Results 121 to 130 of about 196,474 (374)

Cybersecurity Assessments

open access: yesInternational Journal of Recent Technology and Engineering (IJRTE), 2020
The purpose of this study is to review the existing cybersecurity assessments and practices used by technology companies to protect their assets from potential harm and damage. Today, the software systems have thousands of vulnerabilities and, when breached, can cost the companies millions of dollars.
openaire   +2 more sources

The Social Psychology of Cybersecurity [PDF]

open access: yes, 2015
Cybersecurity incidents may seem very technological in nature, but ultimately the hackers and the organisations they target are people, with their own goals, influences and beliefs. There is a danger of relying on lazy stereotypes of those involved in cybersecurity, or taking the Hollywood portrayals of hackers and cybersecurity experts as fact.
McAlaney, John   +2 more
openaire   +1 more source

AI-Driven Cybersecurity: Balancing Advancements and Safeguards

open access: yesJournal of Computer Science and Technology Studies
As Artificial Intelligence (AI) continues its rapid evolution, its profound influence on cybersecurity becomes increasingly evident. This study delves into the pivotal role of AI in fortifying cybersecurity measures, emphasizing its capacity for enhanced
Atia Shahana   +6 more
semanticscholar   +1 more source

SCEN‐SCADA Security: An Enhanced Osprey Optimization‐Based Cyber Attack Detection Model in Supervisory Control and Data Acquisition System Using Serial Cascaded Ensemble Network

open access: yesOptimal Control Applications and Methods, EarlyView.
An efficient and accurate cyber attack detection approach with less computational overhead is still a crucial research problem in SCADA. So, a novel and secure model for cyber attack detection in the SCADA system using advanced deep learning techniques together with the heuristic algorithm is executed in this research work. The weighted optimal feature
Fatimah Yaseen Hashim Alzubaidi   +3 more
wiley   +1 more source

Volitional Cybersecurity

open access: yes, 2023
This dissertation introduces the “Volitional Cybersecurity” (VCS) theory as a systematic way to think about adoption and manage long-term adherence to cybersecurity approaches. The validation of VCS has been performed in small- and medium-sized enterprises or businesses (SMEs/SMBs) context.
openaire   +2 more sources

Artificial intelligence in cybersecurity: Protecting national infrastructure: A USA review

open access: yesWorld Journal of Advanced Research and Reviews
Artificial Intelligence (AI) has emerged as a transformative force in the field of cybersecurity, playing a pivotal role in safeguarding national infrastructure.
Donald Obinna Daraojimba   +5 more
semanticscholar   +1 more source

Transformative Pathways in Qatar's E‐Government: Integrating Societal Engagement and NGO Partnerships for Sustainable Digital Governance

open access: yesPublic Administration and Development, EarlyView.
ABSTRACT Digital transformation has revolutionized public service delivery, yet studies on societal engagement with e‐Government services in Qatar remain limited. Despite significant investments in digital governance, 70% of services continue to be accessed through traditional methods, indicating barriers to adoption.
Moosa Elayah
wiley   +1 more source

COMPREHENSIVE REVIEW ON CYBERSECURITY: MODERN THREATS AND ADVANCED DEFENSE STRATEGIES

open access: yesComputer Science & IT Research Journal
In the rapidly evolving landscape of cyberspace, the prevalence of sophisticated cyber threats has escalated, posing formidable challenges to individuals, organizations, and nations.
Ogugua Chimezie Obi   +5 more
semanticscholar   +1 more source

Smart Urbanism Through Artificial Intelligence (AI)‐Megaprojects: The Case of China's Healthcare Services

open access: yesPublic Administration and Development, EarlyView.
ABSTRACT Urban Artificial Intelligence (AI) technologies are increasingly being piloted in cities worldwide, constituting a critical element in the evolution of contemporary and future smart cities. Although there is a growing body of research on the integration of AI into healthcare and smart city systems, the specific intersection of urban AI and ...
Zongtian Guo, Federico Cugurullo
wiley   +1 more source

Cybersecurity risks in online banking: A detailed review and preventive strategies applicatio

open access: yesWorld Journal of Advanced Research and Reviews
In an era where the digital transformation of the banking sector intersects with the escalating complexity of cyber threats, this paper endeavors to dissect the multifaceted realm of cybersecurity within the banking industry.
A. Oyewole   +3 more
semanticscholar   +1 more source

Home - About - Disclaimer - Privacy