Journal articles on the topic 'Cybersecurity certification'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the top 50 journal articles for your research on the topic 'Cybersecurity certification.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.
Al Harrack, Micheline. "Connecting O*Net® Database to Cybersecurity Workforce Professional Certifications." International Journal on Integrating Technology in Education 10, no. 2 (June 30, 2021): 65–76. http://dx.doi.org/10.5121/ijite.2021.10206.
Full textWang, Ping, and Hubert D'Cruze. "Certifications in Cybersecurity Workforce Development." International Journal of Hyperconnectivity and the Internet of Things 3, no. 2 (July 2019): 38–57. http://dx.doi.org/10.4018/ijhiot.2019070104.
Full textTsvilii, Olena. "Cybersecurity regulation: cybersecurity certification of operational technologies." Technology audit and production reserves 1, no. 2(57) (February 28, 2021): 54–60. http://dx.doi.org/10.15587/2706-5448.2021.225271.
Full textTsvilii, Olena. "SYSTEM OF CERTIFICATION OF CYBERSECURITY OF INFORMATION AND COMMUNICATIONS TECHNOLOGIES." Proceedings of the O.S. Popov ОNAT 1, no. 2 (December 31, 2020): 121–34. http://dx.doi.org/10.33243/2518-7139-2020-1-2-121-134.
Full textAnanda, Safrida, Ika Putranti, and Andi Dir. "ANALYSIS OF THE EU CYBERSECURITY ACT UNDER THE THEORY OF NEOLIBERAL INSTITUTIONALISM." Arena Hukum 15, no. 1 (April 28, 2022): 176–99. http://dx.doi.org/10.21776/ub.arenahukum.2022.01501.9.
Full textGunawan, Budi, Barito Mulyo Ratmono, Denok Kurniasih, and Paulus Israwan Setyoko. "Cybersecurity effectiveness: The role of internal auditor certification, risk assessment and senior management." International Journal of Data and Network Science 7, no. 4 (2023): 1805–14. http://dx.doi.org/10.5267/j.ijdns.2023.7.011.
Full textMitrakas, Andreas. "The emerging EU framework on cybersecurity certification." Datenschutz und Datensicherheit - DuD 42, no. 7 (June 29, 2018): 411–14. http://dx.doi.org/10.1007/s11623-018-0969-2.
Full textColeman, Joe. "The DOD's CMMC 2.0: What Heat Treaters Need to Know." AM&P Technical Articles 182, no. 2 (March 1, 2024): 37–39. http://dx.doi.org/10.31399/asm.amp.2024-02.p037.
Full textFleming, Courtney, Mark Reith, and Wayne Henry. "Securing Commercial Satellites for Military Operations: A Cybersecurity Supply Chain Framework." International Conference on Cyber Warfare and Security 18, no. 1 (February 28, 2023): 85–92. http://dx.doi.org/10.34190/iccws.18.1.1062.
Full textNikolov, Borislav. "Maritime Cybersecurity Education and Training at Nikola Vaptsarov Naval Academy." Pedagogika-Pedagogy 95, no. 6s (August 29, 2023): 48–55. http://dx.doi.org/10.53656/ped2023-6s.05.
Full textRazikin, Khairur, and Agus Widodo. "General Cybersecurity Maturity Assessment Model: Best Practice to Achieve Payment Card Industry-Data Security Standard (PCI-DSS) Compliance." CommIT (Communication and Information Technology) Journal 15, no. 2 (August 31, 2021): 91–104. http://dx.doi.org/10.21512/commit.v15i2.6931.
Full textDawson, Maurice. "Applying a holistic cybersecurity framework for global IT organizations." Business Information Review 35, no. 2 (May 8, 2018): 60–67. http://dx.doi.org/10.1177/0266382118773624.
Full textNowrozy, Raza. "GPTs or Grim Position Threats? The Potential Impacts of Large Language Models on Non-Managerial Jobs and Certifications in Cybersecurity." Informatics 11, no. 3 (July 11, 2024): 45. http://dx.doi.org/10.3390/informatics11030045.
