Добірка наукової літератури з теми "Human aspects of cyber security"
Оформте джерело за APA, MLA, Chicago, Harvard та іншими стилями
Ознайомтеся зі списками актуальних статей, книг, дисертацій, тез та інших наукових джерел на тему "Human aspects of cyber security".
Біля кожної праці в переліку літератури доступна кнопка «Додати до бібліографії». Скористайтеся нею – і ми автоматично оформимо бібліографічне посилання на обрану працю в потрібному вам стилі цитування: APA, MLA, «Гарвард», «Чикаго», «Ванкувер» тощо.
Також ви можете завантажити повний текст наукової публікації у форматі «.pdf» та прочитати онлайн анотацію до роботи, якщо відповідні параметри наявні в метаданих.
Статті в журналах з теми "Human aspects of cyber security"
Begishev, I. R. "Cyber-Security Culture: Psychological and Legal Aspects." Psychology and Law 11, no. 4 (2021): 207–20. http://dx.doi.org/10.17759/psylaw.2021110415.
Повний текст джерелаR., Moinescu. "Aspects of human weaknesses in cyber security." Scientific Bulletin of Naval Academy XXII, no. 1 (July 15, 2019): 163–70. http://dx.doi.org/10.21279/1454-864x-19-i1-022.
Повний текст джерелаNel, Frans, and Lynette Drevin. "Key elements of an information security culture in organisations." Information & Computer Security 27, no. 2 (June 12, 2019): 146–64. http://dx.doi.org/10.1108/ics-12-2016-0095.
Повний текст джерелаPattinson, Malcolm, Marcus Butavicius, Meredith Lillie, Beau Ciccarello, Kathryn Parsons, Dragana Calic, and Agata McCormac. "Matching training to individual learning styles improves information security awareness." Information & Computer Security 28, no. 1 (November 11, 2019): 1–14. http://dx.doi.org/10.1108/ics-01-2019-0022.
Повний текст джерелаQuader, Faisal, and Vandana P. Janeja. "Insights into Organizational Security Readiness: Lessons Learned from Cyber-Attack Case Studies." Journal of Cybersecurity and Privacy 1, no. 4 (November 11, 2021): 638–59. http://dx.doi.org/10.3390/jcp1040032.
Повний текст джерелаVieane, Alex, Gregory Funke, Robert Gutzwiller, Vincent Mancuso, Ben Sawyer, and Christopher Wickens. "Addressing Human Factors Gaps in Cyber Defense." Proceedings of the Human Factors and Ergonomics Society Annual Meeting 60, no. 1 (September 2016): 770–73. http://dx.doi.org/10.1177/1541931213601176.
Повний текст джерелаBalaganesh, Duraisamy. "Future of Secure Remote Workforce Perspective - What’s Next?" IRO Journal on Sustainable Wireless Systems 4, no. 3 (September 5, 2022): 149–61. http://dx.doi.org/10.36548/jsws.2022.3.002.
Повний текст джерелаSebestyen, Gheorghe, and Anca Hangan. "Anomaly detection techniques in cyber-physical systems." Acta Universitatis Sapientiae, Informatica 9, no. 2 (December 20, 2017): 101–18. http://dx.doi.org/10.1515/ausi-2017-0007.
Повний текст джерелаHorbachenko, S. "Cyber security as a component of economic security of Ukraine." Galic'kij ekonomičnij visnik 66, no. 5 (2020): 180–86. http://dx.doi.org/10.33108/galicianvisnyk_tntu2020.05.180.
Повний текст джерелаFausett, Crystal M., and Joseph R. Keebler. "Shift Happens: Human Factors Considerations for Handoffs in Cyber-Security Operations Centers." Proceedings of the Human Factors and Ergonomics Society Annual Meeting 66, no. 1 (September 2022): 110–14. http://dx.doi.org/10.1177/1071181322661131.
Повний текст джерелаДисертації з теми "Human aspects of cyber security"
Afzal, Muhammad. "Human and Organizational Aspects of Cyber Security : From a System Suppliers Perspective." Thesis, KTH, Industriella informations- och styrsystem, 2010. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-105778.
Повний текст джерелаGopisetty, Yugandhar. "A study of online users' cyber threat awareness and their use of threat countermeasures." Thesis, Umeå universitet, Institutionen för informatik, 2016. http://urn.kb.se/resolve?urn=urn:nbn:se:umu:diva-115918.
