theoretical%20and%20factual%20materials%20on%20its%20social%20and%20political%20impacts%2C%20this%20article%20suggests%20that%20the%20%5Cu201cbattle%5Cufb01eld%5Cu201d%20terminology%20frames%20the%20discussion%20of%20online%20security%20within%20a%20drive%20for%20the%20%5Cu201cmilitarization%5Cu201d%20of%20cyberspace.%20It%20concludes%20by%20presenting%20generativity-based%20perspectives%20as%20a%20contribution%20towards%20addressing%20contemporary%20challenges%20to%20network%20politics%20in%20cybercon%5Cufb02ict%20theoretical%20frameworks.%22%2C%22date%22%3A%222015–08-20%22%2C%22language%22%3A%22en%22%2C%22DOI%22%3A%2210.22230%5C%2Fcjc.2015v40n3a2742%22%2C%22ISSN%22%3A%220705–3657%2C%201499–6642%22%2C%22url%22%3A%22https%3A%5C%2F%5C%2Fcjc.utpjournals.press%5C%2Fdoi%5C%2F10.22230%5C%2Fcjc.2015v40n3a2742%22%2C%22collections%22%3A%5B%22YLB2M7DD%22%5D%2C%22dateModified%22%3A%222023–11-02T07%3A50%3A31Z%22%7D%7D%2C%7B%22key%22%3A%22NB5CEYPH%22%2C%22library%22%3A%7B%22id%22%3A2359887%7D%2C%22meta%22%3A%7B%22creatorSummary%22%3A%22Urquhart%20and%20McAuley%22%2C%22parsedDate%22%3A%222018%22%2C%22numChildren%22%3A1%7D%2C%22bib%22%3A%22%3Cdiv%20class%3D%5C%22csl-bib-body%5C%22%20style%3D%5C%22line-height%3A%202%3B%20padding-left%3A%201em%3B%20text-indent%3A-1em%3B%5C%22%3E%5Cn%20%20%3Cdiv%20class%3D%5C%22csl-entry%5C%22%3EUrquhart%2C%20L.%2C%20%26amp%3B%20McAuley%2C%20D.%20%282018%29.%20Avoiding%20the%20internet%20of%20insecure%20industrial%20things.%20%3Ci%3EComputer%20Law%20%26amp%3B%20Security%20Review%3C%5C%2Fi%3E%2C%20%3Ci%3E34%3C%5C%2Fi%3E%283%29%2C%20450%26%23x2013%3B466.%20%3Ca%20href%3D%27https%3A%5C%2F%5C%2Fdoi.org%5C%2F10.1016%5C%2Fj.clsr.2017.12.004%27%3Ehttps%3A%5C%2F%5C%2Fdoi.org%5C%2F10.1016%5C%2Fj.clsr.2017.12.004%3C%5C%2Fa%3E%3C%5C%2Fdiv%3E%5Cn%3C%5C%2Fdiv%3E%22%2C%22data%22%3A%7B%22itemType%22%3A%22journalArticle%22%2C%22title%22%3A%22Avoiding%20the%20internet%20of%20insecure%20industrial%20things%22%2C%22creators%22%3A%5B%7B%22creatorType%22%3A%22author%22%2C%22firstName%22%3A%22Lachlan%22%2C%22lastName%22%3A%22Urquhart%22%7D%2C%7B%22creatorType%22%3A%22author%22%2C%22firstName%22%3A%22Derek%22%2C%22lastName%22%3A%22McAuley%22%7D%5D%2C%22abstractNote%22%3A%22Security%20incidents%20such%20as%20targeted%20distributed%20denial%20of%20service%20%28DDoS%29%20attacks%20on%20power%20grids%20and%20hacking%20of%20factory%20industrial%20control%20systems%20%28ICS%29%20are%20on%20the%20increase.%20This%20paper%20unpacks%20where%20emerging%20security%20risks%20lie%20for%20the%20industrial%20internet%20of%20things%2C%20drawing%20on%20both%20technical%20and%20regulatory%20perspectives.%20Legal%20changes%20are%20being%20ushered%20by%20the%20European%20Union%20%28EU%29%20Network%20and%20Information%20Security%20%28NIS%29%20Directive%202016%20and%20the%20General%20Data%20Protection%20Regulation%202016%20%28GDPR%29%20%28both%20to%20be%20enforced%20from%20May%202018%29.%20We%20use%20the%20case%20study%20of%20the%20emergent%20smart%20energy%20supply%20chain%20to%20frame%2C%20scope%20out%20and%20consolidate%20the%20breadth%20of%20security%20concerns%20at%20play%2C%20and%20the%20regulatory%20responses.%20We%20argue%20the%20industrial%20IoT%20brings%20four%20security%20concerns%20to%20the%20fore%2C%20namely%3A%20appreciating%20the%20shift%20from%20offline%20to%20online%20infrastructure%3B%20managing%20temporal%20dimensions%20of%20security%3B%20addressing%20the%20implementation%20gap%20for%20best%20practice%3B%20and%20engaging%20with%20infrastructural%20complexity.%20Our%20goal%20is%20to%20surface%20risks%20and%20foster%20dialogue%20to%20avoid%20the%20emergence%20of%20an%20Internet%20of%20Insecure%20Industrial%20Things.%22%2C%22date%22%3A%2206%5C%2F2018%22%2C%22language%22%3A%22en%22%2C%22DOI%22%3A%2210.1016%5C%2Fj.clsr.2017.12.004%22%2C%22ISSN%22%3A%2202673649%22%2C%22url%22%3A%22https%3A%5C%2F%5C%2Flinkinghub.elsevier.com%5C%2Fretrieve%5C%2Fpii%5C%2FS0267364917303217%22%2C%22collections%22%3A%5B%22YLB2M7DD%22%5D%2C%22dateModified%22%3A%222023–11-02T07%3A50%3A29Z%22%7D%7D%2C%7B%22key%22%3A%22XRDWBU3N%22%2C%22library%22%3A%7B%22id%22%3A2359887%7D%2C%22meta%22%3A%7B%22creatorSummary%22%3A%22Eilstrup-Sangiovanni%22%2C%22parsedDate%22%3A%222018%22%2C%22numChildren%22%3A1%7D%2C%22bib%22%3A%22%3Cdiv%20class%3D%5C%22csl-bib-body%5C%22%20style%3D%5C%22line-height%3A%202%3B%20padding-left%3A%201em%3B%20text-indent%3A-1em%3B%5C%22%3E%5Cn%20%20%3Cdiv%20class%3D%5C%22csl-entry%5C%22%3EEilstrup-Sangiovanni%2C%20M.%20%282018%29.%20Why%20the%20World%20Needs%20an%20International%20Cyberwar%20Convention.%20%3Ci%3EPhilosophy%20%26amp%3B%20Technology%3C%5C%2Fi%3E%2C%20%3Ci%3E31%3C%5C%2Fi%3E%283%29%2C%20379%26%23x2013%3B407.%20%3Ca%20href%3D%27https%3A%5C%2F%5C%2Fdoi.org%5C%2F10.1007%5C%2Fs13347-017‑0271‑5%27%3Ehttps%3A%5C%2F%5C%2Fdoi.org%5C%2F10.1007%5C%2Fs13347-017‑0271‑5%3C%5C%2Fa%3E%3C%5C%2Fdiv%3E%5Cn%3C%5C%2Fdiv%3E%22%2C%22data%22%3A%7B%22itemType%22%3A%22journalArticle%22%2C%22title%22%3A%22Why%20the%20World%20Needs%20an%20International%20Cyberwar%20Convention%22%2C%22creators%22%3A%5B%7B%22creatorType%22%3A%22author%22%2C%22firstName%22%3A%22Mette%22%2C%22lastName%22%3A%22Eilstrup-Sangiovanni%22%7D%5D%2C%22abstractNote%22%3A%22States%5Cu2019%20capacity%20for%20using%20modern%20information%20and%20communication%20technology%20to%20inflict%20grave%20harm%20on%20enemies%20has%20been%20amply%20demonstrated%20in%20recent%20years%2C%20with%20many%20countries%20reporting%20large-scale%20cyberattacks%20against%20their%20military%20defense%20systems%2C%20water%20supply%2C%20and%20other%20critical%20infrastructure.%20Currently%2C%20no%20agreed-upon%20international%20rules%20or%20norms%20exist%20to%20govern%20international%20conflict%20in%20cyberspace.%20Many%20governments%20prefer%20to%20keep%20it%20that%20way.%20They%20argue%20that%20difficulties%20of%20verifiability%20and%20challenges%20posed%20by%20rapid%20technological%20change%20rule%20out%20agreement%20on%20an%20international%20cyber%20convention.%20Instead%2C%20they%20prefer%20to%20rely%20on%20informal%20cooperation%20and%20strategic%20deterrence%20to%20limit%20direct%20conflict.%20In%20this%20article%2C%20I%20seek%20to%20rebut%20some%20of%20the%20main%20objections%20to%20seeking%20an%20international%20convention%20on%20the%20use%20of%20cyber%20weapons.%20While%20there%20are%20significant%20obstacles%20to%20achieving%20effective%20arms%20control%20in%20the%20cyber%20domain%2C%20historical%20experience%20from%20other%20areas%20of%20international%20arms%20control%20suggests%20that%20none%20of%20these%20obstacles%20are%20insurmountable.%20Furthermore%2C%20while%20most%20critics%20of%20cyberarms%20control%20assume%20that%20cyberspace%20favors%20offensive%20strategies%2C%20closer%20inspection%20reveals%20the%20dominance%20of%20cyber-defensive%20strategies.%20This%20in%20turn%20improves%20prospects%20for%20striking%20an%20effective%20international%20agreement%20on%20cyberarms%20control.%22%2C%22date%22%3A%229%5C%2F2018%22%2C%22language%22%3A%22en%22%2C%22DOI%22%3A%2210.1007%5C%2Fs13347-017‑0271‑5%22%2C%22ISSN%22%3A%222210–5433%2C%202210–5441%22%2C%22url%22%3A%22http%3A%5C%2F%5C%2Flink.springer.com%5C%2F10.1007%5C%2Fs13347-017‑0271‑5%22%2C%22collections%22%3A%5B%22YLB2M7DD%22%5D%2C%22dateModified%22%3A%222023–11-02T07%3A50%3A21Z%22%7D%7D%2C%7B%22key%22%3A%22TQEH7758%22%2C%22library%22%3A%7B%22id%22%3A2359887%7D%2C%22meta%22%3A%7B%22creatorSummary%22%3A%22Ghionis%22%2C%22numChildren%22%3A1%7D%2C%22bib%22%3A%22%3Cdiv%20class%3D%5C%22csl-bib-body%5C%22%20style%3D%5C%22line-height%3A%202%3B%20padding-left%3A%201em%3B%20text-indent%3A-1em%3B%5C%22%3E%5Cn%20%20%3Cdiv%20class%3D%5C%22csl-entry%5C%22%3EGhionis%2C%20A.