[HTML][HTML] Cyber threat intelligence using PCA-DNN model to detect abnormal network behavior

M Al-Fawa'reh, M Al-Fayoumi, S Nashwan… - Egyptian Informatics …, 2022 - Elsevier
Security issues are the most critical challenges facing new technologies associated with the
internet of things (IoT), big data, and cloud computing. A secure and efficient intrusion …

[HTML][HTML] Perspectives of non-expert users on cyber security and privacy: An analysis of online discussions on twitter

N Pattnaik, S Li, JRC Nurse - Computers & Security, 2023 - Elsevier
Many researchers have studied non-expert users' perspectives of cyber security and privacy
aspects of computing devices at home, but their studies are mostly small-scale empirical …

An Experiment to Prevent Malicious Actors from Compromising Private Digital Assets Over a Public Network

F Hartanto, B Budiman, E Gwei… - Engineering …, 2024 - journal.binus.ac.id
In the current millennium, human society has immensely improved its ability to obtain and
distribute information. This change on the other hand, has caused the majority of daily …

Moving from Risk Factors to Positive Online Behaviors: An integrated behavioral change approach

T Smith, ER Leukfeldt… - … International Handbook of …, 2023 - taylorfrancis.com
This chapter introduces a fresh perspective on the study of online deviance by shifting the
focus from risk factors to the promotion of protective behaviors. It proposes a person-centric …

Функції міжнаціональних команд віддаленої підтримки кінцевих користувачів інформаційних систем в глобальному ІТ підприємстві

ОО Мороз, ОВ Кисса - Innovation and Sustainability.№ 4: 6-18., 2023 - ir.lib.vntu.edu.ua
В статті досліджено та проаналізовано функції та моделі міжнаціональних команд
технічної підтримки в глобальних ІТ компаніях у контексті постійної модернізації …

Cybersecurity Management for Virtual Private Network (VPN) Applications: A Proposed Framework for the Governance of their Use in the Kingdom of Saudi Arabia

SA Alashi, HA Aldahawi - Journal of Information Security and …, 2020 - journals.nauss.edu.sa
By using the research process, this study addresses the attitudes of the members of Saudi
society towards using Virtual Private Network (VPN) applications and the former's …

Functions of international remote end-user support teams of information systems in a global IT company

O Moroz, O Kyssa - Innovation and Sustainability, 2023 - inns.com.ua
The article studied and analyzed the functions and models of international technical support
teams in global IT companies in the context of continuous modernization of information …

Solución basada en herramientas de software libre para la implementación del teletrabajo online en empresas cubanas

R Perdigón Llanes, IR Madrigal Leiva - Revista Cubana de Ciencias …, 2022 - scielo.sld.cu
En la actualidad la adopción del teletrabajo constituye un tema de interés para empresas y
negocios. Sin embargo, su utilización en países en desarrollo como Cuba es incipiente …

Analysing information technology risks affecting South African government employers due to remote working

BS Mahlangu, B Schutte - Journal for New Generation Sciences, 2024 - journals.co.za
The COVID-19 pandemic has prompted organisations to adopt remote working, raising
concerns about information security and cybersecurity. The steady rise in remote working …