The thesis "Cyberterrorism and digital piracy" deals with the description of aims, motivation, tools, and consequences of current cyberwars. First of all, it concentrates on features of cyberconflicts while trying to indentify and define the essence of cyberterrorism, its principles, causes, and threats. Besides a description of common cyberwar methods, it provides a reader with a detailed analysis of the "Information Assurance" concept, which represents a form of strategy used to define risks of information security in the cyberspace. The analytic part of the thesis concerns concrete cases of the international cyberterorism and its forms in the 2007 to 2010 cyberwars. It also analyses some particular cyberattacks from the geopolitical poin...
One form of activity in cyberspace is the information battle. One of the proposed definitions will d...
The development of information technologies in the modern world affects all spheres of human activit...
Nowadays in cyberspace, there is a burst of information to which everyone has access. However, apart...
The article focuses on the destructive phenomenon of cyberterrorism as an atypical manifestation (fo...
The subject of my diploma thesis, Cyber terrorism - medial threat, is a phenomenon of terrorist atta...
Security in cyberspace is a highly debated issue right now, as is the threat of terrorism. With ongo...
My bacherols thesis on the topic Analysis of the current condition of cybernetic criminality in EU f...
Today when the human evolution and the world itself are more advanced than ever before, made possibl...
Aim: The main purpose of these considerations is to identify the cyberspace protection issues in the...
The aim of the article is the general characterization of cyberterrorism as a new and constantly evo...
The article is about the threats that result from the evolution of new technologies. Problems such a...
Problem setting. Ukraine continues its integration processes with the international community, in pa...
The paper explores the notion of cyber attack as a concept for understanding modern conflicts. It st...
Although it seems to be a global phenomenon, the internet is a part of human society for relatively ...
The paper aims to analyse how information warfare can be conducted in cyberspace and to look at this...
One form of activity in cyberspace is the information battle. One of the proposed definitions will d...
The development of information technologies in the modern world affects all spheres of human activit...
Nowadays in cyberspace, there is a burst of information to which everyone has access. However, apart...
The article focuses on the destructive phenomenon of cyberterrorism as an atypical manifestation (fo...
The subject of my diploma thesis, Cyber terrorism - medial threat, is a phenomenon of terrorist atta...
Security in cyberspace is a highly debated issue right now, as is the threat of terrorism. With ongo...
My bacherols thesis on the topic Analysis of the current condition of cybernetic criminality in EU f...
Today when the human evolution and the world itself are more advanced than ever before, made possibl...
Aim: The main purpose of these considerations is to identify the cyberspace protection issues in the...
The aim of the article is the general characterization of cyberterrorism as a new and constantly evo...
The article is about the threats that result from the evolution of new technologies. Problems such a...
Problem setting. Ukraine continues its integration processes with the international community, in pa...
The paper explores the notion of cyber attack as a concept for understanding modern conflicts. It st...
Although it seems to be a global phenomenon, the internet is a part of human society for relatively ...
The paper aims to analyse how information warfare can be conducted in cyberspace and to look at this...
One form of activity in cyberspace is the information battle. One of the proposed definitions will d...
The development of information technologies in the modern world affects all spheres of human activit...
Nowadays in cyberspace, there is a burst of information to which everyone has access. However, apart...