%20A.%20%28n.d.%29.%20%3Ci%3EThe%20Limits%20of%20Deterrence%20in%20the%20Cyber%20World%3C%5C%2Fi%3E.%3C%5C%2Fdiv%3E%5Cn%3C%5C%2Fdiv%3E%22%2C%22data%22%3A%7B%22itemType%22%3A%22journalArticle%22%2C%22title%22%3A%22The%20Limits%20of%20Deterrence%20in%20the%20Cyber%20World%22%2C%22creators%22%3A%5B%7B%22creatorType%22%3A%22author%22%2C%22firstName%22%3A%22A%20A%22%2C%22lastName%22%3A%22Ghionis%22%7D%5D%2C%22abstractNote%22%3A%22%22%2C%22date%22%3A%22%22%2C%22language%22%3A%22en%22%2C%22DOI%22%3A%22%22%2C%22ISSN%22%3A%22%22%2C%22url%22%3A%22%22%2C%22collections%22%3A%5B%22YLB2M7DD%22%5D%2C%22dateModified%22%3A%222023–11-02T07%3A50%3A15Z%22%7D%7D%2C%7B%22key%22%3A%22VFQE4GDF%22%2C%22library%22%3A%7B%22id%22%3A2359887%7D%2C%22meta%22%3A%7B%22creatorSummary%22%3A%22Karimov%22%2C%22numChildren%22%3A1%7D%2C%22bib%22%3A%22%3Cdiv%20class%3D%5C%22csl-bib-body%5C%22%20style%3D%5C%22line-height%3A%202%3B%20padding-left%3A%201em%3B%20text-indent%3A-1em%3B%5C%22%3E%5Cn%20%20%3Cdiv%20class%3D%5C%22csl-entry%5C%22%3EKarimov%2C%20N.%20%28n.d.%29.%20%3Ci%3EThe%20European%20Union%20Cyber%20Security%20and%20Protection%20of%20Human%20Rights%3C%5C%2Fi%3E.%3C%5C%2Fdiv%3E%5Cn%3C%5C%2Fdiv%3E%22%2C%22data%22%3A%7B%22itemType%22%3A%22journalArticle%22%2C%22title%22%3A%22The%20European%20Union%20Cyber%20Security%20and%20Protection%20of%20Human%20Rights%22%2C%22creators%22%3A%5B%7B%22creatorType%22%3A%22author%22%2C%22firstName%22%3A%22Nurlan%22%2C%22lastName%22%3A%22Karimov%22%7D%5D%2C%22abstractNote%22%3A%22%22%2C%22date%22%3A%22%22%2C%22language%22%3A%22en%22%2C%22DOI%22%3A%22%22%2C%22ISSN%22%3A%22%22%2C%22url%22%3A%22%22%2C%22collections%22%3A%5B%22YLB2M7DD%22%5D%2C%22dateModified%22%3A%222023–11-02T07%3A50%3A13Z%22%7D%7D%2C%7B%22key%22%3A%22VCV5EE25%22%2C%22library%22%3A%7B%22id%22%3A2359887%7D%2C%22meta%22%3A%7B%22creatorSummary%22%3A%22Warf%20and%20Fekete%22%2C%22parsedDate%22%3A%222016–05-03%22%2C%22numChildren%22%3A1%7D%2C%22bib%22%3A%22%3Cdiv%20class%3D%5C%22csl-bib-body%5C%22%20style%3D%5C%22line-height%3A%202%3B%20padding-left%3A%201em%3B%20text-indent%3A-1em%3B%5C%22%3E%5Cn%20%20%3Cdiv%20class%3D%5C%22csl-entry%5C%22%3EWarf%2C%20B.%2C%20%26amp%3B%20Fekete%2C%20E.%20%282016%29.%20Relational%20geographies%20of%20cyberterrorism%20and%20cyberwar.%20%3Ci%3ESpace%20and%20Polity%3C%5C%2Fi%3E%2C%20%3Ci%3E20%3C%5C%2Fi%3E%282%29%2C%20143%26%23x2013%3B157.%20%3Ca%20href%3D%27https%3A%5C%2F%5C%2Fdoi.org%5C%2F10.1080%5C%2F13562576.2015.1112113%27%3Ehttps%3A%5C%2F%5C%2Fdoi.org%5C%2F10.1080%5C%2F13562576.2015.1112113%3C%5C%2Fa%3E%3C%5C%2Fdiv%3E%5Cn%3C%5C%2Fdiv%3E%22%2C%22data%22%3A%7B%22itemType%22%3A%22journalArticle%22%2C%22title%22%3A%22Relational%20geographies%20of%20cyberterrorism%20and%20cyberwar%22%2C%22creators%22%3A%5B%7B%22creatorType%22%3A%22author%22%2C%22firstName%22%3A%22Barney%22%2C%22lastName%22%3A%22Warf%22%7D%2C%7B%22creatorType%22%3A%22author%22%2C%22firstName%22%3A%22Emily%22%2C%22lastName%22%3A%22Fekete%22%7D%5D%2C%22abstractNote%22%3A%22%22%2C%22date%22%3A%222016–05-03%22%2C%22language%22%3A%22en%22%2C%22DOI%22%3A%2210.1080%5C%2F13562576.2015.1112113%22%2C%22ISSN%22%3A%221356–2576%2C%201470–1235%22%2C%22url%22%3A%22http%3A%5C%2F%5C%2Fwww.tandfonline.com%5C%2Fdoi%5C%2Ffull%5C%2F10.1080%5C%2F13562576.2015.1112113%22%2C%22collections%22%3A%5B%22YLB2M7DD%22%5D%2C%22dateModified%22%3A%222023–11-02T07%3A50%3A11Z%22%7D%7D%2C%7B%22key%22%3A%22GE92CYV7%22%2C%22library%22%3A%7B%22id%22%3A2359887%7D%2C%22meta%22%3A%7B%22creatorSummary%22%3A%22Sigholm%22%2C%22parsedDate%22%3A%222013–12-01%22%2C%22numChildren%22%3A1%7D%2C%22bib%22%3A%22%3Cdiv%20class%3D%5C%22csl-bib-body%5C%22%20style%3D%5C%22line-height%3A%202%3B%20padding-left%3A%201em%3B%20text-indent%3A-1em%3B%5C%22%3E%5Cn%20%20%3Cdiv%20class%3D%5C%22csl-entry%5C%22%3ESigholm%2C%20J.%20%282013%29.%20Non-State%20Actors%20in%20Cyberspace%20Operations.%20%3Ci%3EJournal%20of%20Military%20Studies%3C%5C%2Fi%3E%2C%20%3Ci%3E4%3C%5C%2Fi%3E%281%29%2C%201%26%23x2013%3B37.%20%3Ca%20href%3D%27https%3A%5C%2F%5C%2Fdoi.org%5C%2F10.1515%5C%2Fjms-2016–0184%27%3Ehttps%3A%5C%2F%5C%2Fdoi.org%5C%2F10.1515%5C%2Fjms-2016–0184%3C%5C%2Fa%3E%3C%5C%2Fdiv%3E%5Cn%3C%5C%2Fdiv%3E%22%2C%22data%22%3A%7B%22itemType%22%3A%22journalArticle%22%2C%22title%22%3A%22Non-State%20Actors%20in%20Cyberspace%20Operations%22%2C%22creators%22%3A%5B%7B%22creatorType%22%3A%22author%22%2C%22firstName%22%3A%22Johan%22%2C%22lastName%22%3A%22Sigholm%22%7D%5D%2C%22abstractNote%22%3A%22The%20growing%20importance%20of%20cyberspace%20to%20modern%20society%2C%20and%20its%20increasing%20use%20as%20an%20arena%20for%20dispute%2C%20is%20becoming%20a%20national%20security%20concern%20for%20governments%20and%20armed%20forces%20globally.%20The%20special%20characteristics%20of%20cyberspace%2C%20such%20as%20its%20asymmetric%20nature%2C%20the%20lack%20of%20attribution%2C%20the%20low%20cost%20of%20entry%2C%20the%20legal%20ambiguity%2C%20and%20its%20role%20as%20an%20efficient%20medium%20for%20protest%2C%20crime%2C%20espionage%20and%20military%20aggression%2C%20makes%20it%20an%20attractive%20domain%20for%20nation-states%20as%20well%20as%20nonstate%20actors%20in%20cyber%20conflict.%22%2C%22date%22%3A%222013–12‑1%22%2C%22language%22%3A%22en%22%2C%22DOI%22%3A%2210.1515%5C%2Fjms-2016–0184%22%2C%22ISSN%22%3A%221799–3350%22%2C%22url%22%3A%22https%3A%5C%2F%5C%2Fwww.sciendo.com%5C%2Farticle%5C%2F10.1515%5C%2Fjms-2016–0184%22%2C%22collections%22%3A%5B%22YLB2M7DD%22%5D%2C%22dateModified%22%3A%222023–11-02T07%3A50%3A07Z%22%7D%7D%2C%7B%22key%22%3A%22WYGXSC8T%22%2C%22library%22%3A%7B%22id%22%3A2359887%7D%2C%22meta%22%3A%7B%22creatorSummary%22%3A%22Burton%22%2C%22parsedDate%22%3A%222015–10-02%22%2C%22numChildren%22%3A2%7D%2C%22bib%22%3A%22%3Cdiv%20class%3D%5C%22csl-bib-body%5C%22%20style%3D%5C%22line-height%3A%202%3B%20padding-left%3A%201em%3B%20text-indent%3A-1em%3B%5C%22%3E%5Cn%20%20%3Cdiv%20class%3D%5C%22csl-entry%5C%22%3EBurton%2C%20J.%20%282015%29.%20NATO%26%23x2019%3Bs%20cyber%20defence%3A%20strategic%20challenges%20and%20institutional%20adaptation.%20%3Ci%3EDefence%20Studies%3C%5C%2Fi%3E%2C%20%3Ci%3E15%3C%5C%2Fi%3E%284%29%2C%20297%26%23x2013%3B319.%20%3Ca%20href%3D%27https%3A%5C%2F%5C%2Fdoi.org%5C%2F10.1080%5C%2F14702436.2015.1108108%27%3Ehttps%3A%5C%2F%5C%2Fdoi.org%5C%2F10.1080%5C%2F14702436.2015.1108108%3C%5C%2Fa%3E%3C%5C%2Fdiv%3E%5Cn%3C%5C%2Fdiv%3E%22%2C%22data%22%3A%7B%22itemType%22%3A%22journalArticle%22%2C%22title%22%3A%22NATO%5Cu2019s%20cyber%20defence%3A%20strategic%20challenges%20and%20institutional%20adaptation%22%2C%22creators%22%3A%5B%7B%22creatorType%22%3A%22author%22%2C%22firstName%22%3A%22Joe%22%2C%22lastName%22%3A%22Burton%22%7D%5D%2C%22abstractNote%22%3A%22%22%2C%22date%22%3A%222015–10-02%22%2C%22language%22%3A%22en%22%2C%22DOI%22%3A%2210.1080%5C%2F14702436.2015.1108108%22%2C%22ISSN%22%3A%221470–2436%2C%201743–9698%22%2C%22url%22%3A%22http%3A%5C%2F%5C%2Fwww.tandfonline.com%5C%2Fdoi%5C%2Ffull%5C%2F10.1080%5C%2F14702436.2015.1108108%22%2C%22collections%22%3A%5B%22YLB2M7DD%22%5D%2C%22dateModified%22%3A%222023–11-02T07%3A50%3A05Z%22%7D%7D%2C%7B%22key%22%3A%22Y9C9HA26%22%2C%22library%22%3A%7B%22id%22%3A2359887%7D%2C%22meta%22%3A%7B%22creatorSummary%22%3A%22Lindstrom%22%2C%22numChildren%22%3A1%7D%2C%22bib%22%3A%22%3Cdiv%20class%3D%5C%22csl-bib-body%5C%22%20style%3D%5C%22line-height%3A%202%3B%20padding-left%3A%201em%3B%20text-indent%3A-1em%3B%5C%22%3E%5Cn%20%20%3Cdiv%20class%3D%5C%22csl-entry%5C%22%3ELindstrom%2C%20G.