Journal articles on the topic 'Human aspects of cyber security'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the top 50 journal articles for your research on the topic 'Human aspects of cyber security.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.
Begishev, I. R. "Cyber-Security Culture: Psychological and Legal Aspects." Psychology and Law 11, no. 4 (2021): 207–20. http://dx.doi.org/10.17759/psylaw.2021110415.
Full textR., Moinescu. "Aspects of human weaknesses in cyber security." Scientific Bulletin of Naval Academy XXII, no. 1 (July 15, 2019): 163–70. http://dx.doi.org/10.21279/1454-864x-19-i1-022.
Full textNel, Frans, and Lynette Drevin. "Key elements of an information security culture in organisations." Information & Computer Security 27, no. 2 (June 12, 2019): 146–64. http://dx.doi.org/10.1108/ics-12-2016-0095.
Full textPattinson, Malcolm, Marcus Butavicius, Meredith Lillie, Beau Ciccarello, Kathryn Parsons, Dragana Calic, and Agata McCormac. "Matching training to individual learning styles improves information security awareness." Information & Computer Security 28, no. 1 (November 11, 2019): 1–14. http://dx.doi.org/10.1108/ics-01-2019-0022.
Full textQuader, Faisal, and Vandana P. Janeja. "Insights into Organizational Security Readiness: Lessons Learned from Cyber-Attack Case Studies." Journal of Cybersecurity and Privacy 1, no. 4 (November 11, 2021): 638–59. http://dx.doi.org/10.3390/jcp1040032.
Full textVieane, Alex, Gregory Funke, Robert Gutzwiller, Vincent Mancuso, Ben Sawyer, and Christopher Wickens. "Addressing Human Factors Gaps in Cyber Defense." Proceedings of the Human Factors and Ergonomics Society Annual Meeting 60, no. 1 (September 2016): 770–73. http://dx.doi.org/10.1177/1541931213601176.
Full textBalaganesh, Duraisamy. "Future of Secure Remote Workforce Perspective - What’s Next?" IRO Journal on Sustainable Wireless Systems 4, no. 3 (September 5, 2022): 149–61. http://dx.doi.org/10.36548/jsws.2022.3.002.
Full textSebestyen, Gheorghe, and Anca Hangan. "Anomaly detection techniques in cyber-physical systems." Acta Universitatis Sapientiae, Informatica 9, no. 2 (December 20, 2017): 101–18. http://dx.doi.org/10.1515/ausi-2017-0007.
Full textHorbachenko, S. "Cyber security as a component of economic security of Ukraine." Galic'kij ekonomičnij visnik 66, no. 5 (2020): 180–86. http://dx.doi.org/10.33108/galicianvisnyk_tntu2020.05.180.
Full textFausett, Crystal M., and Joseph R. Keebler. "Shift Happens: Human Factors Considerations for Handoffs in Cyber-Security Operations Centers." Proceedings of the Human Factors and Ergonomics Society Annual Meeting 66, no. 1 (September 2022): 110–14. http://dx.doi.org/10.1177/1071181322661131.
Full textRamadhan, Iqbal. "STRATEGI KEAMANAN CYBER SECURITY DI KAWASAN ASIA TENGGARA." Jurnal Asia Pacific Studies 3, no. 2 (January 16, 2020): 181–92. http://dx.doi.org/10.33541/japs.v3i1.1081.
Full textNikel, Fosoh Holiness, and Austin Oguejiofor Amaechi. "An Assessment of Employee Knowledge, Awareness, Attitude towards Organizational Cybersecurity in Cameroon." Network and Communication Technologies 7, no. 1 (February 21, 2022): 1. http://dx.doi.org/10.5539/nct.v7n1p1.
Full textTESAŘ, Aleš, Fabian BAXA, and Dalibor PROCHÁZKA. "M.A.D. AGAIN? Shift of the Term M.A.D. to the Cyber Domain." Obrana a strategie (Defence and Strategy) 22, no. 2 (December 16, 2022): 036–50. http://dx.doi.org/10.3849/1802-7199.22.2022.02.036-050.
