Search Results - "cybersecurity"

Refine Results
  1. 1

    Ethics, Cybersecurity and the Military by Ford, Shannon

    Published 2013
    “…In this paper I examine the issue of cybersecurity in the context of the conventionally understood ends of the military. …”
    Get full text
  2. 2

    Metamorphic testing for cybersecurity by Chen, Tsong Yueh, Kuo, Fei-Ching, Ma, Wenjuan, Susilo, Willy, Towey, Dave, Voas, Jeffrey, Zhou, Zhi Quan

    Published 2016
    “…The authors report how MT detected previously unknown bugs in real-world critical applications such as code obfuscators, giving evidence that software testing requires diverse perspectives to achieve greater cybersecurity.…”
    Get full text
  3. 3

    Understanding Cybersecurity: Ethical and Conceptual Considerations by Ford, Shannon

    Published 2013
    “…Finally, I go on to consider two potential avenues for improving the conceptual clarity of cybersecurity. First, I examine cybersecurity in reference to the actor using the term. …”
    Get full text
  4. 4

    Blockchain-enabled cybersecurity framework for healthcare domain by Islam, Md Shohidul

    Published 2025
    “…Blockchain-enabled cybersecurity systems to ensure decentralised data transactions are gradually gaining popularity in the digital era for various areas like healthcare, education, finance, and transportation. …”
    Get full text
  5. 5

    The Challenges and Solutions of Cybersecurity Among Malaysian Companies by Puteri Fadzline, Muhamad Tamyez

    Published 2019
    “…The objective of this chapter is to analyze the challenges faced by Malaysian companies in cybersecurity and to determine solution for Malaysian companies to overcome challenges in cybersecurity. …”
    Get full text
    Get full text
    Get full text
  6. 6
  7. 7
  8. 8
  9. 9

    The role of cybersecurity on the performance of Malaysian higher education institutions by Balla Moussa Dioubate, Wan Norhayate Wan Daud, Fakhrul Anwar Zainol, Fauzilah Salleh, Hilmi Mohd Faiz, Lee, Ooi Hai

    Published 2023
    “…Cybersecurity, as a security management requirement, is essential to understanding data security in higher institutions. …”
    Get full text
    Get full text
  10. 10
  11. 11

    Integration of information systems and cybersecurity countermeasures: An exposure to risk perspective by Baskerville, Richard, Rowe, F., Wolff, F.

    Published 2018
    “…Based on an econometric analysis of a survey sample of 9,721 French firms, the study finds that higher degrees of system integration entail higher degrees of cybersecurity usage. Whereas previously it was thought that systems integration reduces the number of vulnerabilities and thus the need for cybersecurity countermeasures, we find that the more the system is integrated, the greater the use of self-protective cybersecurity countermeasures. …”
    Get full text
  12. 12

    Implementation of serious games for data privacy and protection awareness in Cybersecurity by Siti Normaziah, Ihsan, Tuty Asmawaty, Abd Kadir, Nurul Ishafira, Ismail, Yuan, Kerk Zhi, Jie, Yeow Song

    Published 2023
    “…The advantage of playing these games is that they can help non-expert end users improve their knowledge and awareness of cybersecurity and also increase a player's motivation, engagement, and comprehension of cybersecurity knowledge.…”
    Get full text
    Get full text
    Get full text
  13. 13

    UMP, CyberSecurity tingkat keupayaan pakar keselamatan siber by Nor Salwana, Mohammad Idris

    Published 2021
    “…PEKAN, 7 Disember 2021 - Program 2u2i yang dilaksanakan antara Universiti Malaysia Pahang (UMP) dan CyberSecurity Malaysia (CSM) mampu memupuk semangat keusahawanan melalui kerjasama akademik dan industri dengan pendekatan penyampaian secara Work-based Learning.…”
    Get full text
    Get full text
  14. 14

    Securing the IoT frontier: exploring the limitation and future directions in cybersecurity by Mahmoud Ahmed, Moustafa Abdelrahman, Md Yunus, Nur Arzilawati

    Published 2024
    “…Our findings affirm the pivotal influence of robust cybersecurity measures in crafting a resiliently connected ecosystem. …”
    Get full text
    Get full text
  15. 15

    Cybersecurity behavioural model for students in the tertiary institutions / Fatokun Faith Boluwatife by Fatokun Faith , Boluwatife

    Published 2020
    “… Humans are majorly identified as the weakest link in cybersecurity. Tertiary institution student’s face lot of cybersecurity issues due to their increased Internet exposure, however cybersecurity behavioural studies focusing on tertiary students is limited. …”
    Get full text
    Get full text
    Get full text
  16. 16
  17. 17

    Impact of training on cybersecurity awareness / Zuriani Ahmad Zukarnain ... [et al]. by Ahmad Zukarnain, Zuriani, Hashim, Mimi Zazira, Muhammad, Norrini, Mansor, Farah Ahlami, Wan Azib, Wan Nor Hazimah

    Published 2020
    “…The ultimate goal of the program is to help children to understand issues related to cybersecurity and instill the cybersecurity awareness. …”
    Get full text
  18. 18

    Incremental learning for large-scale stream data and its application to cybersecurity by Ali, Siti Hajar Aminah

    Published 2015
    “…This is one of a worst case scenario of malicious spam email which is usually handled by cybersecurity field. Another different case of cybersecurity is the Distributed Denial of Services (DDoS) attack. …”
    Get full text
    Get full text
  19. 19

    The cybersecurity governance in changing the security psychology and security posture: insights into e-procurement by Dawood Gani, Anisha Banu, Fernando, Yudi

    Published 2021
    “…The aim of this study is to identify the practices for an effective cybersecurity governance by examining and synthesising existing cybersecurity and cybersecurity governance maturity models and framework from the literature and industry. …”
    Get full text
    Get full text
  20. 20

    Blockchain-enabled cybersecurity provision for scalable heterogeneous network: A comprehensive survey by Islam, Md. Shohidul, Rahman, Md. Arafatur, M. A., Ameedeen, Husnul, Ajra, Zahian, Ismail, Jasni, Mohamad Zain

    Published 2024
    “…Blockchain-enabled cybersecurity system to ensure and strengthen decentralized digital transaction is gradually gaining popularity in the digital era for various areas like finance, transportation, healthcare, education, and supply chain management. …”
    Get full text
    Get full text