%20%28n.d.%29.%20%3Ci%3EMeeting%20the%20Cyber%20Security%20Challenge%3C%5C%2Fi%3E.%3C%5C%2Fdiv%3E%5Cn%3C%5C%2Fdiv%3E%22%2C%22data%22%3A%7B%22itemType%22%3A%22journalArticle%22%2C%22title%22%3A%22Meeting%20the%20Cyber%20Security%20Challenge%22%2C%22creators%22%3A%5B%7B%22creatorType%22%3A%22author%22%2C%22firstName%22%3A%22Gustav%22%2C%22lastName%22%3A%22Lindstrom%22%7D%5D%2C%22abstractNote%22%3A%22%22%2C%22date%22%3A%22%22%2C%22language%22%3A%22en%22%2C%22DOI%22%3A%22%22%2C%22ISSN%22%3A%22%22%2C%22url%22%3A%22%22%2C%22collections%22%3A%5B%22YLB2M7DD%22%5D%2C%22dateModified%22%3A%222023–11-02T07%3A50%3A02Z%22%7D%7D%2C%7B%22key%22%3A%22WWU5PX8D%22%2C%22library%22%3A%7B%22id%22%3A2359887%7D%2C%22meta%22%3A%7B%22creatorSummary%22%3A%22Kaschner%22%2C%22parsedDate%22%3A%222020%22%2C%22numChildren%22%3A1%7D%2C%22bib%22%3A%22%3Cdiv%20class%3D%5C%22csl-bib-body%5C%22%20style%3D%5C%22line-height%3A%202%3B%20padding-left%3A%201em%3B%20text-indent%3A-1em%3B%5C%22%3E%5Cn%20%20%3Cdiv%20class%3D%5C%22csl-entry%5C%22%3EKaschner%2C%20H.%20%282020%29.%20%3Ci%3ECyber%20Crisis%20Management%3A%20Das%20Praxishandbuch%20zu%20Krisenmanagement%20und%20Krisenkommunikation%3C%5C%2Fi%3E.%20Springer%20Fachmedien%20Wiesbaden.%20https%3A%5C%2F%5C%2Fdoi.org%5C%2F10.1007%5C%2F978‑3–658-27914–1%3C%5C%2Fdiv%3E%5Cn%3C%5C%2Fdiv%3E%22%2C%22data%22%3A%7B%22itemType%22%3A%22book%22%2C%22title%22%3A%22Cyber%20Crisis%20Management%3A%20Das%20Praxishandbuch%20zu%20Krisenmanagement%20und%20Krisenkommunikation%22%2C%22creators%22%3A%5B%7B%22creatorType%22%3A%22author%22%2C%22firstName%22%3A%22Holger%22%2C%22lastName%22%3A%22Kaschner%22%7D%5D%2C%22abstractNote%22%3A%22%22%2C%22date%22%3A%222020%22%2C%22language%22%3A%22de%22%2C%22ISBN%22%3A%22978–3‑658–27913‑4%20978–3‑658–27914‑1%22%2C%22url%22%3A%22http%3A%5C%2F%5C%2Flink.springer.com%5C%2F10.1007%5C%2F978‑3–658-27914–1%22%2C%22collections%22%3A%5B%22YLB2M7DD%22%5D%2C%22dateModified%22%3A%222023–07-21T15%3A55%3A49Z%22%7D%7D%2C%7B%22key%22%3A%22LZSQBZUX%22%2C%22library%22%3A%7B%22id%22%3A2359887%7D%2C%22meta%22%3A%7B%22creatorSummary%22%3A%22Rosenberger%20et%20al.%22%2C%22parsedDate%22%3A%222023%22%2C%22numChildren%22%3A3%7D%2C%22bib%22%3A%22%3Cdiv%20class%3D%5C%22csl-bib-body%5C%22%20style%3D%5C%22line-height%3A%202%3B%20padding-left%3A%201em%3B%20text-indent%3A-1em%3B%5C%22%3E%5Cn%20%20%3Cdiv%20class%3D%5C%22csl-entry%5C%22%3ERosenberger%2C%20N.%2C%20Niederh%26%23xE4%3Buser%2C%20M.%2C%20%26amp%3B%20Kr%26%23xE4%3Bmer%2C%20K.%20%282023%29.%20%3Ci%3EKommunikation%20in%20der%20digitalen%20Transformation%26%23x202F%3B%3A%20Trendstudie%20Schweiz%202022%3C%5C%2Fi%3E.%20%3Ca%20href%3D%27https%3A%5C%2F%5C%2Fdoi.org%5C%2F10.21256%5C%2FZHAW-2808%27%3Ehttps%3A%5C%2F%5C%2Fdoi.org%5C%2F10.21256%5C%2FZHAW-2808%3C%5C%2Fa%3E%3C%5C%2Fdiv%3E%5Cn%3C%5C%2Fdiv%3E%22%2C%22data%22%3A%7B%22itemType%22%3A%22journalArticle%22%2C%22title%22%3A%22Kommunikation%20in%20der%20digitalen%20Transformation%20%3A%20Trendstudie%20Schweiz%202022%22%2C%22creators%22%3A%5B%7B%22creatorType%22%3A%22author%22%2C%22firstName%22%3A%22Nicole%22%2C%22lastName%22%3A%22Rosenberger%22%7D%2C%7B%22creatorType%22%3A%22author%22%2C%22firstName%22%3A%22Markus%22%2C%22lastName%22%3A%22Niederh%5Cu00e4user%22%7D%2C%7B%22creatorType%22%3A%22author%22%2C%22firstName%22%3A%22Katharina%22%2C%22lastName%22%3A%22Kr%5Cu00e4mer%22%7D%5D%2C%22abstractNote%22%3A%22Das%20Forschungsprojekt%20%5Cu00abKommunikation%20in%20der%20digitalen%20Transformation%5Cu00bb%20ist%20als%20Trendstudie%20angelegt%20und%20untersucht%20seit%202018%20alle%20zwei%20Jahre%20den%20Zustand%20und%20den%20Entwicklungsbedarf%20der%20Unternehmenskommunikation%20in%20der%20digitalen%20Transformation.%20Leitend%20ist%20dabei%20ein%20in%20der%20Erststudie%202018%20entwickeltes%20Framework%2C%20welches%20die%20Rolle%20von%20Corporate%20Communications%20in%20der%20digitalen%20Transformation%20auf%20drei%20Ebenen%20beschreibt%20%28Niederh%5Cu00e4user%20%26%20Rosenberger%2C%202018%29.%20Auf%20der%20Mikroebene%20fokussiert%20die%20Untersuchung%20auf%20die%20digitale%20Transformation%20der%20Kommunikationsabteilung%2C%20auf%20der%20Mesoebene%20auf%20die%20Funktion%20der%20Unternehmenskommunikation%20im%20Transformationsprozess%20der%20gesamten%20Organisation%20und%20auf%20der%20Makroebene%20auf%20das%20Schaffen%20von%20Akzeptanz%20f%5Cu00fcr%20den%20Transformationsprozess%20in%20Markt%20und%20Gesellschaft.%20Die%20vorliegende%20dritte%20Studie%202022%20basiert%20auf%20einer%20Online-Befragung%20von%20133%20Kommunikationsverantwortlichen%20%28CCOs%29%20in%20der%20Deutschschweiz%20und%20auf%2012%20vertiefenden%20Interviews%20mit%20Expert%3Ainnen.%20Zur%20Einordnung%20wurde%20ein%20%5Cu00dcberblick%20zum%20aktuellen%20Forschungsstand%20erarbeitet.%20Die%20Studie%20zeigt%20auf%2C%20dass%20einschneidende%20Ereignisse%20wie%20die%20Pandemie%20oder%20der%20Ukraine-Krieg%20weniger%20die%20Richtung%20als%20die%20Geschwindigkeit%20der%20digitalen%20Transformation%20ver%5Cu00e4ndert%20haben.%20Die%20%5Cu00abAgenda%20f%5Cu00fcr%20die%20Kommunikation%20in%20der%20digitalen%20Transformation%5Cu00bb%20aus%20der%20Erststudie%20wurde%20mit%20den%20Ergebnissen%20der%20beiden%20Folgestudien%20abgeglichen%2C%20angepasst%20und%20erweitert.%20Sie%20zeigt%20Kommunikationsverantwortlichen%20auf%2C%20in%20welche%20Richtung%20sie%20die%20Unternehmenskommunikation%20entwickeln%20sollten.%22%2C%22date%22%3A%222023%22%2C%22language%22%3A%22de%22%2C%22DOI%22%3A%2210.21256%5C%2FZHAW-2808%22%2C%22ISSN%22%3A%22%22%2C%22url%22%3A%22https%3A%5C%2F%5C%2Fdigitalcollection.zhaw.ch%5C%2Fhandle%5C%2F11475%5C%2F26695%22%2C%22collections%22%3A%5B%22YLB2M7DD%22%2C%22PF4P4483%22%5D%2C%22dateModified%22%3A%222023–07-20T18%3A08%3A02Z%22%7D%7D%2C%7B%22key%22%3A%229L3ABNUY%22%2C%22library%22%3A%7B%22id%22%3A2359887%7D%2C%22meta%22%3A%7B%22creatorSummary%22%3A%22Lerch%20and%20Tanner%22%2C%22parsedDate%22%3A%222022%22%2C%22numChildren%22%3A1%7D%2C%22bib%22%3A%22%3Cdiv%20class%3D%5C%22csl-bib-body%5C%22%20style%3D%5C%22line-height%3A%202%3B%20padding-left%3A%201em%3B%20text-indent%3A-1em%3B%5C%22%3E%5Cn%20%20%3Cdiv%20class%3D%5C%22csl-entry%5C%22%3ELerch%2C%20K.%20M.%2C%20%26amp%3B%20Tanner%2C%20M.%20%282022%29.%20%3Ci%3ESchweizerische%20Mobiliar%20Versicherungsgesellschaft%20AG%20Digitalswitzerland%20Allianz%20Digitale%20Sicherheit%20Schweiz%20Fachhochschule%20Nordwestschweiz%20FHNW%2C%20Kompetenzzentrum%20Digitale%20Transformation%20Schweizerische%20Akademie%20der%20Technischen%20Wissenschaften%20SATW%3C%5C%2Fi%3E.