Digital Transformation, Cyber Threats & Policy: 38DT 2021

Description

Special Issue On: Digital Transformation, Cyber Threats & Policy

Selected papers from 38th IBIMA International Conference 23-24 November 2021

38DT
  • An Overview on Software Testing and Auditing
    Catia LOPES1, Maryam ABBASI3, Pedro MARTINS2, Filipe CARDOSO1 and Filipe SA4
    Volume 2021 (64), Article ID 38156021, Digital Transformation, Cyber Threats & Policy: 38DT 2021
  • Comparison Of Network Attacks Before and During Covid-19 On Educational Institutions
    Grzegorz PODGORSKI
    Volume 2021 (64), Article ID 38148821, Digital Transformation, Cyber Threats & Policy: 38DT 2021
  • Data Sharing and Data Retention Using Microsoft Teams: A Case Study of a Large Polish Manufacturing Company
    Piotr CZERWONKA
    Volume 2021 (64), Article ID 38146821, Digital Transformation, Cyber Threats & Policy: 38DT 2021
  • Digital Revolution and Cyber Threats as Its Consequence
    Michał ZIMOŃ and Rafał KASPRZYK
    Volume 2021 (64), Article ID 38133121, Digital Transformation, Cyber Threats & Policy: 38DT 2021
  • Management Activities in The Structural Monitoring Process
    Adrian Traian G.M. RĂDULESCU1, Gheorghe M.T. RĂDULESCU1, Tiberiu KALMAR2, Virgil Mihai RĂDULESCU1 and Corina M. RĂDULESCU1
    Volume 2021 (64), Article ID 38120221, Digital Transformation, Cyber Threats & Policy: 38DT 2021
  • Disrupting U.S. Critical infrastructures: When and why China or Russia confess?
    The probability of State-sponsored Russian and Chinese cyber breaches of U.S. critical infrastructures is nearly 100 percent. The obvious question for the United States and government security professionals then becomes not whether to act, but how to get China and Russia to confess to the crime. Under what circumstances will Russia and China remain silent if the prisoner's dilemma suggests that their dominant strategy after an attack is to defect (confess)? Why are these nations not conceding or considering owning up to any attacks on U.S. critical infrastructures? The paper uses the prisoner's dilemma to characterize and explore when and why Russia and China will confess in a simulated scenario of cooperation against the United States in cyberspace. Specifically, a coordinated attack against the U.S. energy infrastructures, including power generating plants, transmission lines, and distribution transformers.
    Volume 2021 (64), Article ID 3860921, Digital Transformation, Cyber Threats & Policy: 38DT 2021

Editor-in-Chief

Khalid S. Soliman, International Business Information Management Association, USA

Editorial Board

Peer review process is the responsibility of the Scientific Committee of the conference program

Follow conference author guidelines

Free of charge

Table of Content
  • An Overview on Software Testing and Auditing
    Catia LOPES1, Maryam ABBASI3, Pedro MARTINS2, Filipe CARDOSO1 and Filipe SA4
    Volume 2021 (64), Article ID 38156021, Digital Transformation, Cyber Threats & Policy: 38DT 2021
  • Comparison Of Network Attacks Before and During Covid-19 On Educational Institutions
    Grzegorz PODGORSKI
    Volume 2021 (64), Article ID 38148821, Digital Transformation, Cyber Threats & Policy: 38DT 2021
  • Data Sharing and Data Retention Using Microsoft Teams: A Case Study of a Large Polish Manufacturing Company
    Piotr CZERWONKA
    Volume 2021 (64), Article ID 38146821, Digital Transformation, Cyber Threats & Policy: 38DT 2021
  • Digital Revolution and Cyber Threats as Its Consequence
    Michał ZIMOŃ and Rafał KASPRZYK
    Volume 2021 (64), Article ID 38133121, Digital Transformation, Cyber Threats & Policy: 38DT 2021
  • Management Activities in The Structural Monitoring Process
    Adrian Traian G.M. RĂDULESCU1, Gheorghe M.T. RĂDULESCU1, Tiberiu KALMAR2, Virgil Mihai RĂDULESCU1 and Corina M. RĂDULESCU1
    Volume 2021 (64), Article ID 38120221, Digital Transformation, Cyber Threats & Policy: 38DT 2021
  • Disrupting U.S. Critical infrastructures: When and why China or Russia confess?
    The probability of State-sponsored Russian and Chinese cyber breaches of U.S. critical infrastructures is nearly 100 percent. The obvious question for the United States and government security professionals then becomes not whether to act, but how to get China and Russia to confess to the crime. Under what circumstances will Russia and China remain silent if the prisoner's dilemma suggests that their dominant strategy after an attack is to defect (confess)? Why are these nations not conceding or considering owning up to any attacks on U.S. critical infrastructures? The paper uses the prisoner's dilemma to characterize and explore when and why Russia and China will confess in a simulated scenario of cooperation against the United States in cyberspace. Specifically, a coordinated attack against the U.S. energy infrastructures, including power generating plants, transmission lines, and distribution transformers.
    Volume 2021 (64), Article ID 3860921, Digital Transformation, Cyber Threats & Policy: 38DT 2021

Peer review process is the responsibility of the Scientific Committee of the conference program

Follow conference author guidelines

Free of charge

The Journal is indexed and/or abstracted in the following databases/resources: