Works matching Cybersecurity
Results: 5000
Penerapan Kerangka Kerja NIST Cybersecurity dan CIS Controls sebagai Manajemen Risiko Keamanan Siber.
- Published in:
- Techno.com, 2023, v. 22, n. 3, p. 527, doi. 10.33633/tc.v22i3.8491
- By:
- Publication type:
- Article
INFORMATION SECURITY FOR ELECTRIC CARS IN ACCORDANCE WITH NIST CRITICAL INFRASTRUCTURE CYBERSECURITY FRAMEWORK.
- Published in:
- Military Engineer / Hadmérnök, 2017, v. 12, n. 4, p. 195
- By:
- Publication type:
- Article
The Disclosures of Information on Cybersecurity in Listed Companies in Latin America—Proposal for a Cybersecurity Disclosure Index.
- Published in:
- Sustainability (2071-1050), 2022, v. 14, n. 3, p. 1390, doi. 10.3390/su14031390
- By:
- Publication type:
- Article
Assessing Employees' Cybersecurity Attitude Based on Working and Cybersecurity Threat Experience.
- Published in:
- African Journal of Information Systems, 2023, v. 15, n. 3, p. 207
- By:
- Publication type:
- Article
Expert assessment of organizational cybersecurity programs and development of vignettes to measure cybersecurity countermeasures awareness.
- Published in:
- Online Journal of Applied Knowledge Management, 2018, v. 6, n. 1, p. 67, doi. 10.36965/ojakm.2018.6(1)67-80
- By:
- Publication type:
- Article
CYBERSECURITY RISKS AND ITS REGULATIONS. THE PHILOSOPHY OF CYBERSECURITY AUDIT.
- Published in:
- Wisdom, 2023, v. 25, n. 1, p. 67, doi. 10.24234/wisdom.v25i1.970
- By:
- Publication type:
- Article
An Effective Cybersecurity Training Model to Support an Organizational Awareness Program: The Cybersecurity Awareness TRAining Model (CATRAM). A Case Study in Canada.
- Published in:
- Journal of Cases on Information Technology, 2019, v. 21, n. 3, p. N.PAG, doi. 10.4018/JCIT.2019070102
- By:
- Publication type:
- Article
A rough cut cybersecurity investment using portfolio of security controls with maximum cybersecurity value.
- Published in:
- International Journal of Production Research, 2022, v. 60, n. 21, p. 6556, doi. 10.1080/00207543.2021.1994166
- By:
- Publication type:
- Article
Organizational Learning from Cybersecurity Performance: Effects on Cybersecurity Investment Decisions.
- Published in:
- Information Systems Frontiers, 2024, v. 26, n. 3, p. 1109, doi. 10.1007/s10796-023-10404-7
- By:
- Publication type:
- Article
Cybersecurity strategy: future proof cybersecurity for small to medium enterprises in South Africa.
- Published in:
- International Journal of Research in Business & Social Science, 2024, v. 13, p. 15, doi. 10.20525/ijrbs.v13i4.3308
- By:
- Publication type:
- Article
BALANCING CYBERSECURITY POLICIES AND INSTITUTIONAL ETHICS: A LEGAL AND CULTURAL PERSPECTIVE ON HIGHER EDUCATION FRAMEWORKS.
- Published in:
- Environmental & Social Management Journal / Revista de Gestão Social e Ambiental, 2025, v. 19, n. 1, p. 1, doi. 10.24857/rgsa.v19n1-049
- By:
- Publication type:
- Article
The influence of traditional cybersecurity training on user attitudes towards VR cybersecurity training.
- Published in:
- Issues in Information Systems, 2023, v. 24, n. 1, p. 101, doi. 10.48009/1_iis_2023_109
- By:
- Publication type:
- Article
Organizational Cybersecurity Systems and Sustainable Business Performance of Small and Medium Enterprises (SMEs) in Saudi Arabia: The Mediating and Moderating Role of Cybersecurity Resilience and Organizational Culture.