%3C%5C%2Fdiv%3E%5Cn%3C%5C%2Fdiv%3E%22%2C%22data%22%3A%7B%22itemType%22%3A%22journalArticle%22%2C%22title%22%3A%22Schweizerische%20Mobiliar%20Versicherungsgesellschaft%20AG%20Digitalswitzerland%20Allianz%20Digitale%20Sicherheit%20Schweiz%20Fachhochschule%20Nordwestschweiz%20FHNW%2C%20Kompetenzzentrum%20Digitale%20Transformation%20Schweizerische%20Akademie%20der%20Technischen%20Wissenschaften%20SATW%22%2C%22creators%22%3A%5B%7B%22creatorType%22%3A%22author%22%2C%22firstName%22%3A%22Karin%20M%5Cu00e4ndli%22%2C%22lastName%22%3A%22Lerch%22%7D%2C%7B%22creatorType%22%3A%22author%22%2C%22firstName%22%3A%22Mara%22%2C%22lastName%22%3A%22Tanner%22%7D%5D%2C%22abstractNote%22%3A%22%22%2C%22date%22%3A%222022%22%2C%22language%22%3A%22de%22%2C%22DOI%22%3A%22%22%2C%22ISSN%22%3A%22%22%2C%22url%22%3A%22%22%2C%22collections%22%3A%5B%22YLB2M7DD%22%5D%2C%22dateModified%22%3A%222023–04-27T06%3A15%3A46Z%22%7D%7D%2C%7B%22key%22%3A%222PK2VF9U%22%2C%22library%22%3A%7B%22id%22%3A2359887%7D%2C%22meta%22%3A%7B%22creatorSummary%22%3A%22Frick%22%2C%22parsedDate%22%3A%222022%22%2C%22numChildren%22%3A1%7D%2C%22bib%22%3A%22%3Cdiv%20class%3D%5C%22csl-bib-body%5C%22%20style%3D%5C%22line-height%3A%202%3B%20padding-left%3A%201em%3B%20text-indent%3A-1em%3B%5C%22%3E%5Cn%20%20%3Cdiv%20class%3D%5C%22csl-entry%5C%22%3EFrick%2C%20J.-C.%20%282022%29.%20%3Ci%3EComparis-%20Datenvertrauens-%20studie%202022%3C%5C%2Fi%3E.%3C%5C%2Fdiv%3E%5Cn%3C%5C%2Fdiv%3E%22%2C%22data%22%3A%7B%22itemType%22%3A%22journalArticle%22%2C%22title%22%3A%22Comparis-%20Datenvertrauens-%20studie%202022%22%2C%22creators%22%3A%5B%7B%22creatorType%22%3A%22author%22%2C%22firstName%22%3A%22Jean-Claude%22%2C%22lastName%22%3A%22Frick%22%7D%5D%2C%22abstractNote%22%3A%22%22%2C%22date%22%3A%222022%22%2C%22language%22%3A%22de%22%2C%22DOI%22%3A%22%22%2C%22ISSN%22%3A%22%22%2C%22url%22%3A%22%22%2C%22collections%22%3A%5B%22YLB2M7DD%22%5D%2C%22dateModified%22%3A%222023–04-27T06%3A15%3A33Z%22%7D%7D%2C%7B%22key%22%3A%228ZYTZDCI%22%2C%22library%22%3A%7B%22id%22%3A2359887%7D%2C%22meta%22%3A%7B%22creatorSummary%22%3A%22Knoll%22%2C%22parsedDate%22%3A%222017%22%2C%22numChildren%22%3A1%7D%2C%22bib%22%3A%22%3Cdiv%20class%3D%5C%22csl-bib-body%5C%22%20style%3D%5C%22line-height%3A%202%3B%20padding-left%3A%201em%3B%20text-indent%3A-1em%3B%5C%22%3E%5Cn%20%20%3Cdiv%20class%3D%5C%22csl-entry%5C%22%3EKnoll%2C%20M.%20%282017%29.%20IT-Risikomanagement%20im%20Zeitalter%20der%20Digitalisierung.%20%3Ci%3EHMD%20Praxis%20der%20Wirtschaftsinformatik%3C%5C%2Fi%3E%2C%20%3Ci%3E54%3C%5C%2Fi%3E%281%29%2C%204%26%23x2013%3B20.%20%3Ca%20href%3D%27https%3A%5C%2F%5C%2Fdoi.org%5C%2F10.1365%5C%2Fs40702-017‑0287‑4%27%3Ehttps%3A%5C%2F%5C%2Fdoi.org%5C%2F10.1365%5C%2Fs40702-017‑0287‑4%3C%5C%2Fa%3E%3C%5C%2Fdiv%3E%5Cn%3C%5C%2Fdiv%3E%22%2C%22data%22%3A%7B%22itemType%22%3A%22journalArticle%22%2C%22title%22%3A%22IT-Risikomanagement%20im%20Zeitalter%20der%20Digitalisierung%22%2C%22creators%22%3A%5B%7B%22creatorType%22%3A%22author%22%2C%22firstName%22%3A%22Matthias%22%2C%22lastName%22%3A%22Knoll%22%7D%5D%2C%22abstractNote%22%3A%22In%20the%20age%20of%20digital%20transformation%20IT%20gains%20more%20and%20more%20importance%20in%20our%20life%20and%20work%2C%20and%20therefore%20requires%20increased%20interdisciplinary%20focus%20on%20new%20and%20upcoming%20risks.%20More%20than%20ever%20new%20products%20and%20business%20models%20are%20combined%20with%20a%20high%20potential%20to%20collect%20and%20process%20own%20and%20external%20data%2C%20to%20observe%20and%20to%20attack%20companies%20as%20well%20as%20households.%20This%20article%20introduces%20the%20basics%20of%20it%20risk%20management%2C%20addresses%20current%20topics%20and%20drafts%20ideas%20for%20further%20discussion.%22%2C%22date%22%3A%222%5C%2F2017%22%2C%22language%22%3A%22de%22%2C%22DOI%22%3A%2210.1365%5C%2Fs40702-017‑0287‑4%22%2C%22ISSN%22%3A%221436–3011%2C%202198–2775%22%2C%22url%22%3A%22http%3A%5C%2F%5C%2Flink.springer.com%5C%2F10.1365%5C%2Fs40702-017‑0287‑4%22%2C%22collections%22%3A%5B%22YLB2M7DD%22%5D%2C%22dateModified%22%3A%222022–10-12T11%3A12%3A20Z%22%7D%7D%2C%7B%22key%22%3A%229EWJ3LEX%22%2C%22library%22%3A%7B%22id%22%3A2359887%7D%2C%22meta%22%3A%7B%22creatorSummary%22%3A%22Horten%20and%20Gr%5Cu00e4ber%22%2C%22parsedDate%22%3A%222020%22%2C%22numChildren%22%3A1%7D%2C%22bib%22%3A%22%3Cdiv%20class%3D%5C%22csl-bib-body%5C%22%20style%3D%5C%22line-height%3A%202%3B%20padding-left%3A%201em%3B%20text-indent%3A-1em%3B%5C%22%3E%5Cn%20%20%3Cdiv%20class%3D%5C%22csl-entry%5C%22%3EHorten%2C%20B.%2C%20%26amp%3B%20Gr%26%23xE4%3Bber%2C%20M.%20%282020%29.%20Cyberkriminalit%26%23xE4%3Bt%3A%20%26%23xDC%3Bbersicht%20zu%20aktuellen%20und%20k%26%23xFC%3Bnftigen%20Erscheinungsformen.%20%3Ci%3EForensische%20Psychiatrie%2C%20Psychologie%2C%20Kriminologie%3C%5C%2Fi%3E%2C%20%3Ci%3E14%3C%5C%2Fi%3E%283%29%2C%20233%26%23x2013%3B241.%20%3Ca%20href%3D%27https%3A%5C%2F%5C%2Fdoi.org%5C%2F10.1007%5C%2Fs11757-020–00605‑0%27%3Ehttps%3A%5C%2F%5C%2Fdoi.org%5C%2F10.1007%5C%2Fs11757-020–00605‑0%3C%5C%2Fa%3E%3C%5C%2Fdiv%3E%5Cn%3C%5C%2Fdiv%3E%22%2C%22data%22%3A%7B%22itemType%22%3A%22journalArticle%22%2C%22title%22%3A%22Cyberkriminalit%5Cu00e4t%3A%20%5Cu00dcbersicht%20zu%20aktuellen%20und%20k%5Cu00fcnftigen%20Erscheinungsformen%22%2C%22creators%22%3A%5B%7B%22creatorType%22%3A%22author%22%2C%22firstName%22%3A%22Barbara%22%2C%22lastName%22%3A%22Horten%22%7D%2C%7B%22creatorType%22%3A%22author%22%2C%22firstName%22%3A%22Marleen%22%2C%22lastName%22%3A%22Gr%5Cu00e4ber%22%7D%5D%2C%22abstractNote%22%3A%22The%20possibilities%20for%20cybercriminals%20and%20the%20manifestations%20of%20cybercrime%20have%20signi%5Cufb01cantly%20increased%20in%20recent%20years%20due%20to%20the%20digitalization%20and%20spread%20of%20internet-enabled%20devices.%20The%20term%20cybercrime%20describes%20criminal%20acts%20committed%20via%20internet%2C%20but%20there%20are%20numerous%20manifestations%20which%20are%20classi%5Cufb01ed%20differently%20depending%20on%20the%20context%20of%20cybercrime.%20The%20prevalence%20of%20cybercrime%20is%20presented%20in%20the%20annual%20Federal%20Management%20Report%20of%20the%20German%20Federal%20Criminal%20Police%20Of%5Cufb01ce%20%28BKA%29.%20This%20report%20identi%5Cufb01es%20challenges%20by%2C%20among%20others%2C%20new%20methods%20of%20distributing%20malware%20and%20identity%20theft.%20Ransomware%2C%20an%20increased%20danger%20potential%20from%20the%20Internet%20of%20things%20and%20attacks%20on%20so-called%20critical%20infrastructures%20must%20also%20be%20perceived%20as%20cybercriminal%20threats.%20In%20addition%2C%20sexually%20motivated%20crimes%2C%20such%20as%20child%20pornography%2C%20also%20spread%20faster%20in%20the%20virtual%20space.%20The%20German%20Police%20Crime%20Statistics%20for%202019%20showed%20a%2015.4%25%20increase%20in%20cybercrime%20compared%20to%20the%20previous%20year.%20An%20increase%20in%20identity%20theft%20via%20platforms%2C%20such%20as%20darknet%20as%20well%20as%20a%20growing%20potential%20threat%20from%20developments%2C%20such%20as%20smart%20homes%2C%20cloud%20computing%20or%20big%20data%20is%20predicted.%20Empirical%20studies%20on%20the%20victimization%20experiences%20of%20cyberattacks%20are%20available%20for%20private%20individuals%20and%20industrial%20companies.%20The%20offenders%20were%20mostly%20young%20male%20adults.%22%2C%22date%22%3A%2208%5C%2F2020%22%2C%22language%22%3A%22de%22%2C%22DOI%22%3A%2210.1007%5C%2Fs11757-020–00605‑0%22%2C%22ISSN%22%3A%221862–7072%2C%201862–7080%22%2C%22url%22%3A%22https%3A%5C%2F%5C%2Flink.springer.com%5C%2F10.1007%5C%2Fs11757-020–00605‑0%22%2C%22collections%22%3A%5B%22YLB2M7DD%22%5D%2C%22dateModified%22%3A%222022–10-12T11%3A12%3A13Z%22%7D%7D%2C%7B%22key%22%3A%22SCF48LU2%22%2C%22library%22%3A%7B%22id%22%3A2359887%7D%2C%22meta%22%3A%7B%22creatorSummary%22%3A%22Kasprowicz%20and%20Rieger%22%2C%22parsedDate%22%3A%222020%22%2C%22numChildren%22%3A1%7D%2C%22bib%22%3A%22%3Cdiv%20class%3D%5C%22csl-bib-body%5C%22%20style%3D%5C%22line-height%3A%202%3B%20padding-left%3A%201em%3B%20text-indent%3A-1em%3B%5C%22%3E%5Cn%20%20%3Cdiv%20class%3D%5C%22csl-entry%5C%22%3EKasprowicz%2C%20D.