Zobrazeno 1 - 10
of 18
pro vyhledávání: '"Char Sample"'
Autor:
Char Sample, Michael J. Jensen, Keith Scott, John McAlaney, Steve Fitchpatrick, Amanda Brockinton, David Ormrod, Amy Ormrod
Publikováno v:
Frontiers in Psychology, Vol 11 (2020)
The misleading and propagandistic tendencies in American news reporting have been a part of public discussion from its earliest days as a republic (Innis, 2007; Sheppard, 2007). “Fake news” is hardly new (McKernon, 1925), and the term has been ap
Externí odkaz:
https://doaj.org/article/16a6f5c9304747b7afd2fa51a4082ade
Autor:
Vladislav D. Veksler, Norbou Buchler, Blaine E. Hoffman, Daniel N. Cassenti, Char Sample, Shridat Sugrim
Publikováno v:
Frontiers in Psychology, Vol 9 (2018)
Computational models of cognitive processes may be employed in cyber-security tools, experiments, and simulations to address human agency and effective decision-making in keeping computational networks secure. Cognitive modeling can addresses multi-d
Externí odkaz:
https://doaj.org/article/6146cce7330e4a7293fedaaa98dbac93
Publikováno v:
Frontiers in Psychology, Vol 9 (2018)
Cyber attacks have been increasingly detrimental to networks, systems, and users, and are increasing in number and severity globally. To better predict system vulnerabilities, cybersecurity researchers are developing new and more holistic approaches
Externí odkaz:
https://doaj.org/article/7f8bbf238f78486e9a86a63f3b67db81
Publikováno v:
European Conference on Cyber Warfare and Security. 21:256-262
Zero Trust Architecture (ZTA) deployments are growing in popularity, widely viewed as a solution to historical enterprise security monitoring that typically finds attackers months after they have gained system access. ZTA design incorporates multiple
Autor:
Connie Justice, Char Sample
Publikováno v:
International Conference on Cyber Warfare and Security. 17:81-91
Expected growth of the job market for cyber security professionals in both the US and the UK remains strong for the foreseeable future. While there are many roles to be found in cyber security, that vary from penetration tester to chief information s
Publikováno v:
2020 Resilience Week (RWS).
Cybersecurity continues the migration toward data-informed solutions and the quality of the data is gaining in importance. Data accuracy is foundational to the trustworthiness required of artificial intelligence solutions. Trustworthy data must be ac
Autor:
Amanda Brockinton, David Ormrod, John McAlaney, Amy Ormrod, Michael J. Jensen, Steve Fitchpatrick, Char Sample, Keith Scott
Publikováno v:
Frontiers in Psychology
Frontiers in Psychology, Vol 11 (2020)
Frontiers in Psychology, Vol 11 (2020)
The misleading and propagandistic tendencies in American news reporting have been a part of public discussion from its earliest days as a republic (Innis, 2007;Sheppard, 2007). “Fake news” is hardly new (McKernon, 1925), and the term has been app
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_dedup___::d2f1dd1c670c49fea92639fdc1ade39b
https://dora.dmu.ac.uk/handle/2086/20242
https://dora.dmu.ac.uk/handle/2086/20242
Technical advances in cyber-attack attribution continues to show incremental improvement. A growing interest in the role of the human in perception management, and decision-making suggest that other aspects of human cognition may be able to help info
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_dedup___::fcf5db1a8271a0a09b4ee30110a9162b
https://doi.org/10.4018/978-1-5225-7909-0.ch001
https://doi.org/10.4018/978-1-5225-7909-0.ch001
Publikováno v:
IEEE BigData
Fake News is widely recognized as a security problem that involves multiple academic disciplines; therefore, solving the problem of fake news requires a cross-discipline approach where behavioral science, computational linguistics, mathematics, stati