- Published in:
- Sustainability (2071-1050), 2024, v. 16, n. 5, p. 1880, doi. 10.3390/su16051880
- By:
- Publication type:
- Article
Cybersecurity Cost of Quality: Managing the Costs of Cybersecurity Risk Management.
- Published in:
- Software Quality Professional, 2017, v. 19, n. 4, p. 25
- By:
- Publication type:
- Article
Citizen-centric cybersecurity model for promoting good cybersecurity behaviour.
- Published in:
- Journal of Cyber Security Technology, 2023, v. 7, n. 3, p. 154, doi. 10.1080/23742917.2023.2217535
- By:
- Publication type:
- Article
A meta-model of cybersecurity curriculums: Assessing cybersecurity curricular frameworks for business schools.
- Published in:
- Journal of Education for Business, 2021, v. 96, n. 2, p. 99, doi. 10.1080/08832323.2020.1757594
- By:
- Publication type:
- Article
METHODOLOGY BASED ON THE NIST CYBERSECURITY FRAMEWORK AS A PROPOSAL FOR CYBERSECURITY MANAGEMENT IN GOVERNMENT ORGANIZATIONS.
- Published in:
- 3C TIC, 2021, v. 10, n. 2, p. 123, doi. 10.17993/3ctic.2021.102.123-141
- By:
- Publication type:
- Article
Cybersecurity Resiliency of Marine Renewable Energy Systems Part 2: Cybersecurity Best Practices and Risk Management.
- Published in:
- Marine Technology Society Journal, 2021, v. 55, n. 2, p. 104, doi. 10.4031/mtsj.55.2.4
- By:
- Publication type:
- Article
Cybersecurity Resiliency of Marine Renewable Energy Systems-Part 1: Identifying Cybersecurity Vulnerabilities and Determining Risk.
- Published in:
- Marine Technology Society Journal, 2020, v. 54, n. 6, p. 97, doi. 10.4031/mtsj.54.6.9
- By:
- Publication type:
- Article
Avoidance of Cybersecurity Threats with the Deployment of a Web-Based Blockchain-Enabled Cybersecurity Awareness System.
- Published in:
- Applied Sciences (2076-3417), 2021, v. 11, n. 17, p. 7880, doi. 10.3390/app11177880
- By:
- Publication type:
- Article
Accountants, Cybersecurity Isn't Just for "Techies": Incorporating Cybersecurity into the Accounting Curriculum.
- Published in:
- Issues in Accounting Education, 2022, v. 37, n. 3, p. 73, doi. 10.2308/ISSUES-2021-001
- By:
- Publication type:
- Article
Cybersecurity Maturity of Türkiye: An Assessment with ENISA's National Capabilities Assessment Framework (NCAF).
- Published in:
- Journal of Defense Sciences / Savunma Bilmleri Dergisi, 2024, v. 20, n. 2, p. 191, doi. 10.17134/khosbd.1450078
- By:
- Publication type:
- Article
Impact of Cybersecurity and AI's Related Factors on Incident Reporting Suspicious Behaviour and Employees Stress: Moderating Role of Cybersecurity Training.
- Published in:
- International Journal of Cyber Criminology, 2024, v. 18, n. 1, p. 83, doi. 10.5281/zenodo.4766805
- By:
- Publication type:
- Article
Impact of Digital Literacy and Online Privacy Concerns on Cybersecurity Behaviour: The Moderating Role of Cybersecurity Awareness.
- Published in:
- International Journal of Cyber Criminology, 2023, v. 17, n. 2, p. 166, doi. 10.5281/zenodo.4766711
- By:
- Publication type:
- Article
The evolution of global cybersecurity norms in the digital age: A longitudinal study of the cybersecurity norm development process.
