Journal articles on the topic 'CyberSecurty'

To see the other types of publications on this topic, follow the link: CyberSecurty.

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the top 50 journal articles for your research on the topic 'CyberSecurty.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.

1

Ham, Jeroen Van Der. "Toward a Better Understanding of “Cybersecurity”." Digital Threats: Research and Practice 2, no. 3 (July 2021): 1–3. http://dx.doi.org/10.1145/3442445.

Full text
Abstract:
The term “cybersecurity” has gained widespread popularity but has not been defined properly. The term is used by many different people to mean different things in different contexts. A better understanding of “cybersecurity” will allow us a better understanding of what it means to be “cybersecure.” This in turn will allow us to take more appropriate measures to ensure actual cybersecurity.
APA, Harvard, Vancouver, ISO, and other styles
2

Calliess, Christian, and Ansgar Baumgarten. "Cybersecurity in the EU The Example of the Financial Sector: A Legal Perspective." German Law Journal 21, no. 6 (September 2020): 1149–79. http://dx.doi.org/10.1017/glj.2020.67.

Full text
Abstract:
AbstractCybersecurity in the financial sector is a dynamic and evolving policy field with unique challenges and specific characteristics. While it has recently received a lot of attention from disciplines like Economics and Politics, legal literature on this topic, especially with regard to EU law, still lags behind. This is surprising, given that cybersecurity in the EU is characterized by complex governance structures, a variety of legal sources, and a wide range of different rule makers and involved actors, and given that only a clear legal framework with efficient institutions at both EU and Member State level can provide for a safe digital environment. The purpose of this Article, therefore, is twofold: On the one hand, it aims to introduce the legal aspects of cybersecurity in the financial sector while taking stock of existing cybersecurity schemes, including their strengths and weaknesses from a legal perspective. On the other hand, it will set out key elements that cybersecurity regulation in the financial sector must respect in order to be effective and come up with reform proposals to make the EU financial sector more cybersecure.
APA, Harvard, Vancouver, ISO, and other styles
3

Campbell, Robert D. "Cybersecurity." ACM SIGCSE Bulletin 35, no. 2 (June 2003): 24–26. http://dx.doi.org/10.1145/782941.782965.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

BOHATY, ROCHELLE F. H. "CYBERSECURITY." Chemical & Engineering News 86, no. 44 (November 3, 2008): 18–20. http://dx.doi.org/10.1021/cen-v086n044.p018.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Pullin, Dennis W. "Cybersecurity." Frontiers of Health Services Management 35, no. 1 (2018): 3–12. http://dx.doi.org/10.1097/hap.0000000000000038.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

CACM Staff. "Cybersecurity." Communications of the ACM 60, no. 4 (March 24, 2017): 20–21. http://dx.doi.org/10.1145/3051455.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Maurer, Chris, Kevin Kim, Dan Kim, and Leon A. Kappelman. "Cybersecurity." Communications of the ACM 64, no. 2 (January 25, 2021): 28–30. http://dx.doi.org/10.1145/3399667.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Ratnayake, Deepthi. "Cybersecurity." ITNOW 64, no. 1 (February 17, 2022): 37. http://dx.doi.org/10.1093/itnow/bwac019.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Ratnayake, Deepthi. "Cybersecurity." ITNOW 64, no. 2 (May 12, 2022): 49. http://dx.doi.org/10.1093/itnow/bwac056.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Tagarev, Todor. "Intelligence, Crime and Cybersecurity." Information & Security: An International Journal 31 (2014): 05–06. http://dx.doi.org/10.11610/isij.3100.

Full text
APA, Harvard, Vancouver, ISO, and other styles
11

Backman, Sarah. "Organising National Cybersecurity Centres." Information & Security: An International Journal 32 (2015): 9–26. http://dx.doi.org/10.11610/isij.3206.

Full text
APA, Harvard, Vancouver, ISO, and other styles
12

Tasevski, Predrag. "Macedonian Path Towards Cybersecurity." Information & Security: An International Journal 32 (2015): 109–19. http://dx.doi.org/10.11610/isij.3204.

Full text
APA, Harvard, Vancouver, ISO, and other styles
13

CALATAYUD MARTÍ, PILAR, JULIAN ROMERO CHAVARRO, MARIO MONTAGUD AGUAR, LUCIA ARCOS USERO, MARTA GARCÍA PELLICER, and ALFREDO QUIJANO LÓPEZ. "THREE-LEVEL METHODOLOGY FOR SECURE AND EFFICIENT GRID INTEGRATION OF ELECTRIC VEHICLE." DYNA 96, no. 3 (May 1, 2021): 264–69. http://dx.doi.org/10.6036/10013.

