2017
DOI: 10.1080/01611194.2017.1362063
|View full text |Cite
|
Sign up to set email alerts
|

Cybersecurity: Exploring core concepts through six scenarios

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
8
0

Year Published

2019
2019
2024
2024

Publication Types

Select...
7
1

Relationship

1
7

Authors

Journals

citations
Cited by 19 publications
(8 citation statements)
references
References 13 publications
0
8
0
Order By: Relevance
“…Removable media, despite their convenience, also carry the risk of infecting machines with malware. An organisation can ban all removable media from the workspace and make all computers unable to accept, read from, or write to removable media (Sherman et al ., 2017).…”
Section: Resultsmentioning
confidence: 99%
“…Removable media, despite their convenience, also carry the risk of infecting machines with malware. An organisation can ban all removable media from the workspace and make all computers unable to accept, read from, or write to removable media (Sherman et al ., 2017).…”
Section: Resultsmentioning
confidence: 99%
“…Hence, poor interaction of people and technology incurs opportunities for malicious cyber intrusions which inherently compromise the security of digital data in the BIM project (Doneda and Almeida, 2015). The aforementioned factors will inherently result in an increased vulnerability towards cybersecurity attacks, targeting the integrity, availability and confidentiality of information, using the weak points in an organisational structure (Salminen, 2019; Sherman et al , 2017). Therefore, it can be concluded that managing the process and people-related vulnerabilities within the built environment becomes more critical during the post-occupancy phase, where the increased volume of information heightens the complexities associated with secure handling and effective management of information.…”
Section: Discussionmentioning
confidence: 99%
“…Restricted development is the most commonly accepted solution to the safe AI problem. AI-boxes, leakproofing and restricted question-answering-only systems (Oracle AI) are among the proposed solutions in this group [3,4,16,17,20]. The methods presented in this category are similar to putting a dangerous human being into prison -it does not give a 100% safety but in most cases can help society to survive for some period of time.…”
Section: IImentioning
confidence: 99%