Applying generative machine learning to intrusion detection: A systematic map** study and review

J Halvorsen, C Izurieta, H Cai… - ACM Computing …, 2024 - dl.acm.org
Intrusion Detection Systems (IDSs) are an essential element of modern cyber defense,
alerting users to when and where cyber-attacks occur. Machine learning can enable IDSs to …

[PDF][PDF] A review of metaverse and cybersecurity in the digital era

P Jaipong, S Siripipattanakul… - … Journal of Computing …, 2023 - researchgate.net
Purpose–Adoption of the metaverse may increase cybersecurity risks. This study evaluates
the literature on metaverse and cybersecurity in the digital era. Method–A narrative …

IoT and AI for smart government: A research agenda

A Kankanhalli, Y Charalabidis, S Mellouli - Government Information …, 2019 - Elsevier
Abstract The Internet of things (IoT) is the network of objects/things that contain electronics,
software, sensors, and actuators, which allows these things to connect, interact, and …

A framework for Internet of Things-enabled smart government: A case of IoT cybersecurity policies and use cases in US federal government

AT Chatfield, CG Reddick - Government Information Quarterly, 2019 - Elsevier
Abstract Internet of Things (IoT) is ubiquitous in society. IoT-enabled dynamic capabilities in
real-time sensing and responding can spur digital transformation in unlocking the potential …

The hidden threat of cyber-attacks–undermining public confidence in government

R Shandler, MA Gomez - Journal of Information Technology & …, 2023 - Taylor & Francis
This paper argues that the primary threat posed by cyber-attacks is not cataclysmic physical
destruction-but rather more insidious societal risks such as reduced trust in government. To …

Develo** a modified total interpretive structural model (M-TISM) for organizational strategic cybersecurity management

R Rajan, NP Rana, N Parameswar, S Dhir… - … Forecasting and Social …, 2021 - Elsevier
Cybersecurity is a serious issue that many organizations face these days. Therefore,
cybersecurity management is very important for any organization. Organizations should …

Assessing information security risks in the cloud: A case study of Australian local government authorities

O Ali, A Shrestha, A Chatfield, P Murray - Government Information Quarterly, 2020 - Elsevier
Cloud computing enables cost-effective and scalable growth of IT services that can enhance
government services. Despite the Australian Federal Government's 'cloud-first'strategy and …

Building cyber security awareness in a develo** country: lessons from Myanmar

LYC Chang, N Coppel - Computers & Security, 2020 - Elsevier
The paper discusses the arguments for inclusion of cybersecurity awareness building in
development assistance programs. We note that cybersecurity awareness building can …

Enhancing the public value of mobile fintech services through cybersecurity awareness antecedents: A novel framework in Jordan

H Alhanatleh, A Khaddam… - Investment …, 2024 - search.proquest.com
The study aimed to link cybersecurity awareness and its antecedents to discover the level of
public value of using mobile financial services from the perspective of'citizens in the …

[HTML][HTML] Adaptive governance of autonomous vehicles: Accelerating the adoption of disruptive technologies in Singapore

SY Tan, A Taeihagh - Government Information Quarterly, 2021 - Elsevier
Despite their promise, there have been discussions surrounding the technological risks of
autonomous vehicles (AVs) and the extent to which AVs are ready for large-scale …