Showing 141 - 160 results of 5,684 for search '"Cybersecurity"', query time: 0.18s Refine Results
  1. 141
  2. 142
  3. 143
  4. 144

    Multidimensional cybersecurity framework for strategic foresight by Onwubiko, Cyril, Ouazzane, Karim

    Published 2021
    “…Cybersecurity is now at the forefront of most organisations’ digital transformative agendas and National economic, social and political programmes. …”
    Get full text
    Article
  5. 145

    Guidelines for usable cybersecurity: past and present by Nurse, J, Creese, S, Goldsmith, M, Lamberts, K

    Published 2011
    “…This is especially because poor usability in this context typically translates into inadequate application of cybersecurity tools and functionality, thereby ultimately limiting their effectiveness. …”
    Conference item
  6. 146

    Comparative cybersecurity law in socialist Asia by Bui, SN, Lee, J-A

    Published 2022
    “…This Article is a comparative study of the cybersecurity laws adopted in China and Vietnam in 2017 and 2018, respectively. …”
    Journal article
  7. 147

    Privacy Requirements in Cybersecurity Applications of Blockchain by Axon, L, Goldsmith, M, Creese, S

    Published 2018
    “…We explore a set of proposed uses of Blockchain within cybersecurity and consider their requirements for privacy. …”
    Book section
  8. 148
  9. 149

    Malware ecologies: a politics of cybersecurity by Dwyer, AC

    Published 2019
    “…In doing so, I challenge contemporary discourses of cybersecurity to ask if conventional notions of who and what (per)form security are adequate, and how these are reconfigured through a radical 'more-than-human' politics, where malware are not just objects of security, but are active participants in its production and negotiation.…”
    Thesis
  10. 150

    Make cybersecurity a strategic asset by Powell, T, Hepfer, M

    Published 2020
    “…By elevating cybersecurity from an operational necessity to a source of opportunity, leaders can boost resilience and business advantage.…”
    Journal article
  11. 151

    Reconfigure: feminist action research in cybersecurity by Slupska, J, Duckworth, SD, Neff, GS

    Published 2021
    “…This report presents a 10-month pilot study applying “action research” methods to cybersecurity. The Reconfigure Network ran a series of community workshops in which we invited participants to define their own cybersecurity threats, implement changes to protect themselves, and reflect on the role cybersecurity plays in their lives. …”
    Report
  12. 152
  13. 153
  14. 154

    Big Data Analytics and Computational Intelligence for Cybersecurity / by Ouaissa, Mariya, editor 654935, Boulouard, Zakaria, editor 654937, Ouaissa, Mariyam, editor 654938, Khan, Inam Ullah, editor 654939, Kaosar, Mohammed, editor 654940

    Published [202
    “…This book can be a source for researchers, students, and practitioners interested in the fields of artificial intelligence, cybersecurity, data analytics, and recent trends of networks.…”
    Get full text
    software, multimedia
  15. 155

    Cybersecurity Issues, Challenges, and Solutions in the Business World / by Verma, Suhasini, 1976-, editor 651877, Vyas, Vidhisha, 1980-, editor 651878, Kaushik, Keshav, editor 651879, IGI Global (Online service) 631983

    Published 2023
    “…Cybersecurity Issues, Challenges, and Solutions in the Business World considers cybersecurity innovation alongside the methods and strategies for its joining with the business industry and discusses pertinent application zones such as smart city, e-social insurance, shrewd travel, and more. …”
    Get full text
    software, multimedia
  16. 156

    Kids Cybersecurity Using Computational Intelligence Techniques / by Yafooz, Wael M. S., editor 652525, Al-Aqrabi, Hussain, editor 652526, Al-Dhaqm, Arafat, editor 652527, Emara, Abdelhamid, editor 652528, SpringerLink (Online service)

    Published 2023
    “…This book is beneficial to postgraduate students and researchers' concerns on recent methods and approaches to kids' cybersecurity.…”
    Get full text
    software, multimedia
  17. 157

    The Challenges and Solutions of Cybersecurity Among Malaysian Companies by Puteri Fadzline, Muhamad Tamyez

    Published 2019
    “…The objective of this chapter is to analyze the challenges faced by Malaysian companies in cybersecurity and to determine solution for Malaysian companies to overcome challenges in cybersecurity. …”
    Get full text
    Get full text
    Book Chapter
  18. 158
  19. 159
  20. 160

    Strengthening Cybersecurity for Patient Data Protection in Europe by Robin van Kessel, Madeleine Haig, Elias Mossialos

    Published 2023-08-01
    “… The health care sector experiences 76% of cybersecurity breaches due to basic web application attacks, miscellaneous errors, and system intrusions, resulting in compromised health data or disrupted health services. …”
    Get full text
    Article