Full textLevy, Yair, and Ruti Gafni. "Towards the quantification of cybersecurity footprint for SMBs using the CMMC 2.0." Online Journal of Applied Knowledge Management 10, no. 1 (September 6, 2022): 43–61. http://dx.doi.org/10.36965/ojakm.2022.10(1)43-61.
Full textNwankwo, Iheanyi, Marc Stauch, Panagiotis Radoglou-Grammatikis, Panagiotis Sarigiannidis, George Lazaridis, Anastasios Drosou, and Dimitrios Tzovaras. "Data Protection and Cybersecurity Certification Activities and Schemes in the Energy Sector." Electronics 11, no. 6 (March 21, 2022): 965. http://dx.doi.org/10.3390/electronics11060965.
Full textHernandez-Ramos, Jose L., Sara N. Matheu, and Antonio Skarmeta. "The Challenges of Software Cybersecurity Certification [Building Security In]." IEEE Security & Privacy 19, no. 1 (January 2021): 99–102. http://dx.doi.org/10.1109/msec.2020.3037845.
Full textKipker, Dennis-Kenji. "EU Cybersecurity Act und Certification Schemes: ein aktueller Fortschrittsbericht." Datenschutz und Datensicherheit - DuD 44, no. 4 (March 16, 2020): 263–65. http://dx.doi.org/10.1007/s11623-020-1264-6.
Full textMartinez, Cristina, Iñaki Etxaniz, Alberto Molinuevo, and Juncal Alonso. "MEDINA Catalogue of Cloud Security controls and metrics: Towards Continuous Cloud Security compliance." Open Research Europe 4 (April 24, 2024): 90. http://dx.doi.org/10.12688/openreseurope.16669.1.
Full textIslam, Md Shariful, Nusrat Farah, and Thomas F. Stafford. "Factors associated with security/cybersecurity audit by internal audit function." Managerial Auditing Journal 33, no. 4 (April 3, 2018): 377–409. http://dx.doi.org/10.1108/maj-07-2017-1595.
Full textMatheu, Sara N., Jose L. Hernandez-Ramos, and Antonio F. Skarmeta. "Toward a Cybersecurity Certification Framework for the Internet of Things." IEEE Security & Privacy 17, no. 3 (May 2019): 66–76. http://dx.doi.org/10.1109/msec.2019.2904475.
Full textMatheu, Sara N., José L. Hernández-Ramos, Antonio F. Skarmeta, and Gianmarco Baldini. "A Survey of Cybersecurity Certification for the Internet of Things." ACM Computing Surveys 53, no. 6 (December 29, 2020): 1–36. http://dx.doi.org/10.1145/3410160.
Full textBenyahya, Meriem, Anastasija Collen, and Niels Alexander Nijdam. "Cybersecurity and Data Privacy Certification Gaps of Connected and Automated Vehicles." Transportation Research Procedia 72 (2023): 783–90. http://dx.doi.org/10.1016/j.trpro.2023.11.468.
Full textMincewicz, Wojciech. "EDUCATION IN THE FIELD OF CYBERSECURITY AT UNIVERSITIES IN POLAND." Zeszyty Naukowe SGSP 86 (June 26, 2023): 117–25. http://dx.doi.org/10.5604/01.3001.0053.7149.
Full textKipker, Dennis-Kenji. "EU Cybersecurity Act and Certification Schemes: an up-to-date progress report." Datenschutz und Datensicherheit - DuD 44, no. 6 (May 14, 2020): 390–92. http://dx.doi.org/10.1007/s11623-020-1290-4.
Full textAzzani, Ihsania Karin, Susilo Adi Purwantoro, and Hikmat Zakky Almubarok. "Enhancing awareness of cyber crime: a crucial element in confronting the challenges of hybrid warfare In Indonesia." Defense and Security Studies 5 (January 5, 2024): 1–9. http://dx.doi.org/10.37868/dss.v5.id255.
Full textPuchkov, Oleksandr, and Оlena Uvarkina. "Sustainable development of the system of formal cyber education: reflection of modern concepts." Collection "Information Technology and Security" 11, no. 1 (June 29, 2023): 60–68. http://dx.doi.org/10.20535/2411-1031.2023.11.1.283635.
