Understanding the plural landscape of cybersecurity governance in Spain: a matter of capital exchange
C Del-Real, AM Díaz-Fernández - International Cybersecurity Law Review, 2022 - Springer
This paper empirically explores the contribution and collaborative networks of public and
private actors to cybersecurity provision in Spain. The article draws on data from three …
private actors to cybersecurity provision in Spain. The article draws on data from three …
[HTML][HTML] Advancing coordination in critical maritime infrastructure protection: Lessons from maritime piracy and cybersecurity
T Liebetrau, C Bueger - International Journal of Critical Infrastructure …, 2024 - Elsevier
Critical maritime infrastructure protection has become a priority in ocean governance,
particularly in Europe. Increased geopolitical tensions, regional conflicts, and the Nord …
particularly in Europe. Increased geopolitical tensions, regional conflicts, and the Nord …
Water 4.0 in Hungary: Prospects and Cybersecurity Concerns
T Szádeczky - Acta Polytechnica Hungarica, 2023 - real.mtak.hu
This paper discusses the increasing significance of smart water management, within the
context of the fourth industrial revolution and the associated cybersecurity risks, particularly …
context of the fourth industrial revolution and the associated cybersecurity risks, particularly …
Industry 4.0-based critical infrastructure and the NIS Directive
Z Bederna, T Szadeczky - Proceedings of the Central and Eastern …, 2022 - dl.acm.org
Industrial automatization and robotization make the manufacturing and all industrial
processes more effective and robust. Industrial control systems consist of many specific …
processes more effective and robust. Industrial control systems consist of many specific …
Legal Assessment of the National Cybersecurity System in Poland in the Light of the New Developments in the NIS2 Directive
A Besiekierska - 2023 46th MIPRO ICT and Electronics …, 2023 - ieeexplore.ieee.org
The Polish Act on the National Cybersecurity System was adopted on 5 July 2018. Unlike
with the NIS Directive, which it implemented, the scope of its regulation covered public …
with the NIS Directive, which it implemented, the scope of its regulation covered public …
A multi-layered security model to counter social engineering attacks: a learning-based approach
L Edwards, M Zahid Iqbal, M Hassan - International Cybersecurity Law …, 2024 - Springer
Social engineering is a malicious technique that leverages deception and manipulation to
exploit the cognitive biases and heuristics of human behaviour, causing severe threats to …
exploit the cognitive biases and heuristics of human behaviour, causing severe threats to …
Understanding Public Perception of Internet Security in the European Union
This paper presents an extensive analysis of Internet security experiences and perceptions
among European Union (EU) citizens, as detailed by data within commented graphics …
among European Union (EU) citizens, as detailed by data within commented graphics …
EU Cybersecurity Theory and Practice
I Stankov - 2023 31st National Conference with International …, 2023 - ieeexplore.ieee.org
In an increasingly digitized world the need to provide cyber protection is a critical factor for
the existence and proper functioning of a number of important information systems and the …
the existence and proper functioning of a number of important information systems and the …
The Impact of the War in Ukraine on the Information Security of the European Union's Banking Industry–A Case Study of Hungary And Slovakia
T Somogyi, R Nagy - CONTEMPORARY MILITARY CHALLENGES, 2023 - sciendo.com
Besides the constant threat of cyber terrorism (Kenney, 2015), guided cyber-attacks have
been experienced in recent conflicts, eg in Georgia (Besenyő, 2008) and in Estonia (Blank …
been experienced in recent conflicts, eg in Georgia (Besenyő, 2008) and in Estonia (Blank …
US-Based, Medium-Sized Organizations' Cybersecurity Investment
J Katibai - 2023 - search.proquest.com
This research presented on the topic of US-based medium-sized organizational
cybersecurity investment. Organizational cybersecurity investment has increased due to an …
cybersecurity investment. Organizational cybersecurity investment has increased due to an …