Oxford Index Browse

You are looking at 11-20 of 21 items for:

Computing x Law x clear all

Refine by type

Refine by product

 

Journal of Cybersecurity

Journal. Subjects: IT and Communications Law; Computer Science; Computer Security.

Go to Oxford Journals »  home page

Keys under doormats: mandating insecurity by requiring government access to all data and communications

Harold Abelson, Ross Anderson, Steven M. Bellovin, Josh Benaloh, Matt Blaze, Whitfield Diffie, John Gilmore, Matthew Green, Susan Landau, Peter G. Neumann, Ronald L. Rivest, Jeffrey I. Schiller, Bruce Schneier, Michael A. Specter and Daniel J. Weitzner.

in Journal of Cybersecurity

September 2015; p ublished online November 2015 .

Journal Article. Subjects: IT and Communications Law; Computer Science; Computer Security. 10876 words.

Twenty years ago, law enforcement organizations lobbied to require data and communication services to engineer their products to guarantee law enforcement access to all data. After lengthy...

Go to Oxford Journals »  full text: open access

malware

Overview page. Subjects: Law — Computing.

An inclusive term for any software with a subversive purpose. Malware includes Trojan horses, viruses, worms, adware (def. 2), and spyware.

See overview in Oxford Index

Neural correlates of gender differences and color in distinguishing security warnings and legitimate websites: a neurosecurity study

Bonnie Brinton Anderson, C. Brock Kirwan, David Eargle, Scott R. Jensen and Anthony Vance.

in Journal of Cybersecurity

September 2015; p ublished online November 2015 .

Journal Article. Subjects: IT and Communications Law; Computer Science; Computer Security. 8564 words.

Users have long been recognized as the weakest link in security. Accordingly, researchers have applied knowledge from the fields of psychology and human–computer interaction to understand...

Go to Oxford Journals »  full text: open access

Optimizing time allocation for network defence

Tristan Caulfield and Andrew Fielder.

in Journal of Cybersecurity

September 2015; p ublished online November 2015 .

Journal Article. Subjects: IT and Communications Law; Computer Science; Computer Security. 11932 words.

The presence of unpatched, exploitable vulnerabilities in software is a prerequisite for many forms of cyberattack. Because of the almost inevitable discovery of a vulnerability and...

Go to Oxford Journals »  full text: open access

quality of service

Overview page. Subjects: Computing — Law.

The ability of a network to deliver predictable and guaranteed transmission speeds. The better the quality of service, the higher the probability that the transmission speed will reach and...

See overview in Oxford Index

Scripting the crime commission process in the illicit online prescription drug trade

Nektarios Leontiadis and Alice Hutchings.

in Journal of Cybersecurity

September 2015; p ublished online November 2015 .

Journal Article. Subjects: IT and Communications Law; Computer Science; Computer Security. 10549 words.

This article considers the processes in the illicit online prescription drug trade, namely search-redirection attacks and the operation of unlicensed pharmacies using crime script analysis....

Go to Oxford Journals »  full text: open access

silicon chip

Overview page. Subjects: Law — Computing.

A single crystal of a semiconducting silicon material, typically having millimetre dimensions, fabricated in such a way that it can perform a large number of independent electronic...

See overview in Oxford Index

small-to-medium enterprise

Overview page. Subjects: Computing — Law.

An English counterpart to small office home office, describing companies which have a small workforce.

See overview in Oxford Index

Tipping the scales: the attribution problem and the feasibility of deterrence against cyberattack

Jon R. Lindsay.

in Journal of Cybersecurity

September 2015; p ublished online November 2015 .

Journal Article. Subjects: IT and Communications Law; Computer Science; Computer Security. 14142 words.

Cyber attackers rely on deception to exploit vulnerabilities and obfuscate their identity, which makes many pessimistic about cyber deterrence. The attribution problem appears to make...

Go to Oxford Journals »  full text: open access