Статті в журналах з теми "Human aspects of cyber security"
Оформте джерело за APA, MLA, Chicago, Harvard та іншими стилями
Ознайомтеся з топ-50 статей у журналах для дослідження на тему "Human aspects of cyber security".
Біля кожної праці в переліку літератури доступна кнопка «Додати до бібліографії». Скористайтеся нею – і ми автоматично оформимо бібліографічне посилання на обрану працю в потрібному вам стилі цитування: APA, MLA, «Гарвард», «Чикаго», «Ванкувер» тощо.
Також ви можете завантажити повний текст наукової публікації у форматі «.pdf» та прочитати онлайн анотацію до роботи, якщо відповідні параметри наявні в метаданих.
Переглядайте статті в журналах для різних дисциплін та оформлюйте правильно вашу бібліографію.
Begishev, I. R. "Cyber-Security Culture: Psychological and Legal Aspects." Psychology and Law 11, no. 4 (2021): 207–20. http://dx.doi.org/10.17759/psylaw.2021110415.
Повний текст джерелаR., Moinescu. "Aspects of human weaknesses in cyber security." Scientific Bulletin of Naval Academy XXII, no. 1 (July 15, 2019): 163–70. http://dx.doi.org/10.21279/1454-864x-19-i1-022.
Повний текст джерелаNel, Frans, and Lynette Drevin. "Key elements of an information security culture in organisations." Information & Computer Security 27, no. 2 (June 12, 2019): 146–64. http://dx.doi.org/10.1108/ics-12-2016-0095.
Повний текст джерелаPattinson, Malcolm, Marcus Butavicius, Meredith Lillie, Beau Ciccarello, Kathryn Parsons, Dragana Calic, and Agata McCormac. "Matching training to individual learning styles improves information security awareness." Information & Computer Security 28, no. 1 (November 11, 2019): 1–14. http://dx.doi.org/10.1108/ics-01-2019-0022.
Повний текст джерелаQuader, Faisal, and Vandana P. Janeja. "Insights into Organizational Security Readiness: Lessons Learned from Cyber-Attack Case Studies." Journal of Cybersecurity and Privacy 1, no. 4 (November 11, 2021): 638–59. http://dx.doi.org/10.3390/jcp1040032.
Повний текст джерелаVieane, Alex, Gregory Funke, Robert Gutzwiller, Vincent Mancuso, Ben Sawyer, and Christopher Wickens. "Addressing Human Factors Gaps in Cyber Defense." Proceedings of the Human Factors and Ergonomics Society Annual Meeting 60, no. 1 (September 2016): 770–73. http://dx.doi.org/10.1177/1541931213601176.
Повний текст джерелаBalaganesh, Duraisamy. "Future of Secure Remote Workforce Perspective - What’s Next?" IRO Journal on Sustainable Wireless Systems 4, no. 3 (September 5, 2022): 149–61. http://dx.doi.org/10.36548/jsws.2022.3.002.
Повний текст джерелаSebestyen, Gheorghe, and Anca Hangan. "Anomaly detection techniques in cyber-physical systems." Acta Universitatis Sapientiae, Informatica 9, no. 2 (December 20, 2017): 101–18. http://dx.doi.org/10.1515/ausi-2017-0007.
Повний текст джерелаHorbachenko, S. "Cyber security as a component of economic security of Ukraine." Galic'kij ekonomičnij visnik 66, no. 5 (2020): 180–86. http://dx.doi.org/10.33108/galicianvisnyk_tntu2020.05.180.
Повний текст джерелаFausett, Crystal M., and Joseph R. Keebler. "Shift Happens: Human Factors Considerations for Handoffs in Cyber-Security Operations Centers." Proceedings of the Human Factors and Ergonomics Society Annual Meeting 66, no. 1 (September 2022): 110–14. http://dx.doi.org/10.1177/1071181322661131.
Повний текст джерелаRamadhan, Iqbal. "STRATEGI KEAMANAN CYBER SECURITY DI KAWASAN ASIA TENGGARA." Jurnal Asia Pacific Studies 3, no. 2 (January 16, 2020): 181–92. http://dx.doi.org/10.33541/japs.v3i1.1081.