Full text
Abstract:
The secure integration of electric vehicle (EV) plays a key role in the energy transition through a resilient and decarbonised economy. However, a massive EV penetration means a rise in electricity demand with negative consequences to the distribution systems (voltage drops, branches congestion, etc) if the charging infrastructure is not cybersecure and does not perform smart charging mechanisms. Furthermore, these new infrastructures and their operating procedures provide new chances to cyberattacks to be performed, aimed at either exploiting those grid vulnerabilities or acquiring some user’s private information. Therefore, to ease the secure integration of EV charging infrastructures in the future network, this paper presents a three-level actuation methodology for charging infrastructures, which includes active management of EV supply equipment (EVSE) to allow dynamic control of charges, installation of ancillary protection systems, planning of EVSE’s location within the distribution system and cybersecure management of the whole infrastructure. The presented methodology is based on a thorough analysis of the possible cyberattacks that may occur during the transactions of the charging process, as well as tests carried out on a real pilot, which demonstrate the possible impacts that an uncontrolled charging of the EV can have on the distribution network, thus identifying the vulnerabilities of the distribution network. Keywords: Smart Grid, electrification, electric vehicle, charging station, Charge point operator, cybersecurity, smart charging.
APA, Harvard, Vancouver, ISO, and other styles
14

Tsvilii, Olena. "Cybersecurity regulation: cybersecurity certification of operational technologies." Technology audit and production reserves 1, no. 2(57) (February 28, 2021): 54–60. http://dx.doi.org/10.15587/2706-5448.2021.225271.

Full text
Abstract:
The object of research is the system and schemes of conformity assessment (certification) of cybersecurity of operational technologies (OT), as a set of rules and procedures that describe the objects of certification, determine the specified requirements and provide a methodology for certification. The terminological base and conceptual apparatus of the study of cybersecurity certification of operational technologies are based on the international standard ISO 17000:2020 Conformity assessment – Vocabulary and general principles. Cybersecurity certification systems and schemes are based on assessment standards, the choice and application of which is not unambiguous and historically has many interpretations and application mechanisms. These standards consist of tools, policies, security concepts, security assurances, guidelines, risk management approaches, best practices, safeguards, and technologies. But they have, to one degree or another, a significant drawback – the complexity of transforming the results of information security assessment according to these standards into security guarantees with any wide international recognition. In the context of globalization, this significantly degrades the cybersecurity quality. The main hypothesis of research is that the cybersecurity quality can be improved by converging towards a common methodology that is based on agreed international standards and international best practice for certification. The question of the key role of cybersecurity for operational technologies, which become the basis for Economy 4.0 and are now considered as a new frontier of cybersecurity, is considered. The need to create a system and schemes for certification of OT cybersecurity based on international and European certification principles is shown. A hierarchical model of cybersecurity certification system assessment standards and a hierarchical model of agreements on mutual recognition of cybersecurity certificates have been developed, which will allow a systematic approach to the creation of a system and schemes for OT cybersecurity certification. This provides an opportunity for developers of systems and certification schemes to form OT cybersecurity certification systems based on the principles of wide cross-border recognition of OT cybersecurity certificates.
APA, Harvard, Vancouver, ISO, and other styles
15

Wang, Shouhong, and Hai Wang. "A Sociotechnical Systems Analysis of Knowledge Management for Cybersecurity." International Journal of Sociotechnology and Knowledge Development 13, no. 3 (July 2021): 77–94. http://dx.doi.org/10.4018/ijskd.2021070105.

Full text
Abstract:
Knowledge management (KM) is a tool to tackle cybersecurity issues, provided it emphasizes on the interrelated social, organizational, and technological factors involved in cybersecurity. This paper proposes a sociotechnical systems analysis framework of KM systems for cybersecurity. Specifically, it applies a sociotechnical systems approach to investigation of constructs of KM systems for cybersecurity and identifies five major constructs of KM systems for cybersecurity: roles of KM in cybersecurity, organizational framework of KM for cybersecurity, cybersecurity analytics process, tools of KM for cybersecurity, and system architecture of KM for cybersecurity. The five constructs in the proposed sociotechnical systems analysis framework are analyzed. The paper makes contribution to the growing information systems literature by presenting a special case of sociotechnical systems analysis. The sociotechnical systems analysis framework provides guidelines for the development of KM systems for cybersecurity in organizations.
APA, Harvard, Vancouver, ISO, and other styles
16

Craigen, Dan, Nadia Diakun-Thibault, and Randy Purse. "Defining Cybersecurity." Technology Innovation Management Review 4, no. 10 (October 30, 2014): 13–21. http://dx.doi.org/10.22215/timreview835.

