Reviewing third-party risk management: best practices in accounting and cybersecurity for superannuation organizations

TO Abrahams, OA Farayola, S Kaggwa… - Finance & Accounting …, 2024 - fepbl.com
This paper conducts a comprehensive review of third-party risk management practices
tailored to the unique context of superannuation organizations, with a specific focus on …

A thematic analysis of ransomware incidents among United States hospitals, 2016–2022

G Munoz Cornejo, J Lee, BA Russell - Health and Technology, 2024 - Springer
Purpose To characterize the patterns, vulnerabilities, and responses associated with
ransomware incidents in US hospitals. Methods The study employs qualitative thematic …

Computational complexity of modified blowfish cryptographic algorithm on video data

AE Adeniyi, S Misra, E Daniel, A Bokolo Jr - Algorithms, 2022 - mdpi.com
Background: The technological revolution has allowed users to exchange data and
information in various fields, and this is one of the most prevalent uses of computer …

[HTML][HTML] Conti Inc.: understanding the internal discussions of a large ransomware-as-a-service operator with machine learning

E Ruellan, M Paquet-Clouston, S Garcia - Crime Science, 2024 - Springer
Abstract Ransomware-as-a-service (RaaS) is increasing the scale and complexity of
ransomware attacks. Understanding the internal operations behind RaaS has been a …

Ransomware-as-a-Weapon (RaaW): A Futuristic Approach for Understanding Malware as a Social Weapon

K Mohanty, GS Bopche, S Brahnam… - … Challenges for Cyber …, 2023 - igi-global.com
The use of information technology has widened in the past few years. With the evolving IT
industries and infrastructure comes an ocean of development and opportunities and a series …

Estimation of the key segments of the cyber crime economics

S Ohrimenco, G Borta, V Cernei - 2021 IEEE 8th International …, 2021 - ieeexplore.ieee.org
Our everyday world is rapidly changing with the help of digital transformation and is
increasingly dependent on information technology, and because of that our society needs to …

Ransomware: stages, detection and evasion

YKBM Yunus, SB Ngah - 2021 International Conference on …, 2021 - ieeexplore.ieee.org
Ransomware attacks has been increasing lately with companies suffer monetarily, wasted
business opportunity and wasted time. Big companies are now targeted as they are more …

Russian organised crime and Ransomware as a Service: state cultivated cybercrime

H Gately - 2023 - figshare.mq.edu.au
Ransomware as a Service (RaaS) has become one of the most significant threats within the
cybersecurity landscape, with a ransomware attack occurring every eleven seconds. Despite …

Preventing and Combating Cybercrime in Indonesia

MF Imran - International Journal of Cyber Criminology, 2023 - cybercrimejournal.com
The escalating pace of technological advancements has led to a substantial increase in the
incidence of cybercrime, posing significant threats to the privacy and confidentiality of public …

The effects of cyber threats on maintenance outsourcing and age replacement policy

A Ta, H Tarakci, S Kulkarni, V Prybutok, R Pavur - Computers in Industry, 2023 - Elsevier
This research examines maintenance outsourcing in the presence of cyber-attacks. The
research findings contribute to the literature on maintenance outsourcing by considering …