Search Results

There are 515304 results for: content related to: Health Consequences of a Cyber Event

  1. Cyber Security Policy Catalog

    Cyber Security Policy Guidebook

    Jennifer L. Bayuk, Jason Healey, Paul Rohmeyer, Marcus H. Sachs, Jeffrey Schmidt, Joseph Weiss, Pages: 93–210, 2012

    Published Online : 9 APR 2012, DOI: 10.1002/9781118241530.ch6

  2. Cyber Security Threats to Public Health

    World Medical & Health Policy

    Volume 5, Issue 1, March 2013, Pages: 37–46, Daniel J. Barnett, Tara Kirk Sell, Robert K. Lord, Curtis J. Jenkins, James W. Terbush and Thomas A. Burke

    Version of Record online : 18 MAR 2013, DOI: 10.1002/wmh3.19

  3. Proactive Cybersecurity: A Comparative Industry and Regulatory Analysis

    American Business Law Journal

    Volume 52, Issue 4, Winter 2015, Pages: 721–787, Amanda N. Craig, Scott J. Shackelford and Janine S. Hiller

    Version of Record online : 21 OCT 2015, DOI: 10.1111/ablj.12055

  4. The integration of diversely redundant designs, dynamic system models, and state estimation technology to the cyber security of physical systems

    Systems Engineering

    Volume 16, Issue 4, Winter 2013, Pages: 401–412, Barry M. Horowitz and Katherine M. Pierce

    Version of Record online : 1 JAN 2013, DOI: 10.1002/sys.21239

  5. You have free access to this content
    A Cyber-archaeology Approach to Social Movement Research: Framework and Case Study

    Journal of Computer-Mediated Communication

    Volume 16, Issue 1, October 2010, Pages: 48–70, D. Zimbra, A. Abbasi and H. Chen

    Version of Record online : 29 OCT 2010, DOI: 10.1111/j.1083-6101.2010.01531.x

  6. Moving Toward an Italian Cyber Defense and Security Strategy

    Cyber Conflict

    Daniel Ventre, Pages: 165–192, 2013

    Published Online : 6 MAR 2013, DOI: 10.1002/9781118562666.ch5

  7. Cyberconflict

    Cyberwar and Information Warfare

    Daniel Ventre, Pages: 113–244, 2013

    Published Online : 21 FEB 2013, DOI: 10.1002/9781118603482.ch4

  8. The Cyber Worlds of Self-Injurers: Deviant Communities, Relationships, and Selves

    Symbolic Interaction

    Volume 31, Issue 1, Winter 2008, Pages: 33–56, Patricia A. Adler and Peter Adler

    Version of Record online : 22 DEC 2011, DOI: 10.1525/si.2008.31.1.33

  9. A survey of cyber crimes

    Security and Communication Networks

    Volume 5, Issue 4, April 2012, Pages: 422–437, Yanping Zhang, Yang Xiao, Kaveh Ghaboosi, Jingyuan Zhang and Hongmei Deng

    Version of Record online : 13 JUL 2011, DOI: 10.1002/sec.331

  10. A System-Aware Cyber Security architecture

    Systems Engineering

    Volume 15, Issue 2, Summer 2012, Pages: 225–240, Rick A. Jones and Barry Horowitz

    Version of Record online : 13 FEB 2012, DOI: 10.1002/sys.21206

  11. French Perspectives on Cyber-conflict

    Cyber Conflict

    Daniel Ventre, Pages: 77–134, 2013

    Published Online : 6 MAR 2013, DOI: 10.1002/9781118562666.ch3

  12. Managing Risk

    Cybersecurity for Executives: A Practical Guide

    Gregory J. Touhill, C. Joseph Touhill, Pages: 37–93, 2014

    Published Online : 13 JUN 2014, DOI: 10.1002/9781118908785.ch3

  13. U.S. Cyber Public Policy: Don't Rely on It to Protect the Brand

    Cyber Threat!: How to Manage the Growing Risk of Cyber Attacks

    N. MacDonnell Ulsch, Pages: 85–102, 2014

    Published Online : 25 JUL 2014, DOI: 10.1002/9781118915028.ch05

  14. Using BITs to Protect Bytes: Promoting Cyber Peace by Safeguarding Trade Secrets Through Bilateral Investment Treaties

    American Business Law Journal

    Volume 52, Issue 1, Spring 2015, Pages: 1–74, Scott J. Shackelford, Eric L. Richards, Anjanette H. Raymond and Amanda N. Craig

    Version of Record online : 22 JAN 2015, DOI: 10.1111/ablj.12041

  15. Cyber Aggression: The Relation between Online Offenders and Offline Social Competence

    Social Development

    Volume 20, Issue 3, August 2011, Pages: 587–604, Corrie L. Schoffstall and Robert Cohen

    Version of Record online : 24 MAR 2011, DOI: 10.1111/j.1467-9507.2011.00609.x

  16. Canada's Cyber Security Policy: A Tortuous Path Toward a Cyber Security Strategy

    Cyber Conflict

    Hugo Loiseau, Lina Lemay, Pages: 1–44, 2013

    Published Online : 6 MAR 2013, DOI: 10.1002/9781118562666.ch1

  17. SCADA modeling for performance and vulnerability assessment of integrated cyber–physical systems

    International Transactions on Electrical Energy Systems

    Volume 25, Issue 3, March 2015, Pages: 498–519, Alexandru Stefanov, Chen-Ching Liu, Manimaran Govindarasu and Shinn-Shyan Wu

    Version of Record online : 20 DEC 2013, DOI: 10.1002/etep.1862

  18. Systems Engineering in a Cyber Security Engineering Program

    INCOSE International Symposium

    Volume 25, Issue 1, October 2015, Pages: 1403–1416, Dr Peggy Brouse

    Version of Record online : 28 OCT 2015, DOI: 10.1002/j.2334-5837.2015.00138.x

  19. A macro method for measuring economic-benefit returns on cybersecurity investments: The table top approach

    Systems Engineering

    Volume 16, Issue 3, Autumn (Fall) 2013, Pages: 313–328, Paul R. Garvey, Richard A. Moynihan and Les Servi

    Version of Record online : 11 DEC 2012, DOI: 10.1002/sys.21236

  20. The Future of Cyber-Resilience in an Age of Global Complexity


    Volume 33, Issue 4, December 2013, Pages: 299–310, Lewis Herrington and Richard Aldrich

    Version of Record online : 1 NOV 2013, DOI: 10.1111/1467-9256.12035