Повний текст джерелаNikel, Fosoh Holiness, and Austin Oguejiofor Amaechi. "An Assessment of Employee Knowledge, Awareness, Attitude towards Organizational Cybersecurity in Cameroon." Network and Communication Technologies 7, no. 1 (February 21, 2022): 1. http://dx.doi.org/10.5539/nct.v7n1p1.
Повний текст джерелаTESAŘ, Aleš, Fabian BAXA, and Dalibor PROCHÁZKA. "M.A.D. AGAIN? Shift of the Term M.A.D. to the Cyber Domain." Obrana a strategie (Defence and Strategy) 22, no. 2 (December 16, 2022): 036–50. http://dx.doi.org/10.3849/1802-7199.22.2022.02.036-050.
Повний текст джерелаSalminen, Mirva. "Refocusing and Redefining Cybersecurity: Individual Security in the Digitalising European High North." Yearbook of Polar Law Online 10, no. 1 (2019): 321–56. http://dx.doi.org/10.1163/22116427_010010015.
Повний текст джерелаNeizvestny, Sergey. "Social Aspects of the Consequences of Artificial Intelligence Decision Making in a Digital Society." Sociological Journal 27, no. 2 (June 29, 2021): 90–108. http://dx.doi.org/10.19181/socjour.2021.27.2.8088.
Повний текст джерелаHerlambang, Penggalih Mahardika, Sylvia Anjani, Hendro Wijayanto, and Murni Murni. "CYBER SECURITY BEHAVIOR MODEL ON HEALTH INFORMATION SYSTEM USERS DURING COVID-19 PANDEMIC." Cyber Security dan Forensik Digital 3, no. 2 (December 11, 2020): 27–33. http://dx.doi.org/10.14421/csecurity.2020.3.2.2152.
Повний текст джерелаOlivares Rojas, Juan Carlos, ENRIQUE REYES ARCHUNDIA, JOSE ANTONIO GUTIERREZ GNECCHI, ARTURO MENDEZ PATIÑO, JAIME CERDA JACOBO, and ISMAEL MOLINA MORENO. "A METHODOLOGY FOR CYBER HYGIENE IN SMART GRIDS." DYNA 97, no. 1 (January 1, 2022): 92–97. http://dx.doi.org/10.6036/10085.
Повний текст джерелаEmake, Erhovwosere Donald, Ibrahim Adepoju Adeyanju, and Godwin Obruozie Uzedhe. "Industrial Control Systems (ICS): Cyber-attacks & Security Optimization." International Journal of Computer Engineering and Information Technology 12, no. 5 (May 31, 2020): 31–41. http://dx.doi.org/10.47277/ijceit/12(5)1.
Повний текст джерелаCser, Orsolya. "The Role and Security of Money from the Aspect of Cyber Warfare." Academic and Applied Research in Military and Public Management Science 14, no. 3 (September 30, 2015): 331–42. http://dx.doi.org/10.32565/aarms.2015.3.7.
Повний текст джерелаPawlak, Patryk. "The EUs Role in Shaping the Cyber Regime Complex." European Foreign Affairs Review 24, Issue 2 (May 1, 2019): 167–86. http://dx.doi.org/10.54648/eerr2019011.
Повний текст джерелаLehto, Martti, Aki-Mauri Huhtinen, and Saara Jantunen. "The Open Definition of Cyber." International Journal of Cyber Warfare and Terrorism 1, no. 2 (April 2011): 1–9. http://dx.doi.org/10.4018/ijcwt.2011040101.
Повний текст джерелаHnatienko, Hryhoriy, and Natalia Tmenova. "DETERMINING THE PRIORITY OF CYBER SECURITY MEASURES FOR INCOMPLETE EXPERT RANKING." Information systems and technologies security, no. 1 (2) (2020): 9–15. http://dx.doi.org/10.17721/ists.2020.1.9-15.
Повний текст джерелаGay, Chris, Barry Horowitz, John Elshaw, Philip Bobko, and Inki Kim. "Operator Suspicion and Decision Responses to Cyber-Attacks on Unmanned Ground Vehicle Systems." Proceedings of the Human Factors and Ergonomics Society Annual Meeting 61, no. 1 (September 2017): 226–30. http://dx.doi.org/10.1177/1541931213601540.
