A comprehensive study on current and future trends towards the characteristics and enablers of industry 4.0

N Karnik, U Bora, K Bhadri, P Kadambi… - Journal of Industrial …, 2022 - Elsevier
Abstract Since the first Industrial Revolution the trends in manufacturing have evolved a lot,
from mechanical production to the era of smart manufacturing via technologies like Cyber …

Discussing resilience in the context of cyber physical systems

S Colabianchi, F Costantino, G Di Gravio… - Computers & Industrial …, 2021 - Elsevier
Abstract Cyber-Physical Systems (CPSs) are increasingly more complex and integrated into
our everyday lives forming the basis of smart infrastructures, products, and services …

Leveraging human factors in cybersecurity: an integrated methodological approach

A Pollini, TC Callari, A Tedeschi, D Ruscio… - Cognition, Technology & …, 2022 - Springer
Abstract Computer and Information Security (CIS) is usually approached adopting a
technology-centric viewpoint, where the human components of sociotechnical systems are …

Evaluating protection motivation based cybersecurity awareness training on Kirkpatrick's Model

NF Khan, N Ikram, H Murtaza, M Javed - Computers & Security, 2023 - Elsevier
Context Cybersecurity behavioral literature has a significant number of studies on training
and awareness. However, there is lack of theoretical underpinnings in develo** …

Evaluating the adoption of cybersecurity and its influence on organizational performance

T Hasani, N O'Reilly, A Dehghantanha… - SN Business & …, 2023 - Springer
Cyberattacks negatively impact the performance of enterprises all around the globe. While
organizations invest more in cybersecurity to avoid cyberattacks, studies on the factors …

[HTML][HTML] A typology of cybersecurity behavior among knowledge workers

D Baltuttis, T Teubner, MTP Adam - Computers & Security, 2024 - Elsevier
While the cybersecurity literature on behavioral factors has expanded, current
countermeasures often overlook employee-specific behavioral differences, leading to …

[HTML][HTML] Modeling effective cybersecurity training frameworks: A delphi method-based study

N Chowdhury, S Katsikas, V Gkioulos - Computers & Security, 2022 - Elsevier
Today, cybersecurity training is commonplace in both large companies and Small & Medium
Enterprise (SME). Nonetheless, the effectiveness of many of the current training offerings is …

[HTML][HTML] VISTA: An inclusive insider threat taxonomy, with mitigation strategies

K Renaud, M Warkentin, G Pogrebna… - Information & …, 2024 - Elsevier
Insiders have the potential to do a great deal of damage, given their legitimate access to
organisational assets and the trust they enjoy. Organisations can only mitigate insider …

A cyber situational awareness model to predict the implementation of cyber security controls and precautions by SMEs

K Renaud, J Ophoff - Organizational Cybersecurity Journal: Practice …, 2021 - emerald.com
Purpose There is widespread concern about the fact that small-and medium-sized
enterprises (SMEs) seem to be particularly vulnerable to cyberattacks. This is perhaps …

Exploring the impact of AI-driven solutions on cybersecurity adoption in small and medium enterprises

GS Nadella, H Gonaygunta, D Kumar… - World Journal of …, 2024 - wjarr.co.in
This study delves into the intricate dynamics of cybersecurity adoption within small and
medium enterprises (SMEs), with a specific focus on the transformative potential of AI-driven …