Cybersecurity, Trustworthiness and Resilient Systems: Guiding Values for Policy
| Main Authors: | Henschke, A., Ford, Shannon |
|---|---|
| Format: | Journal Article |
| Published: |
2017
|
| Online Access: | http://hdl.handle.net/20.500.11937/76893 |
Similar Items
Ethics, Cybersecurity and the Military
by: Ford, Shannon
Published: (2013)
by: Ford, Shannon
Published: (2013)
Understanding Cybersecurity: Ethical and Conceptual Considerations
by: Ford, Shannon
Published: (2013)
by: Ford, Shannon
Published: (2013)
The Asia-Pacific Chapter of the International Society for Military Ethics
by: Allhoff, F., et al.
Published: (2017)
by: Allhoff, F., et al.
Published: (2017)
Metamorphic testing for cybersecurity
by: Chen, Tsong Yueh, et al.
Published: (2016)
by: Chen, Tsong Yueh, et al.
Published: (2016)
Replacing missing values using trustworthy data values from web data sources
by: Mohd Jaya, Mohd Izham, et al.
Published: (2017)
by: Mohd Jaya, Mohd Izham, et al.
Published: (2017)
Trustworthiness Measure for e-Service
by: Chang, Elizabeth, et al.
Published: (2005)
by: Chang, Elizabeth, et al.
Published: (2005)
Trustworthy Positioning for Next Generation Intelligent Transport Systems
by: El-Mowafy, Ahmed
Published: (2018)
by: El-Mowafy, Ahmed
Published: (2018)
Integration of information systems and cybersecurity countermeasures: An exposure to risk perspective
by: Baskerville, Richard, et al.
Published: (2018)
by: Baskerville, Richard, et al.
Published: (2018)
Diligence and trustworthiness : the qualities of muslim employee
by: Ali Mohamed, Ashgar Ali
Published: (2013)
by: Ali Mohamed, Ashgar Ali
Published: (2013)
Defining trustworthiness in service oriented environment
by: Hussain, Farookh Khadeer, et al.
Published: (2006)
by: Hussain, Farookh Khadeer, et al.
Published: (2006)
Trustworthiness measurement methodology for e-business
by: Hussain, Farookh, et al.
Published: (2006)
by: Hussain, Farookh, et al.
Published: (2006)
Building trustworthy e-Commerce wesite
by: Che Hussin, Ab. Razak
Published: (2007)
by: Che Hussin, Ab. Razak
Published: (2007)
Building trustworthy E-commerce website
by: Che Hussin, Ab. Razak
Published: (2007)
by: Che Hussin, Ab. Razak
Published: (2007)
Military ethics and strategy: Senior commanders, moral values, and cultural perspectives
by: Ford, Shannon
Published: (2015)
by: Ford, Shannon
Published: (2015)
An innovative reputation system for trustworthy and secure vehicle-to-vehicle communication
by: Almani, Dimah
Published: (2025)
by: Almani, Dimah
Published: (2025)
Blockchain-enabled cybersecurity framework for healthcare domain
by: Islam, Md Shohidul
Published: (2025)
by: Islam, Md Shohidul
Published: (2025)
The Challenges and Solutions of Cybersecurity Among Malaysian Companies
by: Puteri Fadzline, Muhamad Tamyez
Published: (2019)
by: Puteri Fadzline, Muhamad Tamyez
Published: (2019)
The Scope of Military Ethics Education in the Asia-Pacific: The Perceptions of Senior Military Officers on Security, Values and Morality
by: Ford, Shannon
Published: (2014)
by: Ford, Shannon
Published: (2014)
Trust, trustworthiness and the consensus effect: an
evolutionary approach
by: Adriani, Fabrizio, et al.
Published: (2015)
by: Adriani, Fabrizio, et al.
Published: (2015)
Trust and trustworthiness under information asymmetry and ambiguity
by: Clot-Figueras, Irma, et al.
Published: (2016)
by: Clot-Figueras, Irma, et al.
Published: (2016)
Tree-based classification to users’ trustworthiness in OSNs
by: Nabipourshiri, R., et al.
Published: (2018)
by: Nabipourshiri, R., et al.
Published: (2018)
Diligence and trustworthy: the qualities of a Muslim employee
by: Ali Mohamed, Ashgar Ali
Published: (2010)
by: Ali Mohamed, Ashgar Ali
Published: (2010)
What the students expect and perceive about trustworthiness?
by: Ibrahimi, Mensur, et al.
