[HTML][HTML] Moving towards agile cybersecurity incident response: A case study exploring the enabling role of big data analytics-embedded dynamic capabilities

A Naseer, H Naseer, A Ahmad, SB Maynard… - Computers & …, 2023 - Elsevier
Organizations are at risk of cyber-attacks more than ever before due to the ongoing
digitalization of business operations. Industry reports indicate that it is not a matter of if but …

AI-driven cloud security: Examining the impact of user behavior analysis on threat detection

SO Olabanji, Y Marquis, CS Adigwe… - Asian Journal of …, 2024 - papers.ssrn.com
This study explores the comparative effectiveness of AI-driven user behavior analysis and
traditional security measures in cloud computing environments. It specifically examines their …

[PDF][PDF] Cyber resilience framework: Strengthening defenses and enhancing continuity in business security

A AL-Hawamleh - International Journal of Computing and Digital …, 2024 - researchgate.net
This study presents a comprehensive Cybersecurity Resilience Framework designed to
fortify organizational defenses against the evolving landscape of cyber threats while …

Cyber risk management strategies and integration: toward supply chain cyber resilience and robustness

A Jazairy, M Brho, I Manuj, TJ Goldsby - International Journal of …, 2024 - emerald.com
Purpose Despite the proliferation of cyberthreats upon the supply chain (SC) at large,
knowledge on SC cybersecurity is scarce and predominantly conceptual or descriptive …

[HTML][HTML] Developing a data breach protection capability framework in retailing

MR Uddin, S Akter, WJT Lee - International Journal of Production …, 2024 - Elsevier
Protecting data in retail operations is vital in the age of data-driven digital transformation.
Businesses face a constant challenge from data breaches due to the unpredictable and …

Autonomous Threat Hunting: A Future Paradigm for AI-Driven Threat Intelligence

SR Sindiramutty - arXiv preprint arXiv:2401.00286, 2023 - arxiv.org
The evolution of cybersecurity has spurred the emergence of autonomous threat hunting as
a pivotal paradigm in the realm of AI-driven threat intelligence. This review navigates …

[HTML][HTML] Effects of Visual Risk Indicators on Phishing Detection Behavior: An Eye-Tracking Experiment

D Baltuttis, T Teubner - Computers & Security, 2024 - Elsevier
Cybersecurity vulnerability ranks among the foremost global business risks. Phishing
attempts, in particular through email, persistently challenge organizations despite …

[引用][C] Comparative review of big data analytics and GIS in healthcare decision-making

OJ Akindote, AO Adegbite… - World Journal …, 2023 - World Journal of Advanced …

Policy helix and antecedents of cybersecurity policymaking agility

M Afshari Mofrad, B Abedin, A Amrollahi - 2023 - aisel.aisnet.org
The cyber threat landscape is constantly changing, and organisations need to stay current
with the dynamism of their internal and external environment. One important aspect is to be …

[HTML][HTML] Toward Dynamic Data-Driven Time-Slicing LSH for Joinable Table Discovery

W Wang, C Zhu, H Yan - Electronics, 2024 - mdpi.com
In legacy industrial systems, discovering joinable information between database tables is
important for applications such as data integration and data analysis. Locality-Sensitive …