%2C%20%26amp%3B%20Rieger%2C%20S.%20%28Eds.%29.%20%282020%29.%20%3Ci%3EHandbuch%20Virtualit%26%23xE4%3Bt%3C%5C%2Fi%3E.%20Springer%20Fachmedien%20Wiesbaden.%20https%3A%5C%2F%5C%2Fdoi.org%5C%2F10.1007%5C%2F978‑3–658-16342–6%3C%5C%2Fdiv%3E%5Cn%3C%5C%2Fdiv%3E%22%2C%22data%22%3A%7B%22itemType%22%3A%22book%22%2C%22title%22%3A%22Handbuch%20Virtualit%5Cu00e4t%22%2C%22creators%22%3A%5B%7B%22creatorType%22%3A%22editor%22%2C%22firstName%22%3A%22Dawid%22%2C%22lastName%22%3A%22Kasprowicz%22%7D%2C%7B%22creatorType%22%3A%22editor%22%2C%22firstName%22%3A%22Stefan%22%2C%22lastName%22%3A%22Rieger%22%7D%5D%2C%22abstractNote%22%3A%22%22%2C%22date%22%3A%222020%22%2C%22language%22%3A%22de%22%2C%22ISBN%22%3A%22978–3‑658–16341‑9%20978–3‑658–16342‑6%22%2C%22url%22%3A%22http%3A%5C%2F%5C%2Flink.springer.com%5C%2F10.1007%5C%2F978‑3–658-16342–6%22%2C%22collections%22%3A%5B%22YLB2M7DD%22%5D%2C%22dateModified%22%3A%222022–10-12T11%3A12%3A03Z%22%7D%7D%2C%7B%22key%22%3A%227SZ2VVP2%22%2C%22library%22%3A%7B%22id%22%3A2359887%7D%2C%22meta%22%3A%7B%22creatorSummary%22%3A%22Bartsch%20and%20Frey%22%2C%22parsedDate%22%3A%222017%22%2C%22numChildren%22%3A1%7D%2C%22bib%22%3A%22%3Cdiv%20class%3D%5C%22csl-bib-body%5C%22%20style%3D%5C%22line-height%3A%202%3B%20padding-left%3A%201em%3B%20text-indent%3A-1em%3B%5C%22%3E%5Cn%20%20%3Cdiv%20class%3D%5C%22csl-entry%5C%22%3EBartsch%2C%20M.%2C%20%26amp%3B%20Frey%2C%20S.%20%282017%29.%20%3Ci%3ECyberstrategien%20f%26%23xFC%3Br%20Unternehmen%20und%20Beh%26%23xF6%3Brden%3C%5C%2Fi%3E.%20Springer%20Fachmedien%20Wiesbaden.%20https%3A%5C%2F%5C%2Fdoi.org%5C%2F10.1007%5C%2F978‑3–658-16139–2%3C%5C%2Fdiv%3E%5Cn%3C%5C%2Fdiv%3E%22%2C%22data%22%3A%7B%22itemType%22%3A%22book%22%2C%22title%22%3A%22Cyberstrategien%20f%5Cu00fcr%20Unternehmen%20und%20Beh%5Cu00f6rden%22%2C%22creators%22%3A%5B%7B%22creatorType%22%3A%22author%22%2C%22firstName%22%3A%22Michael%22%2C%22lastName%22%3A%22Bartsch%22%7D%2C%7B%22creatorType%22%3A%22author%22%2C%22firstName%22%3A%22Stefanie%22%2C%22lastName%22%3A%22Frey%22%7D%5D%2C%22abstractNote%22%3A%22%22%2C%22date%22%3A%222017%22%2C%22language%22%3A%22de%22%2C%22ISBN%22%3A%22978–3‑658–16138‑5%20978–3‑658–16139‑2%22%2C%22url%22%3A%22http%3A%5C%2F%5C%2Flink.springer.com%5C%2F10.1007%5C%2F978‑3–658-16139–2%22%2C%22collections%22%3A%5B%22YLB2M7DD%22%5D%2C%22dateModified%22%3A%222022–10-12T11%3A11%3A54Z%22%7D%7D%2C%7B%22key%22%3A%224X9485DU%22%2C%22library%22%3A%7B%22id%22%3A2359887%7D%2C%22meta%22%3A%7B%22creatorSummary%22%3A%22Peter%20et%20al.%22%2C%22numChildren%22%3A1%7D%2C%22bib%22%3A%22%3Cdiv%20class%3D%5C%22csl-bib-body%5C%22%20style%3D%5C%22line-height%3A%202%3B%20padding-left%3A%201em%3B%20text-indent%3A-1em%3B%5C%22%3E%5Cn%20%20%3Cdiv%20class%3D%5C%22csl-entry%5C%22%3EPeter%2C%20M.%20K.%2C%20H%26%23xF6%3Blzli%2C%20A.%2C%20Kaelin%2C%20A.%20W.%2C%20Lerch%2C%20K.%20M.%2C%20Vifian%2C%20P.%2C%20%26amp%3B%20Wettstein%2C%20N.%20%28n.d.%29.%20%3Ci%3EHomeoffice%20und%20Cybers%26%23xAD%3B%20icherheit%20in%20Schweizer%20KMU%3C%5C%2Fi%3E.%2030.%3C%5C%2Fdiv%3E%5Cn%3C%5C%2Fdiv%3E%22%2C%22data%22%3A%7B%22itemType%22%3A%22journalArticle%22%2C%22title%22%3A%22Homeoffice%20und%20Cybers%5Cu00ad%20icherheit%20in%20Schweizer%20KMU%22%2C%22creators%22%3A%5B%7B%22creatorType%22%3A%22author%22%2C%22firstName%22%3A%22Marc%20K%22%2C%22lastName%22%3A%22Peter%22%7D%2C%7B%22creatorType%22%3A%22author%22%2C%22firstName%22%3A%22Andreas%22%2C%22lastName%22%3A%22H%5Cu00f6lzli%22%7D%2C%7B%22creatorType%22%3A%22author%22%2C%22firstName%22%3A%22Andreas%20W%22%2C%22lastName%22%3A%22Kaelin%22%7D%2C%7B%22creatorType%22%3A%22author%22%2C%22firstName%22%3A%22Karin%20M%5Cu00e4ndli%22%2C%22lastName%22%3A%22Lerch%22%7D%2C%7B%22creatorType%22%3A%22author%22%2C%22firstName%22%3A%22Patric%22%2C%22lastName%22%3A%22Vifian%22%7D%2C%7B%22creatorType%22%3A%22author%22%2C%22firstName%22%3A%22Nicole%22%2C%22lastName%22%3A%22Wettstein%22%7D%5D%2C%22abstractNote%22%3A%22%22%2C%22date%22%3A%22%22%2C%22language%22%3A%22de%22%2C%22DOI%22%3A%22%22%2C%22ISSN%22%3A%22%22%2C%22url%22%3A%22%22%2C%22collections%22%3A%5B%22YLB2M7DD%22%5D%2C%22dateModified%22%3A%222022–07-01T08%3A16%3A34Z%22%7D%7D%2C%7B%22key%22%3A%22QNG9BN33%22%2C%22library%22%3A%7B%22id%22%3A2359887%7D%2C%22meta%22%3A%7B%22creatorSummary%22%3A%22Newman%22%2C%22numChildren%22%3A1%7D%2C%22bib%22%3A%22%3Cdiv%20class%3D%5C%22csl-bib-body%5C%22%20style%3D%5C%22line-height%3A%202%3B%20padding-left%3A%201em%3B%20text-indent%3A-1em%3B%5C%22%3E%5Cn%20%20%3Cdiv%20class%3D%5C%22csl-entry%5C%22%3ENewman%2C%20N.%20%28n.d.%29.%20%3Ci%3EReuters%20Institute%20Digital%20News%20Report%202020%3C%5C%2Fi%3E%20%28p.%20112%29.%3C%5C%2Fdiv%3E%5Cn%3C%5C%2Fdiv%3E%22%2C%22data%22%3A%7B%22itemType%22%3A%22report%22%2C%22title%22%3A%22Reuters%20Institute%20Digital%20News%20Report%202020%22%2C%22creators%22%3A%5B%7B%22creatorType%22%3A%22author%22%2C%22firstName%22%3A%22Nic%22%2C%22lastName%22%3A%22Newman%22%7D%5D%2C%22abstractNote%22%3A%22%22%2C%22reportNumber%22%3A%22%22%2C%22reportType%22%3A%22%22%2C%22institution%22%3A%22%22%2C%22date%22%3A%22%22%2C%22language%22%3A%22en%22%2C%22url%22%3A%22%22%2C%22collections%22%3A%5B%22YLB2M7DD%22%5D%2C%22dateModified%22%3A%222022–05-23T09%3A10%3A21Z%22%7D%7D%2C%7B%22key%22%3A%222KDPJWAW%22%2C%22library%22%3A%7B%22id%22%3A2359887%7D%2C%22meta%22%3A%7B%22creatorSummary%22%3A%22Deloitte%22%2C%22numChildren%22%3A1%7D%2C%22bib%22%3A%22%3Cdiv%20class%3D%5C%22csl-bib-body%5C%22%20style%3D%5C%22line-height%3A%202%3B%20padding-left%3A%201em%3B%20text-indent%3A-1em%3B%5C%22%3E%5Cn%20%20%3Cdiv%20class%3D%5C%22csl-entry%5C%22%3EDeloitte.%20%28n.d.%29.%20%3Ci%3ECyber%20survey%202020%3C%5C%2Fi%3E.%20Retrieved%20May%2023%2C%202022%2C%20from%20%3Ca%20href%3D%27https%3A%5C%2F%5C%2Fwww2.deloitte.com%5C%2Fcontent%5C%2Fdam%5C%2FDeloitte%5C%2Fdk%5C%2FDocuments%5C%2FCyber%5C%2Fcyberreport%5C%2FCyber_survey_.pdf%27%3Ehttps%3A%5C%2F%5C%2Fwww2.deloitte.com%5C%2Fcontent%5C%2Fdam%5C%2FDeloitte%5C%2Fdk%5C%2FDocuments%5C%2FCyber%5C%2Fcyberreport%5C%2FCyber_survey_.pdf%3C%5C%2Fa%3E%3C%5C%2Fdiv%3E%5Cn%3C%5C%2Fdiv%3E%22%2C%22data%22%3A%7B%22itemType%22%3A%22webpage%22%2C%22title%22%3A%22Cyber%20survey%202020%22%2C%22creators%22%3A%5B%7B%22creatorType%22%3A%22author%22%2C%22firstName%22%3A%22%22%2C%22lastName%22%3A%22Deloitte%22%7D%5D%2C%22abstractNote%22%3A%22%22%2C%22date%22%3A%22%22%2C%22url%22%3A%22https%3A%5C%2F%5C%2Fwww2.deloitte.com%5C%2Fcontent%5C%2Fdam%5C%2FDeloitte%5C%2Fdk%5C%2FDocuments%5C%2FCyber%5C%2Fcyberreport%5C%2FCyber_survey_.pdf%22%2C%22language%22%3A%22%22%2C%22collections%22%3A%5B%22YLB2M7DD%22%5D%2C%22dateModified%22%3A%222022–05-23T09%3A04%3A58Z%22%7D%7D%2C%7B%22key%22%3A%22VL38YCCD%22%2C%22library%22%3A%7B%22id%22%3A2359887%7D%2C%22meta%22%3A%7B%22creatorSummary%22%3A%22Deloitte%22%2C%22parsedDate%22%3A%222019%22%2C%22numChildren%22%3A1%7D%2C%22bib%22%3A%22%3Cdiv%20class%3D%5C%22csl-bib-body%5C%22%20style%3D%5C%22line-height%3A%202%3B%20padding-left%3A%201em%3B%20text-indent%3A-1em%3B%5C%22%3E%5Cn%20%20%3Cdiv%20class%3D%5C%22csl-entry%5C%22%3EDeloitte.%20%282019%29.%20%3Ci%3ECyber%20Security%20Report%202019.%20Teil%201%20Deutschland%3C%5C%2Fi%3E.%20%3Ca%20href%3D%27https%3A%5C%2F%5C%2Fwww2.deloitte.com%5C%2Fcontent%5C%2Fdam%5C%2FDeloitte%5C%2Fde%5C%2FDocuments%5C%2Frisk%5C%2FCyber-Security-Report-2019-Teil‑1.pdf%27%3Ehttps%3A%5C%2F%5C%2Fwww2.deloitte.com%5C%2Fcontent%5C%2Fdam%5C%2FDeloitte%5C%2Fde%5C%2FDocuments%5C%2Frisk%5C%2FCyber-Security-Report-2019-Teil‑1.pdf%3C%5C%2Fa%3E%3C%5C%2Fdiv%3E%5Cn%3C%5C%2Fdiv%3E%22%2C%22data%22%3A%7B%22itemType%22%3A%22report%22%2C%22title%22%3A%22Cyber%20Security%20Report%202019.