Повний текст джерелаRyczyński, Jacek. "Human Factor as a Determinant of Reliability and Safety of Technical Systems." Journal of KONBiN 49, no. 3 (October 1, 2019): 195–220. http://dx.doi.org/10.2478/jok-2019-0056.
Повний текст джерелаGanzhur, Marina, Nikita Dyachenko, Andrey Gazizov, Arthur Otakulov, and Dmitry Romanov. "Modeling of storage processes using Petri nets." E3S Web of Conferences 175 (2020): 05038. http://dx.doi.org/10.1051/e3sconf/202017505038.
Повний текст джерелаKhurana, Mehak. "Secure Coding and Software Vulnerabilities in Implementation Phase of Software Development." ECS Transactions 107, no. 1 (April 24, 2022): 7037–45. http://dx.doi.org/10.1149/10701.7037ecst.
Повний текст джерелаShi, Lei. "Analysis of the Security of 5G Technology from the Network Level." SHS Web of Conferences 144 (2022): 02007. http://dx.doi.org/10.1051/shsconf/202214402007.
Повний текст джерелаBasmadjian, Robert. "Communication Vulnerabilities in Electric Mobility HCP Systems: A Semi-Quantitative Analysis." Smart Cities 4, no. 1 (March 20, 2021): 405–28. http://dx.doi.org/10.3390/smartcities4010023.
Повний текст джерелаKumar, Sumit, and Prof Dr Preeti Rai. "A STUDY ON SECURITY SERVICES AND THREATS IN CLOUD COMPUTING." International Journal of Engineering Applied Sciences and Technology 6, no. 9 (January 1, 2022): 249–55. http://dx.doi.org/10.33564/ijeast.2022.v06i09.036.
Повний текст джерелаHajda, Janusz, Ryszard Jakuszewski, and Szymon Ogonowski. "Security Challenges in Industry 4.0 PLC Systems." Applied Sciences 11, no. 21 (October 20, 2021): 9785. http://dx.doi.org/10.3390/app11219785.
Повний текст джерелаRaveendran, Reshna, and Kheira Tabet Aoul. "A Meta-Integrative Qualitative Study on the Hidden Threats of Smart Buildings/Cities and Their Associated Impacts on Humans and the Environment." Buildings 11, no. 6 (June 10, 2021): 251. http://dx.doi.org/10.3390/buildings11060251.
Повний текст джерелаVilic, Vida. "Phishing as a form of fraud identity theft in healthcare: Victimization during COVID-19 pandemic." Temida 25, no. 1 (2022): 53–78. http://dx.doi.org/10.2298/tem2201053v.
Повний текст джерелаBurov, Oleksandr. "The impact of cybercrime on the digital economy." Theory and Practice of Intellectual Property, no. 5 (November 17, 2021): 69–78. http://dx.doi.org/10.33731/52021.244519.
Повний текст джерелаMaraj, Arianit, and William Butler. "Taxonomy of Social Engineering Attacks: A Survey of Trends and Future Directions." International Conference on Cyber Warfare and Security 17, no. 1 (March 2, 2022): 185–93. http://dx.doi.org/10.34190/iccws.17.1.40.
Повний текст джерелаMazaraki, Nataliia, and Yulia Goncharova. "CYBER DIMENSION OF HYBRID WARS: ESCAPING A ‘GREY ZONE’ OF INTERNATIONAL LAW TO ADRESS ECONOMIC DAMAGES." Baltic Journal of Economic Studies 8, no. 2 (March 25, 2022): 115–20. http://dx.doi.org/10.30525/2256-0742/2022-8-2-115-120.
Повний текст джерелаGarcia, Denise. "Future arms, technologies, and international law: Preventive security governance." European Journal of International Security 1, no. 1 (January 27, 2016): 94–111. http://dx.doi.org/10.1017/eis.2015.7.
Повний текст джерелаJohri, Amar, and Shailendra Kumar. "Exploring Customer Awareness towards Their Cyber Security in the Kingdom of Saudi Arabia: A Study in the Era of Banking Digital Transformation." Human Behavior and Emerging Technologies 2023 (January 12, 2023): 1–10. http://dx.doi.org/10.1155/2023/2103442.
Повний текст джерелаPant, Sambid Bilas. "Non-Traditional Security Challenges for Nepal: A Case of Covid-19." Unity Journal 3, no. 01 (March 6, 2022): 278–91. http://dx.doi.org/10.3126/unityj.v3i01.43332.
