[HTML][HTML] Learning from safety science: A way forward for studying cybersecurity incidents in organizations

N Ebert, T Schaltegger, B Ambuehl, L Schöni… - Computers & …, 2023 - Elsevier
In the aftermath of cybersecurity incidents within organizations, explanations of their causes
often revolve around isolated technical or human events such as an Advanced Persistent …

A principlist framework for cybersecurity ethics

P Formosa, M Wilson, D Richards - Computers & Security, 2021 - Elsevier
The ethical issues raised by cybersecurity practices and technologies are of critical
importance. However, there is disagreement about what is the best ethical framework for …

[PDF][PDF] Identifying behavioral constructs in relation to user cybersecurity behavior

T Mashiane, E Kritzinger - Eurasian Journal of Social …, 2021 - eurasianpublications.com
A behavior such as enabling two factor authentication has a positive impact on a users'
information security. It is assumed that given the benefits, users will want to perform this …

Layered structures of robustness and resilience: Evidence from cybersecurity projects for critical infrastructures in Central Europe

F Maurer, A Fritzsche - Strategic Change, 2023 - Wiley Online Library
The article studies cybersecurity projects from the perspective of social systems theory.
Measures taken to increase cybersecurity are aimed at the robustness and resilience of …

First be safe: Exploring and improving journalists' skills in digital security

J Frech, V Lilienthal, V Schönbächler - Journalism, 2024 - journals.sagepub.com
Despite the scientific significance of journalism practice, the gap between academic and
applied fields persists. In this paper, based on our project on the digital security of journalists …

Ethical considerations in maritime cybersecurity research

A Oruc - 2022 - ntnuopen.ntnu.no
Maritime transportation, an essential component of world trade, is performed by
contemporary vessels. Despite the improvements that rapid advances in technology have …

A Multi-level Reference Model and a Dedicated Method for Cyber-Security by Design: On the Example of the Electricity Sector

S de Kinderen, M Kaczmarek-Heß, S Hacks - Business & Information …, 2024 - Springer
The increased reliance of organizations on information technology inherently increases their
vulnerability to cyber-security attacks. As a response, a host of cyber-security approaches …

Insights into socio-technical interactions and implications-a discussion

R Narayan, G Macher - European Conference on Software Process …, 2023 - Springer
Abstract Information and communication technologies have dominant impacts in all spheres
of modern life. While these technologies offer the possibility to make the world a richer, more …

Islamic Digital Banking In The Light Of Maqasid Shariah: A Review Of Literatures: Perbankan Digital Islam Berasaskan Maqasid Syariah: Kajian Literatur

MR Ab Aziz, MZI Mustafar - Al-Qanatir: International Journal of …, 2021 - al-qanatir.com
The advancement of information and communication technology has transformed many
industries from manual-based to automatic-based activity and from offline to online …

Forschende in der Angriffsrolle: Zum besonderen forschungsethischen Bedarf in der IT-Sicherheit

S Weydner-Volkmann… - Zeitschrift für …, 2023 - praktische-philosophie.org
Infolge der tiefgreifenden Durchdringung unserer Lebenswelt mit digitalen Systemen hat
sich die gesamtgesellschaftliche Anforderung formiert, diese Systeme gegen immer neue …