Review of cybersecurity research topics, taxonomy and challenges: Interdisciplinary perspective

H Suryotrisongko, Y Musashi - 2019 IEEE 12th conference on …, 2019 - ieeexplore.ieee.org
As cybersecurity is a growing field of science, there is not complete agreement across the
scope of cybersecurity research topics. This paper proposes a grouping and classifications …

Enhancing Software Supply Chain Resilience: Strategy For Mitigating Software Supply Chain Security Risks And Ensuring Security Continuity In Development …

A Akinsola, A Akinde - arXiv preprint arXiv:2407.13785, 2024 - arxiv.org
This article delves into the strategic approaches and preventive measures necessary to
safeguard the software supply chain against evolving threats. It aims to foster an …

A comprehensive survey on social engineering attacks, countermeasures, case study, and research challenges

T Rathod, NK Jadav, S Tanwar, A Alabdulatif… - Information Processing …, 2025 - Elsevier
Social engineering attacks are inevitable and imperil the integrity, security, and
confidentiality of the information used on social media platforms. Prominent technologies …

[HTML][HTML] Risk-based cybersecurity compliance assessment system (RC2AS)

A Alfaadhel, I Almomani, M Ahmed - Applied Sciences, 2023 - mdpi.com
Cybersecurity attacks are still causing significant threats to individuals and organizations,
affecting almost all aspects of life. Therefore, many countries worldwide try to overcome this …

Exploring MSMEs Cybersecurity Awareness and Risk Management: Information Security Awareness

YA Singgalen, HD Purnomo… - … (Indonesian Journal of …, 2021 - journal.ugm.ac.id
The use of information technology in the management of Micro, Small, and Medium
Enterprises (MSMEs) is not limited to business performance and productivity but also …

[PDF][PDF] CRM and customer data: Challenges of conducting business in digital economy

M Bakator, D Đorđević, D Ćoćkalo… - Journal of …, 2021 - researchgate.net
Enterprises are facing difficulties in achieving and maintaining competitive ability amidst
globalized markets. In the modern business environment, an effective CRM is an imperative …

Systematic Literature Review of Security Control Assessment Challenges

NAA Othman, AA Norman… - 2022 IEEE 12th …, 2022 - ieeexplore.ieee.org
The advancement of cybersecurity has called for active effective information security
management. Security control (SC) assessment must be empowered to ensure that security …

[HTML][HTML] Defeating the 21st century demon “Cybercrime” on corporate bodies in Nigeria: Is security intelligence a weapon? A quantitative study

MB Afolabi, GA Raji - F1000Research, 2022 - f1000research.com
Background: This paper unveils the role of security intelligence in facilitating the war against
cybercrime in organizations. it introduces the term cybercrime and security intelligence with …

Contextual remediations prioritization system designed to implement theoretical principles of CVSS v4

D Tsurcanu - UPB Scientific Bulletin, Series C: Electrical Engineering …, 2024 - ibn.idsi.md
Technological advancements have led to an unprecedented expansion in the number and
complexity of device interconnections. This brisk pace of adoption, while indicative of …

Secure 3rd party software integration

V Markkanen, T Frantti - 2023 10th International Conference on …, 2023 - ieeexplore.ieee.org
Organisations are seeking ways to centralize their systems and operations. The need for
cloud-based Customer Relationship Management (CRM) systems is, without a doubt …