Full text
APA, Harvard, Vancouver, ISO, and other styles
17

Craigen, Dan, Nadia Diakun-Thibault, and Randy Purse. "Defining Cybersecurity." Technology Innovation Management Review 4, no. 10 (October 30, 2014): 13–21. http://dx.doi.org/10.22215/timreview/835.

Full text
APA, Harvard, Vancouver, ISO, and other styles
18

Oleinik, Margarita, and Tatyana Porubel. "Agroholdings cybersecurity." Proceedings of the Kuban State Agrarian University 1, no. 78 (2019): 33–41. http://dx.doi.org/10.21515/1999-1703-78-33-41.

Full text
APA, Harvard, Vancouver, ISO, and other styles
19

Talbot, Edward B., Deborah Frincke, and Matt Bishop. "Demythifying Cybersecurity." IEEE Security & Privacy Magazine 8, no. 3 (May 2010): 56–59. http://dx.doi.org/10.1109/msp.2010.95.

Full text
APA, Harvard, Vancouver, ISO, and other styles
20

Kim, Lee. "Cybersecurity awareness." Nursing 47, no. 6 (June 2017): 65–67. http://dx.doi.org/10.1097/01.nurse.0000516242.05454.b4.

Full text
APA, Harvard, Vancouver, ISO, and other styles
21

Radziwill, Nicole M. "Cybersecurity Leadership." Quality Management Journal 25, no. 2 (April 3, 2018): 109. http://dx.doi.org/10.1080/10686967.2018.1436356.

Full text
APA, Harvard, Vancouver, ISO, and other styles
22

Reagin, Michael J., and Michael V. Gentry. "Enterprise Cybersecurity." Frontiers of Health Services Management 35, no. 1 (2018): 13–22. http://dx.doi.org/10.1097/hap.0000000000000037.

Full text
APA, Harvard, Vancouver, ISO, and other styles
23

Lukowiak, Marcin, Stanisław Radziszowski, James Vallino, and Christopher Wood. "Cybersecurity Education." ACM Transactions on Computing Education 14, no. 1 (March 2014): 1–20. http://dx.doi.org/10.1145/2538029.

Full text
APA, Harvard, Vancouver, ISO, and other styles
24

Baranchuk, Adrian, Bryce Alexander, Debra Campbell, Sohaib Haseeb, Damian Redfearn, Chris Simpson, and Ben Glover. "Pacemaker Cybersecurity." Circulation 138, no. 12 (September 18, 2018): 1272–73. http://dx.doi.org/10.1161/circulationaha.118.035261.

Full text
APA, Harvard, Vancouver, ISO, and other styles
25

Kim, Lee. "Cybersecurity awareness." Nursing Management (Springhouse) 48, no. 4 (April 2017): 16–19. http://dx.doi.org/10.1097/01.numa.0000514066.30572.f3.

Full text
APA, Harvard, Vancouver, ISO, and other styles
26

Kim, Lee. "Cybersecurity matters." Nursing Management (Springhouse) 49, no. 2 (February 2018): 16–22. http://dx.doi.org/10.1097/01.numa.0000529921.97762.be.

Full text
APA, Harvard, Vancouver, ISO, and other styles
27

Kuhn, Rick. "Introduction: Cybersecurity." IT Professional 12, no. 4 (July 2010): 18–19. http://dx.doi.org/10.1109/mitp.2010.110.

Full text
APA, Harvard, Vancouver, ISO, and other styles
28

Ratnayake, Deepthi. "Insight: Cybersecurity." ITNOW 63, no. 2 (June 1, 2021): 41. http://dx.doi.org/10.1093/itnow/bwab052.

Full text
APA, Harvard, Vancouver, ISO, and other styles
29

POPESCU, Eugen F. "Complementary Cybersecurity." International Journal of Information Security and Cybercrime 9, no. 2 (December 30, 2020): 33–37. http://dx.doi.org/10.19107/ijisc.2020.02.05.

