Results 21 to 30 of about 79,039 (285)
Legal support for information security of legal entities under Lithuanian and Ukrainian legislation
In the rapidly evolving digital landscape, the safeguarding of information security for legal entities has emerged as a critical concern. This article investigates and compares the legal frameworks governing information security for legal entities in ...
M. Pleskach, I. Tumasoniene
doaj +1 more source
Institutional, technological, and financial drivers of national cyber resilience under armed conflict and post-conflict recovery [PDF]
Type of the article: Research Article Abstract Military and economic turbulence transform the relationships between factors shaping national cyber resilience.
Inna Shkolnyk +4 more
doaj +1 more source
Kurumsal Siber Güvenliğe Yönelik Tehditler ve Önlemleri
Günümüzde bilgi ve iletişim teknolojilerinde çeşitli uygulamaların artarak kişilerin günlük yaşantılarının vazgeçilmez bir parçası haline gelmesiyle birlikte gerek kamu gerekte özel sektörde birçok kurum hizmet sunumlarını siber ortamda ...
Hüseyin ÇAKIR, Hakan YAŞAR
doaj +6 more sources
EU cybersecurity capacity building in the Mediterranean and the Middle East [PDF]
Cyberthreats on the Rise The 2008 Report on the implementation of the European Security Strategy included “cybersecurity” for the first time among the priorities of the EU’s external action, stating that: “modern economies are heavily reliant on critical
Lannon, Erwoan
core
Trustee: A Trust Management System for Fog-enabled Cyber Physical Systems [PDF]
In this paper, we propose a lightweight trust management system (TMS) for fog-enabled cyber physical systems (Fog-CPS). Trust computation is based on multi-factor and multi-dimensional parameters, and formulated as a statistical regression problem which ...
Chowdhry, B. S. +3 more
core +1 more source
Features requirement elicitation process for designing a chatbot application
This article seeks to assist the chatbot community by outlining the characteristics that a chatbot needs to possess and explaining how to create a chatbot for a bank. In order to determine which capabilities are most crucial to ending users, a study of a small sample of chatbot users was conducted.
Nurul Muizzah Johari +4 more
wiley +1 more source
This article examines Pakistan’s evolving cyber governance as a critical case of how artificial intelligence (AI) intersects with dual-use security and fragile institutional design.
Sajjad Ahmed +2 more
doaj +1 more source
Governance in Overcoming Gender-Based Cyber Violence: Case Study Bosnia and Herzegovina
This study aims to analyze the governance of the Government of Bosnia and Herzegovina in overcoming gender-based cyber violence. Good governance in policy frameworks and institutional institutions is needed to meet cybersecurity needs in an inclusive and
Anggi Kunjaini
doaj +1 more source
Research Problem: Nigeria faces escalating cyber threats with direct implications for national security, yet its cyber defence architecture remains underdeveloped.
IFEANYI ANAENUGWU JUSTIN
doaj +1 more source
Is the responsibilization of the cyber security risk reasonable and judicious? [PDF]
Cyber criminals appear to be plying their trade without much hindrance. Home computer users are particularly vulnerable to attack by an increasingly sophisticated and globally dispersed hacker group.
Cockshott, Paul +4 more
core +3 more sources