- Published in:
- Information Security Journal: A Global Perspective, 2024, v. 33, n. 3, p. 204, doi. 10.1080/19393555.2023.2201482
- By:
- Publication type:
- Article
Leveraging Emerging Cybersecurity Reporting Regulations: The Effect of Industry Driven Expectations for Voluntary Assurance.
- Published in:
- Accounting Horizons, 2025, v. 39, n. 1, p. 183, doi. 10.2308/HORIZONS-2023-088
- By:
- Publication type:
- Article
Economics of Cybersecurity Investment and Information Sharing: Firm Decision Making Under Policy Constraints.
- Published in:
- Systems, 2025, v. 13, n. 2, p. 83, doi. 10.3390/systems13020083
- By:
- Publication type:
- Article
全球治理与国内挑战:印度网络安全战略多元主义路径研究.
- Published in:
- Cyber Security & Data Governance, 2025, v. 44, n. 1, p. 30, doi. 10.19358/j.issn.2097-1788.2025.01.005
- By:
- Publication type:
- Article
网络安全等级保护制度下的数据安全研究.
- Published in:
- Cyber Security & Data Governance, 2023, v. 42, n. 12, p. 67, doi. 10.19358/j.issn.2097-1788.2023.12.011
- By:
- Publication type:
- Article
The impact of regulatory mechanisms on vulnerability disclosure behavior during crowdsourcing cybersecurity testing.
- Published in:
- Electronic Research Archive, 2023, v. 31, n. 11, p. 1, doi. 10.3934/mbe.2023841
- By:
- Publication type:
- Article
دور تطبيق معاييراألمن السيبراني على التميزالتنظيمي – دراسة ميدانية على أعضاء هيئة التدريس في جامعة طيبة باملدينة املنورة لعام –2023/202.
- Published in:
- Journal of Economic Administrative & Legal Sciences, 2023, v. 7, n. 10, p. 33, doi. 10.26389/AJSRP.C230123
- By:
- Publication type:
- Article
- دور األمن السيبراني في تحقيق امليزة التنافسية – دراسة ميدانية على موظفي مطارامللك عبد العزيزالدولي بجدة.
- Published in:
- Journal of Economic Administrative & Legal Sciences, 2021, v. 5, n. 9, p. 144, doi. 10.26389/AJSRP.D081020
- By:
- Publication type:
- Article
دور الأمن السيبراني في التقليل من أعداد الجرائم الإلكترونية في محافظة العقبة " باستخدام نظم المعلومات الجغرافية ".
- Published in:
- Journal of Humanities & Social Sciences (2522-3380), 2024, v. 8, n. 8, p. 14, doi. 10.26389/ajsrp.r130624
- By:
- Publication type:
- Article
مستوى وعي معلمات قبل الخدمة في كلية التربية بجامعة الكويت بالأمن السيبراني.
- Published in:
- Journal of Education - Sohag University, 2024, v. 118, n. 118, p. 237, doi. 10.12816/EDUSOHAG.2024
- By:
- Publication type:
- Article
متطلبات تحقيق الأمن السيبراني في الجامعات المصرية من وجهة نظر هيئة التدريس في ظل التحول الرقمي أعضاء.
- Published in:
- Journal of Education - Sohag University, 2023, v. 105, n. 105, p. 737, doi. 10.12816/EDUSOHAG.2023
- By:
- Publication type:
- Article
STBM: secure and trustworthy blockchain-based model for cybersecurity service transactions.
- Published in:
- Journal on Communication / Tongxin Xuebao, 2024, v. 45, n. 9, p. 68, doi. 10.11959/j.issn.1000-436x.2024158
- By:
- Publication type:
- Article
基于软提示微调和强化学习的网络安全命名实体识别方法研究.
- Published in:
- Journal on Communication / Tongxin Xuebao, 2024, v. 45, n. 10, p. 1, doi. 10.11959/j.issn.1000-436x.2024183
- By:
- Publication type:
- Article
融合对抗主动学习的网络安全知识三元组抽取.
