Turnitin
降AI改写
早检测系统
早降重系统
Turnitin-UK版
万方检测-期刊版
维普编辑部版
Grammarly检测
Paperpass检测
checkpass检测
PaperYY检测
[HTML][HTML] The impact of artificial intelligence on organisational cyber security: An outcome of a systematic literature review
I Jada, TO Mayayise - Data and Information Management, 2024 - Elsevier
As digital transformation continues to advance, organisations are becoming increasingly
aware of the benefits that modern technologies offer. However, with greater technology …
aware of the benefits that modern technologies offer. However, with greater technology …
Artificial intelligence for enhancing resilience
In an increasingly complex and unpredictable world, resilience-the ability to withstand and
recover from adverse conditions is essential across various sectors. This research paper …
recover from adverse conditions is essential across various sectors. This research paper …
Current trends in AI and ML for cybersecurity: A state-of-the-art survey
N Mohamed - Cogent Engineering, 2023 - Taylor & Francis
This paper provides a comprehensive survey of the state-of-the-art use of Artificial
Intelligence (AI) and Machine Learning (ML) in the field of cybersecurity. The paper …
Intelligence (AI) and Machine Learning (ML) in the field of cybersecurity. The paper …
Building a thematic framework of cybersecurity: a systematic literature review approach
TY Khaw, A Amran, AP Teoh - Journal of Systems and Information …, 2024 - emerald.com
Purpose This paper aims to explore the factors affecting cybersecurity implementation in
organizations in various countries and develop a cybersecurity framework to improve …
organizations in various countries and develop a cybersecurity framework to improve …
[PDF][PDF] From Legacy Systems to Zero Trust: Transitioning Your Organization's Security Model
F Paul - 2022 - researchgate.net
In today's digital-first world, cybersecurity threats are more sophisticated and pervasive than
ever before. Legacy security models, which typically rely on a trusted perimeter to protect an …
ever before. Legacy security models, which typically rely on a trusted perimeter to protect an …
Artificial intelligence in knowledge management: application insights and guidelines
D Cossul, G Ferreira, M Mueller… - Revista de Gestão e …, 2023 - ojs.revistagesec.org.br
The development of digital technologies has aroused increasing interest among researchers
and managers due to the inherent transformations in productive systems, where knowledge …
and managers due to the inherent transformations in productive systems, where knowledge …
[HTML][HTML] Managing cybersecurity threats and increasing organizational resilience
PRJ Trim, YI Lee - Big Data and Cognitive Computing, 2023 - mdpi.com
Cyber security is high up on the agenda of senior managers in private and public sector
organizations and is likely to remain so for the foreseeable future. Because cyber-attacks are …
organizations and is likely to remain so for the foreseeable future. Because cyber-attacks are …
[HTML][HTML] Enhancing cybersecurity resilience through advanced red-teaming exercises and MITRE ATT&CK framework integration: A paradigm shift in cybersecurity …
As cybersecurity threats evolve alarmingly, conventional defense strategies are becoming
increasingly ineffective. In response to this urgent challenge, our study presents a …
increasingly ineffective. In response to this urgent challenge, our study presents a …
[HTML][HTML] Artificial Intelligence as a Catalyst for Management System Adaptability, Agility and Resilience: Map** the Research Agenda
Artificial intelligence (AI) is an increasingly notable presence in society, industries, and
organizations, making its necessity felt more in managerial decisions and practices. This …
organizations, making its necessity felt more in managerial decisions and practices. This …
Impact of Cybersecurity and AI's Related Factors on Incident Reporting Suspicious Behaviour and Employees Stress: Moderating Role of Cybersecurity Training
VV Muthuswamy, S Esakki - International Journal of Cyber …, 2024 - cybercrimejournal.com
This research seeks to investigate how incident reporting of suspicious behaviour mediates
relationships in the realm of cybersecurity incident management (CIM), cybersecurity …
relationships in the realm of cybersecurity incident management (CIM), cybersecurity …