Catalogue Search | MBRL
Search Results Heading
Explore the vast range of titles available.
MBRLSearchResults
-
DisciplineDiscipline
-
Is Peer ReviewedIs Peer Reviewed
-
Series TitleSeries Title
-
Reading LevelReading Level
-
YearFrom:-To:
-
More FiltersMore FiltersContent TypeItem TypeIs Full-Text AvailableSubjectPublisherSourceDonorLanguagePlace of PublicationContributorsLocation
Done
Filters
Reset
1,666
result(s) for
"Computer security -- China"
Sort by:
Chinese cybersecurity and defense
by
Ventre, Daniel
in
Computer security
,
Computer security -- China
,
Cyber intelligence (Computer security)
2014,2015
Cyberdefense has become, over the past five years, a major issue on the international scene. China, by the place it occupies, is the subject of attention: it is observed, criticized, and designated by many states as a major player in the global cyber-insecurity. The United States is building their cyberdefense strategy against what they call the \"Chinese threat.\" It is therefore important to better understand today's challenges related to cyber dimension in regard of the rise of China. Contributions from international researchers provide cross perspectives on China, its strategies and policies for cybersecurity and cyberdefense. These issues have now gained major strategic dimension:
Is Cyberspace changing the scene of international relations?
How China does apprehend cybersecurity and cyberdefense?
What are the issues, challenges?
What is the role of China in the global cyberspace?
CRACK99 : the takedown of a $100 million Chinese software pirate /
The \"story of the biggest software piracy case prosecuted by the U.S. Department of Justice\"--Amazon.com.
Chinese Cybersecurity and Cyberdefense
2015
Cyberdefense has become, over the past five years, a major issue on the international scene. China, by the place it occupies, is the subject of attention: it is observed, criticized, and designated by many states as a major player in the global cyber-insecurity. The United States is building their cyberdefense strategy against what they call the \"Chinese threat.\" It is therefore important to better understand today's challenges related to cyber dimension in regard of the rise of China.Contributions from international researchers provide cross perspectives on China, its strategies and policies for cybersecurity and cyberdefense. These issues have now gained major strategic dimension:Is Cyberspace changing the scene of international relations?How China does apprehend cybersecurity and cyberdefense?What are the issues, challenges?What is the role of China in the global cyberspace?
Individuals’ Internet Security Perceptions and Behaviors
2016
Little is known about the context sensitivity of users’ online security perceptions and behaviors to national and individual attributes, and there is inadequate research about the spectrum of users’ behaviors in dealing with online security threats. In addressing this gap, this paper draws on two complementary theoretical bases: (1) the contextualization of the protection motivation theory (PMT) to online security behavior and (2) a polycontextual lens for the cross-national comparison of users’ security behaviors in the United States and China. The conceptualized model is tested based on 718 survey observations collected from the United States and China. The results support our model and show the divergence between the United States, an exemplar of modern Western society, and China, an exemplar of traditional Eastern society, in forming threat perceptions and in seeking help and avoidance as coping behaviors. Our results also uncovered the significant moderating impacts of espoused culture on the way perceptions of security threats and coping appraisals influence security behaviors. Our findings underline the importance of context-sensitive theory building in security research and provide insights into the motivators and moderators of individuals’ online security behaviors in the two nations.
Journal Article
A comprehensive AI policy education framework for university teaching and learning
2023
This study aims to develop an AI education policy for higher education by examining the perceptions and implications of text generative AI technologies. Data was collected from 457 students and 180 teachers and staff across various disciplines in Hong Kong universities, using both quantitative and qualitative research methods. Based on the findings, the study proposes an AI Ecological Education Policy Framework to address the multifaceted implications of AI integration in university teaching and learning. This framework is organized into three dimensions: Pedagogical, Governance, and Operational. The Pedagogical dimension concentrates on using AI to improve teaching and learning outcomes, while the Governance dimension tackles issues related to privacy, security, and accountability. The Operational dimension addresses matters concerning infrastructure and training. The framework fosters a nuanced understanding of the implications of AI integration in academic settings, ensuring that stakeholders are aware of their responsibilities and can take appropriate actions accordingly.HighlightsProposed AI Ecological Education Policy Framework for university teaching and learning.Three dimensions: Pedagogical, Governance, and Operational AI Policy Framework.Qualitative and quantitative data collected from students, teachers, and staff.Ten key areas identified for planning an AI policy in universities.Students should play an active role in drafting and implementing the policy.
Journal Article
Exploring the role of gamified information security education systems on information security awareness and protection behavioral intention
2023
This study examines the effect of a gamified information security education system (ISES) on developing users’ information security awareness and protection behavioral intention. We developed a research model based on affordance theory and means-end chain theory. Using a scenario-based experimental survey approach, we obtained 220 valid samples and then conducted partial-least-squares structural equation modeling (PLS-SEM) to test the model. The results showed that (1) the affordance of the gamified ISES can enhance users’ information security awareness through both emotional and cognitive paths; (2) information security awareness positively influences information security protection behavioral intention, but physical presence and information security knowledge growth do not; and (3) interest-type curiosity positively moderates the relationship between enjoyment affordance and physical presence, and deprivation-type curiosity positively moderates the relationship between knowledge affordance and information security knowledge growth. This study identifies the emotional and cognitive stimulation paths of the gamified ISES to enhance users' information security awareness and protection behavior intention and reveals the moderating role of curiosity, which enriches the empirical research on the impact mechanism of the gamified education system in the field of information security. In addition, our research can provide practical and feasible suggestions for education departments and design units to reasonably apply and design gamified ISESs. The influence of education level and other factors on information security protection behavioral intention can be further explored in future research.
