7,038 Hits in 4.8 sec

Organizational Cybersecurity Journal editorial introduction

Gurvirender Tejay, Gary Klein
2021 Organizational Cybersecurity Journal: Practice, Process and People  
Karen Renaud and Jacques Ophoff promote understanding why SMEs do not implement cybersecurity best practice measures.  ...  Organizational Cybersecurity Journal: Practice, Process, and People (OCJ) seeks to publish advances in scientific knowledge directly related to cybersecurity management.  ... 
doi:10.1108/ocj-09-2021-017 fatcat:du7ubggfx5hw7bwzhfodei5pia

Educating Future Multidisciplinary Cybersecurity Teams

Jean R.S. Blair, Andrew O. Hall, Edward Sobiesk
2019 Computer  
Examples demonstrating the effectiveness of current and emerging multidisciplinary cybersecurity teams are included.  ...  and perspectives that emerged from their own discipline-centric methodological approaches.  ...  in a section that has people with their expertise, as in the law department, the cyber operations department, the human resources department, and so on) and then provide matrixed support to respond to  ... 
doi:10.1109/mc.2018.2884190 fatcat:paosodwyrrg2joiz5ya47ch6ae

Botching Human Factors in Cybersecurity in Business Organizations

Calvin Nobles
2018 Holistica  
Corporate executives, managers, and cybersecurity professionals rely extensively on technology to avert cybersecurity incidents.  ...  Human factors remained unexplored and underappreciated in information security.  ...  The DoD like many private organizations aims to reduce human error in cybersecurity by overly investing in technology (Department of Defense, 2015).  ... 
doi:10.2478/hjbpa-2018-0024 fatcat:63tffk2g2vdzzhrn5c5kqavxgy

The Current Network Security Situation and Emergency Network Response

2016 Chinese Journal of Engineering Science  
Current Cybersecurity Situation and Emergency Response of Cybersecurity.  ...  The core technology and security assurance in the existing emergency management mechanisms are relatively backward.  ...  It lacks practicability and maneuverability in practical applications. Apart from China, other major Internet or network-developed countries have developed national cybersecurity strategies [7] .  ... 
doi:10.15302/j-sscae-2016.06.017 fatcat:ydc6twhz3zeudesbtatozqgsp4

Digital divide on cybersecurity awareness among the Malaysian higher learning institution students

Kalaimagal Ramakrishnan, Norizan Mohd Yasin, Jeyarani Periasamy
2022 AIP Conference Proceedings  
Malaysia (CSM) department.  ...  In line with the Cybersecurity Malaysia, the study contributes to a betterment of society in Malaysia.  ...  Section B of the questionnaire requested on their Cybersecurity awareness and to understand their feedback on Cybersecurity in their department of study.  ... 
doi:10.1063/5.0092796 fatcat:guexnxh6rbefbcvdf24lkrmgei

Cybersecurity Management In the States: The Emerging Role of Chief Information Security Officers

Marilu Goodyear, Holly T. Goerdel, Shannon Portillo, Linda Williams
2010 Social Science Research Network  
States are also engaging in exercises that provide practice with cybersecurity scenarios sponsored by the Department of Homeland Security.  ...  These standard practices include an understanding of specific outcomes or goals the enterprise is committed to achieve.  ...  , build and run those solutions in a way that delivers bottom-line business value.  ... 
doi:10.2139/ssrn.2187412 fatcat:mjqtbmdlxndhpmligo7jkqzwbi

Journal of Cybersecurity and Privacy: A New Open Access Journal

Danda B. Rawat
2021 Journal of Cybersecurity and Privacy  
The Cybersecurity and Privacy field has been one of the most critical parts of our lives and modern society at large [...]  ...  He has secured over USD 16 million in research funding from the US National Science Foundation (NSF), US Department of Homeland Security (DHS), US National Security Agency (NSA), US Department of Energy  ...  Rawat was the recipient of NSF CAREER Award in 2016, Department of Homeland Security (DHS) Scientific Leadership Award in 2017, Researcher Exemplar Award 2019 and Graduate Faculty Exemplar Award 2019 from  ... 
doi:10.3390/jcp1010010 fatcat:yivv35ks2bdo3k3br6eqid5edm

Institutional Strategies for Cybersecurity in Higher Education Institutions

Eric C. K. Cheng, Tianchong Wang
2022 Information  
Publications that showcase best practices often lack system-wide perspectives towards cybersecurity in HEIs.  ...  Security Measures; (7) Paying Attention to Mobile Devices Use, Using Encryption as a Daily Practice; and (8) Risk Management.  ...  Fostering Communities of Practice (CoP) [63] may deepen the staff members' understanding of cybersecurity and contextualise the promising practices learned.  ... 
doi:10.3390/info13040192 fatcat:k3sdck53fngyjob5jtjjgbeq2u

