Cyber security threats and vulnerabilities: a systematic map** study
There has been a tremendous increase in research in the area of cyber security to support
cyber applications and to avoid key security threats faced by these applications. The goal of …
cyber applications and to avoid key security threats faced by these applications. The goal of …
Impact of social engineering attacks: A literature review
W Fuertes, D Arévalo, JD Castro, M Ron… - … and Advances in …, 2022 - Springer
Social engineering is the practice, which allows attackers to obtain sensitive or confidential
information from a user of a system or organization, exploiting specific characteristics of the …
information from a user of a system or organization, exploiting specific characteristics of the …
Time pressure in human cybersecurity behavior: Theoretical framework and countermeasures
Cybersecurity is a growing concern for private individuals and professional entities. Reports
have shown that the majority of cybersecurity incidents occur because users fail to behave …
have shown that the majority of cybersecurity incidents occur because users fail to behave …
Validation of a socio-technical management process for optimising cybersecurity practices
This study developed a socio-technical management process to optimise both technical and
non-technical security measures to provide optimal, rather than adequate, enterprise …
non-technical security measures to provide optimal, rather than adequate, enterprise …
The new frontier of cybersecurity: emerging threats and innovations
In today's digitally interconnected world, cybersecurity threats have reached unprecedented
levels, presenting a pressing concern for individuals, organizations, and governments. This …
levels, presenting a pressing concern for individuals, organizations, and governments. This …
Measuring remote working skills: Scale development and validation study
S Benligiray, AY Güngör, İ Akbaş - Plos one, 2024 - journals.plos.org
Remote work, one of the most significant working arrangements of today, requires certain
employee skills. Although there are some hints, there is not much information in the literature …
employee skills. Although there are some hints, there is not much information in the literature …
[PDF][PDF] Emerging Threats in Cyberspace: Implications for National Security Policy and Healthcare Sector
Currently, the majority of economic, commercial, cultural, social, and governmental activity
and contacts between countries, encompassing individuals, non-governmental …
and contacts between countries, encompassing individuals, non-governmental …
Cyber Security Education
G Austin - Principles and Policies. New York, NY, UK and New …, 2020 - api.taylorfrancis.com
Names: Austin, Greg, 1951-editor. Title: Cyber-security education: principles and
policies/edited by Greg Austin. Description: London; New York: Routledge/Taylor & Francis …
policies/edited by Greg Austin. Description: London; New York: Routledge/Taylor & Francis …
Cyber security behaviour in organisations
This review explores the academic and policy literature in the context of everyday cyber
security in organisations. In so doing, it identifies four behavioural sets that influences how …
security in organisations. In so doing, it identifies four behavioural sets that influences how …
Emerging threats in cybersecurity: a review article
I Kumar - International Journal of Applied and Natural …, 2023 - bluemarkpublishers.com
This research article explores the emerging threats in cybersecurity and their implications.
The aim of the study is to identify and analyze the various types of threats that organizations …
The aim of the study is to identify and analyze the various types of threats that organizations …