Journal articles on the topic 'Cybersecurity risk management'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the top 50 journal articles for your research on the topic 'Cybersecurity risk management.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.
Eaton, Tim V., Jonathan H. Grenier, and David Layman. "Accounting and Cybersecurity Risk Management." Current Issues in Auditing 13, no. 2 (March 1, 2019): C1—C9. http://dx.doi.org/10.2308/ciia-52419.
Full textBurrell, Darrell Norman. "Understanding Healthcare Cybersecurity Risk Management Complexity." Land Forces Academy Review 29, no. 1 (February 28, 2024): 38–49. http://dx.doi.org/10.2478/raft-2024-0004.
Full textBriscoe, Christopher, and Carl Young. "Scale, Complexity, and Cybersecurity Risk Management." Journal of Information Security 15, no. 04 (2024): 524–44. http://dx.doi.org/10.4236/jis.2024.154029.
Full textOlawoyin, Olayinka Michael. "Blockchain Technology in Risk Management: Strengthening Cybersecurity and Financial Integrity." International Journal of Research Publication and Reviews 5, no. 10 (October 2024): 2336–48. http://dx.doi.org/10.55248/gengpi.5.1024.2829.
Full textAdebayo Omowunmi Temitope, LawalYusufAdedayo, and Braimoh Kareem. "Cybersecurity risk management in agile development: protecting data and system." International Journal of Science and Research Archive 8, no. 1 (February 28, 2023): 988–94. http://dx.doi.org/10.30574/ijsra.2023.8.1.0188.
Full textKeskin, Omer F., Kevin Matthe Caramancion, Irem Tatar, Owais Raza, and Unal Tatar. "Cyber Third-Party Risk Management: A Comparison of Non-Intrusive Risk Scoring Reports." Electronics 10, no. 10 (May 13, 2021): 1168. http://dx.doi.org/10.3390/electronics10101168.
Full textLi, He, Won Gyun No, and Tawei Wang. "SEC's cybersecurity disclosure guidance and disclosed cybersecurity risk factors." International Journal of Accounting Information Systems 30 (September 2018): 40–55. http://dx.doi.org/10.1016/j.accinf.2018.06.003.
Full textChebib, Tom. "Digital Identity: A Human-Centered Risk Awareness Study." Muma Business Review 5 (2021): 031–33. http://dx.doi.org/10.28945/4826.
Full textKure, Halima Ibrahim, and Shareeful Islam. "Assets focus risk management framework for critical infrastructure cybersecurity risk management." IET Cyber-Physical Systems: Theory & Applications 4, no. 4 (December 1, 2019): 332–40. http://dx.doi.org/10.1049/iet-cps.2018.5079.
Full textLee, In. "Internet of Things (IoT) Cybersecurity: Literature Review and IoT Cyber Risk Management." Future Internet 12, no. 9 (September 18, 2020): 157. http://dx.doi.org/10.3390/fi12090157.
Full textFolorunsho, O. S., A. Q. Ayinde, M. A. Olagoke, and O. E. Fatoye. "Implementation of Cybersecurity Risk Theory and Model in Healthcare." Advances in Multidisciplinary and scientific Research Journal Publication 13, no. 4 (December 30, 2022): 65–72. http://dx.doi.org/10.22624/aims/cisdi/v13n4p4.
Full textWright, Jorja. "Healthcare cybersecurity and cybercrime supply chain risk management." Health Economics and Management Review 4, no. 4 (December 31, 2023): 17–27. http://dx.doi.org/10.61093/hem.2023.4-02.
Full textMąkosa, Grzegorz. "Risk management as a determinant of cybersecurity." Nowoczesne Systemy Zarządzania 14, no. 3 (January 22, 2021): 67–80. http://dx.doi.org/10.37055/nsz/132731.
