Extracting key factors of cyber hygiene behaviour among software engineers: A systematic literature review

S Kalhoro, M Rehman, V Ponnusamy… - IEEE Access, 2021 - ieeexplore.ieee.org
The advent of new technologies and the rapid growth of internet users have given birth to
the menace of cyber-crime. Unfortunately, it is increasing at an alarming pace. This situation …

Analysis of adversary activities using cloud-based web services to enhance cyber threat intelligence

H Al-Mohannadi, I Awan, J Al Hamar - Service Oriented Computing and …, 2020 - Springer
The understanding of cyber threats to a network is challenging yet rewarding as it allows an
organisation to prevent a potential attack. Numerous efforts have been made to predict cyber …

[PDF][PDF] Progression of Internet Banking System in Bangladesh and its Challenges

B Sarker, B Sarker, P Podder… - International Journal of …, 2020 - academia.edu
Internet banking has become a hotcake in the arena of digital banking. Internet banking is
modern technology based computerized system that provides one of the easiest banking …

Phishing attacks in Qatar: A literature review of the problems and solutions

Y Al-Hamar, H Kolivand… - 2019 12th International …, 2019 - ieeexplore.ieee.org
This paper outlines the literature on phishing attacks in Qatar and techniques for countering
them. It begins with the background of phishing, specifically spearphishing, in Qatar and the …

[PDF][PDF] Simulating municipal cybersecurity incidents: recommendations from expert interviews

K Gedris, K Bowman, A Neupane, A Hughes… - Proceedings of the …, 2021 - par.nsf.gov
As cyberattacks on city and public infrastructures become increasingly common and harmful,
it is critical that we train the professional workforce to prepare and respond appropriately …

Exploring the Role of Cyber Security Measures (Encryption, Firewalls, and Authentication Protocols) in Preventing Cyber-Attacks on E-commerce Platforms

AF Al Naim, AM Ghouri - … Journal of eBusiness and eGovernment Studies, 2023 - sobiad.org
The present study seeks to examine the significance of cybersecurity measures, specifically
encryption strength (ES), firewall configuration (FC), and authentication protocols (AP), in …

[PDF][PDF] Cybersecurity when working from home during COVID-19: considering the human factors

MT Whitty, N Moustafa, M Grobler - Journal of Cybersecurity, 2024 - academic.oup.com
This research examined the lives of Australian employees who moved to work from home
during COVID-19. Taking a unique approach to cybersecurity, we sought to gain insights …

Transformation of cybersecurity posture in IT telecommunication: a case study of a telecom operator

A Adel, D Sarwar, A Hosseinian-Far - Cybersecurity, Privacy and Freedom …, 2021 - Springer
Organisations are facing sophisticated and advanced persistent threats (APT) that are
targeting sensitive information assets. Any form of cyber-presence can be typically attacked …

Managing Professional-Ethical Negotiation for Cyber Conflict Prevention: Perspectives From Higher Institution Learners in the Pandemic Age

A Hadi, M Huda, N Lyndon, BM Nasir - International Journal of Cyber …, 2024 - igi-global.com
This article aims to investigate the professional and ethical negotiation on managing cyber
conflict prevention towards misuse and exploitation of massive social media adoption from …

Data security and privacy, cyber-security enhancement, and systems recovery approaches for microgrid networks

NR Naraindath, HA Kupolati, RC Bansal… - Modelling and Control …, 2024 - Elsevier
Microgrids increase the feasibility of distributed renewable energy generation through
intelligent power flow optimization, which has significant economic and ecological benefits …