2012 IEEE International Conference on Intelligence and Security Informatics 2012
DOI: 10.1109/isi.2012.6284146
|View full text |Cite
|
Sign up to set email alerts
|

Towards cyber operations - The new role of academic cyber security research and education

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1

Citation Types

0
6
0

Year Published

2013
2013
2020
2020

Publication Types

Select...
3
2
2

Relationship

0
7

Authors

Journals

citations
Cited by 14 publications
(6 citation statements)
references
References 0 publications
0
6
0
Order By: Relevance
“…The issues of security have been the perennial global concerns not only in developing and developed nations of Southeast Asia region but also globally as reported by Collins (2003) and Smith (2004) respectively. Among the critical concerns in the advent of digital era in many educational systems are school safety, cybersecurity, and cyber ethics that were reported widely in news (e.g., Nobullying.com, 2015) and some research studies (e.g., by Masrom et al, 2012;Kritzinger, 2015;Kallberg & Thuraisingham, 2012) but still lack supportive and corrective action plans, hence much research urgency with preventive measure is needed.…”
Section: Introductionmentioning
confidence: 99%
“…The issues of security have been the perennial global concerns not only in developing and developed nations of Southeast Asia region but also globally as reported by Collins (2003) and Smith (2004) respectively. Among the critical concerns in the advent of digital era in many educational systems are school safety, cybersecurity, and cyber ethics that were reported widely in news (e.g., Nobullying.com, 2015) and some research studies (e.g., by Masrom et al, 2012;Kritzinger, 2015;Kallberg & Thuraisingham, 2012) but still lack supportive and corrective action plans, hence much research urgency with preventive measure is needed.…”
Section: Introductionmentioning
confidence: 99%
“…The leader is the one authorized to generate official reports to human resources (Dunn et al, 2005). Tasks groups involved are (Kallberg et al, 2012):…”
Section: Contingency Plan and Task Groupsmentioning
confidence: 99%
“…The staff involved in the tasks will review the contingency plan approved by management departments, as well as the procedures for business recovery and the resumption of the operations in the main center (Kallberg et al, 2012;McDonald, 2008). Finally, the plan is the final result of the project development start-up, approving in a straight manner to minimize impromptu decisions.…”
Section: Contingency Plan and Task Groupsmentioning
confidence: 99%
“…Internal networks often require the establishment and maintenance of multiple HESI-management information systems (HESI-MIS) or databases. Cyber security capacity building is a major IT gap within most HEIs and will become increasingly important as a means to protect the personal and proprietary information of stakeholders and institutions (Kallberg and Thuraisingham 2012).…”
Section: Defining Higher Education Social Intelligencementioning
confidence: 99%
“…Patents can only protect ideas and intellectual property so far, and the old password encryption technologies of the past are no longer sufficient to protect against the professional hackers of today and the future. Cyber warfare is also a national defense issue, as many research universities often serve as research and development hubs for government health, economic analyses, and military technologies (Rid 2012;Kallberg and Thuraisingham 2013;Stone 2013). Higher education institutions (HEIs) need to build and maintain the social intelligence capacity to counter the likelihood of cyber espionage, which is only now reaching e-epidemic proportions.…”
mentioning
confidence: 99%