MA Siddiqi, W Pak, MA Siddiqi - Applied Sciences, 2022 - mdpi.com
As cybersecurity strategies become more robust and challenging, cybercriminals are mutating cyberattacks to be more evasive. Recent studies have highlighted the use of social …
Abstract Computer and Information Security (CIS) is usually approached adopting a technology-centric viewpoint, where the human components of sociotechnical systems are …
This study investigated the integration readiness of four predominant cybersecurity Governance, Risk and Compliance (GRC) frameworks-NIST CSF 2.0, COBIT 2019, ISO …
Social engineering is an attack on information security for accessing systems or networks. Social engineering attacks occur when victims do not recognize methods, models, and …
WJ Triplett - Journal of Cybersecurity and Privacy, 2022 - mdpi.com
This article identifies human factors in workplaces that contribute to the challenges faced by cybersecurity leadership within organizations and discusses strategic communication …
IH Sarker - Security and Privacy, 2023 - Wiley Online Library
Due to the rising dependency on digital technology, cybersecurity has emerged as a more prominent field of research and application that typically focuses on securing devices …
Background: Cyber defense is reactive and slow. On average, the time-to-remedy is hundreds of times larger than the time-to-compromise. In response, Human Digital Twins …
Cybersecurity procedures and policies are prevalent countermeasures for protecting organizations from cybercrimes and security incidents. Without considering human …
MC Almeida, AC Yoshikuni, R Dwivedi… - Global Journal of Flexible …, 2022 - Springer
The banking industry is highly prone to Information Systems (IS) security breaches from outside organizations and inside organizations. There are processes to monitor, detect …