Cyber security threats and vulnerabilities: a systematic map** study

M Humayun, M Niazi, NZ Jhanjhi, M Alshayeb… - Arabian Journal for …, 2020 - Springer
There has been a tremendous increase in research in the area of cyber security to support
cyber applications and to avoid key security threats faced by these applications. The goal of …

Impact of social engineering attacks: A literature review

W Fuertes, D Arévalo, JD Castro, M Ron… - … and Advances in …, 2022 - Springer
Social engineering is the practice, which allows attackers to obtain sensitive or confidential
information from a user of a system or organization, exploiting specific characteristics of the …

Time pressure in human cybersecurity behavior: Theoretical framework and countermeasures

NH Chowdhury, MTP Adam, T Teubner - Computers & Security, 2020 - Elsevier
Cybersecurity is a growing concern for private individuals and professional entities. Reports
have shown that the majority of cybersecurity incidents occur because users fail to behave …

Validation of a socio-technical management process for optimising cybersecurity practices

M Malatji, A Marnewick, S von Solms - Computers & Security, 2020 - Elsevier
This study developed a socio-technical management process to optimise both technical and
non-technical security measures to provide optimal, rather than adequate, enterprise …

The new frontier of cybersecurity: emerging threats and innovations

D Dave, G Sawhney, P Aggarwal… - 2023 29th …, 2023 - ieeexplore.ieee.org
In today's digitally interconnected world, cybersecurity threats have reached unprecedented
levels, presenting a pressing concern for individuals, organizations, and governments. This …

Measuring remote working skills: Scale development and validation study

S Benligiray, AY Güngör, İ Akbaş - Plos one, 2024 - journals.plos.org
Remote work, one of the most significant working arrangements of today, requires certain
employee skills. Although there are some hints, there is not much information in the literature …

[PDF][PDF] Emerging Threats in Cyberspace: Implications for National Security Policy and Healthcare Sector

S Ness, T Khinvasara - Journal of Engineering Research and …, 2024 - researchgate.net
Currently, the majority of economic, commercial, cultural, social, and governmental activity
and contacts between countries, encompassing individuals, non-governmental …

Cyber Security Education

G Austin - Principles and Policies. New York, NY, UK and New …, 2020 - api.taylorfrancis.com
Names: Austin, Greg, 1951-editor. Title: Cyber-security education: principles and
policies/edited by Greg Austin. Description: London; New York: Routledge/Taylor & Francis …

Cyber security behaviour in organisations

A Ertan, G Crossland, C Heath, D Denny… - arxiv preprint arxiv …, 2020 - arxiv.org
This review explores the academic and policy literature in the context of everyday cyber
security in organisations. In so doing, it identifies four behavioural sets that influences how …

Emerging threats in cybersecurity: a review article

I Kumar - International Journal of Applied and Natural …, 2023 - bluemarkpublishers.com
This research article explores the emerging threats in cybersecurity and their implications.
The aim of the study is to identify and analyze the various types of threats that organizations …