Understanding the plural landscape of cybersecurity governance in Spain: a matter of capital exchange

C Del-Real, AM Díaz-Fernández - International Cybersecurity Law Review, 2022 - Springer
This paper empirically explores the contribution and collaborative networks of public and
private actors to cybersecurity provision in Spain. The article draws on data from three …

[HTML][HTML] Advancing coordination in critical maritime infrastructure protection: Lessons from maritime piracy and cybersecurity

T Liebetrau, C Bueger - International Journal of Critical Infrastructure …, 2024 - Elsevier
Critical maritime infrastructure protection has become a priority in ocean governance,
particularly in Europe. Increased geopolitical tensions, regional conflicts, and the Nord …

Water 4.0 in Hungary: Prospects and Cybersecurity Concerns

T Szádeczky - Acta Polytechnica Hungarica, 2023 - real.mtak.hu
This paper discusses the increasing significance of smart water management, within the
context of the fourth industrial revolution and the associated cybersecurity risks, particularly …

Industry 4.0-based critical infrastructure and the NIS Directive

Z Bederna, T Szadeczky - Proceedings of the Central and Eastern …, 2022 - dl.acm.org
Industrial automatization and robotization make the manufacturing and all industrial
processes more effective and robust. Industrial control systems consist of many specific …

Legal Assessment of the National Cybersecurity System in Poland in the Light of the New Developments in the NIS2 Directive

A Besiekierska - 2023 46th MIPRO ICT and Electronics …, 2023 - ieeexplore.ieee.org
The Polish Act on the National Cybersecurity System was adopted on 5 July 2018. Unlike
with the NIS Directive, which it implemented, the scope of its regulation covered public …

A multi-layered security model to counter social engineering attacks: a learning-based approach

L Edwards, M Zahid Iqbal, M Hassan - International Cybersecurity Law …, 2024 - Springer
Social engineering is a malicious technique that leverages deception and manipulation to
exploit the cognitive biases and heuristics of human behaviour, causing severe threats to …

Understanding Public Perception of Internet Security in the European Union

VM Vargas, M Oancea, CA Teodorescu… - Proceedings of the …, 2024 - sciendo.com
This paper presents an extensive analysis of Internet security experiences and perceptions
among European Union (EU) citizens, as detailed by data within commented graphics …

EU Cybersecurity Theory and Practice

I Stankov - 2023 31st National Conference with International …, 2023 - ieeexplore.ieee.org
In an increasingly digitized world the need to provide cyber protection is a critical factor for
the existence and proper functioning of a number of important information systems and the …

The Impact of the War in Ukraine on the Information Security of the European Union's Banking Industry–A Case Study of Hungary And Slovakia

T Somogyi, R Nagy - CONTEMPORARY MILITARY CHALLENGES, 2023 - sciendo.com
Besides the constant threat of cyber terrorism (Kenney, 2015), guided cyber-attacks have
been experienced in recent conflicts, eg in Georgia (Besenyő, 2008) and in Estonia (Blank …

US-Based, Medium-Sized Organizations' Cybersecurity Investment

J Katibai - 2023 - search.proquest.com
This research presented on the topic of US-based medium-sized organizational
cybersecurity investment. Organizational cybersecurity investment has increased due to an …