Applying generative machine learning to intrusion detection: A systematic map** study and review
Intrusion Detection Systems (IDSs) are an essential element of modern cyber defense,
alerting users to when and where cyber-attacks occur. Machine learning can enable IDSs to …
alerting users to when and where cyber-attacks occur. Machine learning can enable IDSs to …
[PDF][PDF] A review of metaverse and cybersecurity in the digital era
Purpose–Adoption of the metaverse may increase cybersecurity risks. This study evaluates
the literature on metaverse and cybersecurity in the digital era. Method–A narrative …
the literature on metaverse and cybersecurity in the digital era. Method–A narrative …
IoT and AI for smart government: A research agenda
Abstract The Internet of things (IoT) is the network of objects/things that contain electronics,
software, sensors, and actuators, which allows these things to connect, interact, and …
software, sensors, and actuators, which allows these things to connect, interact, and …
A framework for Internet of Things-enabled smart government: A case of IoT cybersecurity policies and use cases in US federal government
Abstract Internet of Things (IoT) is ubiquitous in society. IoT-enabled dynamic capabilities in
real-time sensing and responding can spur digital transformation in unlocking the potential …
real-time sensing and responding can spur digital transformation in unlocking the potential …
The hidden threat of cyber-attacks–undermining public confidence in government
This paper argues that the primary threat posed by cyber-attacks is not cataclysmic physical
destruction-but rather more insidious societal risks such as reduced trust in government. To …
destruction-but rather more insidious societal risks such as reduced trust in government. To …
Develo** a modified total interpretive structural model (M-TISM) for organizational strategic cybersecurity management
Cybersecurity is a serious issue that many organizations face these days. Therefore,
cybersecurity management is very important for any organization. Organizations should …
cybersecurity management is very important for any organization. Organizations should …
Assessing information security risks in the cloud: A case study of Australian local government authorities
Cloud computing enables cost-effective and scalable growth of IT services that can enhance
government services. Despite the Australian Federal Government's 'cloud-first'strategy and …
government services. Despite the Australian Federal Government's 'cloud-first'strategy and …
Building cyber security awareness in a develo** country: lessons from Myanmar
LYC Chang, N Coppel - Computers & Security, 2020 - Elsevier
The paper discusses the arguments for inclusion of cybersecurity awareness building in
development assistance programs. We note that cybersecurity awareness building can …
development assistance programs. We note that cybersecurity awareness building can …
Enhancing the public value of mobile fintech services through cybersecurity awareness antecedents: A novel framework in Jordan
The study aimed to link cybersecurity awareness and its antecedents to discover the level of
public value of using mobile financial services from the perspective of'citizens in the …
public value of using mobile financial services from the perspective of'citizens in the …
[HTML][HTML] Adaptive governance of autonomous vehicles: Accelerating the adoption of disruptive technologies in Singapore
SY Tan, A Taeihagh - Government Information Quarterly, 2021 - Elsevier
Despite their promise, there have been discussions surrounding the technological risks of
autonomous vehicles (AVs) and the extent to which AVs are ready for large-scale …
autonomous vehicles (AVs) and the extent to which AVs are ready for large-scale …