Full text
Abstract:
The paper presents the need for enhancing the classical Cybersecurity domain of study with a set of complementary perspectives that are meant to support and facilitate a proper long-term human evolution, as well as a balanced and healthy environment. It describes the influence of human decisions on the technology, in its entire lifecycle, and likewise the technological feedback that is experienced both by the human and the nature, in return. It emphasizes the need for profound analysis of the influences that technology brings on humans – as individuals and as society – and on the surrounding environment. In the same time, it points towards the importance of adaptation of our daily lives to the technological advancements. The paper concludes with a set of necessities for raising the awareness and knowledge on these matters, in order to document and support the decisions that shape our realities.
APA, Harvard, Vancouver, ISO, and other styles
30

Ratnayake, Deepthi. "Insight: cybersecurity." ITNOW 63, no. 4 (December 1, 2021): 39. http://dx.doi.org/10.1093/itnow/bwab118.

Full text
APA, Harvard, Vancouver, ISO, and other styles
31

Ratnayake, Deepthi. "Insight: Cybersecurity." ITNOW 63, no. 3 (August 16, 2021): 39. http://dx.doi.org/10.1093/itnow/bwab082.

Full text
APA, Harvard, Vancouver, ISO, and other styles
32

Gritzalis, Dimitris A., Grammati Pantziou, and Rodrigo Román-Castro. "Sensors Cybersecurity." Sensors 21, no. 5 (March 4, 2021): 1762. http://dx.doi.org/10.3390/s21051762.

Full text
APA, Harvard, Vancouver, ISO, and other styles
33

Maconachy, W. V., and D. Kinsey. "Cybersecurity Education." Journal of The Colloquium for Information Systems Security Education 9, no. 1 (March 8, 2022): 4. http://dx.doi.org/10.53735/cisse.v9i1.138.

Full text
Abstract:
Recent cyber events within the U. S. cyber ecosystem present the alarming fact that attacks with both denial of service and kinetic consequences are now prevalent in non-governmental systems. This paper examines the need to expand studies of cyber and other warfare modalities into the cybersecurity curricula now being taught in American universities.
APA, Harvard, Vancouver, ISO, and other styles
34

Burley, Diana L., Jon Eisenberg, and Seymour E. Goodman. "Would cybersecurity professionalization help address the cybersecurity crisis?" Communications of the ACM 57, no. 2 (February 2014): 24–27. http://dx.doi.org/10.1145/2556936.

Full text
APA, Harvard, Vancouver, ISO, and other styles
35

LAGE SERRANO, OSCAR, and MARIA SAIZ SANTOS. "BLOCKCHAIN AND THE DECENTRALISATION OF THE CYBERSECURITY INDUSTRY." DYNA 96, no. 3 (May 1, 2021): 239. http://dx.doi.org/10.6036/10188.

Full text
Abstract:
This paper aims to analyse the potential impact that blockchain technology will have on the cybersecurity industry. We will look at different applications of blockchain technology in the field of cybersecurity, as well as a new trend of decentralisation of cybersecurity services. Blockchain is precisely a cybersecurity architecture that enables the decentralisation of processes and business models, which could have a direct consequence on cybersecurity services, as well as on the industry itself. Cybersecurity companies will have to adapt to a new ecosystem in which the blockchain technology will enable crowdsourcing of cybersecurity services. Keywords: Blockchain, Cybersecurity, Disruptive Technology, Technology Innovation, Technology Strategy
APA, Harvard, Vancouver, ISO, and other styles
36

Cheng, Eric C. K., and Tianchong Wang. "Institutional Strategies for Cybersecurity in Higher Education Institutions." Information 13, no. 4 (April 12, 2022): 192. http://dx.doi.org/10.3390/info13040192.

Full text
Abstract:
Cybersecurity threats have grown exponentially, posing a heavy burden on organisations. Higher Education Institutions (HEIs) are particularly vulnerable, and their cybersecurity issues are receiving greater attention. However, existing research on cybersecurity has limited referencing value for HEI leaders and policy-makers because they are usually technology-focused. Publications that showcase best practices often lack system-wide perspectives towards cybersecurity in HEIs. Our paper, therefore, aims to bridge this literature gap and generate institutional cybersecurity strategies for HEI leaders and policy-makers from a system perspective. We first review how the cybersecurity landscape has evolved over the last few decades and its latest trends and projections for the next decade. By analysing these historical developments and new changes, we further illuminate the importance of strengthening HEI cybersecurity capacities. As we explore why HEIs face severe challenges to tackle the ever-escalating cyberattacks, we propose a system-wide approach to safeguard HEI cybersecurity and highlight the necessity to reassess prioritised areas. By taking an extensive literature review and desk research of methods that could respond to the cybersecurity vulnerabilities of the next decade, we synthesise our findings with a set of institutional strategies, with takeaways designed to equip HEIs better to address cybersecurity threats into the future. The strategies include: (1) Strengthening Institutional Governance for Cybersecurity; (2) Revisiting Cybersecurity KPIs; (3) Explicating Cybersecurity Policies, Guidelines and Mechanisms; (4) Training and Cybersecurity Awareness Campaigns to Build Cybersecurity Culture; (5) Responding to AI-based Cyber-threats and Harnessing AI to Enhance Cybersecurity; (6) Introduction of New and More Sophisticated Security Measures; (7) Paying Attention to Mobile Devices Use, Using Encryption as a Daily Practice; and (8) Risk Management. We believe that cybersecurity can be safeguarded throughout the new decade when these strategies are considered thoroughly and with the concerted effort of relevant HEI stakeholders.
APA, Harvard, Vancouver, ISO, and other styles
37

