[HTML][HTML] Moving towards agile cybersecurity incident response: A case study exploring the enabling role of big data analytics-embedded dynamic capabilities
Organizations are at risk of cyber-attacks more than ever before due to the ongoing
digitalization of business operations. Industry reports indicate that it is not a matter of if but …
digitalization of business operations. Industry reports indicate that it is not a matter of if but …
AI-driven cloud security: Examining the impact of user behavior analysis on threat detection
This study explores the comparative effectiveness of AI-driven user behavior analysis and
traditional security measures in cloud computing environments. It specifically examines their …
traditional security measures in cloud computing environments. It specifically examines their …
[PDF][PDF] Cyber resilience framework: Strengthening defenses and enhancing continuity in business security
A AL-Hawamleh - International Journal of Computing and Digital …, 2024 - researchgate.net
This study presents a comprehensive Cybersecurity Resilience Framework designed to
fortify organizational defenses against the evolving landscape of cyber threats while …
fortify organizational defenses against the evolving landscape of cyber threats while …
Cyber risk management strategies and integration: toward supply chain cyber resilience and robustness
Purpose Despite the proliferation of cyberthreats upon the supply chain (SC) at large,
knowledge on SC cybersecurity is scarce and predominantly conceptual or descriptive …
knowledge on SC cybersecurity is scarce and predominantly conceptual or descriptive …
[HTML][HTML] Developing a data breach protection capability framework in retailing
Protecting data in retail operations is vital in the age of data-driven digital transformation.
Businesses face a constant challenge from data breaches due to the unpredictable and …
Businesses face a constant challenge from data breaches due to the unpredictable and …
Autonomous Threat Hunting: A Future Paradigm for AI-Driven Threat Intelligence
SR Sindiramutty - arXiv preprint arXiv:2401.00286, 2023 - arxiv.org
The evolution of cybersecurity has spurred the emergence of autonomous threat hunting as
a pivotal paradigm in the realm of AI-driven threat intelligence. This review navigates …
a pivotal paradigm in the realm of AI-driven threat intelligence. This review navigates …
[HTML][HTML] Effects of Visual Risk Indicators on Phishing Detection Behavior: An Eye-Tracking Experiment
D Baltuttis, T Teubner - Computers & Security, 2024 - Elsevier
Cybersecurity vulnerability ranks among the foremost global business risks. Phishing
attempts, in particular through email, persistently challenge organizations despite …
attempts, in particular through email, persistently challenge organizations despite …
[引用][C] Comparative review of big data analytics and GIS in healthcare decision-making
OJ Akindote, AO Adegbite… - World Journal …, 2023 - World Journal of Advanced …
Policy helix and antecedents of cybersecurity policymaking agility
The cyber threat landscape is constantly changing, and organisations need to stay current
with the dynamism of their internal and external environment. One important aspect is to be …
with the dynamism of their internal and external environment. One important aspect is to be …
[HTML][HTML] Toward Dynamic Data-Driven Time-Slicing LSH for Joinable Table Discovery
W Wang, C Zhu, H Yan - Electronics, 2024 - mdpi.com
In legacy industrial systems, discovering joinable information between database tables is
important for applications such as data integration and data analysis. Locality-Sensitive …
important for applications such as data integration and data analysis. Locality-Sensitive …