Full textSalminen, Mirva. "Refocusing and Redefining Cybersecurity: Individual Security in the Digitalising European High North." Yearbook of Polar Law Online 10, no. 1 (2019): 321–56. http://dx.doi.org/10.1163/22116427_010010015.
Full textNeizvestny, Sergey. "Social Aspects of the Consequences of Artificial Intelligence Decision Making in a Digital Society." Sociological Journal 27, no. 2 (June 29, 2021): 90–108. http://dx.doi.org/10.19181/socjour.2021.27.2.8088.
Full textHerlambang, Penggalih Mahardika, Sylvia Anjani, Hendro Wijayanto, and Murni Murni. "CYBER SECURITY BEHAVIOR MODEL ON HEALTH INFORMATION SYSTEM USERS DURING COVID-19 PANDEMIC." Cyber Security dan Forensik Digital 3, no. 2 (December 11, 2020): 27–33. http://dx.doi.org/10.14421/csecurity.2020.3.2.2152.
Full textOlivares Rojas, Juan Carlos, ENRIQUE REYES ARCHUNDIA, JOSE ANTONIO GUTIERREZ GNECCHI, ARTURO MENDEZ PATIÑO, JAIME CERDA JACOBO, and ISMAEL MOLINA MORENO. "A METHODOLOGY FOR CYBER HYGIENE IN SMART GRIDS." DYNA 97, no. 1 (January 1, 2022): 92–97. http://dx.doi.org/10.6036/10085.
Full textEmake, Erhovwosere Donald, Ibrahim Adepoju Adeyanju, and Godwin Obruozie Uzedhe. "Industrial Control Systems (ICS): Cyber-attacks & Security Optimization." International Journal of Computer Engineering and Information Technology 12, no. 5 (May 31, 2020): 31–41. http://dx.doi.org/10.47277/ijceit/12(5)1.
Full textCser, Orsolya. "The Role and Security of Money from the Aspect of Cyber Warfare." Academic and Applied Research in Military and Public Management Science 14, no. 3 (September 30, 2015): 331–42. http://dx.doi.org/10.32565/aarms.2015.3.7.
Full textPawlak, Patryk. "The EUs Role in Shaping the Cyber Regime Complex." European Foreign Affairs Review 24, Issue 2 (May 1, 2019): 167–86. http://dx.doi.org/10.54648/eerr2019011.
Full textLehto, Martti, Aki-Mauri Huhtinen, and Saara Jantunen. "The Open Definition of Cyber." International Journal of Cyber Warfare and Terrorism 1, no. 2 (April 2011): 1–9. http://dx.doi.org/10.4018/ijcwt.2011040101.
Full textHnatienko, Hryhoriy, and Natalia Tmenova. "DETERMINING THE PRIORITY OF CYBER SECURITY MEASURES FOR INCOMPLETE EXPERT RANKING." Information systems and technologies security, no. 1 (2) (2020): 9–15. http://dx.doi.org/10.17721/ists.2020.1.9-15.
Full textGay, Chris, Barry Horowitz, John Elshaw, Philip Bobko, and Inki Kim. "Operator Suspicion and Decision Responses to Cyber-Attacks on Unmanned Ground Vehicle Systems." Proceedings of the Human Factors and Ergonomics Society Annual Meeting 61, no. 1 (September 2017): 226–30. http://dx.doi.org/10.1177/1541931213601540.
Full textRyczyński, Jacek. "Human Factor as a Determinant of Reliability and Safety of Technical Systems." Journal of KONBiN 49, no. 3 (October 1, 2019): 195–220. http://dx.doi.org/10.2478/jok-2019-0056.
Full textGanzhur, Marina, Nikita Dyachenko, Andrey Gazizov, Arthur Otakulov, and Dmitry Romanov. "Modeling of storage processes using Petri nets." E3S Web of Conferences 175 (2020): 05038. http://dx.doi.org/10.1051/e3sconf/202017505038.