%20Teil%201%20Deutschland%22%2C%22creators%22%3A%5B%7B%22creatorType%22%3A%22author%22%2C%22firstName%22%3A%22%22%2C%22lastName%22%3A%22Deloitte%22%7D%5D%2C%22abstractNote%22%3A%22%22%2C%22reportNumber%22%3A%22%22%2C%22reportType%22%3A%22%22%2C%22institution%22%3A%22%22%2C%22date%22%3A%222019%22%2C%22language%22%3A%22d%22%2C%22url%22%3A%22https%3A%5C%2F%5C%2Fwww2.deloitte.com%5C%2Fcontent%5C%2Fdam%5C%2FDeloitte%5C%2Fde%5C%2FDocuments%5C%2Frisk%5C%2FCyber-Security-Report-2019-Teil‑1.pdf%22%2C%22collections%22%3A%5B%22YLB2M7DD%22%5D%2C%22dateModified%22%3A%222022–05-23T09%3A02%3A04Z%22%7D%7D%2C%7B%22key%22%3A%22NIKLGACZ%22%2C%22library%22%3A%7B%22id%22%3A2359887%7D%2C%22meta%22%3A%7B%22creatorSummary%22%3A%22Deloitte%22%2C%22numChildren%22%3A1%7D%2C%22bib%22%3A%22%3Cdiv%20class%3D%5C%22csl-bib-body%5C%22%20style%3D%5C%22line-height%3A%202%3B%20padding-left%3A%201em%3B%20text-indent%3A-1em%3B%5C%22%3E%5Cn%20%20%3Cdiv%20class%3D%5C%22csl-entry%5C%22%3EDeloitte.%20%28n.d.%29.%20%3Ci%3EDeloitte%20Cyber%20Security%20Report-2021%20Deutschland%3C%5C%2Fi%3E.%20Retrieved%20May%2023%2C%202022%2C%20from%20%3Ca%20href%3D%27https%3A%5C%2F%5C%2Fwww2.deloitte.com%5C%2Fcontent%5C%2Fdam%5C%2FDeloitte%5C%2Fde%5C%2FDocuments%5C%2Frisk%5C%2FDeloitte-Cyber-Security-Report-2021.pdf%27%3Ehttps%3A%5C%2F%5C%2Fwww2.deloitte.com%5C%2Fcontent%5C%2Fdam%5C%2FDeloitte%5C%2Fde%5C%2FDocuments%5C%2Frisk%5C%2FDeloitte-Cyber-Security-Report-2021.pdf%3C%5C%2Fa%3E%3C%5C%2Fdiv%3E%5Cn%3C%5C%2Fdiv%3E%22%2C%22data%22%3A%7B%22itemType%22%3A%22report%22%2C%22title%22%3A%22Deloitte%20Cyber%20Security%20Report-2021%20Deutschland%22%2C%22creators%22%3A%5B%7B%22creatorType%22%3A%22author%22%2C%22firstName%22%3A%22%22%2C%22lastName%22%3A%22Deloitte%22%7D%5D%2C%22abstractNote%22%3A%22%22%2C%22reportNumber%22%3A%22%22%2C%22reportType%22%3A%22%22%2C%22institution%22%3A%22%22%2C%22date%22%3A%22%22%2C%22language%22%3A%22%22%2C%22url%22%3A%22https%3A%5C%2F%5C%2Fwww2.deloitte.com%5C%2Fcontent%5C%2Fdam%5C%2FDeloitte%5C%2Fde%5C%2FDocuments%5C%2Frisk%5C%2FDeloitte-Cyber-Security-Report-2021.pdf%22%2C%22collections%22%3A%5B%22YLB2M7DD%22%5D%2C%22dateModified%22%3A%222022–05-23T09%3A01%3A55Z%22%7D%7D%2C%7B%22key%22%3A%2253WX4CP4%22%2C%22library%22%3A%7B%22id%22%3A2359887%7D%2C%22meta%22%3A%7B%22numChildren%22%3A1%7D%2C%22bib%22%3A%22%3Cdiv%20class%3D%5C%22csl-bib-body%5C%22%20style%3D%5C%22line-height%3A%202%3B%20padding-left%3A%201em%3B%20text-indent%3A-1em%3B%5C%22%3E%5Cn%20%20%3Cdiv%20class%3D%5C%22csl-entry%5C%22%3E%3Ci%3ETechnology%20Solutions%20for%20Complying%20with%20the%20GDPR%20and%20Data%20Privacy%20Laws%3C%5C%2Fi%3E.%20%28n.d.%29.%20Retrieved%20May%2015%2C%202022%2C%20from%20%3Ca%20href%3D%27https%3A%5C%2F%5C%2Fwww.shrm.org%5C%2Fresourcesandtools%5C%2Fhr-topics%5C%2Ftechnology%5C%2Fpages%5C%2Ftechnology-solutions-gdpr-data-privacy-laws.aspx%27%3Ehttps%3A%5C%2F%5C%2Fwww.shrm.org%5C%2Fresourcesandtools%5C%2Fhr-topics%5C%2Ftechnology%5C%2Fpages%5C%2Ftechnology-solutions-gdpr-data-privacy-laws.aspx%3C%5C%2Fa%3E%3C%5C%2Fdiv%3E%5Cn%3C%5C%2Fdiv%3E%22%2C%22data%22%3A%7B%22itemType%22%3A%22webpage%22%2C%22title%22%3A%22Technology%20Solutions%20for%20Complying%20with%20the%20GDPR%20and%20Data%20Privacy%20Laws%22%2C%22creators%22%3A%5B%5D%2C%22abstractNote%22%3A%22%22%2C%22date%22%3A%22%22%2C%22url%22%3A%22https%3A%5C%2F%5C%2Fwww.shrm.org%5C%2Fresourcesandtools%5C%2Fhr-topics%5C%2Ftechnology%5C%2Fpages%5C%2Ftechnology-solutions-gdpr-data-privacy-laws.aspx%22%2C%22language%22%3A%22%22%2C%22collections%22%3A%5B%22YLB2M7DD%22%5D%2C%22dateModified%22%3A%222022–05-15T14%3A30%3A46Z%22%7D%7D%2C%7B%22key%22%3A%22E4IKYQ2G%22%2C%22library%22%3A%7B%22id%22%3A2359887%7D%2C%22meta%22%3A%7B%22numChildren%22%3A0%7D%2C%22bib%22%3A%22%3Cdiv%20class%3D%5C%22csl-bib-body%5C%22%20style%3D%5C%22line-height%3A%202%3B%20padding-left%3A%201em%3B%20text-indent%3A-1em%3B%5C%22%3E%5Cn%20%20%3Cdiv%20class%3D%5C%22csl-entry%5C%22%3E%3Ci%3EExclusive%3A%20Senior%20EU%20officials%20were%20targeted%20with%20Israeli%20spyware%20%7C%20Reuters%3C%5C%2Fi%3E.%20%28n.d.%29.%20Retrieved%20May%2015%2C%202022%2C%20from%20%3Ca%20href%3D%27https%3A%5C%2F%5C%2Fwww.reuters.com%5C%2Ftechnology%5C%2Fexclusive-senior-eu-officials-were-targeted-with-israeli-spyware-sources-2022–04-11%5C%2F%27%3Ehttps%3A%5C%2F%5C%2Fwww.reuters.com%5C%2Ftechnology%5C%2Fexclusive-senior-eu-officials-were-targeted-with-israeli-spyware-sources-2022–04-11%5C%2F%3C%5C%2Fa%3E%3C%5C%2Fdiv%3E%5Cn%3C%5C%2Fdiv%3E%22%2C%22data%22%3A%7B%22itemType%22%3A%22webpage%22%2C%22title%22%3A%22Exclusive%3A%20Senior%20EU%20officials%20were%20targeted%20with%20Israeli%20spyware%20%7C%20Reuters%22%2C%22creators%22%3A%5B%5D%2C%22abstractNote%22%3A%22%22%2C%22date%22%3A%22%22%2C%22url%22%3A%22https%3A%5C%2F%5C%2Fwww.reuters.com%5C%2Ftechnology%5C%2Fexclusive-senior-eu-officials-were-targeted-with-israeli-spyware-sources-2022–04-11%5C%2F%22%2C%22language%22%3A%22%22%2C%22collections%22%3A%5B%22YLB2M7DD%22%5D%2C%22dateModified%22%3A%222022–05-15T14%3A30%3A20Z%22%7D%7D%2C%7B%22key%22%3A%22G2WKIWWE%22%2C%22library%22%3A%7B%22id%22%3A2359887%7D%2C%22meta%22%3A%7B%22creatorSummary%22%3A%22Raaflaub%29%22%2C%22numChildren%22%3A1%7D%2C%22bib%22%3A%22%3Cdiv%20class%3D%5C%22csl-bib-body%5C%22%20style%3D%5C%22line-height%3A%202%3B%20padding-left%3A%201em%3B%20text-indent%3A-1em%3B%5C%22%3E%5Cn%20%20%3Cdiv%20class%3D%5C%22csl-entry%5C%22%3ERaaflaub%29%2C%20%26lt%3BKaty%20Romy%26gt%3B%2C%20%28%26%23xDC%3Bbertragung%20aus%20dem%20Franz%26%23xF6%3Bsischen%3A%20Christian.%20%28n.d.%29.%20%3Ci%3EHomeoffice%20%26%23x2013%3B%20Einfallstor%20f%26%23xFC%3Br%20Cyberkriminelle%3C%5C%2Fi%3E.%20SWI%20swissinfo.ch.%20Retrieved%20May%2015%2C%202022%2C%20from%20%3Ca%20href%3D%27https%3A%5C%2F%5C%2Fwww.swissinfo.ch%5C%2Fger%5C%2Fgesellschaft%5C%2Fhomeoffice—einfallstor-fuer-cyberkriminelle%5C%2F46155880%27%3Ehttps%3A%5C%2F%5C%2Fwww.swissinfo.ch%5C%2Fger%5C%2Fgesellschaft%5C%2Fhomeoffice—einfallstor-fuer-cyberkriminelle%5C%2F46155880%3C%5C%2Fa%3E%3C%5C%2Fdiv%3E%5Cn%3C%5C%2Fdiv%3E%22%2C%22data%22%3A%7B%22itemType%22%3A%22webpage%22%2C%22title%22%3A%22Homeoffice%20%5Cu2013%20Einfallstor%20f%5Cu00fcr%20Cyberkriminelle%22%2C%22creators%22%3A%5B%7B%22creatorType%22%3A%22author%22%2C%22firstName%22%3A%22%3CKaty%20Romy%3E%2C%20%28%5Cu00dcbertragung%20aus%20dem%20Franz%5Cu00f6sischen%3A%20Christian%22%2C%22lastName%22%3A%22Raaflaub%29%22%7D%5D%2C%22abstractNote%22%3A%22Viele%20Firmen%20sind%20immer%20noch%20schlecht%20ger%5Cu00fcstet.%22%2C%22date%22%3A%22%22%2C%22url%22%3A%22https%3A%5C%2F%5C%2Fwww.swissinfo.ch%5C%2Fger%5C%2Fgesellschaft%5C%2Fhomeoffice—einfallstor-fuer-cyberkriminelle%5C%2F46155880%22%2C%22language%22%3A%22de%22%2C%22collections%22%3A%5B%22YLB2M7DD%22%5D%2C%22dateModified%22%3A%222022–05-15T14%3A28%3A18Z%22%7D%7D%2C%7B%22key%22%3A%22PYQ4NNZK%22%2C%22library%22%3A%7B%22id%22%3A2359887%7D%2C%22meta%22%3A%7B%22numChildren%22%3A1%7D%2C%22bib%22%3A%22%3Cdiv%20class%3D%5C%22csl-bib-body%5C%22%20style%3D%5C%22line-height%3A%202%3B%20padding-left%3A%201em%3B%20text-indent%3A-1em%3B%5C%22%3E%5Cn%20%20%3Cdiv%20class%3D%5C%22csl-entry%5C%22%3E%3Ci%3EWas%20ist%20Cyberkriminalit%26%23xE4%3Bt%20und%20wie%20l%26%23xE4%3Bsst%20sie%20sich%20verhindern%3F%3C%5C%2Fi%3E%20%28n.d.