Alammari, Abdullah, Osama Sohaib, and Sayed Younes. "Developing and evaluating cybersecurity competencies for students in computing programs." PeerJ Computer Science 8 (January 17, 2022): e827. http://dx.doi.org/10.7717/peerj-cs.827.

Full text
Abstract:
Changes due to technological development in the workplace are putting pressure on academia to keep pace with the changing nature of work. Due to the growing need for cybersecurity professionals, universities improve their cybersecurity programs to develop qualified cybersecurity competencies. The purpose of this study is to validate the cybersecurity knowledge, skills, and abilities (KSAs) competencies of cybersecurity degree programs using a fuzzy linguistic group decision-making method. This study shows that cybersecurity knowledge is essential, along with technical skills and human abilities for cybersecurity professionals.
APA, Harvard, Vancouver, ISO, and other styles
38

Shires, James. "Enacting Expertise: Ritual and Risk in Cybersecurity." Politics and Governance 6, no. 2 (June 11, 2018): 31–40. http://dx.doi.org/10.17645/pag.v6i2.1329.

Full text
Abstract:
This article applies the concept of ritual to cybersecurity expertise, beginning with the cybersecurity “skills gap”: the perceived lack of suitably qualified professionals necessary to tackle contemporary cybersecurity challenges. It proposes that cybersecurity expertise is best understood as a skilled performance which satisfies decision-makers’ demands for risk management. This alternative understanding of cybersecurity expertise enables investigation of the types of performance involved in key events which congregate experts together: cybersecurity conferences. The article makes two key claims, which are empirically based on participant observation of cybersecurity conferences in the Middle East. First, that cybersecurity conferences are ritualized activities which create an expert community across international boundaries despite significant political and social differences. Second, that the ritualized physical separation between disinterested knowledge-sharing and commercial advertisement at these conferences enacts an ideal of “pure” cybersecurity expertise rarely encountered elsewhere, without which the claims to knowledge made by cybersecurity experts would be greatly undermined. The approach taken in this article is thus a new direction for cybersecurity research, with significant implications for other areas of international politics.
APA, Harvard, Vancouver, ISO, and other styles
39

Ananda, Safrida, Ika Putranti, and Andi Dir. "ANALYSIS OF THE EU CYBERSECURITY ACT UNDER THE THEORY OF NEOLIBERAL INSTITUTIONALISM." Arena Hukum 15, no. 1 (April 28, 2022): 176–99. http://dx.doi.org/10.21776/ub.arenahukum.2022.01501.9.

Full text
Abstract:
Wannacry Ransomware epidemics have attacked several high-profile companies in European Union creating an EU-wide cybersecurity crisis in the digital economy and social order. In response, European Union established an appropriate regulation in cybercrime namely The Cybersecurity Act. The Act as an international regime does not only gives a permanent mandate that strengthens European Union Agency for Network and Information Security (ENISA) but also establishes The EU Cybersecurity Certification Scheme in order to increase cybersecurity and build cyber resilience in the European Union Digital Single Market. This paper investigates how does the Cybersecurity Act as a business law in maintaining cybersecurity aspect on the European Union Digital Single Market through the theory of neoliberal institutionalism as a framework of thinking. After a series of conduction of literature reviews, this research argues that The Cybersecurity Act would be an appropriate regulation in dealing with the cybersecurity crisis in the digitalized market order. The standardization in The EU Cybersecurity Certification Scheme regulated by The Cybersecurity Act would improve cybersecurity and build cyber resilience in the European Union Digital Single Market.
APA, Harvard, Vancouver, ISO, and other styles
40

Coenraad, Merijke, Anthony Pellicone, Diane Jass Ketelhut, Michel Cukier, Jan Plane, and David Weintrop. "Experiencing Cybersecurity One Game at a Time: A Systematic Review of Cybersecurity Digital Games." Simulation & Gaming 51, no. 5 (June 19, 2020): 586–611. http://dx.doi.org/10.1177/1046878120933312.

