Search results

1 – 10 of 66
Content available
Article
Publication date: 1 April 2004

Brian Ellis

55

Abstract

Details

Soldering & Surface Mount Technology, vol. 16 no. 1
Type: Research Article
ISSN: 0954-0911

Keywords

Book part
Publication date: 15 September 2022

Caner Asbaş and Şule Tuzlukaya

A cyberattack is an attempt by cybercriminals as individuals or organizations with unauthorized access using one or more computers and computer systems to steal, expose, change…

Abstract

A cyberattack is an attempt by cybercriminals as individuals or organizations with unauthorized access using one or more computers and computer systems to steal, expose, change, disable or eliminate information, or to breach computer information systems, computer networks, and computer infrastructures. Cyberattackers gain a benefit from victims, which may be criminal such as stealing data or money, or political or personal such as revenge. In cyberattacks, various targets are possible. Some potential targets for businesses include business and customer financial data, customer lists, trade secrets, and login credentials.

Cyberattackers use a variety of methods to gain access to data, including malware such as viruses, worms, and spyware and phishing methods, man-in-the-middle attacks, denial-of-service attacks, SQL injection, zero-day exploit, and DNS tunneling.

Related to cyberattack, the term cyberwarfare is gaining popularity nowadays. Cyberwarfare is the use of cyberattacks by a state or an organization to cause harm as in warfare against another state's or organization's computer information systems, networks, and infrastructures.

Military, civil, and ideological motivations, or hacktivism can be used to launch a cyberwarfare. For these reasons, cyberwarfare may be used to conduct espionage, sabotage, propaganda, and economic disruption.

Considering highly digitalized business processes such as e-mails, digital banking, online conference, and digital manufacturing methods, damage of cyberwarfare to businesses and countries are unavoidable. As a result, developing strategies for defending against cyberattacks and cyberwarfare is critical for businesses. The concepts of cyberattack and cyberwarfare, as well as business strategies to be protected against them will be discussed in this chapter.

Details

Conflict Management in Digital Business
Type: Book
ISBN: 978-1-80262-773-2

Keywords

Content available
Article
Publication date: 1 June 2004

Brian Ellis

47

Abstract

Details

Circuit World, vol. 30 no. 2
Type: Research Article
ISSN: 0305-6120

Keywords

Article
Publication date: 1 April 1990

Dialog files suit against ACS On 7 June 1990, Dialog Information Services filed a suit against the American Chemical Society (ACS) in the United States District Court for the…

Abstract

Dialog files suit against ACS On 7 June 1990, Dialog Information Services filed a suit against the American Chemical Society (ACS) in the United States District Court for the District of Columbia. In its suit, Dialog charged that the Society had caused the company $50 million in lost revenues by limiting Dialog's access to information in the CAS database, by withdrawing access to previously available data, and by other monopolistic practices. It seeks recompense of $150 million, including $100 million in punitive damages, and relief from outstanding royalty claims from the ACS.

Details

The Electronic Library, vol. 8 no. 4
Type: Research Article
ISSN: 0264-0473

Abstract

Details

Responsible Investment Around the World: Finance after the Great Reset
Type: Book
ISBN: 978-1-80382-851-0

Article
Publication date: 1 August 2000

Marilyn M. Helms, Lawrence P. Ettkin and Daniel J. Morris

With the growth of information technologies and with more firms partnering, a major concern for organizations today is the protection of competitive information from thieving…

2122

Abstract

With the growth of information technologies and with more firms partnering, a major concern for organizations today is the protection of competitive information from thieving. Firms must develop an understanding of the multidimensional flavor of defensive intelligence and its challenges in a bureaucracy, examine companies’ vulnerabilities and implement some basic defensive intelligence measures in order to protect their organization’s knowledge. Organizations must address major areas of vulnerabilities, including employees, partners and public information. Firms can take specific actions to minimize successful acts of espionage such as protections preventing unauthorized use of information systems. Companies should develop a set of priorities and determine where and to what degree security procedures need to be implemented. Beyond security, employing proactive measures can provide a valuable weapon for the long‐term prosperity of your firm.