%29.%20Was%20ist%20Cyberkriminalit%26%23xE4%3Bt%20und%20wie%20l%26%23xE4%3Bsst%20sie%20sich%20verhindern%3F%20Retrieved%20May%2015%2C%202022%2C%20from%20%3Ca%20href%3D%27https%3A%5C%2F%5C%2Fwww.avast.com%5C%2Fde-de%5C%2Fc-cybercrime%27%3Ehttps%3A%5C%2F%5C%2Fwww.avast.com%5C%2Fde-de%5C%2Fc-cybercrime%3C%5C%2Fa%3E%3C%5C%2Fdiv%3E%5Cn%3C%5C%2Fdiv%3E%22%2C%22data%22%3A%7B%22itemType%22%3A%22webpage%22%2C%22title%22%3A%22Was%20ist%20Cyberkriminalit%5Cu00e4t%20und%20wie%20l%5Cu00e4sst%20sie%20sich%20verhindern%3F%22%2C%22creators%22%3A%5B%5D%2C%22abstractNote%22%3A%22Jedes%20Jahr%20kostet%20Cyberkriminalit%5Cu00e4t%20Einzelpersonen%20und%20Unternehmen%20Milliarden%20von%20Dollar%2C%20Tendenz%20steigend.%20Aber%20was%20genau%20hat%20man%20sich%20darunter%20vorzustellen%3F%20Hier%20herausfinden.%22%2C%22date%22%3A%22%22%2C%22url%22%3A%22https%3A%5C%2F%5C%2Fwww.avast.com%5C%2Fde-de%5C%2Fc-cybercrime%22%2C%22language%22%3A%22de-de%22%2C%22collections%22%3A%5B%22YLB2M7DD%22%5D%2C%22dateModified%22%3A%222022–05-15T14%3A27%3A52Z%22%7D%7D%2C%7B%22key%22%3A%22ASCKGCWR%22%2C%22library%22%3A%7B%22id%22%3A2359887%7D%2C%22meta%22%3A%7B%22numChildren%22%3A1%7D%2C%22bib%22%3A%22%3Cdiv%20class%3D%5C%22csl-bib-body%5C%22%20style%3D%5C%22line-height%3A%202%3B%20padding-left%3A%201em%3B%20text-indent%3A-1em%3B%5C%22%3E%5Cn%20%20%3Cdiv%20class%3D%5C%22csl-entry%5C%22%3E%3Ci%3ECyberkriminelle%20zur%20Bek%26%23xE4%3Bmpfung%20von%20Cyberkriminalit%26%23xE4%3Bt%20im%20Visier%3C%5C%2Fi%3E.%20%28n.d.%29.%20FireEye.%20Retrieved%20May%2015%2C%202022%2C%20from%20%3Ca%20href%3D%27https%3A%5C%2F%5C%2Fwww.fireeye.de%5C%2Fcurrent-threats%5C%2Fstopping-todays-cyber-attacks.html%27%3Ehttps%3A%5C%2F%5C%2Fwww.fireeye.de%5C%2Fcurrent-threats%5C%2Fstopping-todays-cyber-attacks.html%3C%5C%2Fa%3E%3C%5C%2Fdiv%3E%5Cn%3C%5C%2Fdiv%3E%22%2C%22data%22%3A%7B%22itemType%22%3A%22webpage%22%2C%22title%22%3A%22Cyberkriminelle%20zur%20Bek%5Cu00e4mpfung%20von%20Cyberkriminalit%5Cu00e4t%20im%20Visier%22%2C%22creators%22%3A%5B%5D%2C%22abstractNote%22%3A%22Cyberkriminalit%5Cu00e4t%20und%20Cyberangriffe%20nehmen%20weiter%20zu.%20Informieren%20Sie%20sich%2C%20wie%20Cyberkriminelle%20die%20Sicherheitsma%5Cu00dfnahmen%20von%20Unternehmen%20rasch%20%5Cu00fcberwinden%20und%20wie%20Sie%20sie%20stoppen%20k%5Cu00f6nnen.%22%2C%22date%22%3A%22%22%2C%22url%22%3A%22https%3A%5C%2F%5C%2Fwww.fireeye.de%5C%2Fcurrent-threats%5C%2Fstopping-todays-cyber-attacks.html%22%2C%22language%22%3A%22de%22%2C%22collections%22%3A%5B%22YLB2M7DD%22%5D%2C%22dateModified%22%3A%222022–05-15T14%3A27%3A27Z%22%7D%7D%2C%7B%22key%22%3A%22N62QBC8V%22%2C%22library%22%3A%7B%22id%22%3A2359887%7D%2C%22meta%22%3A%7B%22numChildren%22%3A1%7D%2C%22bib%22%3A%22%3Cdiv%20class%3D%5C%22csl-bib-body%5C%22%20style%3D%5C%22line-height%3A%202%3B%20padding-left%3A%201em%3B%20text-indent%3A-1em%3B%5C%22%3E%5Cn%20%20%3Cdiv%20class%3D%5C%22csl-entry%5C%22%3E%3Ci%3ECyberkriminalit%26%23xE4%3Bt%20%26%23x2013%3B%20die%20Gefahr%20aus%20dem%20Home%20Office%3C%5C%2Fi%3E.%20%28n.d.%29.%20Deloitte%20Schweiz.%20Retrieved%20May%2015%2C%202022%2C%20from%20%3Ca%20href%3D%27https%3A%5C%2F%5C%2Fwww2.deloitte.com%5C%2Fch%5C%2Fde%5C%2Fpages%5C%2Frisk%5C%2Farticles%5C%2Fcovid-19-cyber-crime-working-from-home.html%27%3Ehttps%3A%5C%2F%5C%2Fwww2.deloitte.com%5C%2Fch%5C%2Fde%5C%2Fpages%5C%2Frisk%5C%2Farticles%5C%2Fcovid-19-cyber-crime-working-from-home.html%3C%5C%2Fa%3E%3C%5C%2Fdiv%3E%5Cn%3C%5C%2Fdiv%3E%22%2C%22data%22%3A%7B%22itemType%22%3A%22webpage%22%2C%22title%22%3A%22Cyberkriminalit%5Cu00e4t%20%5Cu2013%20die%20Gefahr%20aus%20dem%20Home%20Office%22%2C%22creators%22%3A%5B%5D%2C%22abstractNote%22%3A%22Die%20Arbeit%20aus%20dem%20Home%20Office%20stellt%20f%5Cu00fcr%20Unternehmen%20aufgrund%20der%20steigenden%20Anzahl%20von%20Cyberkriminellen%2C%20die%20COVID-19-bedingte%20%5Cu00c4ngste%20ausn%5Cu00fctzen%2C%20schlechter%20technologischer%20Infrastruktur%20und%20vor%20allem%20unzureichender%20Cyber-%20und%20Datensicherheit%20ein%20grosses%20Cyberrisiko%20dar.%22%2C%22date%22%3A%22%22%2C%22url%22%3A%22https%3A%5C%2F%5C%2Fwww2.deloitte.com%5C%2Fch%5C%2Fde%5C%2Fpages%5C%2Frisk%5C%2Farticles%5C%2Fcovid-19-cyber-crime-working-from-home.html%22%2C%22language%22%3A%22de%22%2C%22collections%22%3A%5B%22YLB2M7DD%22%5D%2C%22dateModified%22%3A%222022–05-15T14%3A27%3A03Z%22%7D%7D%2C%7B%22key%22%3A%229J5KDV3R%22%2C%22library%22%3A%7B%22id%22%3A2359887%7D%2C%22meta%22%3A%7B%22creatorSummary%22%3A%22Hillig%22%2C%22parsedDate%22%3A%222021–03-15%22%2C%22numChildren%22%3A1%7D%2C%22bib%22%3A%22%3Cdiv%20class%3D%5C%22csl-bib-body%5C%22%20style%3D%5C%22line-height%3A%202%3B%20padding-left%3A%201em%3B%20text-indent%3A-1em%3B%5C%22%3E%5Cn%20%20%3Cdiv%20class%3D%5C%22csl-entry%5C%22%3EHillig%2C%20J.%20%282021%2C%20March%2015%29.%20%3Ci%3ESo%20leicht%20konnte%20Luzernerin%20%26%23xFC%3Bber%20150%26%23x2019%3B000%20Kameras%20hacken%3C%5C%2Fi%3E.%20Blick.%20%3Ca%20href%3D%27https%3A%5C%2F%5C%2Fwww.blick.ch%5C%2Fschweiz%5C%2Fsicherheits-skandal-in-den-usa-so-leicht-konnte-luzerner-ueber-150000-kameras-hacken-id16401940.html%27%3Ehttps%3A%5C%2F%5C%2Fwww.blick.ch%5C%2Fschweiz%5C%2Fsicherheits-skandal-in-den-usa-so-leicht-konnte-luzerner-ueber-150000-kameras-hacken-id16401940.html%3C%5C%2Fa%3E%3C%5C%2Fdiv%3E%5Cn%3C%5C%2Fdiv%3E%22%2C%22data%22%3A%7B%22itemType%22%3A%22webpage%22%2C%22title%22%3A%22So%20leicht%20konnte%20Luzernerin%20%5Cu00fcber%20150%27000%20Kameras%20hacken%22%2C%22creators%22%3A%5B%7B%22creatorType%22%3A%22author%22%2C%22firstName%22%3A%22Johannes%22%2C%22lastName%22%3A%22Hillig%22%7D%5D%2C%22abstractNote%22%3A%22Ein%20Schweizer%20Hacker-Kollektiv%20knackte%20rund%20150%27000%20%5Cu00dcberwachungskameras%20einer%20US-Firma%2C%20die%20in%20Gef%5Cu00e4ngnissen%20und%20Spit%5Cu00e4lern%20genutzt%20werden.%20Daf%5Cu00fcr%20brauchte%20es%20kein%20Super-Genie%2C%20erkl%5Cu00e4rt%20Berufshacker%20Cyrill%20Brunschwiler.%22%2C%22date%22%3A%222021–03-15T17%3A51%3A57.5757%2B01%3A00%22%2C%22url%22%3A%22https%3A%5C%2F%5C%2Fwww.blick.ch%5C%2Fschweiz%5C%2Fsicherheits-skandal-in-den-usa-so-leicht-konnte-luzerner-ueber-150000-kameras-hacken-id16401940.html%22%2C%22language%22%3A%22de-CH%22%2C%22collections%22%3A%5B%22YLB2M7DD%22%5D%2C%22dateModified%22%3A%222022–05-15T09%3A26%3A14Z%22%7D%7D%2C%7B%22key%22%3A%22Z6KQMW5S%22%2C%22library%22%3A%7B%22id%22%3A2359887%7D%2C%22meta%22%3A%7B%22creatorSummary%22%3A%22Bundesamt%20f%5Cu00fcr%20Statistik%22%2C%22numChildren%22%3A1%7D%2C%22bib%22%3A%22%3Cdiv%20class%3D%5C%22csl-bib-body%5C%22%20style%3D%5C%22line-height%3A%202%3B%20padding-left%3A%201em%3B%20text-indent%3A-1em%3B%5C%22%3E%5Cn%20%20%3Cdiv%20class%3D%5C%22csl-entry%5C%22%3EBundesamt%20f%26%23xFC%3Br%20Statistik.%20%28n.d.%29.%20%3Ci%3EGemeldete%20Ffaelle%20von%20Cyberkriminalitaet%20in%20der%20Shweiz%202021%3C%5C%2Fi%3E.%20Statista.%3C%5C%2Fdiv%3E%5Cn%3C%5C%2Fdiv%3E%22%2C%22data%22%3A%7B%22itemType%22%3A%22document%22%2C%22title%22%3A%22Gemeldete%20Ffaelle%20von%20Cyberkriminalitaet%20in%20der%20Shweiz%202021%22%2C%22creators%22%3A%5B%7B%22creatorType%22%3A%22author%22%2C%22firstName%22%3A%22%22%2C%22lastName%22%3A%22Bundesamt%20f%5Cu00fcr%20Statistik%22%7D%5D%2C%22abstractNote%22%3A%22%22%2C%22date%22%3A%22%22%2C%22language%22%3A%22%22%2C%22url%22%3A%22%22%2C%22collections%22%3A%5B%22YLB2M7DD%22%5D%2C%22dateModified%22%3A%222022–05-12T13%3A55%3A19Z%22%7D%7D%5D%7D
Grimm, R. (n.d.). Psychological Aspects of Cybercrime.