Full text
Abstract:
Background. Cybersecurity is of increasing importance in our interconnected world, yet the field has a growing workforce deficit and an underrepresentation of women and people of color. In an effort to address these issues, many digital games have been created to teach individuals about cybersecurity and keeping themselves, their data, and their networks safe. Intervention. We present the results of a systematic review of digital games related to cybersecurity as a means to understand how players are being introduced to cybersecurity in game-based contexts. Methods. Using a systematic search, we identified 181 games related to cybersecurity (either through content or aesthetics) by searching the Apple App Store, the Google Play Store, Steam, and the web broadly. Each game was played for up to an hour and characteristics such as the game story, game elements, and presentation of cybersecurity were gathered. Results. We found diverse conceptualizations of cybersecurity and of cybersecurity professionals. Further, the nature of games and the framing of cybersecurity varied by the platform and device on which the game was available (computer, mobile, or web). Web games were most likely to present cybersecurity as cyber safety and were more likely to be a gamified quiz or worksheet. Computer and mobile games tended to present cybersecurity through game aesthetics or deep content engagement. The games mirrored the underrepresentation of women and minoritized individuals in the field. Discussion. With the variety of digital cybersecurity games and the differences in games based on the platform on which the game is available, it is important game developers move beyond presenting cybersecurity through gamification and focusing on cyber safety. The current scope of cybersecurity games leaves room for the development of games focused on deeper content engagement with cybersecurity topics in an environment conducive to the broadening participation goals of the cybersecurity field.
APA, Harvard, Vancouver, ISO, and other styles
41

Tsvilii, Olena. "SYSTEM OF CERTIFICATION OF CYBERSECURITY OF INFORMATION AND COMMUNICATIONS TECHNOLOGIES." Proceedings of the O.S. Popov ОNAT 1, no. 2 (December 31, 2020): 121–34. http://dx.doi.org/10.33243/2518-7139-2020-1-2-121-134.

Full text
Abstract:
Cybersecurity of information and communication technologies (hereinafter - ICT) is a key issue for maintaining the functioning and security of the digital economy and public administration in the soon. An important role in the field of cybersecurity is played by the conformity assessment (certification) of cybersecurity. This may apply to the cybersecurity of ICT components, products, equipment, services and processes, to the cybersecurity of cloud services, to the cybersecurity of technological processes, to personal competence in the field of cybersecurity, and so on. Cybersecurity certification rules, procedures, and management establish a certification scheme, and a set of rules and procedures for managing similar or related conformity assessment schemes form a certification system. Creating cybersecurity certification schemes is a priority and relevant today. There are now a number of systems and assessment standards that can be applied to cybersecurity certification, but they do not ensure mutual recognition of test laboratory test and evaluation procedures and results, and the pursuit of harmonized and comparable cybersecurity assessment and implementation procedures. This situation is a global problem. Accordingly, the current legislation of Ukraine in the field of cybersecurity sets tasks for the application of the best international and European principles of conformity assessment of information and cybersecurity. The creation of cybersecurity certification systems and schemes based on international and European principles of conformity assessment requires appropriate scientific and methodological support. The article proposes a hierarchical model of assessment standards for the cybersecurity certification system and a hierarchical model of agreements on mutual recognition of cybersecurity certificates. Also, in the article, based on these models, the basics of the Cyber Security Certification System and Cyber Security Certification Schemes for ICT products and cloud services are proposed, with an emphasis on such elements as: assessment standards; accreditation of certification bodies; mutual recognition of certification results
APA, Harvard, Vancouver, ISO, and other styles
42

Reeves, A., P. Delfabbro, and D. Calic. "Encouraging Employee Engagement With Cybersecurity: How to Tackle Cyber Fatigue." SAGE Open 11, no. 1 (January 2021): 215824402110000. http://dx.doi.org/10.1177/21582440211000049.