Full textKhurana, Mehak. "Secure Coding and Software Vulnerabilities in Implementation Phase of Software Development." ECS Transactions 107, no. 1 (April 24, 2022): 7037–45. http://dx.doi.org/10.1149/10701.7037ecst.
Full textShi, Lei. "Analysis of the Security of 5G Technology from the Network Level." SHS Web of Conferences 144 (2022): 02007. http://dx.doi.org/10.1051/shsconf/202214402007.
Full textBasmadjian, Robert. "Communication Vulnerabilities in Electric Mobility HCP Systems: A Semi-Quantitative Analysis." Smart Cities 4, no. 1 (March 20, 2021): 405–28. http://dx.doi.org/10.3390/smartcities4010023.
Full textKumar, Sumit, and Prof Dr Preeti Rai. "A STUDY ON SECURITY SERVICES AND THREATS IN CLOUD COMPUTING." International Journal of Engineering Applied Sciences and Technology 6, no. 9 (January 1, 2022): 249–55. http://dx.doi.org/10.33564/ijeast.2022.v06i09.036.
Full textHajda, Janusz, Ryszard Jakuszewski, and Szymon Ogonowski. "Security Challenges in Industry 4.0 PLC Systems." Applied Sciences 11, no. 21 (October 20, 2021): 9785. http://dx.doi.org/10.3390/app11219785.
Full textRaveendran, Reshna, and Kheira Tabet Aoul. "A Meta-Integrative Qualitative Study on the Hidden Threats of Smart Buildings/Cities and Their Associated Impacts on Humans and the Environment." Buildings 11, no. 6 (June 10, 2021): 251. http://dx.doi.org/10.3390/buildings11060251.
Full textVilic, Vida. "Phishing as a form of fraud identity theft in healthcare: Victimization during COVID-19 pandemic." Temida 25, no. 1 (2022): 53–78. http://dx.doi.org/10.2298/tem2201053v.
Full textBurov, Oleksandr. "The impact of cybercrime on the digital economy." Theory and Practice of Intellectual Property, no. 5 (November 17, 2021): 69–78. http://dx.doi.org/10.33731/52021.244519.
Full textMaraj, Arianit, and William Butler. "Taxonomy of Social Engineering Attacks: A Survey of Trends and Future Directions." International Conference on Cyber Warfare and Security 17, no. 1 (March 2, 2022): 185–93. http://dx.doi.org/10.34190/iccws.17.1.40.
Full textMazaraki, Nataliia, and Yulia Goncharova. "CYBER DIMENSION OF HYBRID WARS: ESCAPING A ‘GREY ZONE’ OF INTERNATIONAL LAW TO ADRESS ECONOMIC DAMAGES." Baltic Journal of Economic Studies 8, no. 2 (March 25, 2022): 115–20. http://dx.doi.org/10.30525/2256-0742/2022-8-2-115-120.
Full textGarcia, Denise. "Future arms, technologies, and international law: Preventive security governance." European Journal of International Security 1, no. 1 (January 27, 2016): 94–111. http://dx.doi.org/10.1017/eis.2015.7.
Full textJohri, Amar, and Shailendra Kumar. "Exploring Customer Awareness towards Their Cyber Security in the Kingdom of Saudi Arabia: A Study in the Era of Banking Digital Transformation." Human Behavior and Emerging Technologies 2023 (January 12, 2023): 1–10. http://dx.doi.org/10.1155/2023/2103442.
Full textPant, Sambid Bilas. "Non-Traditional Security Challenges for Nepal: A Case of Covid-19." Unity Journal 3, no. 01 (March 6, 2022): 278–91. http://dx.doi.org/10.3126/unityj.v3i01.43332.