Full textAbdulrahim, Nabihah R., Daniel O. Orwa, and Christopher A. Moturi. "Towards adequate cybersecurity risk management in SMEs." International Journal of Business Continuity and Risk Management 11, no. 4 (2021): 343. http://dx.doi.org/10.1504/ijbcrm.2021.10043709.
Full textKhan, Ashraf, and Majid Malaika. "Central Bank Risk Management, Fintech, and Cybersecurity." IMF Working Papers 2021, no. 105 (April 2021): 1. http://dx.doi.org/10.5089/9781513582344.001.
Full textBrandao, Pedro, and Paulo Branco. "Cybersecurity risk management in the industry 4.0." International Journal of Scientific Research and Management 10, no. 03 (March 2, 2022): 747–54. http://dx.doi.org/10.18535/ijsrm/v10i3.ec01.
Full textMoturi, Christopher A., Nabihah R. Abdulrahim, and Daniel O. Orwa. "Towards adequate cybersecurity risk management in SMEs." International Journal of Business Continuity and Risk Management 11, no. 4 (2021): 343. http://dx.doi.org/10.1504/ijbcrm.2021.119943.
Full textSuryaprakash Nalluri, Murali Mohan Malyala, SukanyaKonatam, and Kiran Kumar Kandagiri. "Cybersecurity risk management in cloud computing environment." International Journal of Science and Research Archive 10, no. 1 (October 30, 2023): 1062–68. http://dx.doi.org/10.30574/ijsra.2023.10.1.1127.
Full textShikhaliyev, Ramiz H. "CYBERSECURITY RISKS MANAGEMENT OF INDUSTRIAL CONTROL SYSTEMS: A REVIEW." Problems of Information Technology 15, no. 1 (January 26, 2024): 37–43. http://dx.doi.org/10.25045/jpit.v15.i1.05.
Full textMelaku, Henock Mulugeta. "Context-Based and Adaptive Cybersecurity Risk Management Framework." Risks 11, no. 6 (May 31, 2023): 101. http://dx.doi.org/10.3390/risks11060101.
Full textGanin, Alexander A., Phuoc Quach, Mahesh Panwar, Zachary A. Collier, Jeffrey M. Keisler, Dayton Marchese, and Igor Linkov. "Multicriteria Decision Framework for Cybersecurity Risk Assessment and Management." Risk Analysis 40, no. 1 (September 5, 2017): 183–99. http://dx.doi.org/10.1111/risa.12891.
Full textOhrt, Andrew, Kevin M. Morley, Dan Groves, and Joel Cox. "Tackle Cybersecurity and AWIA Compliance With AWWA's New Cybersecurity Risk Management Tool." Journal - American Water Works Association 112, no. 3 (March 2020): 70–73. http://dx.doi.org/10.1002/awwa.1466.
Full textSong, Ju Myung, Tawei Wang, Ju-Chun Yen, and Yu-Hung Chen. "Does cybersecurity maturity level assurance improve cybersecurity risk management in supply chains?" International Journal of Accounting Information Systems 54 (September 2024): 100695. http://dx.doi.org/10.1016/j.accinf.2024.100695.
Full textNkambule, Mafika, and Joey Jansen van Vuuren. "Integrating Enterprise Architecture into Cybersecurity Risk Management in Higher Education." International Conference on Cyber Warfare and Security 19, no. 1 (March 21, 2024): 501–10. http://dx.doi.org/10.34190/iccws.19.1.2189.
Full textGoel, Rajni, Anupam Kumar, and James Haddow. "PRISM: a strategic decision framework for cybersecurity risk assessment." Information & Computer Security 28, no. 4 (June 19, 2020): 591–625. http://dx.doi.org/10.1108/ics-11-2018-0131.
Full textShires, James. "Enacting Expertise: Ritual and Risk in Cybersecurity." Politics and Governance 6, no. 2 (June 11, 2018): 31–40. http://dx.doi.org/10.17645/pag.v6i2.1329.