Published: (2011)
by: Ibrahimi, Mensur, et al.
Published: (2011)
Trustworthiness measurement methodology (TMM) for assessment purposes
by: Hussain, Farookh, et al.
Published: (2007)
by: Hussain, Farookh, et al.
Published: (2007)
Aspects influencing trustworthiness in service oriented environments
by: Hussain, Farookh Khadeer, et al.
Published: (2006)
by: Hussain, Farookh Khadeer, et al.
Published: (2006)
Trustworthy provenance framework for document workflow provenance
by: Rupasinghe, P., et al.
Published: (2016)
by: Rupasinghe, P., et al.
Published: (2016)
A temporal-focused trustworthiness to enhance trust-based recommender systems
by: Moghaddam, Morteza Ghorbani, et al.
Published: (2013)
by: Moghaddam, Morteza Ghorbani, et al.
Published: (2013)
Measuring attitude towards personal data for adaptive cybersecurity
by: Addae, Joyce Hoese, et al.
Published: (2017)
by: Addae, Joyce Hoese, et al.
Published: (2017)
Leveraging web and behavioural data for usable adaptive cybersecurity
by: Addae, Joyce Hoese
Published: (2019)
by: Addae, Joyce Hoese
Published: (2019)
The role of cybersecurity on the performance of Malaysian higher education institutions
by: Balla Moussa Dioubate,, et al.
Published: (2023)
by: Balla Moussa Dioubate,, et al.
Published: (2023)
Exploring the use of blockchain technology in cybersecurity and data science
by: Rahmat, Robaisya, et al.
Published: (2023)
by: Rahmat, Robaisya, et al.
Published: (2023)
Constructing trustworthy historical narratives: criteria, principles, and techniques
by: Gill, Michael J., et al.
Published: (2018)
by: Gill, Michael J., et al.
Published: (2018)
Engineering trustworthy ontologies: case study of protein ontology
by: Hussain, Farookh Khadeer, et al.
Published: (2006)
by: Hussain, Farookh Khadeer, et al.
Published: (2006)
Intrusion detection system using autoencoder based deep neural network for SME cybersecurity
by: Khaizuran Aqhar, Ubaidillah, et al.
Published: (2021)
by: Khaizuran Aqhar, Ubaidillah, et al.
Published: (2021)
Implementation of serious games for data privacy and protection awareness in Cybersecurity
by: Siti Normaziah, Ihsan, et al.
Published: (2023)
by: Siti Normaziah, Ihsan, et al.
Published: (2023)
UMP, CyberSecurity tingkat keupayaan pakar keselamatan siber
by: Nor Salwana, Mohammad Idris
Published: (2021)
by: Nor Salwana, Mohammad Idris
Published: (2021)
Securing the IoT frontier: exploring the limitation and future directions in cybersecurity
by: Mahmoud Ahmed, Moustafa Abdelrahman, et al.
Published: (2024)
by: Mahmoud Ahmed, Moustafa Abdelrahman, et al.
Published: (2024)
Risk, trust, trustworthiness and social preferences: perspective from Kazakhstan
by: Zhagparova, Akerke
Published: (2015)
by: Zhagparova, Akerke
Published: (2015)
Public university administrators reminded on the importance of trustworthiness in advanced management
by: UMP, PNC
Published: (2019)
by: UMP, PNC
Published: (2019)
Antecedents of Customer E-loyalty With the Effect of Trustworthiness in Malaysia Context
by: Wong, Poh-Ming Winnie, et al.
Published: (2014)
by: Wong, Poh-Ming Winnie, et al.
Published: (2014)
Similar Items
-
Ethics, Cybersecurity and the Military
by: Ford, Shannon
Published: (2013) -
Understanding Cybersecurity: Ethical and Conceptual Considerations
by: Ford, Shannon
Published: (2013) -
The Asia-Pacific Chapter of the International Society for Military Ethics
by: Allhoff, F., et al.
Published: (2017) -
Metamorphic testing for cybersecurity
by: Chen, Tsong Yueh, et al.
Published: (2016) -
Replacing missing values using trustworthy data values from web data sources
by: Mohd Jaya, Mohd Izham, et al.
Published: (2017)