Повний текст джерелаJung, Sung-Oh. "A quantitative man-machine model for cyber security efficiency analysis." Texas A&M University, 2005. http://hdl.handle.net/1969.1/4851.
Повний текст джерелаAyereby, Manouan Pierre-Marius. "Overcoming Data Breaches and Human Factors in Minimizing Threats to Cyber-Security Ecosystems." ScholarWorks, 2018. https://scholarworks.waldenu.edu/dissertations/6163.
Повний текст джерелаSanjab, Anibal Jean. "Security of Cyber-Physical Systems with Human Actors: Theoretical Foundations, Game Theory, and Bounded Rationality." Diss., Virginia Tech, 2018. http://hdl.handle.net/10919/86204.
Повний текст джерелаPh. D.
Enhancing the efficiency, sustainability, and resilience of cities, infrastructure, and industrial systems is contingent on their transformation into more interactive and interconnected smart systems. This has led to the emergence of what is known as cyber-physical systems (CPSs). CPSs are widescale distributed and interconnected systems integrating physical components and humans via a cyber layer that enables sensing, connectivity, and data processing. Some of the most prominent examples of CPSs include the smart electric grid, smart cities, intelligent transportation systems, and the Internet of Things. The seamless interconnectivity between the various elements of a CPS introduces a wealth of operational benefits. However, this wide-scale interconnectivity and ubiquitous integration of cyber technologies render CPSs vulnerable to a range of security threats as manifested by recently reported security breaches in a number of CPS application domains. Addressing these culminating security challenges requires the development and implementation of fool-proof defense strategies grounded in solid theoretical foundations. To this end, the central goal of this dissertation is to enhance the security of CPSs by advancing novel analytical frameworks which tightly integrate the cyber, physical, and human elements of a CPS. The developed frameworks and tools enable the derivation of holistic defense strategies by: a) Characterizing the security interdependence between the various elements of a CPS, b) Quantifying the consequences of possible attacks on a CPS and the effectiveness of any implemented defense mechanism, c) Modeling the multi-agent interactions in CPSs, involving humans and automated systems, which have a direct effect on the security state of the system, and d) Capturing the role that human perceptions and decision making processes play in the security of CPSs. The developed tools and performed analyses integrate the engineering principles of CPSs with the mathematical concepts of game theory and human behavioral models and introduce key contributions to a number of CPS application domains such as the smart electric grid and drone systems. The introduced results enable strengthening the security of CPSs, thereby paving the way for their wide-scale adoption in smart cities and critical infrastructure.
Миронець, Оксана Миколаївна, and Tigadi Nageshwar. "Theoretical and legal aspects of human security in the republic of India." Thesis, Київський кооперативний інститут бізнесу і права, 2017. http://er.nau.edu.ua/handle/NAU/35620.
Повний текст джерелаLeppan, Claudette. "Analysis of a South African cyber-security awareness campaign for schools using interdisciplinary communications frameworks." Thesis, Nelson Mandela Metropolitan University, 2017. http://hdl.handle.net/10948/18167.
Повний текст джерелаMunir, Sundas, and Mirza Sanam Iqbal Baig. "Challenges and Security Aspects of Blockchain Based Online Multiplayer Games." Thesis, Högskolan i Halmstad, Akademin för informationsteknologi, 2019. http://urn.kb.se/resolve?urn=urn:nbn:se:hh:diva-38771.
Повний текст джерелаKirkham, E., and C. Flew. "Strengthening embargoes and enhancing human security." Thesis, International Alert, Saferworld and University of Bradford, Department of Peace Studies, Centre for International Co-operation and Security, 2003. http://hdl.handle.net/10454/4275.