Full textGao, Lei, Thomas G. Calderon, and Fengchun Tang. "Public companies' cybersecurity risk disclosures." International Journal of Accounting Information Systems 38 (September 2020): 100468. http://dx.doi.org/10.1016/j.accinf.2020.100468.
Full textKuhlman, Richard, and Jason Kempf. "FINRA publishes its 2015 “Report on Cybersecurity Practices”." Journal of Investment Compliance 16, no. 2 (July 6, 2015): 47–51. http://dx.doi.org/10.1108/joic-04-2015-0025.
Full textAbel Uzoka, Emmanuel Cadet, and Pascal Ugochukwu Ojukwu. "Applying artificial intelligence in Cybersecurity to enhance threat detection, response, and risk management." Computer Science & IT Research Journal 5, no. 10 (October 24, 2024): 2511–38. http://dx.doi.org/10.51594/csitrj.v5i10.1677.
Full textGunawan, Budi, Barito Mulyo Ratmono, Denok Kurniasih, and Paulus Israwan Setyoko. "Cybersecurity effectiveness: The role of internal auditor certification, risk assessment and senior management." International Journal of Data and Network Science 7, no. 4 (2023): 1805–14. http://dx.doi.org/10.5267/j.ijdns.2023.7.011.
Full textSaveliev, D. V. "Risk Management and Assessment in Software Development Projects." Èlektronnoe modelirovanie 43, no. 4 (August 2, 2021): 113–24. http://dx.doi.org/10.15407/emodel.43.04.113.
Full textVeiga, Bruna. "Evolution of Compliance and Cybersecurity: A Risk Management Perspective in Financial Markets." International Journal of Science and Research (IJSR) 13, no. 10 (October 5, 2024): 1205–7. http://dx.doi.org/10.21275/sr241011004135.
Full textSinggalen, Yerik Afrianto, Hindriyanto Dwi Purnomo, and Irwan Sembiring. "Exploring MSMEs Cybersecurity Awareness and Risk Management : Information Security Awareness." IJCCS (Indonesian Journal of Computing and Cybernetics Systems) 15, no. 3 (July 31, 2021): 233. http://dx.doi.org/10.22146/ijccs.67010.
Full textOkolo, Francess, and Arume Ighoroje. "Security Awareness Programs and Behavioral Patterns in Nigeria Deposit Money Banks: Adopting a Robust Cybersecurity Culture." International Journal of Research and Innovation in Social Science VIII, no. VI (2024): 239–56. http://dx.doi.org/10.47772/ijriss.2024.806019.
Full textLee, In. "Cybersecurity: Risk management framework and investment cost analysis." Business Horizons 64, no. 5 (September 2021): 659–71. http://dx.doi.org/10.1016/j.bushor.2021.02.022.
Full textRoldán Álvarez, Miguel Ángel, and Héctor Fernando Vargas Montoya. "Cybersecurity in Mobile Telecommunication Networks and Management Risk." Ingeniería y Desarrollo 38, no. 2 (March 2, 2021): 279–97. http://dx.doi.org/10.14482/inde.38.2.006.31.
Full textCam, Hasan, and Pierre Mouallem. "Mission assurance policy and risk management in cybersecurity." Environment Systems and Decisions 33, no. 4 (August 30, 2013): 500–507. http://dx.doi.org/10.1007/s10669-013-9468-z.
Full textKim, Dong-Won, Jin-Young Choi, and Keun-Hee Han. "Medical Device Safety Management Using Cybersecurity Risk Analysis." IEEE Access 8 (2020): 115370–82. http://dx.doi.org/10.1109/access.2020.3003032.
Full textYang, Ling, Linda Lau, and Huiqi Gan. "Investors’ perceptions of the cybersecurity risk management reporting framework." International Journal of Accounting & Information Management 28, no. 1 (January 13, 2020): 167–83. http://dx.doi.org/10.1108/ijaim-02-2019-0022.