Details

Information Management & Computer Security, vol. 8 no. 3
Type: Research Article
ISSN: 0968-5227

Keywords

Article
Publication date: 8 May 2018

Adebisi Arewa

This paper aims to determine the extent to which the myriad of cybercrimes is within the purview of extant Nigerian laws against the backdrop of the modicum of legal and…

Abstract

Purpose

This paper aims to determine the extent to which the myriad of cybercrimes is within the purview of extant Nigerian laws against the backdrop of the modicum of legal and institutional mechanisms available at international law for combating cybercrimes.

Design/methodology/approach

This study is library based. It relies on secondary data generated by the variegated multilateral agencies, law reports of international and municipal tribunals, relevant books, journals, monographs policy papers and so forth as the basis of analysis.

Findings

Findings suggest that cybercrimes are very difficult to unravel because their traces are imperceptible and require highly specialised skills and digital protocols to find, store and save them for evidential purposes. Such gathered evidence are in the form of digital data stored in variegated hardware and software media, such as storage peripherals, electronic components, working memory, hard discs and external discs. The difficulty is how to identify, weigh for evidential value and capture the multiplicity of evidence unearthed in a digital forensic investigation. The foregoing underscores the digital forensic problematic which is engendered by the difficulties of contriving a thoroughgoing concept of digital evidence given the malleable nature of the variegated storage media.

Practical implications

This paper engenders considerable acquaintance of the entire sphere of digital crimes and cyber threats, which is contended with in the information epoch, and recommends both legal and institutional mechanisms to counter the clear, real and present danger, which digital crimes represent for the survival of human civilisation, sustainable economic growth and development.

Originality/value

This paper dwells on the infinite potentiality of deploying the instrumentality of national and international law to deter, control and prosecute the myriad of cybercrimes.

Details

Journal of Financial Crime, vol. 25 no. 2
Type: Research Article
ISSN: 1359-0790

Keywords

Article
Publication date: 1 March 1995

Martin Fojt

This special “Anbar Abstracts” issue of the European Business Review is split into six sections covering abstracts under the following headings: Top management issues; Marketing…

21052

Abstract

This special “Anbar Abstracts” issue of the European Business Review is split into six sections covering abstracts under the following headings: Top management issues; Marketing and distribution; Personnel and training; Information management and technology; Operations and production management; Accounting and finance.

Details

European Business Review, vol. 95 no. 3
Type: Research Article
ISSN: 0955-534X

Article
Publication date: 1 April 1997

Precedent for Internet domain names. A recent legal precedent in the UK means that anyone can obtain any domain name that has not already been registered by another party. The…

Abstract

Precedent for Internet domain names. A recent legal precedent in the UK means that anyone can obtain any domain name that has not already been registered by another party. The ruling is the UK precedent on the subject of Internet domain names.

Details

Online and CD-Rom Review, vol. 21 no. 4
Type: Research Article
ISSN: 1353-2642

Article
Publication date: 1 October 2004

Alan D. Smith

With the rapid growth of e‐commerce, governmental and corporate agencies are taking extra precautions when it comes to protecting information. The development of e‐security as a…

4717

Abstract

With the rapid growth of e‐commerce, governmental and corporate agencies are taking extra precautions when it comes to protecting information. The development of e‐security as a discipline has enabled organisations to discover a wider array of similarities between attacks occurring across their security environment and develop appropriate countermeasures. To further improve the security of information, there is a need for conceptualising the interrelationships between e‐security and the major elements involved in changing a company's infrastructure. Organisations should act in an ethical manner, especially when it comes to e‐security and e‐privacy policies, procedures, and practices. The consequential theory of utilitarianism is used and applied to a conceptual model to help explain how organisations may develop better secured information in an information‐sharing and globally networked environment.

Details

Aslib Proceedings, vol. 56 no. 5
Type: Research Article
ISSN: 0001-253X

Keywords

1 – 10 of 66