Full textMatheu-García, Sara N., José L. Hernández-Ramos, Antonio F. Skarmeta, and Gianmarco Baldini. "Risk-based automated assessment and testing for the cybersecurity certification and labelling of IoT devices." Computer Standards & Interfaces 62 (February 2019): 64–83. http://dx.doi.org/10.1016/j.csi.2018.08.003.
Full textBotha-Badenhorst, Danielle, André Martin McDonald, Graham David Barbour, Ethan Buckinjohn, and Wian Gertenbach. "On The Zero-Trust Intranet Certification Problem." International Conference on Cyber Warfare and Security 19, no. 1 (March 21, 2024): 10–18. http://dx.doi.org/10.34190/iccws.19.1.2054.
Full textIto, Kosuke, Shuji Morisaki, and Atsuhiro Goto. "IoT Security-Quality-Metrics Method and Its Conformity with Emerging Guidelines." IoT 2, no. 4 (December 15, 2021): 761–85. http://dx.doi.org/10.3390/iot2040038.
Full textPorche, Joshua, and Shawon Rahman. "Security Culture, Top Management, and Training on Security Effectiveness: A Correlational Study Without CISSP Participants." International journal of Computer Networks & Communications 15, no. 2 (March 30, 2023): 81–104. http://dx.doi.org/10.5121/ijcnc.2023.15205.
Full textLisboa Malaquias, Felipe, Georgios Giantamidis, Stylianos Basagiannis, Simone Fulvio Rollini, and Isaac Amundson. "Towards a Methodology to Design Provably Secure Cyber-physical Systems." ACM SIGAda Ada Letters 43, no. 1 (October 30, 2023): 94–99. http://dx.doi.org/10.1145/3631483.3631499.
Full textGonzalez-Amarillo, Carlos Andrés, Anabel Fraga Vazquez, Gustavo Adolfo Ramirez-Gonzalez, Miguel Angel Mendoza-Moreno, and Juan Carlos Corrales Muñoz. "BIoTS-Path: Certification Transmission of Supply Chains Based on Blockchain–Internet of Things Architectures by Validating the Information Path." Mathematics 11, no. 19 (September 28, 2023): 4108. http://dx.doi.org/10.3390/math11194108.
Full textPark, Na-Eun, So-Hyun Park, Ye-Sol Oh, Jung-Hyun Moon, and Il-Gu Lee. "Distributed Authentication Model for Secure Network Connectivity in Network Separation Technology." Sensors 22, no. 2 (January 12, 2022): 579. http://dx.doi.org/10.3390/s22020579.
Full textShort, Hannah, David Kelsey, Romain Wartel, David Groep, Urpo Kaila, Ralph Niederberger, and Nicole Harris. "WISE Information Security for Collaborating e-Infrastructures." EPJ Web of Conferences 214 (2019): 03041. http://dx.doi.org/10.1051/epjconf/201921403041.
Full textKayisoglu, Gizem, Pelin Bolat, and Emre Duzenli. "Modelling of Maritime Cyber Security Education and Training." Pedagogika-Pedagogy 95, no. 6s (August 29, 2023): 64–78. http://dx.doi.org/10.53656/ped2023-6s.07.
Full textIvasiuk, Oleksandr, and Vyacheslav Kharchenko. "Використання методу верифікації FMEDA/FIT для оцінювання кібербезпеки програмованого логічного контролера: нова інтерпретація принципу SIS." Aerospace Technic and Technology, no. 1 (February 27, 2024): 76–90. http://dx.doi.org/10.32620/aktt.2024.1.07.
Full textAhmed, Adel A. "Lightweight Digital Certificate Management and Efficacious Symmetric Cryptographic Mechanism over Industrial Internet of Things." Sensors 21, no. 8 (April 16, 2021): 2810. http://dx.doi.org/10.3390/s21082810.
Full textChetry, Arjun, and Uzzal Sharma. "Anonymity in decentralized apps: Study of implications for cybercrime investigations." International Journal of Experimental Research and Review 32 (August 30, 2023): 195–205. http://dx.doi.org/10.52756/ijerr.2023.v32.017.