Full textUngureanu, Mirela-Alexandra, Eugen Gavan, and Carmen Gasparotti. "Securing innovation at sea: Cyber risk management for SMEs in ship design." Analele Universităţii "Dunărea de Jos" din Galaţi. Fascicula XI, Construcţii navale/ Annals of "Dunărea de Jos" of Galati, Fascicle XI, Shipbuilding 47 (December 4, 2024): 89–100. https://doi.org/10.35219/annugalshipbuilding/2024.47.11.
Full textUlven, Joachim Bjørge, and Gaute Wangen. "A Systematic Review of Cybersecurity Risks in Higher Education." Future Internet 13, no. 2 (February 2, 2021): 39. http://dx.doi.org/10.3390/fi13020039.
Full textde Peralta, Fleurdeliza A., Mark D. Watson, Ryan M. Bays, Joshua R. Boles, and Ford E. Powers. "Cybersecurity Resiliency of Marine Renewable Energy Systems Part 2: Cybersecurity Best Practices and Risk Management." Marine Technology Society Journal 55, no. 2 (March 1, 2021): 104–16. http://dx.doi.org/10.4031/mtsj.55.2.4.
Full textLam, Maria Lai-Ling, and Kei-Wing Wong. "Shared Cybersecurity Risk Management in the Industry of Medical Devices." International Journal of Cyber-Physical Systems 3, no. 1 (January 1, 2021): 37–56. http://dx.doi.org/10.4018/ijcps.2021010103.
Full textTemitayo Oluwaseun Abrahams, Oluwatoyin Ajoke Farayola, Simon Kaggwa, Prisca Ugomma Uwaoma, Azeez Olanipekun Hassan, and Samuel Onimisi Dawodu. "REVIEWING THIRD-PARTY RISK MANAGEMENT: BEST PRACTICES IN ACCOUNTING AND CYBERSECURITY FOR SUPERANNUATION ORGANIZATIONS." Finance & Accounting Research Journal 6, no. 1 (January 10, 2024): 21–39. http://dx.doi.org/10.51594/farj.v6i1.706.
Full textStraub, PhD, Jeremy. "Cyber-mitigation: Cybersecurity emergency management." Journal of Emergency Management 18, no. 6 (November 1, 2020): 463–73. http://dx.doi.org/10.5055/jem.2020.0517.
Full textHamdan, Basil. "Simulating Cybersecurity Risk Using Advanced Quantitative Risk Assessment Techniques." Journal of The Colloquium for Information Systems Security Education 10, no. 1 (March 8, 2023): 5. http://dx.doi.org/10.53735/cisse.v10i1.169.
Full textPanchamia, Virti, Archita Harchwani, and Tirath Momaya. "Cybersecurity Renaissance: Navigating Threats, Ethical Hacking, and Risk Mitigation in the Digital Era." INTERANTIONAL JOURNAL OF SCIENTIFIC RESEARCH IN ENGINEERING AND MANAGEMENT 08, no. 01 (January 15, 2024): 1–10. http://dx.doi.org/10.55041/ijsrem28181.
Full textFerreira, Daniel Jorge, and Henrique São Mamede. "Predicting Cybersecurity Risk - A Methodology for Assessments." ARIS2 - Advanced Research on Information Systems Security 2, no. 2 (December 30, 2022): 50–63. http://dx.doi.org/10.56394/aris2.v2i2.23.
Full textThapaliya, Suman. "Examining the Influence of AI-Driven Cybersecurity in Financial Sector Management." Batuk 10, no. 2 (July 30, 2024): 129–44. http://dx.doi.org/10.3126/batuk.v10i2.68147.
Full textSalin, Hannes, and Martin Lundgren. "Towards Agile Cybersecurity Risk Management for Autonomous Software Engineering Teams." Journal of Cybersecurity and Privacy 2, no. 2 (April 13, 2022): 276–91. http://dx.doi.org/10.3390/jcp2020015.
Full text