-
41
Development of Large-Scale Farming Based on Explainable Machine Learning for a Sustainable Rural Economy: The Case of Cyber Risk Analysis to Prevent Costly Data Breaches
Published 2023-12-01“…A particularly significant threat to reputation, but also at the same time indirect and direct costs, is the data breach that occurs when a security incident occurs about the data for which the organization is responsible, which results in a violation of confidentiality, availability, or the integrity of the data it manages. …”
Get full text
Article -
42
A Systematic Literature Review on Privacy by Design in the Healthcare Sector
Published 2020-03-01Subjects: Get full text
Article -
43
A Novel Multi-Factor Authentication Algorithm Based on Image Recognition and User Established Relations
Published 2023-01-01Subjects: Get full text
Article -
44
An in-depth analysis of the impact of cyberattacks on the profitability of commercial banks in the United States
Published 2023-09-01Subjects: Get full text
Article -
45
Threats From Unintentional Insiders: An Assessment of an Organization’s Readiness Using Machine Learning
Published 2022-01-01Subjects: Get full text
Article -
46
Hospital cybersecurity risks and gaps: Review (for the non-cyber professional)
Published 2022-08-01Subjects: Get full text
Article -
47
An Unsupervised Model for Identifying and Characterizing Dark Web Forums
Published 2021-01-01Subjects: Get full text
Article -
48
Wearable Technologies and Smart Clothes in the Fashion Business: Some Issues Concerning Cybersecurity and Data Protection
Published 2020-05-01Subjects: Get full text
Article -
49
Human factor, a critical weak point in the information security of an organization's Internet of things
Published 2021-03-01Subjects: “…Data breach…”
Get full text
Article -
50
-
51
Observable Cyber Risk on Cournot Oligopoly Data Storage Markets
Published 2020-11-01Subjects: Get full text
Article -
52
Analysis of Insider Threats in the Healthcare Industry: A Text Mining Approach
Published 2022-08-01Subjects: Get full text
Article -
53
Fuzzy-Based Symmetrical Multi-Criteria Decision-Making Procedure for Evaluating the Impact of Harmful Factors of Healthcare Information Security
Published 2020-04-01Subjects: Get full text
Article -
54
Practical Methods of Implementation for the Indispensable Mechanism of GDPR Compliance
Published 2022-04-01Subjects: Get full text
Article -
55
An Empirical Study on Core Data Asset Identification in Data Governance
Published 2023-10-01Subjects: Get full text
Article -
56
Merging Datasets of CyberSecurity Incidents for Fun and Insight
Published 2021-01-01Subjects: Get full text
Article -
57
Threat Actors’ Tenacity to Disrupt: Examination of Major Cybersecurity Incidents
Published 2022-01-01Subjects: “…Data breach…”
Get full text
Article -
58
Getting Smarter about Smart Cities: Improving Data Security and Privacy through Compliance
Published 2022-11-01Subjects: Get full text
Article -
59
Efficient Dynamic Phishing Safeguard System Using Neural Boost Phishing Protection
Published 2022-09-01Subjects: “…data breach…”
Get full text
Article -
60
Personal Data as a Market Commodity in the GDPR Era: A Systematic Review of Social and Economic Aspects
Published 2022-03-01Subjects: Get full text
Article