Повний текст джерелаArms embargoes are one of the principal tools of states in seeking to prevent, limit and bring an end to armed conflict and human rights abuses. Despite the frequency with which arms embargoes have been imposed, there are significant problems with their implementation. Pressure is therefore growing for the international governmental community to act in order to ensure that the political commitment embodied by the imposition of arms embargoes is matched by the commitment to ensure their rigorous enforcement and to achieve enhanced human security on the ground. Increasing the effectiveness of arms embargoes is a specific aim of the United Nations Programme of Action for Preventing and Combating the Illicit Trade in Small Arms and Light Weapons in All Its Aspects1 which specifically calls upon states "To take appropriate measures, including all legal or administrative means, against any activity that violates a United Nations Security Council arms embargo in accordance with the Charter of the United Nations".2 Accordingly, within the context of the implementation of the UN PoA, the overall aim of this paper is to explore ways in which the international community can act in order to strengthen the impact of arms embargoes and enhance human security. It will begin by examining the purposes, processes and effects relating to arms embargoes, with particular attention to those agreed at international (UN) level, and by highlighting issues of concern in each regard. An overview of the main issues and challenges facing implementation of arms embargoes will include the elaboration of three case-study examples showing the impact of UN arms embargoes on the availability of arms and on human security and a further five that illustrate the dilemmas faced by states in seeking to implement arms embargoes. Priority areas for attention in any international effort to strengthen the effectiveness of arms embargoes will be followed by more extensive proposals for enhancing international embargo regimes within the context of implementing the UN PoA. Whilst it is recognised that the UN PoA contains measures that relate only to the illicit trade in small arms and light weapons (SALW), if implemented fully, many of these would serve to strengthen the international apparatus of control, information exchange and provision of assistance relating to arms proliferation and misuse as a whole. In turn, this would greatly enhance the implementation of UN arms embargoes. Therefore, as well as providing an opportunity for reviewing progress on implementing the PoA, the first Biennial Meeting of States in July 2003 is clearly a major opportunity for states to address a number of the pressing challenges facing states in the implementation of UN embargoes.
Hakkestad, Mårten, and Simon Rynningsjö. "Who hacked my toaster? : A study about security management of the Internet of Things." Thesis, Linköpings universitet, Informatik, 2019. http://urn.kb.se/resolve?urn=urn:nbn:se:liu:diva-158468.
Повний текст джерелаInternet of Things eller Sakernas internet är ett växande område med en växande hotbild och nya hot uppkommer dagligen. Att hålla sig uppdaterad, övervaka nätverk och enheter samt att reagera på att enheter och nätverk blir hackade är en svår och komplicerad uppgift. Den här uppsatsen ämnar undersöka hur ett IT-företag kan arbeta med säkerhetshantering inom Internet of Things. Detta har gjorts genom att kolla utmaningar och säkerhetslösningar inom de tre områdena uppdatera, övervaka och reagera. En kvalitativ forskningsmetod har använts i denna fallstudie tillsammans med ett tolkande synsätt och en abduktiv ansats. Vi har utfört intervjuer på ett stort IT-företag baserat i Sverige tillsammans med en utförlig dokumentanalys. Resultatet av denna uppsats påvisar ett antal utmaningar inom säkerhetshanteringen inom områdena uppdatera, övervaka och reagera tillsammans med hur vårt fallföretag jobbar med att motarbeta dessa utmaningar. I stort sett kan utmaningarna sammanfattas till att allting är svårare när mängden enheten är så hög som den är inom Internet of Things.
Книги з теми "Human aspects of cyber security"
Kizza, Joseph Migga. Computer network security and cyber ethics. 3rd ed. Jefferson, N.C: McFarland, 2011.
Знайти повний текст джерелаeditor, Babic Mile, ed. Human security. London: SCM Press, 2018.
Знайти повний текст джерелаScott, Lynn M. Human capital management for the USAF cyber force. Santa Monica, CA: RAND Project Air Force, 2010.
Знайти повний текст джерелаFurnell, Steven, and Nathan Clarke, eds. Human Aspects of Information Security and Assurance. Cham: Springer International Publishing, 2021. http://dx.doi.org/10.1007/978-3-030-81111-2.
Повний текст джерелаClarke, Nathan, and Steven Furnell, eds. Human Aspects of Information Security and Assurance. Cham: Springer International Publishing, 2022. http://dx.doi.org/10.1007/978-3-031-12172-2.
Повний текст джерелаClarke, Nathan, and Steven Furnell, eds. Human Aspects of Information Security and Assurance. Cham: Springer International Publishing, 2020. http://dx.doi.org/10.1007/978-3-030-57404-8.
Повний текст джерелаKartashkin, V. A. International security and human rights. Moscow: Novosti Press Agency Pub. House, 1988.