Balancing Patient Safety, Clinical Efficacy, and Cybersecurity with Clinician Partners

Joseph Schneider, Axel Wirth
2021 Biomedical Instrumentation & Technology  
In its announcement, UCSD leadership wrote, "In his role, the medical director of cybersecurity will work closely with the security team in the Information Services (IS) department, to continue defending  ...  They also met ad hoc for emergencies.  ... 
doi:10.2345/0899-8205-55.1.21 pmid:33545718 pmcid:PMC8641426 fatcat:vmjeh6xpmrbapiqs3qewdqsg2y

The Looming Cybersecurity Crisis and What It Means for the Practice of Industrial and Organizational Psychology

Rachel C. Dreibelbis, Jaclyn Martin, Michael D. Coovert, David W. Dorsey
2018 Industrial and Organizational Psychology  
We focus on the unique roles of I-O psychologists in relation to the cyber realm and discuss the ways in which they can contribute to organizational cybersecurity efforts.  ...  In this article, we reflect on the idea of keeping pace with cyber, with a particular focus on the role of practicing I-O psychologists in assisting individuals, teams, and organizations.  ...  Although the roles of the practicing I-O psychologists in the cyber domain have yet to fully emerge, we now begin to explore this critical issue.  ... 
doi:10.1017/iop.2018.3 fatcat:66frykmrpbhydisvchgjq6n6ci

Cybersecurity Workforce Development Directions

Ronald Dodge, Costis Toregas, Lance J. Hoffman
2012 International Symposium on Human Aspects of Information Security and Assurance  
The cybersecurity workforce is one of the most critical employment sectors in the world.  ...  In this paper the authors report on efforts in the last two years to define the requirements for developing the cybersecurity workforce.  ...  Acknowledgements This material is based upon work supported in part by the National Science Foundation under grants DUE-0621334 and CISE-103956 and in part upon work supported by the U.S.  ... 
dblp:conf/haisa/DodgeTH12 fatcat:mjx2rs5um5cbbaczgmj3xwawly

Prelims [chapter]

2022 The Emerald Handbook of Higher Education in a Post-Covid World: New Approaches and Technologies for Teaching and Learning  
Recent cybersecurity education literature has focused on developments in cybersecurity curricula, qualifications and accreditation, pedagogy and practice to increase the number of cybersecurity professionals  ...  This chapter appraised and discussed the dangers in, and emerging threats to, using online environments.  ...  In order to embed effective cybersecurity in the classroom there is an expectation that the lecturer has a level of expertise and understanding of cybersecurity both in terms of the teaching environment  ... 
doi:10.1108/978-1-80382-193-120221017 fatcat:75pxwxq4gzbfxje7yzthwrnaz4

Cyber-diplomacy: the making of an international society in the digital age

André Barrinha, Thomas Renard
2017 Global Affairs  
It argues that cyber-diplomacy is an emerging international practice that is attempting to construct a cyber-international society, bridging the national interests of states with world society dynamicsthe  ...  predominant realm in which cyberspace has evolved in the last four decades.  ...  His research focuses on emerging security threats, mainly (counter-)terrorism and (counter-)radicalization in Belgium and in Europe, as well as cyber issues.  ... 
doi:10.1080/23340460.2017.1414924 fatcat:tu2gcpuinjgz7oljaagufg6afq


International Monetary Fund. Monetary and Capital Markets Department
2020 IMF Staff Country Reports  
Thus, good cybersecurity is a prerequisite for financial stability in Norway.  ...  made in Norway are digital (e.g., 475 card transactions per capita per annum)2 and there is an increase in new market entrants providing a broad range of services.  ...  for the second line cybersecurity activities, in line with international good practice.  ... 
doi:10.5089/9781513553146.002 fatcat:pknwdj2ok5d33anjyyabbzhnfu

Assessing Cyberbiosecurity Vulnerabilities and Infrastructure Resilience

Daniel S. Schabacker, Leslie-Anne Levy, Nate J. Evans, Jennifer M. Fowler, Ellen A. Dickey
2019 Frontiers in Bioengineering and Biotechnology  
However, increased access to biotechnology in the digital age has also introduced additional security concerns and ultimately, spawned the new discipline of cyberbiosecurity, which encompasses cybersecurity  ...  With the emergence of this new discipline comes the need for a logical, repeatable, and shared approach for evaluating facility and system vulnerabilities to cyberbiosecurity threats.  ...  Department of Energy, Office of Science, under contract DE-AC02-06CH11357.  ... 
doi:10.3389/fbioe.2019.00061 pmid:31001526 pmcid:PMC6455068 fatcat:jzrqyborybgz7cbvybhxjxkifi
« Previous Showing results 1 — 15 out of 7,038 results