Building a thematic framework of cybersecurity: a systematic literature review approach

TY Khaw, A Amran, AP Teoh - Journal of Systems and Information …, 2024 - emerald.com
Purpose This paper aims to explore the factors affecting cybersecurity implementation in
organizations in various countries and develop a cybersecurity framework to improve …

Key parameters linking cyber-physical trust anchors with embedded internet of things systems

M Maasberg, LG Butler, I Taylor - Frontiers in Communications and …, 2023 - frontiersin.org
Integration of the Internet of Things (IoT) in the automotive industry has brought benefits as
well as security challenges. Significant benefits include enhanced passenger safety and …

An Ontology and Guidelines for Cybersecurity Risk Assessment in the Automotive Domain

K Khalil - 2023 - diva-portal.org
This study aims to propose a knowledge base ontology for the ISO/SAE 21434 cybersecurity
risk assessment activities in the automotive domain. The focus of the paper is to model how …

[HTML][HTML] Publication Pattern and Research Assessment of Cyber Security: A Bibliometric Study

S Ali, M Mushtaq - 2024 - intechopen.com
In today's digital age, where technology shapes our lives, the importance of cyber security
cannot be overstated. As technology advances, the need for cyber security becomes crucial …

A Thematic Qualitative Study: The Influence of Executive Leadership on Cybersecurity in Operational Technology (OT) for Critical Industries

D Chowdhury - 2024 - search.proquest.com
The purpose of this qualitative study is to investigate how C-level executives and board
members influence the development and effectiveness of cybersecurity strategies within …

[PDF][PDF] CYBERSECURITY REGULATION. SYSTEMATIC LITERATURE REVIEW.

BP SANTOS - 2023 - run.unl.pt
Cybersecurity Regulation is becoming an increasing topic as more activities, namely trade
and business, rely on cyber infrastructures. Therefore, regulating this strategic cyber …

Human Factors in Security Risk Analysis of Software Systems: A Systematic Literature Review

WB Mbaka, S Gerwen - Available at SSRN 4799844 - papers.ssrn.com
Security risk analysis techniques are used to inspect the software system for potential
security threats, identify top-priority risks, and plan for security countermeasures. In light of …