Search Results - "cybersecurity"
-
1
Ethics, Cybersecurity and the Military
Published 2013“…In this paper I examine the issue of cybersecurity in the context of the conventionally understood ends of the military. …”
Get full text
-
2
Metamorphic testing for cybersecurity
Published 2016“…The authors report how MT detected previously unknown bugs in real-world critical applications such as code obfuscators, giving evidence that software testing requires diverse perspectives to achieve greater cybersecurity.…”
Get full text
-
3
Understanding Cybersecurity: Ethical and Conceptual Considerations
Published 2013“…Finally, I go on to consider two potential avenues for improving the conceptual clarity of cybersecurity. First, I examine cybersecurity in reference to the actor using the term. …”
Get full text
-
4
Blockchain-enabled cybersecurity framework for healthcare domain
Published 2025“…Blockchain-enabled cybersecurity systems to ensure decentralised data transactions are gradually gaining popularity in the digital era for various areas like healthcare, education, finance, and transportation. …”
Get full text
-
5
The Challenges and Solutions of Cybersecurity Among Malaysian Companies
Published 2019“…The objective of this chapter is to analyze the challenges faced by Malaysian companies in cybersecurity and to determine solution for Malaysian companies to overcome challenges in cybersecurity. …”
Get full text
Get full text
Get full text
-
6
Leveraging web and behavioural data for usable adaptive cybersecurity
Published 2019Subjects: “…Cybersecurity…”
Get full text
-
7
Measuring attitude towards personal data for adaptive cybersecurity
Published 2017Subjects: Get full text
-
8
-
9
The role of cybersecurity on the performance of Malaysian higher education institutions
Published 2023“…Cybersecurity, as a security management requirement, is essential to understanding data security in higher institutions. …”
Get full text
Get full text
-
10
Exploring the use of blockchain technology in cybersecurity and data science
Published 2023“…This essay examines how blockchain technology is used in cybersecurity and data science.…”
Get full text
-
11
Integration of information systems and cybersecurity countermeasures: An exposure to risk perspective
Published 2018“…Based on an econometric analysis of a survey sample of 9,721 French firms, the study finds that higher degrees of system integration entail higher degrees of cybersecurity usage. Whereas previously it was thought that systems integration reduces the number of vulnerabilities and thus the need for cybersecurity countermeasures, we find that the more the system is integrated, the greater the use of self-protective cybersecurity countermeasures. …”
Get full text
-
12
Implementation of serious games for data privacy and protection awareness in Cybersecurity
Published 2023“…The advantage of playing these games is that they can help non-expert end users improve their knowledge and awareness of cybersecurity and also increase a player's motivation, engagement, and comprehension of cybersecurity knowledge.…”
Get full text
Get full text
Get full text
-
13
UMP, CyberSecurity tingkat keupayaan pakar keselamatan siber
Published 2021“…PEKAN, 7 Disember 2021 - Program 2u2i yang dilaksanakan antara Universiti Malaysia Pahang (UMP) dan CyberSecurity Malaysia (CSM) mampu memupuk semangat keusahawanan melalui kerjasama akademik dan industri dengan pendekatan penyampaian secara Work-based Learning.…”
Get full text
Get full text
-
14
Securing the IoT frontier: exploring the limitation and future directions in cybersecurity
Published 2024“…Our findings affirm the pivotal influence of robust cybersecurity measures in crafting a resiliently connected ecosystem. …”
Get full text
Get full text
-
15
Cybersecurity behavioural model for students in the tertiary institutions / Fatokun Faith Boluwatife
Published 2020“… Humans are majorly identified as the weakest link in cybersecurity. Tertiary institution student’s face lot of cybersecurity issues due to their increased Internet exposure, however cybersecurity behavioural studies focusing on tertiary students is limited. …”
Get full text
Get full text
Get full text
-
16
-
17
Impact of training on cybersecurity awareness / Zuriani Ahmad Zukarnain ... [et al].
Published 2020“…The ultimate goal of the program is to help children to understand issues related to cybersecurity and instill the cybersecurity awareness. …”
Get full text
-
18
Incremental learning for large-scale stream data and its application to cybersecurity
Published 2015“…This is one of a worst case scenario of malicious spam email which is usually handled by cybersecurity field. Another different case of cybersecurity is the Distributed Denial of Services (DDoS) attack. …”
Get full text
Get full text
-
19
The cybersecurity governance in changing the security psychology and security posture: insights into e-procurement
Published 2021“…The aim of this study is to identify the practices for an effective cybersecurity governance by examining and synthesising existing cybersecurity and cybersecurity governance maturity models and framework from the literature and industry. …”
Get full text
Get full text
-
20
Blockchain-enabled cybersecurity provision for scalable heterogeneous network: A comprehensive survey
Published 2024“…Blockchain-enabled cybersecurity system to ensure and strengthen decentralized digital transaction is gradually gaining popularity in the digital era for various areas like finance, transportation, healthcare, education, and supply chain management. …”
Get full text
Get full text