Enhanced (cyber) situational awareness: Using interpretable principal component analysis (iPCA) to automate vulnerability severity scoring

M Pourbehzadi, G Javidi, CJ Howell, E Kamar… - Decision Support …, 2024 - Elsevier
Abstract The Common Vulnerability Scoring System (CVSS) is widely used in the
cybersecurity industry to assess the severity of vulnerabilities. However, manual …

Securing the digital supply chain cyber threats and vulnerabilities

SR Sindiramutty, NZ Jhanjhi, CE Tan… - … Measures for Logistics …, 2024 - igi-global.com
The digital supply chain has become an integral part of modern business operations,
enabling efficient and streamlined processes. However, with the rapid advancement of …

[HTML][HTML] Critical Factors and Practices in Mitigating Cybercrimes within E-Government Services: A Rapid Review on Optimising Public Service Management

S Mushtaq, M Shah - Information, 2024 - mdpi.com
This review addresses the fragmented literature on administrative interventions for
cybercrime mitigation within e-government services, which often prioritise technological …

Adaptive edge security framework for dynamic IoT security policies in diverse environments

MN Halgamuge, D Niyato - Computers & Security, 2024 - Elsevier
The rapid expansion of Internet of Things (IoT) technologies has introduced significant
cybersecurity challenges, particularly at the network edge where IoT devices operate …

[HTML][HTML] Controlling User Access with Scripting to Mitigate Cyber-Attacks

O Nyarko-Boateng, IK Nti, AA Mensah, EK Gyamfi - Scientific African, 2024 - Elsevier
With the growing threats in the dynamic digital landscape, organizations are grappling with
the difficult task of managing cyber-attacks by restricting user accessibility to most …

A comprehensive review of it governance: effective implementation of COBIT and ITIL frameworks in financial institutions

O Ilori, NT Nwosu, HNN Naiho - Computer Science & IT Research Journal, 2024 - fepbl.com
In the rapidly evolving landscape of financial institutions, robust IT governance is essential to
ensure that information technology supports business goals, mitigates risks, and complies …

Prosecuting Cybercrimes under International Legal Frameworks: Challenges and Innovations

ST oglu Macidov - Futurity Economics&Law, 2023 - futurity-econlaw.com
Combating cybercrime is one of the most relevant areas of the legal community
development since the widespread integration of digital technologies into all spheres of …

Enhancing IT audit effectiveness with agile methodologies: A conceptual exploration

O Ilori, NT Nwosu, HNN Naiho - Engineering Science & Technology …, 2024 - fepbl.com
This concept paper examines the integration of Agile methodologies into IT audit processes
to enhance effectiveness and efficiency. In today's dynamic and rapidly evolving …

Advanced data analytics in internal audits: A conceptual framework for comprehensive risk assessment and fraud detection

O Ilori, NT Nwosu, HNN Naiho - Finance & Accounting Research Journal, 2024 - fepbl.com
In the face of increasing complexity and rapid technological advancements, traditional
internal audit methods are becoming inadequate for comprehensive risk assessment and …

Understanding Customer Perception of Cyber Attacks: Impact on Trust and Security

J Ebuzor - Corporate Cybersecurity in the Aviation, Tourism, and …, 2024 - igi-global.com
In this chapter, malware, phishing, denial of service, and social engineering tactics are
explored as examples of cyber-attacks. It examines their effects on customers, including …