[HTML][HTML] The Need for Cybersecurity in Industrial Revolution and Smart Cities

A Clim, A Toma, RD Zota, R Constantinescu - Sensors, 2022 - mdpi.com
Cities have grown in development and sophistication throughout human history. Smart cities
are the current incarnation of this process, with increased complexity and social importance …

Supply chain risk management in young and mature SMEs

S Foli, S Durst, L Davies, S Temel - Journal of Risk and Financial …, 2022 - mdpi.com
In this article, we examine how external factors such as demand, security regulation, cyber
risks, and relative performance influence supply chain risk management (SCRM) in young …

An Overview of Security Breach Probability Models

A Mazzoccoli, M Naldi - Risks, 2022 - mdpi.com
Cybersecurity breach probability functions describe how cybersecurity investments impact
the actual vulnerability to cyberattacks through the probability of success of the attack. They …

[HTML][HTML] Between a rock and a hard (ening) place: Cyber insurance in the ransomware era

G Mott, S Turner, JRC Nurse, J MacColl, J Sullivan… - Computers & …, 2023 - Elsevier
Cyber insurance and ransomware are two of the most studied areas within security research
and practice to date, and their interplay continues to raise concerns in industry and …

Cve2att&ck: Bert-based mapping of cves to mitre att&ck techniques

O Grigorescu, A Nica, M Dascalu, R Rughinis - Algorithms, 2022 - mdpi.com
Since cyber-attacks are ever-increasing in number, intensity, and variety, a strong need for a
global, standardized cyber-security knowledge database has emerged as a means to …

[HTML][HTML] Modelling and predicting enterprise-level cyber risks in the context of sparse data availability

D Zängerle, D Schiereck - The Geneva Papers on Risk and Insurance …, 2023 - Springer
Despite growing attention to cyber risks in research and practice, quantitative cyber risk
assessments remain limited, mainly due to a lack of reliable data. This analysis leverages …

[HTML][HTML] Systemic acquired critique of credit card deception exposure through machine learning

RM Dantas, R Firdaus, F Jaleel, PN Mata… - Journal of Open …, 2022 - Elsevier
ABSTRACT A wide range of recent studies are focusing on current issues of financial fraud,
especially concerning cybercrimes. The reason behind this is even with improved security, a …

[HTML][HTML] A service lens on cybersecurity continuity and management for organizations' subsistence and growth

G Thomas, MJ Sule - Organizational Cybersecurity Journal: Practice …, 2022 - emerald.com
Purpose This paper proposes a holistic, proactive and adaptive approach to cybersecurity
from a service lens, given the continuously evolving cyber-attack techniques, threat and …

[HTML][HTML] An application of DEMATEL and fuzzy DEMATEL to evaluate the interaction of safety management system and cybersecurity management system in …

M Khatun, F Wagner, R Jung, M Glaß - Engineering Applications of Artificial …, 2023 - Elsevier
To ensure the safety and security of Automated Vehicles (Avs), the interaction between the
Functional Safety (FuSa) and the Cybersecurity (CS) domains needs to be managed …

Investigating the influence of governance determinants on reporting cybersecurity incidents to police: Evidence from Canadian organizations' perspectives

KR Agbodoh-Falschau, BH Ravaonorohanta - Technology in Society, 2023 - Elsevier
Government agencies and standard setters require organizations operating in critical
infrastructure sectors to disclose cybersecurity incidents, yet little is known about whether …