Common vulnerability scoring system prediction based on open source intelligence information sources

P Kühn, DN Relke, C Reuter - Computers & Security, 2023 - Elsevier
The number of newly published vulnerabilities is constantly increasing. Until now, the
information available when a new vulnerability is published is manually assessed by experts …

Privacy concerns and acceptance factors of osint for cybersecurity: A representative survey

T Riebe - Technology Assessment of Dual-Use ICTs: How to …, 2023 - Springer
Abstract The use of Open Source Intelligence (OSINT) to monitor and detect cybersecurity
threats is gaining popularity among many organizations. This is especially relevant to …

Impact of Digital Literacy and Online Privacy Concerns on Cybersecurity Behaviour: The Moderating Role of Cybersecurity Awareness

M Elrayah, S Jamil - International Journal of Cyber …, 2023 - cybercrimejournal.com
Purpose: This study investigates the impact of digital literacy, citizenship, curation practices,
connectedness, and online privacy concerns on cybersecurity behaviour. It specifically …

Ensuring resilience: Integrating IT disaster recovery planning and business continuity for sustainable information technology operations

DM Kesa - World Journal of Advanced Research and Reviews, 2023 - wjarr.com
Information Technology (IT) Disaster Recovery Planning (IT DRP) and Business Continuity
(BC) are essential components of an organization's overall resilience strategy. IT DRP …

[PDF][PDF] Values? Camera? Action! An ethnography of an AI camera system used by the Netherlands Police

I Fest - 2023 - assets-eu.researchsquare.com
Police departments around the world implement algorithmic systems to enhance various
policing tasks. Ensuring such innovations take place responsibly–with public values …

Exploring OSINT for Modern Day Reconnaissance

AS Ram, A Thalakkat, D Udayan… - 2023 Annual …, 2023 - ieeexplore.ieee.org
The Internet's growth has connected users globally, forming a vast network of data. As new
social media platforms with diverse features emerge, individuals are drawn to sharing their …

A CONDENSED 4-WEEK COURSE ON CYBERSECURITY: A CONNECTIVISM APPROACH WITHIN THE COMMUNITY OF INQUIRY FRAMEWORK

L Whisenant - ICERI2023 Proceedings, 2023 - library.iated.org
This abstract provides an overview of a condensed 4-week course on cybersecurity, which is
designed based on the connectivism learning theory and wrapped in the community of …