Full text
Abstract:
Cybersecurity fatigue is a form of work disengagement specific to cybersecurity. It manifests as a weariness or aversion to cybersecurity-related workplace behaviors or advice and occurs as a result of prior overexposure to cybersecurity-related work demands or training. While some previous theoretical conceptualizations of cybersecurity fatigue are available, this article is the first to capture all dimensions of the phenomenon in a four-component model. The model holds that cybersecurity fatigue can result from overexposure to workplace cybersecurity advice (e.g., training) or cybersecurity actions (e.g., forced password updates). Similarly, we argue that there can be two types of cybersecurity fatigue: attitudinal (e.g., a belief that cybersecurity is not important) and cognitive (e.g., habituated bad behaviors). We present a multidisciplinary review, which draws on research from management, psychology, and information systems. Practitioners can use the four-component model to identify the type of cybersecurity fatigue that may be occurring in employees and adapt workplace processes accordingly to improve behavior. In addition, we present three illustrative case studies, adapted from employee experiences, to demonstrate the application of the four-component model to an organizational context. The review presents a framework for coordinating the existing approaches to cybersecurity fatigue in the current literature.
APA, Harvard, Vancouver, ISO, and other styles
43

MICHALSKI, Daniel. "System Approach to Coherent Cybersecurity Strategy." Safety & Defense 5, no. 1 (December 27, 2019): 31–36. http://dx.doi.org/10.37105/sd.39.

Full text
Abstract:
Cyber-attacks affect not only our daily lives, but also national security by influencing elections, the economy, and communication. This article is an attempt to give an answer to the question included in the topic “How to build a coherent cybersecurity strategy?”. The first part of the article addresses the paradigmatic issue of cybersecurity. The author shows the differences and relations between cybersecurity and cyber defense. At this point, the author presents a systems approach to the nation security and related it to the cybersecurity. The second part of the article has been dedicated to visualize the need of coherent cybersecurity strategy by analyzing data related to cybersecurity. In the end, the author proposes actions to achieve cybersecurity. This has been done based on existing analyzes of cybersecurity strategies and systems approach to the issue of the cybersecurity.
APA, Harvard, Vancouver, ISO, and other styles
44

Cai, Cuihong. "Cybersecurity in the Chinese Context: Changing Concepts, Vital Interests, and Prospects for Cooperation." China Quarterly of International Strategic Studies 01, no. 03 (October 2015): 471–96. http://dx.doi.org/10.1142/s2377740015500189.

Full text
Abstract:
"Cybersecurity" has become a topic of great strategic importance concerning both national and international security, especially after Edward Snowden's disclosure of the secret surveillance programs of the U.S. government. With the largest number of netizens in the world, China holds its own views, beliefs, and assumptions on this topic. To understand the current disputes over international cybersecurity and to identify challenges and opportunities presented to international cybersecurity cooperation, it is of great significance to examine "cybersecurity" in the Chinese context. This article deals with the following issues from a Chinese perspective: cyberspace and cybersecurity in general, China's vital cybersecurity interests and threatening challenges, and barriers to further progress in international cybersecurity cooperation. It is concluded that China's understanding of cybersecurity, which derives from its unique national conditions, does not limit its willingness to participate in international cybersecurity cooperation.
APA, Harvard, Vancouver, ISO, and other styles
45

Nobles, Calvin. "The Cyber Talent Gap and Cybersecurity Professionalizing." International Journal of Hyperconnectivity and the Internet of Things 2, no. 1 (January 2018): 42–51. http://dx.doi.org/10.4018/ijhiot.2018010104.

Full text
Abstract:
Two significant issues loom throughout the cybersecurity domain. The first is the shortage of cybersecurity professionals and the second quandary is the lack of minimum entry standards in cybersecurity. Some organizations' cybersecurity operations are suffering due to the cybersecurity talent gap accompanied by the increasing sophistication and number of cyber-attack attempts. The shortage of cyber talent is rampant in private entities as in public agencies, which highlights the resolve for entry standards into cybersecurity to enhance the professionalization. Researchers and practitioners provide countless recommendations for ameliorating the cybersecurity workforce by addressing the professionalization issue. Professional associations are the nexus of cybersecurity and possess the expertise, leadership, and sustenance to spearhead efforts to develop national-level strategies to resolve the talent gap and establish professionalization standards.
APA, Harvard, Vancouver, ISO, and other styles
46

Makeri, Yakubu Ajiji. "The Effectiveness of Cybersecurity Compliance in a Corporate Organization in Nigeria." International Journal on Recent and Innovation Trends in Computing and Communication 7, no. 6 (June 11, 2019): 16–19. http://dx.doi.org/10.17762/ijritcc.v7i6.5312.

