The continuous amalgamation of technology into the ever increasing facets of everyday life are conducive to encouraging cyber-crimes and cyber-security evolution and diversification. Hence, responses that address resulting concerns presented in this mini-track include 'A Synchronized Shared Key Generation Method for Maintaining End-to-End Security of Big Data Streams', 'A Threat-Vulnerability Based Risk Analysis Model for Cyber Physical System Security' and an analysis of 'How Espoused Culture Influences Misuse Intention: A Micro-Institutional Theory Perspective'. These contributions highlight the growing need to highlight, investigate and address cyber-security vulnerabilities in the broad context of cyber-of-things.
CITATION STYLE
Glisson, W. B., & Choo, K. K. R. (2017). Introduction to the cyber-of-things: Cyber-crimes and Cyber-Security Mini-track. In Proceedings of the Annual Hawaii International Conference on System Sciences (Vol. 2017-January, pp. 6008–6010). IEEE Computer Society. https://doi.org/10.24251/hicss.2017.718
Mendeley helps you to discover research relevant for your work.