[HTML][HTML] When shutdown is no option: Identifying the notion of the digital government continuity paradox in Estonia's eID crisis

I Skierka - Government Information Quarterly, 2023 - Elsevier
States must increasingly manage cybersecurity threats and disruptions in their digital
government infrastructures. However, the digital government literature lacks a systematic …

The evolution of the Human Systems and Simulation Laboratory in nuclear power research

A Hall, JC Joe, TM Miyake, RL Boring - Nuclear Engineering and …, 2023 - Elsevier
Abstract The events at Three Mile Island in the United States brought about fundamental
changes in the ways that simulation would be used in nuclear operations. The need for …

Winning the battle with cyber risk identification tools in industrial control systems: A review

A Rotibi, N Saxena, P Burnap - IET Cyber‐Physical Systems …, 2024 - Wiley Online Library
Abstract The modern Industrial Control System (ICS) environment now combines information
technology (IT), operational technology, and physical processes. This digital transformation …

Towards a new taxonomy of insider threats

S Chaipa, EK Ngassam… - 2022 IST-Africa …, 2022 - ieeexplore.ieee.org
This paper discusses the outcome of combining insider threat agent taxonomies with the aim
of enhancing insider threat detection. The objectives sought to explore taxonomy …

Requirements Analysis for the Evaluation of Automated Security Risk Assessments

M Ehrlich, G Lukas, H Trsek… - 2024 IEEE 20th …, 2024 - ieeexplore.ieee.org
The overall Industry 4.0 developments and the highly dynamic threat landscape enhance
the need for continuous security engineering of industrial components, modules, and …

[HTML][HTML] Development of the framework for quantitative cyber risk assessment in nuclear facilities

KS Son, JG Song, JW Lee - Nuclear Engineering and Technology, 2023 - Elsevier
Industrial control systems in nuclear facilities are facing increasing cyber threats due to the
widespread use of information and communication equipment. To implement cyber security …

[PDF][PDF] Исследование методик контроля уровня защищенности информации на объектах критической информационной инфраструктуры

ИИ Лившиц, АС Бакшеев - Вопросы кибербезопасности, 2022 - cyberrus.info
Научная новизна заключается в разработке модели аудита ИБ для объектов КИИ,
отличающаяся возможностью «двойного» режима для полного цикла обеспечения …

Noise level assessment of Mobile Telecommunication Base Stations Proximate to Residential areas in Accra, Ghana

FK Nkansah, WK Agbosu, K Adanu… - Sriwijaya Journal of …, 2024 - ojs.pps.unsri.ac.id
The installation of base stations in Accra and other urban centers meant to expand mobile
phone network coverage has met opposition from the public. This study was carried out to …

Cyber Risk Assessment for Cyber-Physical Systems: A Review of Methodologies and Recommendations for Improved Assessment Effectiveness

A AlHarmali, S Ali, W Aman, O Hussain - arxiv preprint arxiv:2408.16841, 2024 - arxiv.org
Cyber-Physical Systems (CPS) integrate physical and embedded systems with information
and communication technology systems, monitoring and controlling physical processes with …

Overview and Recommendations for Cyber Risk Assessment in Nuclear Power Plants

F Zhang, K Kelly - Nuclear Technology, 2023 - Taylor & Francis
Digital instrumentation and control (I&C) systems are being deployed in nuclear power
plants (NPPs) for both existing and advanced reactor designs. As I&C systems become more …