- Published in:
- Journal on Communication / Tongxin Xuebao, 2020, v. 41, n. 10, p. 80, doi. 10.11959/j.issn.1000-436x.2020174
- By:
- Publication type:
- Article
Toward a cybersecurity curriculum model for undergraduate business schools: A survey of AACSB-accredited institutions in the United States.
- Published in:
- Journal of Education for Business, 2017, v. 92, n. 1, p. 1, doi. 10.1080/08832323.2016.1261790
- By:
- Publication type:
- Article
Analysis of Türkiye's Cybersecurity Strategies: Historical Developments, Scope, Content and Objectives.
- Published in:
- Sakarya University Journal of Science (SAUJS) / Sakarya Üniversitesi Fen Bilimleri Enstitüsü Dergisi, 2024, v. 28, n. 1, p. 204, doi. 10.16984/saufenbilder.1249760
- By:
- Publication type:
- Article
The Critical Role of Human Resources in Mitigating and Managing Cybersecurity Risks in Modern Organizations: A Strategic Approach.
- Published in:
- Psychosociological Issues in Human Resource Management, 2024, v. 12, n. 2, p. 18
- By:
- Publication type:
- Article
Development of the Concept of Cybersecurity of the Organization.
- Published in:
- TEM Journal, 2021, v. 10, n. 3, p. 1447, doi. 10.18421/TEM103-57
- By:
- Publication type:
- Article
Determining a Return on Investment for Cybersecurity Technologies in Networked Critical Infrastructures.
- Published in:
- International Journal of Organizational & Collective Intelligence, 2021, v. 11, n. 2, p. 1, doi. 10.4018/IJOCI.2021040105
- By:
- Publication type:
- Article
Cybersecurity Skills among European High-School Students: A New Approach in the Design of Sustainable Educational Development in Cybersecurity.
- Published in:
- Sustainability (2071-1050), 2022, v. 14, n. 8, p. N.PAG, doi. 10.3390/su14084763
- By:
- Publication type:
- Article
Building a Sustainable Cybersecurity Culture.
- Published in:
- Central Asia & the Caucasus (14046091), 2022, v. 23, n. 1, p. 1521, doi. 10.37178/ca-c.23.1.157
- By:
- Publication type:
- Article
Cybersecurity Workforce Landscape, Education, and Industry Growth Prospects in Southeast Asia.
- Published in:
- Journal of Tropical Futures: Sustainable Business, Governance & Development (JTF), 2024, v. 1, n. 2, p. 172, doi. 10.1177/27538931231176903
- By:
- Publication type:
- Article
دوحة الوعي بالأمن اسواني ددى الاشخاص ذوي الاعاقة السربة في اسلكة العربية اسعودية من وحمة نفلودم
- Published in:
- Journal of Special Education & Rehabilitation (2314-8608), 2022, v. 14, n. 50, Part 2, p. 1
- By:
- Publication type:
- Article
THE NATIONAL CYBERSECURITY SYSTEM IN THE LIGHT OF THE SCIENCE OF ADMINISTRATIVE LAW. SELECTED NOTES.
- Published in:
- International Journal of Legal Studies ( IJOLS ), 2023, v. 13, n. 1, p. 13, doi. 10.5604/01.3001.0053.9004
- By:
- Publication type:
- Article
A rendfenntartó szervek 21. századi kihívásai: Kiberbiztonság a 21. században.
- Published in:
- National Security Review / Nemzetbiztonsági Szemle, 2022, v. 10, n. 2, p. 40, doi. 10.32561/nsz.2022.2.3
- By:
- Publication type:
- Article
Validity and reliability of Cybersecurity Judgment Questionnaire for middle and high school students: A validation study with Rasch analysis.
- Published in:
- Human Behavior & Emerging Technologies, 2021, v. 3, n. 5, p. 776, doi. 10.1002/hbe2.312
- By:
- Publication type:
- Article