Entry
Reader's guide
Entries A-Z
Subject index
Cybersecurity
The Internet’s capacity to transmit data at high speed and at low cost has substantially changed social and political interactions and the way in which business is organized and conducted. However, as beneficial as the diffusion of digital technologies into more and more aspects of life may be, their misuse is also increasing. In 2015, 38% more security incidents were detected than in the previous year, according to a report from IBM and the Ponemon Institute. More than 169 million personal records were exposed in 2015, stemming from 781 publicized breaches in the financial, business, education, government, and health care sectors, according to a report from the Identity Theft Resource Center. In short, the Internet has a security problem.
Cybersecurity is one approach geared toward countering ...
- Criminal and Ethical Facets
- Economic Facets
- Adware
- Agriculture and the Internet
- Alibaba
- Amazon
- Back Offices, Call Centers, and the Internet
- Bitcoin
- Blockchain
- Broadband Internet Affordability
- Crowdfunding
- Cryptocurrencies
- eBay
- e-Commerce: Business-to-Business
- e-Commerce: Business-to-Consumer
- e-Commerce: Business-to-Government
- Economic Development and the Internet
- Energy Use and the Internet
- e-Tailing
- Fiber Optics and the Internet
- Internet Advertising
- Internet Banking
- Internet Recruiting
- Internet Taxation
- Location-Based Services
- Manufacturing and the Internet
- MercadoLibre
- PayPal
- Rural Areas and the Internet
- Sharing Economy and the Internet
- Smart Cities
- Smart Energy Systems
- Smart Grids
- Telework
- Tourism and the Internet
- Transportation and the Internet
- Virtual Teams
- Webinars
- Internet History and Governance
- Declaration of the Independence of Cyberspace
- ARPANET
- BITNET
- Cyclades
- Deep Packet Inspection
- Electronic Frontier Foundation
- Gopher
- Internet Architecture Board
- Internet Assigned Numbers Authority
- Internet Corporation for Assigned Names and Numbers
- Internet Engineering Task Force
- Internet Governance
- Internet Origins and History
- Internet Society
- Internet Standards
- NSFNET
- Usenet
- WELL, The
- World Wide Web
- World Wide Web Consortium
- Political and Legal Facets
- Anonymous
- Biometrics
- Clicktivism
- Cyberespionage
- Cybersecurity
- Cyberwarfare
- Distributed Denial-of-Service Attack
- e-Government
- Elections and the Internet
- Electronic Signatures
- Geoblocking
- Great Firewall
- Internet Activism
- Internet Censorship
- Internet Law
- Internet Surveillance
- m-Government
- Military Internet
- National Security Agency Surveillance
- Net Neutrality
- Right to Be Forgotten
- Right to Internet Access
- Slacktivism
- Social Movements and the Internet
- Stuxnet
- WikiLeaks
- Social, Behavioral, and Psychological Facets
- Augmented Reality
- Baidu
- Blind People and the Internet
- Blogs
- Chat Rooms
- Children, Adolescents, and the Internet
- Citizen Science
- Crowdsourcing
- Cybercafés
- Cyberoptimism and Cyberpessimism
- Cyberwellness
- Diasporas and the Internet
- Digital Divides, Disability and
- Digital Divides, Ethnicity and
- Digital Divides, Gender and
- Digital Divides, Geography of
- Digital Divides, Global
- Digital Divides, Language and
- Digital Earth
- Digital Humanities
- Digital Natives
- Education and the Internet: Colleges and Universities
- Education and the Internet: Elementary and Secondary Schools
- e-Health
- Elderly People and the Internet
- Electronic Literature
- Emojis and Emoticons
- Ethnographic Research and the Internet
- Google Earth
- Health Care and the Internet
- Internet Addiction
- Internet Dating
- Internet Gambling
- Internet Gaming
- Internet Mapping
- Internet Memes
- Internet Movie Database
- Internet Nonusers
- Internet Pornography
- Internet Privacy
- Internet Slang
- Internet Telephony
- iPhones
- Journalism and the Internet
- Libraries and the Internet
- Massive Open Online Courses
- Microblogs
- Mobile Internet
- Municipal Broadband
- Music and the Internet
- Myspace
- Neogeography
- Netflix
- Netiquette
- Netizen
- One Laptop per Child
- Online Social Networks
- Photo Sharing Applications
- Podcasting
- Project Loon
- Religion and the Internet
- Sexting
- Skype
- Smartphone Apps
- Smartphones
- Social Media
- Sports and the Internet
- Telecenters
- Telemedicine
- Television and the Internet
- Tencent
- Texting
- Tor
- Video Games and the Internet
- Virtual Reality
- Wearable Technologies
- Web 2.0
- Wi-Fi
- Wikipedia
- Yahoo
- YouTube
- Technical Facets
- AI Safety
- Algorithmic Selection on the Internet
- Broadband Internet
- CAPTCHA
- Cloud Computing
- Cookies
- Cyberinfrastructure
- Cyberspace
- Cybersquatting
- Deep Web
- Digital Steganography
- Digital Watermarking
- Domain Name
- Domain Name System
- Electronic Mailing Lists
- Ethernet
- File Sharing
- File Transfer Protocol
- Firewalls
- Freenet
- Geoweb
- Hashtag
- Hyperlink
- Hypertext Markup Language
- Hypertext Transfer Protocol
- Internet Backbone Networks
- Internet Connectivity
- Internet Data Centers
- Internet GIS
- Internet of Things
- Internet Routing
- Internet Service Providers
- IP Addresses
- Local Area Networks
- Packet Switching
- Peer-to-Peer Networks
- Satellite Internet
- Search Engine
- Semantic Web
- TCP/IP
- Traceroute
- Uniform Resource Locator
- Virtual Private Networks
- Volunteered Geographic Information
- Web Browsers
- Web Design
- Web GIS
- Web Mining
- Web Programming
- Webometrics
- Website and Webpage
- Wide Area Networks
- Loading...