A study on the psychology of social engineering-based cyberattacks and existing countermeasures

MA Siddiqi, W Pak, MA Siddiqi - Applied Sciences, 2022 - mdpi.com
As cybersecurity strategies become more robust and challenging, cybercriminals are
mutating cyberattacks to be more evasive. Recent studies have highlighted the use of social …

Maintenance performance in the age of Industry 4.0: A bibliometric performance analysis and a systematic literature review

S Werbińska-Wojciechowska, K Winiarska - Sensors, 2023 - mdpi.com
Featured Application This article is focused on a literature review to provide a valuable
resource for understanding the latest developments in the Maintenance 4.0 approach. The …

Internet of Things (IoT) adoption barriers of smart cities' waste management: An Indian context

M Sharma, S Joshi, D Kannan, K Govindan… - Journal of Cleaner …, 2020 - Elsevier
The current study is a preliminary approach to develop a structural framework of the Internet
of Things (IoT) adoption barriers that exist in the waste management systems of smart cities …

Addressing human factors in cybersecurity leadership

WJ Triplett - Journal of Cybersecurity and Privacy, 2022 - mdpi.com
This article identifies human factors in workplaces that contribute to the challenges faced by
cybersecurity leadership within organizations and discusses strategic communication …

A conceptual model for cybersecurity governance

S Yusif, A Hafeez-Baig - Journal of applied security research, 2021 - Taylor & Francis
Cybersecurity is a growing problem associated with everything an individual or an
organization does that is facilitated by the Internet. It is a multi-facetted program that can be …

Assessing the adaptation of Internet of Things (IoT) barriers for smart cities' waste management using Fermatean fuzzy combined compromise solution approach

AR Mishra, P Rani, A Saha, IM Hezam… - IEEE …, 2022 - ieeexplore.ieee.org
This study proposes a systematic methodology of the adoption of Internet of Things (IoT)
barriers (IoTBs) that exist in the waste management structures of smart cities (SCs) in …

Planning for Cyber Security in Schools: The Human Factor.

MD Richardson, PA Lemoine, WE Stephens… - Educational Planning, 2020 - ERIC
Cybersecurity has emerged as one of the most critical issues confronting schools in the 21st
century. Computer security is an essential instrument for protecting children, but K-12 …

Reconceptualizing cybersecurity awareness capability in the data-driven digital economy

S Akter, MR Uddin, S Sajib, WJT Lee, K Michael… - Annals of operations …, 2022 - Springer
Data breaches have become a formidable challenge for business operations in the twenty-
first century. The emergence of big data in the ever-growing digital economy has created the …

Extracting key factors of cyber hygiene behaviour among software engineers: A systematic literature review

S Kalhoro, M Rehman, V Ponnusamy… - IEEE Access, 2021 - ieeexplore.ieee.org
The advent of new technologies and the rapid growth of internet users have given birth to
the menace of cyber-crime. Unfortunately, it is increasing at an alarming pace. This situation …

Participatory threat modelling: Exploring paths to reconfigure cybersecurity

J Slupska, SD Dawson Duckworth, L Ma… - extended abstracts of the …, 2021 - dl.acm.org
We present “participatory threat modelling” as a feminist cybersecurity practice which allows
technology research to centre traditionally marginalized and excluded experiences. We …