Знайти повний текст джерелаThanh-Đạm, Trương, Wieringa Saskia 1950-, and Chhachhi Amrita, eds. Engendering human security: Feminist perspectives. London: Zed Books, 2006.
Знайти повний текст джерелаMarinos, Louis, and Ioannis Askoxylakis, eds. Human Aspects of Information Security, Privacy, and Trust. Berlin, Heidelberg: Springer Berlin Heidelberg, 2013. http://dx.doi.org/10.1007/978-3-642-39345-7.
Повний текст джерелаTryfonas, Theo, ed. Human Aspects of Information Security, Privacy and Trust. Cham: Springer International Publishing, 2017. http://dx.doi.org/10.1007/978-3-319-58460-7.
Повний текст джерелаЧастини книг з теми "Human aspects of cyber security"
Ravidas, Dhrisya, Malcolm R. Pattinson, and Paula Oliver. "Cyber Security in Healthcare Organisations." In Human Aspects of Information Security and Assurance, 3–11. Cham: Springer International Publishing, 2021. http://dx.doi.org/10.1007/978-3-030-81111-2_1.
Повний текст джерелаPerno, Jason, and Christian W. Probst. "Behavioural Profiling in Cyber-Social Systems." In Human Aspects of Information Security, Privacy and Trust, 507–17. Cham: Springer International Publishing, 2017. http://dx.doi.org/10.1007/978-3-319-58460-7_35.
Повний текст джерелаWall, David S. "Towards a Conceptualisation of Cloud (Cyber) Crime." In Human Aspects of Information Security, Privacy and Trust, 529–38. Cham: Springer International Publishing, 2017. http://dx.doi.org/10.1007/978-3-319-58460-7_37.
Повний текст джерелаGlas, Magdalena, Manfred Vielberth, Tobias Reittinger, Fabian Böhm, and Günther Pernul. "Visual Programming in Cyber Range Training to Improve Skill Development." In Human Aspects of Information Security and Assurance, 3–13. Cham: Springer International Publishing, 2022. http://dx.doi.org/10.1007/978-3-031-12172-2_1.
Повний текст джерелаJaffray, Alice, Conor Finn, and Jason R. C. Nurse. "SherLOCKED: A Detective-Themed Serious Game for Cyber Security Education." In Human Aspects of Information Security and Assurance, 35–45. Cham: Springer International Publishing, 2021. http://dx.doi.org/10.1007/978-3-030-81111-2_4.
Повний текст джерелаVasileiou, Ismini. "Cyber Security Education and Training Delivering Industry Relevant Education and Skills via Degree Apprenticeships." In Human Aspects of Information Security and Assurance, 175–85. Cham: Springer International Publishing, 2020. http://dx.doi.org/10.1007/978-3-030-57404-8_14.
Повний текст джерелаYuan, Haiyue, Shujun Li, Patrice Rusconi, and Nouf Aljaffan. "When Eye-Tracking Meets Cognitive Modeling: Applications to Cyber Security Systems." In Human Aspects of Information Security, Privacy and Trust, 251–64. Cham: Springer International Publishing, 2017. http://dx.doi.org/10.1007/978-3-319-58460-7_17.
Повний текст джерелаFagade, Tesleem, Theo Spyridopoulos, Nabeel Albishry, and Theo Tryfonas. "System Dynamics Approach to Malicious Insider Cyber-Threat Modelling and Analysis." In Human Aspects of Information Security, Privacy and Trust, 309–21. Cham: Springer International Publishing, 2017. http://dx.doi.org/10.1007/978-3-319-58460-7_21.
Повний текст джерелаBuldas, Ahto, and Märt Saarepera. "Are the Current System Engineering Practices Sufficient to Meet Cyber Crime?" In Human Aspects of Information Security, Privacy and Trust, 451–63. Cham: Springer International Publishing, 2017. http://dx.doi.org/10.1007/978-3-319-58460-7_31.
Повний текст джерелаAlotaibi, Mohammed Khaled N. "Employees’ Interest in Professional Advancement on LinkedIn Increases Susceptibility to Cyber-Social Engineering: An Empirical Test." In Human Aspects of Information Security and Assurance, 85–96. Cham: Springer International Publishing, 2020. http://dx.doi.org/10.1007/978-3-030-57404-8_7.
