Towards agile cybersecurity risk management for autonomous software engineering teams

H Salin, M Lundgren - Journal of Cybersecurity and Privacy, 2022 - mdpi.com
In this study, a framework was developed, based on a literature review, to help managers
incorporate cybersecurity risk management in agile development projects. The literature …

Industry Responses to the European Directive on Security of Network and Information Systems ({{{{{NIS)}}}}}: Understanding policy implementation practices across …

OA Michalec, D Van Der Linden, S Milyaeva… - … Symposium on Usable …, 2020 - usenix.org
As traditional legacy systems that run critical national infrastructures (CNI) are increasingly
digitized for performance monitoring and efficiency, significant attention has been brought to …

[HTML][HTML] From compliance to security, responsibility beyond law

J Boeken - Computer Law & Security Review, 2024 - Elsevier
In this opinion piece, I advocate for the adoption of a care-based stakeholder approach in
cybersecurity for companies. With the ever-increasing digitization of all aspects of life …

A Gap Analysis of the Adoption Maturity of Certificateless Cryptography in Cooperative Intelligent Transportation Systems

H Salin, M Lundgren - Journal of Cybersecurity and Privacy, 2023 - mdpi.com
Cooperative Intelligent Transport Systems (C-ITSs) are an important development for
society. C-ITSs enhance road safety, improve traffic efficiency, and promote sustainable …

Supporting information security management: developing a method for information classification

E Bergström - 2020 - diva-portal.org
In the highly digitalised world in which we live today, information and information systems
have become critical assets to organisations, and hence need to be safeguarded …

A Review of Cyber Threat (Artificial) Intelligence in Security Management

M Lundgren, A Padyab - Artificial Intelligence and Cybersecurity: Theory …, 2022 - Springer
Managing cybersecurity within organizations typically relies on careful consideration and
management of its risks. By following an iterative—often sequential—risk management …

Investigation of Assessment Methodologies in Information Security Risk Management

C Rajathi, P Rukmani - International Conference on Information …, 2023 - Springer
Abstract Information security risk management is a crucial component of every organization's
security plan. It comprises the identification, assessment, and prioritization of potential …

[PDF][PDF] Factors Affecting Data-Privacy Protection and Promotion of Safe Digital Usage

R Chakraborty, GS Prakasha, CK Sripavithra - CEUR-WS, 2021 - academia.edu
India is facing the problem of the digital divide. Being developing countries and with low
literacy rates, digital knowledge among the public is weak. Those who know a bit about …

Gerencia de la seguridad en la información de las organizaciones

JL Londoño Córdoba, DR Dorado Gutiérrez… - 2022 - digitk.areandina.edu.co
El mundo es un lugar cambiante y evolutivo, el desarrollo que se ha incentivado es tan
amplio, que la competitividad está en puntos muy elevados, y el desarrollo tecnológico es …

[PDF][PDF] ARTICULO DE REVISIÓN BIBLIOGRAFICA: GERENCIA DE LA SEGURIDAD EN LA INFORMACIÓN DE LAS ORGANIZACIONES MANAGEMENT OF …

AE Eje, JLL Córdoba, DRD Gutiérrez, DG Rendón… - digitk.areandina.edu.co
El mundo es un lugar cambiante y evolutivo, el desarrollo que se ha incentivado es tan
amplio, que la competitividad está en puntos muy elevados, y el desarrollo tecnológico es …