Pugnetti, C., & Casián, C. (n.d.). Cyberrisiken und Schweizer KMU : Eine Untersuchung der Einstellungen von Mitarbeitenden und verhaltensbedingter Anfälligkeiten. 32.
Rafi, S., & Imtiaz, N. (2023). Cyberwar: Its Psychological Impact on Employees and Consequences for Organizations. In F. Özsungur (Ed.), Advances in Digital Crime, Forensics, and Cyber Terrorism (pp. 108–127). IGI Global. https://doi.org/10.4018/978–1‑6684–6741‑1.ch006
Rid, T., & Buchanan, B. (2015). Attributing Cyber Attacks. Journal of Strategic Studies, 38(1–2), 4–37. https://doi.org/10.1080/01402390.2014.977382
Shamsi, J. A., Zeadally, S., Sheikh, F., & Flowers, A. (2016). Attribution in cyberspace: techniques and legal implications. Security and Communication Networks, 9(15), 2886–2900. https://doi.org/10.1002/sec.1485
Adejobi, J. A., Carroll, F., Nawaf, L., & Montasari, R. (2021). PHISHING, TRUST AND HUMAN WELLBEING.
Rafi, S., & Imtiaz, N. (2022). Occupational Stress and Workplace Bullying Concerning Mental Health. International Journal of Education.
Beckerman, C. E. (2022). Is there a cyber security dilemma? Journal of Cybersecurity, 8(1), tyac012. https://doi.org/10.1093/cybsec/tyac012
Maness, R. C., & Valeriano, B. (2018). International Cyber Conflict and National Security (D. S. Reveron, N. K. Gvosdev, & J. A. Cloud, Eds.; Vol. 1). Oxford University Press. https://doi.org/10.1093/oxfordhb/9780190680015.013.25
Morgan State University, & Buresh, D. L. (2022). In Light of The American Departure From Afghanistan, Does Network-Centric Warfare Adequately Prepare The United States to Address Future Cyber Activities by The Taliban? International Journal of Social Science And Human Research, 05(03). https://doi.org/10.47191/ijsshr/v5-i3-45
Naha, A. (2022). Emerging Cyber Security Threats: India’s Concerns and Options. International Journal of Politics and Security, 4(1), 170–200. https://doi.org/10.53451/ijps.996755
Rapaccini, M. (n.d.). Cyberwarfare: definizioni, casi di studio e analisi.
Zeadally, S., & Flowers, A. (2014). Cyberwar: The What, When, Why, and How [Commentary]. IEEE Technology and Society Magazine, 33(3), 14–21. https://doi.org/10.1109/MTS.2014.2345196
Cornish, P., Hughes, R., & Livingstone, D. (2009). Cyberspace and the national security of the United Kingdom: threats and responses. Chatham House.
Csec, T. P. (n.d.). Running Head: AFRICA, EUROPE, AND MIDDLE EAST THREAT ASSESSMENT.
Mukherjee, S. (2019). Cyber Warfare and Implications. SSRN Electronic Journal. https://doi.org/10.2139/ssrn.3431676
Cyber threats: taxonomy, impact, policies, and way forward. (2022). KSII Transactions on Internet and Information Systems, 16(7). https://doi.org/10.3837/tiis.2022.07.017
Hejase, H. J., Fayyad-Kazan, H. F., Hejase, A. J., & Moukadem, I. A. (2021). Cyber Security amid COVID-19. Computer and Information Science, 14(2), 10. https://doi.org/10.5539/cis.v14n2p10
Nycyk, M. (n.d.). Computer Hackers and Hacking:
Wilson, C. (n.d.). Botnets, Cybercrime, and Cyberterrorism: Vulnerabilities and Policy Issues for Congress.
De Matos Alves, A. (2015). Between the “Battlefield” Metaphor and Promises of Generativity: Contrasting Discourses on Cyberconflict. Canadian Journal of Communication, 40(3), 389–406. https://doi.org/10.22230/cjc.2015v40n3a2742
Urquhart, L., & McAuley, D. (2018). Avoiding the internet of insecure industrial things. Computer Law & Security Review, 34(3), 450–466. https://doi.org/10.1016/j.clsr.2017.12.004
Eilstrup-Sangiovanni, M. (2018). Why the World Needs an International Cyberwar Convention. Philosophy & Technology, 31(3), 379–407. https://doi.org/10.1007/s13347-017‑0271‑5
Ghionis, A. A. (n.d.). The Limits of Deterrence in the Cyber World.
Karimov, N. (n.d.). The European Union Cyber Security and Protection of Human Rights.
Warf, B., & Fekete, E. (2016). Relational geographies of cyberterrorism and cyberwar. Space and Polity, 20(2), 143–157. https://doi.org/10.1080/13562576.2015.1112113
Sigholm, J. (2013). Non-State Actors in Cyberspace Operations. Journal of Military Studies, 4(1), 1–37. https://doi.org/10.1515/jms-2016–0184
Burton, J. (2015). NATO’s cyber defence: strategic challenges and institutional adaptation. Defence Studies, 15(4), 297–319. https://doi.org/10.1080/14702436.2015.1108108
Lindstrom, G. (n.d.). Meeting the Cyber Security Challenge.
Kaschner, H. (2020). Cyber Crisis Management: Das Praxishandbuch zu Krisenmanagement und Krisenkommunikation. Springer Fachmedien Wiesbaden. https://doi.org/10.1007/978–3‑658–27914‑1
Rosenberger, N., Niederhäuser, M., & Krämer, K. (2023). Kommunikation in der digitalen Transformation : Trendstudie Schweiz 2022. https://doi.org/10.21256/ZHAW-2808
Lerch, K. M., & Tanner, M. (2022). Schweizerische Mobiliar Versicherungsgesellschaft AG Digitalswitzerland Allianz Digitale Sicherheit Schweiz Fachhochschule Nordwestschweiz FHNW, Kompetenzzentrum Digitale Transformation Schweizerische Akademie der Technischen Wissenschaften SATW.
Frick, J.-C. (2022). Comparis- Datenvertrauens- studie 2022.
Knoll, M. (2017). IT-Risikomanagement im Zeitalter der Digitalisierung. HMD Praxis der Wirtschaftsinformatik, 54(1), 4–20. https://doi.org/10.1365/s40702-017‑0287‑4
Horten, B., & Gräber, M. (2020). Cyberkriminalität: Übersicht zu aktuellen und künftigen Erscheinungsformen. Forensische Psychiatrie, Psychologie, Kriminologie, 14(3), 233–241. https://doi.org/10.1007/s11757-020–00605‑0
Kasprowicz, D., & Rieger, S. (Eds.). (2020). Handbuch Virtualität. Springer Fachmedien Wiesbaden. https://doi.org/10.1007/978–3‑658–16342‑6
Bartsch, M., & Frey, S. (2017). Cyberstrategien für Unternehmen und Behörden. Springer Fachmedien Wiesbaden. https://doi.org/10.1007/978–3‑658–16139‑2
Peter, M. K., Hölzli, A., Kaelin, A. W., Lerch, K. M., Vifian, P., & Wettstein, N. (n.d.). Homeoffice und Cybers icherheit in Schweizer KMU. 30.
Newman, N. (n.d.). Reuters Institute Digital News Report 2020 (p. 112).
Deloitte. (n.d.). Cyber survey 2020. Retrieved May 23, 2022, from https://www2.deloitte.com/content/dam/Deloitte/dk/Documents/Cyber/cyberreport/Cyber_survey_.pdf
Deloitte. (2019). Cyber Security Report 2019. Teil 1 Deutschland. https://www2.deloitte.com/content/dam/Deloitte/de/Documents/risk/Cyber-Security-Report-2019-Teil‑1.pdf
Deloitte. (n.d.). Deloitte Cyber Security Report-2021 Deutschland. Retrieved May 23, 2022, from https://www2.deloitte.com/content/dam/Deloitte/de/Documents/risk/Deloitte-Cyber-Security-Report-2021.pdf
Technology Solutions for Complying with the GDPR and Data Privacy Laws. (n.d.). Retrieved May 15, 2022, from https://www.shrm.org/resourcesandtools/hr-topics/technology/pages/technology-solutions-gdpr-data-privacy-laws.aspx
Exclusive: Senior EU officials were targeted with Israeli spyware | Reuters. (n.d.). Retrieved May 15, 2022, from https://www.reuters.com/technology/exclusive-senior-eu-officials-were-targeted-with-israeli-spyware-sources-2022–04-11/
Raaflaub), <Katy Romy>, (Übertragung aus dem Französischen: Christian. (n.d.). Homeoffice – Einfallstor für Cyberkriminelle. SWI swissinfo.ch. Retrieved May 15, 2022, from https://www.swissinfo.ch/ger/gesellschaft/homeoffice—einfallstor-fuer-cyberkriminelle/46155880
Was ist Cyberkriminalität und wie lässt sie sich verhindern? (n.d.). Was ist Cyberkriminalität und wie lässt sie sich verhindern? Retrieved May 15, 2022, from https://www.avast.com/de-de/c‑cybercrime
Cyberkriminelle zur Bekämpfung von Cyberkriminalität im Visier. (n.d.). FireEye. Retrieved May 15, 2022, from https://www.fireeye.de/current-threats/stopping-todays-cyber-attacks.html
Cyberkriminalität – die Gefahr aus dem Home Office. (n.d.). Deloitte Schweiz. Retrieved May 15, 2022, from https://www2.deloitte.com/ch/de/pages/risk/articles/covid-19-cyber-crime-working-from-home.html
Hillig, J. (2021, March 15). So leicht konnte Luzernerin über 150’000 Kameras hacken. Blick. https://www.blick.ch/schweiz/sicherheits-skandal-in-den-usa-so-leicht-konnte-luzerner-ueber-150000-kameras-hacken-id16401940.html
Bundesamt für Statistik. (n.d.). Gemeldete Ffaelle von Cyberkriminalitaet in der Shweiz 2021. Statista.