Human–machine cooperation research for navigation of maritime autonomous surface ships: A review and consideration

C Liu, X Chu, W Wu, S Li, Z He, M Zheng, H Zhou… - Ocean Engineering, 2022 - Elsevier
Abstract Maritime Autonomous Surface Ships (MASS) have obtained much attention in
recent years. Navigation with human–machine cooperation is the core for L1–L3 MASS. In …

[HTML][HTML] Cyber-threat intelligence for security decision-making: A review and research agenda for practice

S Ainslie, D Thompson, S Maynard, A Ahmad - Computers & Security, 2023 - Elsevier
The increasing militarization of the cyber-threat environment has driven considerable
interest in understanding the role of cyber-threat intelligence (CTI) in supporting the …

[HTML][HTML] Information security risk assessments following cybersecurity breaches: The mediating role of top management attention to cybersecurity

FA Shaikh, M Siponen - Computers & Security, 2023 - Elsevier
Abstract Information Systems (IS) research on managerial response to cybersecurity
breaches has largely focused on externally oriented actions such as customer redressal and …

Information security policy compliance model in organizations

NS Safa, R Von Solms, S Furnell - computers & security, 2016 - Elsevier
The Internet and information technology have influenced human life significantly. However,
information security is still an important concern for both users and organizations …

How can organizations develop situation awareness for incident response: A case study of management practice

A Ahmad, SB Maynard, KC Desouza, J Kotsias… - Computers & …, 2021 - Elsevier
Organized, sophisticated and persistent cyber-threat-actors pose a significant challenge to
large, high-value organizations. They are capable of disrupting and destroying cyber …

Adopting and integrating cyber-threat intelligence in a commercial organisation

J Kotsias, A Ahmad, R Scheepers - European Journal of …, 2023 - Taylor & Francis
Cyber-attacks are increasingly perpetrated by organised, sophisticated and persistent
entities such as crime syndicates and paramilitary forces. Even commercial firms that fully …

Strategically-motivated advanced persistent threat: Definition, process, tactics and a disinformation model of counterattack

A Ahmad, J Webb, KC Desouza, J Boorman - Computers & Security, 2019 - Elsevier
Advanced persistent threat (APT) is widely acknowledged to be the most sophisticated and
potent class of security threat. APT refers to knowledgeable human attackers that are …

How integration of cyber security management and incident response enables organizational learning

A Ahmad, KC Desouza, SB Maynard… - Journal of the …, 2020 - Wiley Online Library
Digital assets of organizations are under constant threat from a wide assortment of nefarious
actors. When threats materialize, the consequences can be significant. Most large …

Enabling cybersecurity incident response agility through dynamic capabilities: the role of real-time analytics

H Naseer, K Desouza, SB Maynard… - European Journal of …, 2024 - Taylor & Francis
We explore how organisations enable agility in their cybersecurity incident response (IR)
process by develo** dynamic capabilities using real-time analytics (RTA). Drawing on …

[HTML][HTML] Cyber-threat perception and risk management in the Swedish financial sector

S Varga, J Brynielsson, U Franke - Computers & security, 2021 - Elsevier
The financial sector relies heavily on information systems for business. This study sets out to
investigate cyber situation awareness in the financial sector in Sweden, by examining what …