Full text
Abstract:
The complexity and growth also create asymmetries between attackers and their targets, and incentives that drive underinvestment in cybersecurity The Digital technologies have transformed how people socialize, shop, interact with government and do business. The World Wide Web is of made amounts of information instantly available. The smartphones have put our fingertips everywhere we go it an improvement on effectiveness cybersecurity training for end users of systems and offers suggestions about and how topManagement leaders can improve on trainingto effectively combat cybersecurity threats at the organizations. Is imperative to achieve higher end-user cybersecurity compliance; practice is accepted, as a means to increase compliance behavior in any organization. The Training can influence compliance by one or more of three causal pathways: by increasing cybersecurity awareness, by increasing cybersecurity proficiency (i.e., improve cybersecurity skills) and by raising cybersecurity self-efficacy. This includes an extensive review of the cybersecurity policies and competencies that are the basis for training needs analysis, setting learning goals, and practical training. This paper discusses opportunities for human resource (HR) practitioners and industrial and organizational (I-O) psychologists, and informationtechnology (IT) specialists, and to integrate their skills and enhance the capabilities of organizations to counteract cybersecurity threats. AnyOrganizations cannot achieve their cybersecurity goalson workers alone, so all employees who use computer networks must be trained on the skill and policies related to cybersecurity.
APA, Harvard, Vancouver, ISO, and other styles
47

Stoianov, Nikolai, and Andrey Ivanov. "Public Key Generation Principles Impact Cybersecurity." Information & Security: An International Journal 47, no. 2 (2020): 249–60. http://dx.doi.org/10.11610/isij.4717.

Full text
APA, Harvard, Vancouver, ISO, and other styles
48

Potii, Oleksandr V., Oleksandr V. Korneyko, and Yrii I. Gorbenko. "Cybersecurity in Ukraine: Problems and Perspectives." Information & Security: An International Journal 32 (2015): 71–94. http://dx.doi.org/10.11610/isij.3201.

Full text
APA, Harvard, Vancouver, ISO, and other styles
49

Mubarakova,, S. R., S. T. Amanzholova,, and R. K. Uskenbayeva,. "USING MACHINE LEARNING METHODS IN CYBERSECURITY." Eurasian Journal of Mathematical and Computer Applications 10, no. 1 (March 2022): 69–78. http://dx.doi.org/10.32523/2306-6172-2022-10-1-69-78.

Full text
Abstract:
Abstract Cybersecurity is an ever-changing field, with advances in technology that open up new opportunities for cyberattacks. In addition, even though serious secu- rity breaches are often reported, small organizations still have to worry about security breaches as they can often be the target of viruses and phishing. This is why it is so important to ensure the privacy of your user profile in cyberspace. The past few years have seen a rise in machine learning algorithms that address major cybersecu- rity issues such as intrusion detection systems (IDS), detection of new modifications of known malware, malware, and spam detection, and malware analysis. In this arti- cle, algorithms have been analyzed using data mining collected from various libraries, and analytics with additional emerging data-driven models to provide more effective security solutions. In addition, an analysis was carried out of companies that are en- gaged in cyber attacks using machine learning. According to the research results, it was revealed that the concept of cybersecurity data science allows you to make the computing process more efficient and intelligent compared to traditional processes in the field of cybersecurity. As a result, according to the results of the study, it was revealed that machine learning, namely unsupervised learning, is an effective method of dealing with risks in cybersecurity and cyberattacks.
APA, Harvard, Vancouver, ISO, and other styles
50

Haapamäki, Elina, and Jukka Sihvonen. "Cybersecurity in accounting research." Managerial Auditing Journal 34, no. 7 (July 1, 2019): 808–34. http://dx.doi.org/10.1108/maj-09-2018-2004.

Full text
Abstract:
Purpose This paper aims to update the cybersecurity-related accounting literature by synthesizing 39 recent theoretical and empirical studies on the topic. Furthermore, the paper provides a set of categories into which the studies fit. Design/methodology/approach This is a synthesis paper that summarizes the research literature on cybersecurity, introducing knowledge from the extant research and revealing areas requiring further examination. Findings This synthesis identifies a research framework that consists of the following research themes: cybersecurity and information sharing, cybersecurity investments, internal auditing and controls related to cybersecurity, disclosure of cybersecurity activities and security threats and security breaches. Practical implications Academics, practitioners and the public would benefit from a research framework that categorizes the research topics related to cybersecurity in the accounting field. This type of analysis is vital to enhance the understanding of the academic research on cybersecurity and can be used to support the identification of new lines for future research. Originality/value This is the first literature analysis of cybersecurity in the accounting field, and it has significant implications for research and practice by detailing, for example, the benefits of and obstacles to information sharing. This synthesis also highlights the importance of the model for cybersecurity investments. Further, the review emphasizes the role of internal auditing and controls to improve cybersecurity.
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!

To the bibliography