[HTML][HTML] Identifying resilience strategies for disruption management in the healthcare supply chain during COVID-19 by digital innovations: A systematic literature …

G Arji, H Ahmadi, P Avazpoor, M Hemmat - Informatics in Medicine …, 2023 - Elsevier
The worldwide spread of the COVID-19 disease has had a catastrophic effect on healthcare
supply chains. The current manuscript systematically analyzes existing studies mitigating …

Continuous improvement in information security: A review of lessons from superannuation cybersecurity uplift programs

TO Abrahams, OA Farayola, OO Amoo… - International Journal of …, 2024 - ijsra.net
As organizations grapple with the escalating threat landscape in the digital age, the
imperative for continuous improvement in information security has become paramount. This …

[HTML][HTML] Cybersecurity Awareness and Training (CAT) framework for remote working employees

M Hijji, G Alam - Sensors, 2022 - mdpi.com
Currently, cybersecurity plays an essential role in computing and information technology
due to its direct effect on organizations' critical assets and information. Cybersecurity is …

[HTML][HTML] Combining sociocultural intelligence with Artificial Intelligence to increase organizational cyber security provision through enhanced resilience

PRJ Trim, YI Lee - Big Data and Cognitive Computing, 2022 - mdpi.com
Although artificial intelligence (AI) and machine learning (ML) can be deployed to improve
cyber security management, not all managers understand the different types of AI/ML and …

Formación y concienciación en ciberseguridad basada en competencias: una revisión sistemática de literatura

J Mendivil Caldentey, B Sanz Urquijo… - Pixel-Bit: Revista de …, 2022 - idus.us.es
La capacidad de una organización para hacer frente a las amenazas y vulnerabilidades
depende en gran medida de los niveles de formación y concienciación en ciberseguridad …

[HTML][HTML] EE-ISAC—practical cybersecurity solution for the energy sector

T Wallis, R Leszczyna - Energies, 2022 - mdpi.com
A recent survey of cybersecurity assessment methods proposed by the scientific community
revealed that their practical adoption constitutes a great challenge. Further research that …

[HTML][HTML] Bth: Behavior-based structured threat hunting framework to analyze and detect advanced adversaries

A Bhardwaj, K Kaushik, A Alomari, A Alsirhani… - Electronics, 2022 - mdpi.com
Organizations of every size and industry are facing a new normal. Adversaries have become
more sophisticated and persistent than ever before. Every network is facing never-ending …

[PDF][PDF] Exploring the effectiveness of cybersecurity training programs: factors, best practices, and future directions

S Nasir - Proceedings of the Cyber Secure Nigeria Conference, 2023 - researchgate.net
Cybersecurity education is essential in equipping individuals with the proper knowledge and
skill sets to protect devices, computers, networks and data from cybersecurity risk. This …

Towards roles and responsibilities in a Cyber Security Awareness Framework for South African Small, Medium, and Micro Enterprises (SMMEs)

TK Lejaka, A da Veiga, M Loock - International Symposium on Human …, 2023 - Springer
Abstract Internet users including Small, Medium and Micro Enterprises (SMMEs) can access
a variety of global opportunities through cyberspace however SMMEs are also targets of …

[HTML][HTML] Dynamic awareness and strategic adaptation in cybersecurity: A game-theory approach

K Kostelić - Games, 2024 - mdpi.com
Awareness and human factors are becoming ever more important in cybersecurity,
particularly in the context of small companies that may need more resources to deal with …