Full textScovia, Apio, and Asiimwe Jonath. "The Electronic Government Procurement System in Uganda; Challenges and Benefits." International Journal of Research and Innovation in Social Science VIII, no. VI (2024): 2598–606. http://dx.doi.org/10.47772/ijriss.2024.806199.
Full textMuzhanova, Tetiana, Svitlana Lehominova, Yurii Shchavinsky, Yuriy Yakymenko, and Halyna Nesterenko. "MAIN APPROACHES AND DIRECTIONS OF DEVELOPMENT OF EUROPEAN UNION CYBER SECURITY POLICY." Cybersecurity: Education, Science, Technique 4, no. 24 (2024): 133–49. http://dx.doi.org/10.28925/2663-4023.2024.24.133149.
Full textVasiliev, S. A., I. A. Nikonova, and O. S. Miroshnichenko. "Banks, Financial Platforms and Big Data: Development Trends and Regulation Directions." Financial Journal 14, no. 5 (October 2022): 105–19. http://dx.doi.org/10.31107/2075-1990-2022-5-105-119.
Full textMeng, Baoluo, Daniel Larraz, Kit Siu, Abha Moitra, John Interrante, William Smith, Saswata Paul, et al. "VERDICT: A Language and Framework for Engineering Cyber Resilient and Safe System." Systems 9, no. 1 (March 3, 2021): 18. http://dx.doi.org/10.3390/systems9010018.
Full textAcheampong, Felix. "Role of Emerging Technologies in Improving Procurement Efficiency and Effectiveness in Ghana." Global Journal of Purchasing and Procurement Management 3, no. 2 (July 5, 2024): 24–33. http://dx.doi.org/10.47604/gjppm.2770.
Full textBeveridge, Robert. "Effectiveness of Increasing Realism Into Cybersecurity Training." International Journal of Cyber Research and Education 2, no. 1 (January 2020): 40–54. http://dx.doi.org/10.4018/ijcre.2020010104.
Full textGudz, Liudmyla. "ENSURING HUMAN RIGHTS IN THE CONTEXT OF IMPLEMENTATION OF ELECTRONIC VOTING IN UKRAINE: PERSPECTIVES AND RISKS." Journal of V. N. Karazin Kharkiv National University, Series "Law", no. 37 (May 28, 2024): 67–75. http://dx.doi.org/10.26565/2075-1834-2024-37-07.
Full textLoo, Sin Ming, Elizabeth Khan, Eleanor Taylor, and Char Sample. "Transforming Cyber Education thru Open to All Accessible Pathways." Journal of The Colloquium for Information Systems Security Education 11, no. 1 (February 27, 2024): 6. http://dx.doi.org/10.53735/cisse.v11i1.188.
Full textBurrell, Darrell Norman. "An Exploration of the Critical Need for Formal Training in Leadership for Cybersecurity and Technology Management Professionals." International Journal of Hyperconnectivity and the Internet of Things 2, no. 1 (January 2018): 52–67. http://dx.doi.org/10.4018/ijhiot.2018010105.
Full textTran, Binh, Karen Benson, and Lorraine Jonassen. "Integrating certifications into the cybersecurity college curriculum: The efficacy of education with certifications to increase the cybersecurity workforce." Journal of Cybersecurity Education Research and Practice 2023, no. 2 (October 12, 2023). http://dx.doi.org/10.32727/8.2023.19.
Full textRamezan, Christopher, Paul Coffy, and Jared Lemons. "Building the Operational Technology (OT) Cybersecurity Workforce: What are Employers Looking for?" Journal of Cybersecurity Education Research and Practice 2024, no. 1 (October 16, 2023). http://dx.doi.org/10.32727/8.2023.31.
Full textTang, Fengchun, and Ling Yang. "The Effects of IT Management Certification Type and Corporate Social Responsibility Performance on Investors’ Responses to Cybersecurity Breaches." Journal of Information Systems, June 1, 2024, 1–16. http://dx.doi.org/10.2308/isys-2023-032.
Full text