[HTML][HTML] Identifying resilience strategies for disruption management in the healthcare supply chain during COVID-19 by digital innovations: A systematic literature …
The worldwide spread of the COVID-19 disease has had a catastrophic effect on healthcare
supply chains. The current manuscript systematically analyzes existing studies mitigating …
supply chains. The current manuscript systematically analyzes existing studies mitigating …
Continuous improvement in information security: A review of lessons from superannuation cybersecurity uplift programs
As organizations grapple with the escalating threat landscape in the digital age, the
imperative for continuous improvement in information security has become paramount. This …
imperative for continuous improvement in information security has become paramount. This …
[HTML][HTML] Cybersecurity Awareness and Training (CAT) framework for remote working employees
Currently, cybersecurity plays an essential role in computing and information technology
due to its direct effect on organizations' critical assets and information. Cybersecurity is …
due to its direct effect on organizations' critical assets and information. Cybersecurity is …
[HTML][HTML] Combining sociocultural intelligence with Artificial Intelligence to increase organizational cyber security provision through enhanced resilience
PRJ Trim, YI Lee - Big Data and Cognitive Computing, 2022 - mdpi.com
Although artificial intelligence (AI) and machine learning (ML) can be deployed to improve
cyber security management, not all managers understand the different types of AI/ML and …
cyber security management, not all managers understand the different types of AI/ML and …
Formación y concienciación en ciberseguridad basada en competencias: una revisión sistemática de literatura
J Mendivil Caldentey, B Sanz Urquijo… - Pixel-Bit: Revista de …, 2022 - idus.us.es
La capacidad de una organización para hacer frente a las amenazas y vulnerabilidades
depende en gran medida de los niveles de formación y concienciación en ciberseguridad …
depende en gran medida de los niveles de formación y concienciación en ciberseguridad …
[HTML][HTML] EE-ISAC—practical cybersecurity solution for the energy sector
T Wallis, R Leszczyna - Energies, 2022 - mdpi.com
A recent survey of cybersecurity assessment methods proposed by the scientific community
revealed that their practical adoption constitutes a great challenge. Further research that …
revealed that their practical adoption constitutes a great challenge. Further research that …
[HTML][HTML] Bth: Behavior-based structured threat hunting framework to analyze and detect advanced adversaries
Organizations of every size and industry are facing a new normal. Adversaries have become
more sophisticated and persistent than ever before. Every network is facing never-ending …
more sophisticated and persistent than ever before. Every network is facing never-ending …
[PDF][PDF] Exploring the effectiveness of cybersecurity training programs: factors, best practices, and future directions
S Nasir - Proceedings of the Cyber Secure Nigeria Conference, 2023 - researchgate.net
Cybersecurity education is essential in equipping individuals with the proper knowledge and
skill sets to protect devices, computers, networks and data from cybersecurity risk. This …
skill sets to protect devices, computers, networks and data from cybersecurity risk. This …
Towards roles and responsibilities in a Cyber Security Awareness Framework for South African Small, Medium, and Micro Enterprises (SMMEs)
TK Lejaka, A da Veiga, M Loock - International Symposium on Human …, 2023 - Springer
Abstract Internet users including Small, Medium and Micro Enterprises (SMMEs) can access
a variety of global opportunities through cyberspace however SMMEs are also targets of …
a variety of global opportunities through cyberspace however SMMEs are also targets of …
[HTML][HTML] Dynamic awareness and strategic adaptation in cybersecurity: A game-theory approach
K Kostelić - Games, 2024 - mdpi.com
Awareness and human factors are becoming ever more important in cybersecurity,
particularly in the context of small companies that may need more resources to deal with …
particularly in the context of small companies that may need more resources to deal with …