[HTML][HTML] Learning from cyber security incidents: A systematic review and future research agenda

CM Patterson, JRC Nurse, VNL Franqueira - Computers & Security, 2023 - Elsevier
Cyber security incidents are now prevalent in many organisations. Arguably, those who can
learn from security incidents and address the underlying causes will reduce the prevalence …

[HTML][HTML] Bridging the gap: A survey and classification of research-informed Ethical Hacking tools

P Modesti, L Golightly, L Holmes, C Opara… - Journal of Cybersecurity …, 2024 - mdpi.com
The majority of Ethical Hacking (EH) tools utilised in penetration testing are developed by
practitioners within the industry or underground communities. Similarly, academic …

Human factor, a critical weak point in the information security of an organization's Internet of things

K Hughes-Lartey, M Li, FE Botchey, Z Qin - Heliyon, 2021 - cell.com
Abstract Internet of Things (IoT) presents opportunities for designing new technologies for
organizations. Many organizations are beginning to accept these technologies for their daily …

Cyber ranges and testbeds for education, training, and research

N Chouliaras, G Kittes, I Kantzavelou, L Maglaras… - Applied Sciences, 2021 - mdpi.com
In recent years, there has been a growing demand for cybersecurity experts, and, according
to predictions, this demand will continue to increase. Cyber Ranges can fill this gap by …

Planning for Cyber Security in Schools: The Human Factor.

MD Richardson, PA Lemoine, WE Stephens… - Educational Planning, 2020 - ERIC
Cybersecurity has emerged as one of the most critical issues confronting schools in the 21st
century. Computer security is an essential instrument for protecting children, but K-12 …

A holistic cybersecurity maturity assessment framework for higher education institutions in the United Kingdom

A Aliyu, L Maglaras, Y He, I Yevseyeva, E Boiten… - Applied Sciences, 2020 - mdpi.com
As organisations are vulnerable to cyberattacks, their protection becomes a significant issue.
Capability Maturity Models can enable organisations to benchmark current maturity levels …

An analysis of human error and reliability in the operation of fixed CO2 systems on cargo ships using HEART Dempster-Shafer evidence theory approach

M Aydin - Ocean Engineering, 2023 - Elsevier
CO 2 fixed fire extinguishing system activation accidents may occur as a result of
unintentional system activation or human error. Crew members present in the area could …

Agile incident response (AIR): Improving the incident response process in healthcare

Y He, ED Zamani, S Lloyd, C Luo - International Journal of Information …, 2022 - Elsevier
Recent industrial reports show an increased number of cybersecurity incidents, which inflict
significant financial losses. Although organisations have been increasing their investments …

[HTML][HTML] Health care cybersecurity challenges and solutions under the climate of COVID-19: Scoping review

Y He, A Aliyu, M Evans, C Luo - Journal of medical Internet research, 2021 - jmir.org
Background COVID-19 has challenged the resilience of the health care information system,
which has affected our ability to achieve the global goal of health and well-being. The …

Risk sensitivity analysis of AIS cyber security through maritime cyber regulatory frameworks

O Soner, G Kayisoglu, P Bolat, K Tam - Applied Ocean Research, 2024 - Elsevier
Given the increasing frequency and sophistication of methods and strategies employed in
cyberattacks, cyber resilience has become a basic notion of cyber risk management. To be …