Повний текст джерелаТези доповідей конференцій з теми "Human aspects of cyber security"
Leon Bello, Jorge, and Emilio Gonzalez Viosca. "CARONTE project: Creating an Agenda for Research on Transportation Security." In CIT2016. Congreso de Ingeniería del Transporte. Valencia: Universitat Politècnica València, 2016. http://dx.doi.org/10.4995/cit2016.2016.3272.
Повний текст джерелаMercuri, Ilenia. "Social Engineering and Human-Robot Interactions' Risks." In 13th International Conference on Applied Human Factors and Ergonomics (AHFE 2022). AHFE International, 2022. http://dx.doi.org/10.54941/ahfe1002199.
Повний текст джерелаKarjalainen, Mika, Tero Kokkonen, and Samir Puuska. "Pedagogical Aspects of Cyber Security Exercises." In 2019 IEEE European Symposium on Security and Privacy Workshops (EuroS&PW). IEEE, 2019. http://dx.doi.org/10.1109/eurospw.2019.00018.
Повний текст джерелаAhmad, Ibtihaj, Muhammad Kaab Zarrar, Takreem Saeed, and Saad Rehman. "Security Aspects of Cyber Physical Systems." In 2018 1st International Conference on Computer Applications & Information Security (ICCAIS). IEEE, 2018. http://dx.doi.org/10.1109/cais.2018.8442009.
Повний текст джерелаGreen, Sam, Ihsan Cicek, and Cetin Kaya Koc. "Continuous-Time Computational Aspects of Cyber-Physical Security." In 2016 Workshop on Fault Diagnosis and Tolerance in Cryptography (FDTC). IEEE, 2016. http://dx.doi.org/10.1109/fdtc.2016.19.
Повний текст джерелаBhatia, Nishant Lalitkumar, Vinod Kumar Shukla, Ritu Punhani, and Shish Kumar Dubey. "Growing Aspects of Cyber Security in E-Commerce." In 2021 International Conference on Communication information and Computing Technology (ICCICT). IEEE, 2021. http://dx.doi.org/10.1109/iccict50803.2021.9510152.
Повний текст джерела"Cyber Security in HSI." In 2019 12th International Conference on Human System Interaction (HSI). IEEE, 2019. http://dx.doi.org/10.1109/hsi47298.2019.8942627.
Повний текст джерелаLeFebvre, Rebecca. "The human element in cyber security." In the 2012 Information Security Curriculum Development Conference. New York, New York, USA: ACM Press, 2012. http://dx.doi.org/10.1145/2390317.2390318.
Повний текст джерелаJones, Simon L., Emily I. M. Collins, Ana Levordashka, Kate Muir, and Adam Joinson. "What is 'Cyber Security'?" In CHI '19: CHI Conference on Human Factors in Computing Systems. New York, NY, USA: ACM, 2019. http://dx.doi.org/10.1145/3290607.3312786.
Повний текст джерела"2 Cyber Security in HSI." In 2021 14th International Conference on Human System Interaction (HSI). IEEE, 2021. http://dx.doi.org/10.1109/hsi52170.2021.9538651.
Повний текст джерелаЗвіти організацій з теми "Human aspects of cyber security"
Beiker, Sven. Unsettled Issues in Remote Operation for On-road Driving Automation. SAE International, December 2021. http://dx.doi.org/10.4271/epr2021028.
Повний текст джерелаFrieson, Kate Grace. A Gender Assessment of SEACFMD 2020: A Roadmap to Prevent, Control and Eradicate foot and mouth disease (by 2020) in Southeast Asia and China. O.I.E (World Organisation for Animal Health), December 2013. http://dx.doi.org/10.20506/standz.2785.
Повний текст джерелаCoelho Resende, Noelle, Renata Weber, Jardel Fischer Loeck, Mathias Vaiano Glens, Carolina Gomes, Priscila Farfan Barroso, Janine Targino, Emerson Elias Merhy, Leandro Dominguez Barretto, and Carly Machado. Working Paper Series: Therapeutic Communities in Brazil. Edited by Taniele Rui and Fiore Mauricio. Drugs, Security and Democracy Program, Social Science Research Council, June 2021. http://dx.doi.org/10.35650/ssrc.2081.d.2021.
Повний текст джерела