Refine
Year of publication
- 2020 (29) (remove)
Document Type
- Conference Proceeding (13)
- Article (10)
- Book (2)
- Part of a Book (2)
- Report (1)
- Review (1)
Keywords
- MINLP (3)
- Experimental validation (2)
- Anwendungsorientierter Forschungsansatz (1)
- Case study (1)
- Change culture (1)
- Cooling system (1)
- Design Science Research (1)
- E-Learning (1)
- Efficiency optimization (1)
- Engineering optimisation (1)
- Engineering optimization (1)
- Enhanced Telecom Operations Map (1)
- Industrial optimisation (1)
- Interactive process mining (1)
- Lean thinking (1)
- Literaturanalyse (1)
- Literaturrecherche (1)
- MILP (1)
- Methodology (1)
- Mixed-integer programming (1)
- Network design (1)
- OR 2019 (1)
- Objective data (1)
- Piecewise linearization (1)
- Powertrain (1)
- Praxisprojekte (1)
- Process engineering (1)
- Pumping systems (1)
- Referenzmodellierung (1)
- Resilience assessment (1)
- Resilience metric graph theory (1)
- Resilient infrastructure (1)
- Technical Operations Research (1)
- Text Analytics (1)
- Text Mining (1)
- Water distribution system (1)
- Water supply system (1)
- anticipation strategy (1)
- business analytics (1)
- decision analytics (1)
- digital economy (1)
- fault detection (1)
- mathematical optimization (1)
- water supply system (1)
Institute
- Fachbereich Elektrotechnik und Informationstechnik (29) (remove)
Design and Development of a Hot S-Parameter Measurement System for Plasma and Magnetron Applications
(2020)
Die NATO definiert den Cyberspace als die "Umgebung, die durch physische und nicht-physische Bestandteile zum Speichern, Ändern, und Austauschen von Daten mit Hilfe von Computer-Netzwerken" [NATO CCDCOE]. Darüber hinaus ist es ein Medium menschlicher Interaktion. IT Angriffe sind feindselige, nichtkooperative Interaktionen, die mittels Konflikttheorie beschrieben werden können. Durch die Anwendung dieses Gedankengebäudes auf IT Sicherheit von Organisationen können eine Reihe von Verbesserungen in Unternehmen identifiziert werden.
Cyberspace is "the environment formed by physical and non-physical components to store, modify, and exchange data using computer networks" (NATO CCDCOE). Beyond that, it is an environment where people interact. IT attacks are hostile, non-cooperative interactions that can be described with conflict theory. Applying conflict theory to IT security leads to different objectives for end-user education, requiring different formats like agency-based competence developing games.