Full textMitra, Poojarini, Kaustuv Bhattacharjee, Anirban Das, Susmita Das, Papiya Ghosh, Priya Gorai, and Sayani Maity. "REVIEW ON VULNERABILITIES AND CHALLENGES ON IOT SECURITY FRAMEWORKS IN DIVERSIFIED FIELDS OF APPLICATIONS." American Journal of Electronics & Communication 2, no. 1 (July 5, 2021): 1–3. http://dx.doi.org/10.15864/ajec.2101.
Full textKjamilji, Artrim, Arben Idrizi, Shkurte Luma-Osmani, and Ferihane Zenuni-Kjamilji. "Secure Naïve Bayes Classification without Loss of Accuracy with Application to Breast Cancer Prediction." Proceeding International Conference on Science and Engineering 3 (April 30, 2020): 397–403. http://dx.doi.org/10.14421/icse.v3.536.
Full textTaheri, Shayan, and Navid Asadizanjani. "An Overview of Medical Electronic Hardware Security and Emerging Solutions." Electronics 11, no. 4 (February 16, 2022): 610. http://dx.doi.org/10.3390/electronics11040610.
Full textAngelopoulos, Angelos, Emmanouel T. Michailidis, Nikolaos Nomikos, Panagiotis Trakadas, Antonis Hatziefremidis, Stamatis Voliotis, and Theodore Zahariadis. "Tackling Faults in the Industry 4.0 Era—A Survey of Machine-Learning Solutions and Key Aspects." Sensors 20, no. 1 (December 23, 2019): 109. http://dx.doi.org/10.3390/s20010109.
Full textBlaga, Nataliya, and Volodymyr Hobela. "IMPROVEMENT OF INFORMATION SECURITY OF THE COMMUNICATION PROCESS AT THE ENTERPRISE." Social & Legal Studios 13, no. 3 (September 29, 2021): 156–62. http://dx.doi.org/10.32518/2617-4162-2021-3-156-162.
Full textAhmed, Warmn, and Noor Ghazi M. Jameel. "Malicious URL Detection Using Decision Tree-based Lexical Features Selection and Multilayer Perceptron Model." UHD Journal of Science and Technology 6, no. 2 (November 13, 2022): 105–16. http://dx.doi.org/10.21928/uhdjst.v6n2y2022.pp105-116.
Full textSoderstrom, Naomi. "Putting some “sense” into our research." Meditari Accountancy Research 27, no. 6 (February 12, 2019): 883–92. http://dx.doi.org/10.1108/medar-11-2018-0396.
Full textChyzhov, Denys. "GENESIS OF THE FORMATION AND DEVELOPMENT OF HUMAN RIGHTS IN THE FIELD OF NATIONAL SECURITY." Administrative law and process, no. 1(34) (2022): 62–71. http://dx.doi.org/10.17721/2227-796x.2022.1.05.
Full textLin, Qingyuan, Rui Ming, Kailing Zhang, and Haibo Luo. "Privacy-Enhanced Intrusion Detection and Defense for Cyber-Physical Systems: A Deep Reinforcement Learning Approach." Security and Communication Networks 2022 (October 10, 2022): 1–9. http://dx.doi.org/10.1155/2022/4996427.
Full textNaidoo, Rennie, and Nicolaas Möller. "Building Software Applications Securely with DevSecOps: A Socio-Technical Perspective." European Conference on Cyber Warfare and Security 21, no. 1 (June 8, 2022): 198–205. http://dx.doi.org/10.34190/eccws.21.1.295.
Full textStevanović, Miroslav, and Dragan Đurđević. "The role of computer forensics in the fight against terrorism." Megatrend revija 17, no. 1 (2020): 129–42. http://dx.doi.org/10.5937/megrev2001129s.
Full textArchibald, Jacqueline M., and Karen Renaud. "Refining the PoinTER “human firewall” pentesting framework." Information & Computer Security 27, no. 4 (September 25, 2019): 575–600. http://dx.doi.org/10.1108/ics-01-2019-0019.
Full text