Showing 181 - 200 results of 6,478 for search '"Cybersecurity"', query time: 0.15s Refine Results
  1. 181

    Perspectives on cybersecurity: A collaborative study by Choucri, Nazli, Jackson, Chrisma

    Published 2022
    “…1. Cybersecurity – Problems, Premises, Perspectives 2 An Abbreviated Technical Perspective on Cybersecurity 3 The Conceptual Underpinning of Cyber Security Studies 4 Cyberspace as the Domain of Content 5 DoD Perspective on Cyberspace 6 China’s Perspective on Cyber Security 7 Pursuing Deterrence Internationally in Cyberspace 8 Is Deterrence Possible in Cyber Warfare? …”
    Get full text
    Working Paper
  2. 182
  3. 183
  4. 184
  5. 185

    Multidimensional cybersecurity framework for strategic foresight by Onwubiko, Cyril, Ouazzane, Karim

    Published 2021
    “…Cybersecurity is now at the forefront of most organisations’ digital transformative agendas and National economic, social and political programmes. …”
    Get full text
    Article
  6. 186

    Guidelines for usable cybersecurity: past and present by Nurse, J, Creese, S, Goldsmith, M, Lamberts, K

    Published 2011
    “…This is especially because poor usability in this context typically translates into inadequate application of cybersecurity tools and functionality, thereby ultimately limiting their effectiveness. …”
    Conference item
  7. 187

    Comparative cybersecurity law in socialist Asia by Bui, SN, Lee, J-A

    Published 2022
    “…This Article is a comparative study of the cybersecurity laws adopted in China and Vietnam in 2017 and 2018, respectively. …”
    Journal article
  8. 188

    Privacy Requirements in Cybersecurity Applications of Blockchain by Axon, L, Goldsmith, M, Creese, S

    Published 2018
    “…We explore a set of proposed uses of Blockchain within cybersecurity and consider their requirements for privacy. …”
    Book section
  9. 189
  10. 190

    Malware ecologies: a politics of cybersecurity by Dwyer, AC

    Published 2019
    “…In doing so, I challenge contemporary discourses of cybersecurity to ask if conventional notions of who and what (per)form security are adequate, and how these are reconfigured through a radical 'more-than-human' politics, where malware are not just objects of security, but are active participants in its production and negotiation.…”
    Thesis
  11. 191

    Make cybersecurity a strategic asset by Powell, T, Hepfer, M

    Published 2020
    “…By elevating cybersecurity from an operational necessity to a source of opportunity, leaders can boost resilience and business advantage.…”
    Journal article
  12. 192

    Reconfigure: feminist action research in cybersecurity by Slupska, J, Duckworth, SD, Neff, GS

    Published 2021
    “…This report presents a 10-month pilot study applying “action research” methods to cybersecurity. The Reconfigure Network ran a series of community workshops in which we invited participants to define their own cybersecurity threats, implement changes to protect themselves, and reflect on the role cybersecurity plays in their lives. …”
    Report
  13. 193
  14. 194
  15. 195

    Big Data Analytics and Computational Intelligence for Cybersecurity / by Ouaissa, Mariya, editor 654935, Boulouard, Zakaria, editor 654937, Ouaissa, Mariyam, editor 654938, Khan, Inam Ullah, editor 654939, Kaosar, Mohammed, editor 654940

    Published [202
    “…This book can be a source for researchers, students, and practitioners interested in the fields of artificial intelligence, cybersecurity, data analytics, and recent trends of networks.…”
    Get full text
    software, multimedia
  16. 196

    Cybersecurity Issues, Challenges, and Solutions in the Business World / by Verma, Suhasini, 1976-, editor 651877, Vyas, Vidhisha, 1980-, editor 651878, Kaushik, Keshav, editor 651879, IGI Global (Online service) 631983

    Published 2023
    “…Cybersecurity Issues, Challenges, and Solutions in the Business World considers cybersecurity innovation alongside the methods and strategies for its joining with the business industry and discusses pertinent application zones such as smart city, e-social insurance, shrewd travel, and more. …”
    Get full text
    software, multimedia
  17. 197

    Kids Cybersecurity Using Computational Intelligence Techniques / by Yafooz, Wael M. S., editor 652525, Al-Aqrabi, Hussain, editor 652526, Al-Dhaqm, Arafat, editor 652527, Emara, Abdelhamid, editor 652528, SpringerLink (Online service)

    Published 2023
    “…This book is beneficial to postgraduate students and researchers' concerns on recent methods and approaches to kids' cybersecurity.…”
    Get full text
    software, multimedia
  18. 198

    The Challenges and Solutions of Cybersecurity Among Malaysian Companies by Puteri Fadzline, Muhamad Tamyez

    Published 2019
    “…The objective of this chapter is to analyze the challenges faced by Malaysian companies in cybersecurity and to determine solution for Malaysian companies to overcome challenges in cybersecurity. …”
    Get full text
    Get full text
    Book Chapter
  19. 199
  20. 200