[HTML][HTML] Learning from cyber security incidents: A systematic review and future research agenda
Cyber security incidents are now prevalent in many organisations. Arguably, those who can
learn from security incidents and address the underlying causes will reduce the prevalence …
learn from security incidents and address the underlying causes will reduce the prevalence …
The role of cybersecurity and policy awareness in shifting employee compliance attitudes: Building supply chain capabilities
This paper investigates the role of general cybersecurity and cybersecurity policy awareness
in enhancing supply chain cyber resilience reactive capabilities. Theorizing from the …
in enhancing supply chain cyber resilience reactive capabilities. Theorizing from the …
Enabling cybersecurity incident response agility through dynamic capabilities: the role of real-time analytics
We explore how organisations enable agility in their cybersecurity incident response (IR)
process by develo** dynamic capabilities using real-time analytics (RTA). Drawing on …
process by develo** dynamic capabilities using real-time analytics (RTA). Drawing on …
[HTML][HTML] Moving towards agile cybersecurity incident response: A case study exploring the enabling role of big data analytics-embedded dynamic capabilities
Organizations are at risk of cyber-attacks more than ever before due to the ongoing
digitalization of business operations. Industry reports indicate that it is not a matter of if but …
digitalization of business operations. Industry reports indicate that it is not a matter of if but …
PQCAIE: Post quantum cryptographic authentication scheme for IoT-based e-health systems
The increasing integration of Internet of Things (IoT) technologies in consumer electronics
has revolutionized various sectors, including healthcare. This evolution has led to the …
has revolutionized various sectors, including healthcare. This evolution has led to the …
Minimizing incident response time in real-world scenarios using quantum computing
Abstract The Information Security Management Systems (ISMS) are global and risk-driven
processes that allow companies to develop their cybersecurity strategy by defining security …
processes that allow companies to develop their cybersecurity strategy by defining security …
[HTML][HTML] Investigating the relationship between human and organisational factors, maintenance, and accidents. The case of chemical process industry in South Africa
Accidents continue to be a major concern in the production, storage, and use of hazardous
substances, and accidents have occurred either during maintenance or lack thereof …
substances, and accidents have occurred either during maintenance or lack thereof …
[HTML][HTML] A cybersecurity risk quantification and classification framework for informed risk mitigation decisions
Data breaches have been causing havoc for many years and continue to rise, demanding a
more comprehensive framework to assess their severity. This study proposes a …
more comprehensive framework to assess their severity. This study proposes a …
[HTML][HTML] A compliance assessment system for Incident Management process
Abstract The Incident Management (IM) process is one of the core activities for increasing
the overall security level of organizations and better responding to cyber attacks. Different …
the overall security level of organizations and better responding to cyber attacks. Different …
QISS: Quantum-enhanced sustainable security incident handling in the IoT
As the Internet of Things (IoT) becomes more integral across diverse sectors, including
healthcare, energy provision and industrial automation, the exposure to cyber vulnerabilities …
healthcare, energy provision and industrial automation, the exposure to cyber vulnerabilities …