[HTML][HTML] Learning from cyber security incidents: A systematic review and future research agenda

CM Patterson, JRC Nurse, VNL Franqueira - Computers & Security, 2023 - Elsevier
Cyber security incidents are now prevalent in many organisations. Arguably, those who can
learn from security incidents and address the underlying causes will reduce the prevalence …

A survey of information security incident handling in the cloud

NH Ab Rahman, KKR Choo - computers & security, 2015 - Elsevier
Incident handling strategy is one key strategy to mitigate risks to the confidentiality, integrity
and availability (CIA) of organisation assets, as well as minimising loss (eg financial …

Information security conscious care behaviour formation in organizations

NS Safa, M Sookhak, R Von Solms, S Furnell… - Computers & …, 2015 - Elsevier
Today, the Internet can be considered to be a basic commodity, similar to electricity, without
which many businesses simply cannot operate. However, information security for both …

[HTML][HTML] The rise of crypto-ransomware in a changing cybercrime landscape: Taxonomising countermeasures

LY Connolly, DS Wall - Computers & Security, 2019 - Elsevier
Year in and year out the increasing adaptivity of offenders has maintained ransomware's
position as a major cybersecurity threat. The cybersecurity industry has responded with a …

Enabling cybersecurity incident response agility through dynamic capabilities: the role of real-time analytics

H Naseer, K Desouza, SB Maynard… - European Journal of …, 2024 - Taylor & Francis
We explore how organisations enable agility in their cybersecurity incident response (IR)
process by developing dynamic capabilities using real-time analytics (RTA). Drawing on …

How integration of cyber security management and incident response enables organizational learning

A Ahmad, KC Desouza, SB Maynard… - Journal of the …, 2020 - Wiley Online Library
Digital assets of organizations are under constant threat from a wide assortment of nefarious
actors. When threats materialize, the consequences can be significant. Most large …

Data breach management: An integrated risk model

F Khan, JH Kim, L Mathiassen, R Moore - Information & Management, 2021 - Elsevier
In response to organizations' increasing vulnerability to data breaches, we present an
integrated risk model for data breach management based on a systematic review of the …

Cyber-resilience of Critical Cyber Infrastructures: Integrating digital twins in the electric power ecosystem

A Salvi, P Spagnoletti, NS Noori - Computers & Security, 2022 - Elsevier
This contribution presents a model for cyber-resilience of critical cyber infrastructures (CCI)
based on the implementation of a digital twin. It addresses the risks associated with the …

HEART-IS: A novel technique for evaluating human error-related information security incidents

M Evans, Y He, L Maglaras, H Janicke - Computers & Security, 2019 - Elsevier
Organisations continue to suffer information security incidents and breaches as a result of
human error even though humans are recognised as the weakest link with regard to …

Human aspects of information security in organisations

NS Safa, R Von Solms, L Futcher - Computer Fraud & Security, 2016 - Elsevier
Information is core to the well-being of any modern-day organisation. In order to satisfactorily
protect this important asset, human, organisational and technological aspects play a core …