Journal Article
Dynamic Tripartite Governance in data security: An evolutionary game model with cross-level government supervision
by
Jiang, Zhiyi
,
Zou, Yuxuan
,
Wang, Shiyu
in
Access control
,
Analysis
,
Biology and Life Sciences
2025
As digital governance transitions to a decentralized architecture, data security has become a key driver of institutional modernization. This study constructs a three-party evolutionary game framework, integrating the grassroots government (GRG), local government (LG), and third-party regulator (TPR), and empirically calibrates the parameters using financial records from municipal data projects. Using replicator dynamics and Lyapunov stability analysis, we identify three key mechanisms in cross-level governance: 1. While reward systems enhance GRG compliance, excessive rewards, due to resource misallocation, weaken LG’s regulatory rigor. 2. When the overall penalties systematically exceed opportunistic gains, rent-seeking behavior is effectively suppressed, reducing the incentives for collusion between GRG and TPR. 3. Increasing the rent-seeking costs of TPR and enhancing social accountability benefits promote GRG’s sustained commitment to data security supervision. Simulations conducted in MATLAB illustrate the nonlinear interactions between governance parameters and reveal that dynamic reward and punishment mechanisms can accelerate convergence towards a stable regulatory equilibrium. This study proposes optimizing China’s grassroots data governance framework through dynamically adjusted reward and penalty mechanisms and increased rent-seeking costs, providing practical guidance for enhancing regulatory effectiveness. Index Terms data security governance, evolutionary game theory, incentive mechanisms, grassroots regulation, rent-seeking.
Journal Article
The impact of farmers’ digital literacy on farmers’ enthusiasm for grain cultivation: Findings from the “Double Hundred and Thousand” farmers in Jiangxi province
by
Xie, Huiping
,
Chen, Jianghua
,
Wang, Zhipeng
in
Access to information
,
Adult
,
Agricultural equipment
2025
Enhancing farmers’ enthusiasm for grain cultivation is crucial for ensuring national food security. Based on survey data from the “Double Hundred and Double Thousand” farmers in Jiangxi Province, this study measures farmers’ enthusiasm for grain cultivation through their double-cropping rice cultivation behavior and employs Probit and Tobit models to empirically analyze the impact of farmers’ digital literacy on their enthusiasm for grain cultivation in traditional double-cropping rice production areas of Jiangxi, as well as its underlying mechanisms. The findings reveal: (1) Improving farmers’ digital literacy exerts a significantly positive influence on their enthusiasm for grain cultivation, promoting double-cropping rice adoption and expanding cultivation areas in traditional production regions. This conclusion remains robust after rigorous testing. (2) Mechanism analysis identifies three pathways: accelerating farmland transfer-in, facilitating the utilization of agricultural machinery socialization services, and promoting the adoption of green grain production technologies, through which enhanced digital literacy drives double-cropping rice cultivation and elevates cultivation enthusiasm. (3) Heterogeneity analysis demonstrates that the positive effect of digital literacy on double-cropping rice cultivation is more pronounced among farmers with higher educational attainment and the level of household part-time farming. Therefore, policies should prioritize elevating farmers’ overall digital literacy, narrowing digital capability gaps, refining land transfer procedures and mechanisms, leveraging the advantages of farmers’ cooperatives, and advancing the dissemination of agricultural machinery socialization services and green grain production technologies.
Journal Article
Enhanced security using multiple paths routine scheme in cloud-MANETs
2023
Cloud Mobile Ad-hoc Networks (Cloud-MANETs) is a framework that can access and deliver cloud services to MANET users through their smart devices. MANETs is a pool of self-organized mobile gadgets that can communicate with each other with no support from a central authority or infrastructure. The main advantage of MANETs is its ability to manage mobility while data communication between different users in the system occurs. In MANETs, clustering is an active technique used to manage mobile nodes. The security of MANETs is a key aspect for the fundamental functionality of the network. Addressing the security-related problems ensures that the confidentiality and integrity of the data transmission is secure. MANETs are highly prone to attacks because of their properties.In clustering schemes, the network is broken down to sub-networks called clusters. These clusters can have overlapping nodes or be disjointed. An enhanced node referred to asthe Cluster Head (CH) is chosen from each set to overseetasks related to routing. It decreases the member nodes’ overhead and improvesthe performance of the system. The relationship between the nodes and CH may vary randomly, leading to re-associations and re-clustering in a MANET that is clustered. An efficient and effective routing protocol is required to allow networking and to find the most suitable paths between the nodes. The networking must be spontaneous, infrastructure-less, and provide end-to-end interactions. The aim of routing is the provision of maximum network load distribution and robust networks. This study focused on the creation of a maximal route between a pair of nodes, and to ensure the appropriate and accurate delivery of the packet. The proposed solution ensured that routing can be carried out with the lowest bandwidth consumption. Compared to existing protocols, the proposed solution had a control overhead of 24, packet delivery ratio of 81, the lowest average end-to-end delay of 6, and an improved throughput of 80,000, thereby enhancing the output of the network. Our result shows that multipath routing enables the network to identify alternate paths connecting the destination and source. Routing is required to conserve energy and for optimum bandwidth utilization.
Journal Article