Повний текст джерелаMitra, Poojarini, Kaustuv Bhattacharjee, Anirban Das, Susmita Das, Papiya Ghosh, Priya Gorai, and Sayani Maity. "REVIEW ON VULNERABILITIES AND CHALLENGES ON IOT SECURITY FRAMEWORKS IN DIVERSIFIED FIELDS OF APPLICATIONS." American Journal of Electronics & Communication 2, no. 1 (July 5, 2021): 1–3. http://dx.doi.org/10.15864/ajec.2101.
Повний текст джерелаKjamilji, Artrim, Arben Idrizi, Shkurte Luma-Osmani, and Ferihane Zenuni-Kjamilji. "Secure Naïve Bayes Classification without Loss of Accuracy with Application to Breast Cancer Prediction." Proceeding International Conference on Science and Engineering 3 (April 30, 2020): 397–403. http://dx.doi.org/10.14421/icse.v3.536.
Повний текст джерелаTaheri, Shayan, and Navid Asadizanjani. "An Overview of Medical Electronic Hardware Security and Emerging Solutions." Electronics 11, no. 4 (February 16, 2022): 610. http://dx.doi.org/10.3390/electronics11040610.
Повний текст джерелаAngelopoulos, Angelos, Emmanouel T. Michailidis, Nikolaos Nomikos, Panagiotis Trakadas, Antonis Hatziefremidis, Stamatis Voliotis, and Theodore Zahariadis. "Tackling Faults in the Industry 4.0 Era—A Survey of Machine-Learning Solutions and Key Aspects." Sensors 20, no. 1 (December 23, 2019): 109. http://dx.doi.org/10.3390/s20010109.
Повний текст джерелаBlaga, Nataliya, and Volodymyr Hobela. "IMPROVEMENT OF INFORMATION SECURITY OF THE COMMUNICATION PROCESS AT THE ENTERPRISE." Social & Legal Studios 13, no. 3 (September 29, 2021): 156–62. http://dx.doi.org/10.32518/2617-4162-2021-3-156-162.
Повний текст джерелаAhmed, Warmn, and Noor Ghazi M. Jameel. "Malicious URL Detection Using Decision Tree-based Lexical Features Selection and Multilayer Perceptron Model." UHD Journal of Science and Technology 6, no. 2 (November 13, 2022): 105–16. http://dx.doi.org/10.21928/uhdjst.v6n2y2022.pp105-116.
Повний текст джерелаSoderstrom, Naomi. "Putting some “sense” into our research." Meditari Accountancy Research 27, no. 6 (February 12, 2019): 883–92. http://dx.doi.org/10.1108/medar-11-2018-0396.
Повний текст джерелаChyzhov, Denys. "GENESIS OF THE FORMATION AND DEVELOPMENT OF HUMAN RIGHTS IN THE FIELD OF NATIONAL SECURITY." Administrative law and process, no. 1(34) (2022): 62–71. http://dx.doi.org/10.17721/2227-796x.2022.1.05.
Повний текст джерелаLin, Qingyuan, Rui Ming, Kailing Zhang, and Haibo Luo. "Privacy-Enhanced Intrusion Detection and Defense for Cyber-Physical Systems: A Deep Reinforcement Learning Approach." Security and Communication Networks 2022 (October 10, 2022): 1–9. http://dx.doi.org/10.1155/2022/4996427.
Повний текст джерелаNaidoo, Rennie, and Nicolaas Möller. "Building Software Applications Securely with DevSecOps: A Socio-Technical Perspective." European Conference on Cyber Warfare and Security 21, no. 1 (June 8, 2022): 198–205. http://dx.doi.org/10.34190/eccws.21.1.295.
Повний текст джерелаStevanović, Miroslav, and Dragan Đurđević. "The role of computer forensics in the fight against terrorism." Megatrend revija 17, no. 1 (2020): 129–42. http://dx.doi.org/10.5937/megrev2001129s.
Повний текст джерелаArchibald, Jacqueline M., and Karen Renaud. "Refining the PoinTER “human firewall” pentesting framework." Information & Computer Security 27, no. 4 (September 25, 2019): 575–600. http://dx.doi.org/10.1108/ics-01-2019-0019.
Повний текст джерела