Transforming healthcare cybersecurity from reactive to proactive: current status and future recommendations

SS Bhuyan, UY Kabir, JM Escareno, K Ector… - Journal of medical …, 2020 - Springer
The recent rise in cybersecurity breaches in healthcare organizations has put patients'
privacy at a higher risk of being exposed. Despite this threat and the additional danger …

[HTML][HTML] Cyber security of critical infrastructures

LA Maglaras, KH Kim, H Janicke, MA Ferrag, S Rallis… - Ict Express, 2018 - Elsevier
Abstract Modern Supervisory Control and Data Acquisition (SCADA) systems are essential
for monitoring and managing electric power generation, transmission and distribution. In the …

A framework of blockchain-based secure and privacy-preserving E-government system

N Elisa, L Yang, F Chao, Y Cao - Wireless networks, 2023 - Springer
Electronic government (e-government) uses information and communication technologies to
deliver public services to individuals and organisations effectively, efficiently and …

[HTML][HTML] A quest for research and knowledge gaps in cybersecurity awareness for small and medium-sized enterprises

S Chaudhary, V Gkioulos, S Katsikas - Computer Science Review, 2023 - Elsevier
The proliferation of information and communication technologies in enterprises enables
them to develop new business models and enhance their operational and commercial …

[PDF][PDF] Botching human factors in cybersecurity in business organizations

C Nobles - HOLISTICA–Journal of Business and Public …, 2018 - sciendo.com
Human factors remained unexplored and underappreciated in information security. The
mounting cyber-attacks, data breaches, and ransomware attacks are a result of human …

Human factor security: evaluating the cybersecurity capacity of the industrial workforce

UD Ani, H He, A Tiwari - Journal of Systems and Information …, 2019 - emerald.com
Purpose As cyber-attacks continue to grow, organisations adopting the internet-of-things
(IoT) have continued to react to security concerns that threaten their businesses within the …

What are the actual costs of cyber risk events?

M Eling, J Wirfs - European Journal of Operational Research, 2019 - Elsevier
Cyber risks are high on the business agenda of every company, but they are difficult to
assess due to the absence of reliable data and thorough analyses. This paper is the first to …

Deterrence and prevention-based model to mitigate information security insider threats in organisations

NS Safa, C Maple, S Furnell, MA Azad, C Perera… - Future Generation …, 2019 - Elsevier
Previous studies show that information security breaches and privacy violations are
important issues for organisations and people. It is acknowledged that decreasing the risk in …

Planning for Cyber Security in Schools: The Human Factor.

MD Richardson, PA Lemoine, WE Stephens… - Educational Planning, 2020 - ERIC
Cybersecurity has emerged as one of the most critical issues confronting schools in the 21st
century. Computer security is an essential instrument for protecting children, but K-12 …

Privacy-preserving schemes for ad hoc social networks: A survey

MA Ferrag, L Maglaras, A Ahmim - … Communications Surveys & …, 2017 - ieeexplore.ieee.org
We review the state of the art of privacypreserving schemes for ad hoc social networks
including mobile social networks (MSNs) and vehicular social networks (VSNs). Specifically …