F Mızrak - Research Journal of Business and Management, 2023 - dergipark.org.tr
Purpose-This literature review aims to delve into the nexus between cybersecurity risk management and strategic management, comprehensively exploring how organizations …
MO Akinsanya, CC Ekechi, CD Okeke - Computer Science & IT Research …, 2024 - fepbl.com
Abstract The Evolution of Cyber Resilience Frameworks in Network Security: A Conceptual Analysis provides a comprehensive overview of the development and application of cyber …
D Craigen, N Diakun-Thibault, R Purse - Technology innovation …, 2014 - timreview.ca
Cybersecurity is a broadly used term, whose definitions are highly variable, often subjective, and at times, uninformative. The absence of a concise, broadly acceptable definition that …
S Saeed, SA Altamimi, NA Alkayyal, E Alshehri… - Sensors, 2023 - mdpi.com
This systematic literature review explores the digital transformation (DT) and cybersecurity implications for achieving business resilience. DT involves transitioning organizational …
Actionable guidance and expert perspective for real-world cybersecurity The Cyber Risk Handbook is the practitioner's guide to implementing, measuring and improving the counter …
S Saeed, SA Suayyid, MS Al-Ghamdi, H Al-Muhaisen… - Sensors, 2023 - mdpi.com
Cybersecurity is a significant concern for businesses worldwide, as cybercriminals target business data and system resources. Cyber threat intelligence (CTI) enhances …
VV Vegesna - Transactions on Latest Trends in Artificial Intelligence, 2023 - ijsdcs.com
This paper delves into the synergy between artificial intelligence (AI) and cybersecurity, exploring the evolving landscape of threats and vulnerabilities in the digital realm. It …
G Culot, F Fattori, M Podrecca… - IEEE Engineering …, 2019 - ieeexplore.ieee.org
Awareness is building on how managers should be involved in Industry 4.0 cybersecurity. This awareness and concern derives from heavy dependence of integrated information …
Cyber resilience involves most societal actors, ie organizations, individuals, threat actors, governments, insurers, etc., at most levels of organization. Actors are embedded within each …