S Farhang, J Grossklags - Decision and Game Theory for Security: 7th …, 2016 - Springer
One of the particularly daunting issues in the cybersecurity domain is information leakage of business or consumer data, which is often triggered by multi-stage attacks and advanced …
The author of this book has identified the seven key emerging Internet-related technologies: Internet of things, smart everything, big data, cloud computing, cybersecurity, software …
Cyber-attacks against small businesses are on the rise yet small business owners often lack effective strategies to avoid these attacks. The purpose of this qualitative multiple case study …
Colleges and universities across the United States have seen data breaches and intellectual property theft rise at a heightened rate over the past several years, partly driven by the …
Purpose Colleges and universities across the USA have seen data breaches and intellectual property theft rise at a heightened rate over the past several years. An integral …
This thesis examines employee interaction with information security in large organisations. It starts by revisiting past research in user-centred security and security management …
After being placed into a position, it is common for new employees to be acclimated to an organization's culture, rules, and procedures via a process called onboarding. These …
Advances in technological uses within public schools provide increased methods to collect and store non-public personal information (NPI) or personally identifiable information (PII) …
The purpose of this paper is to present an argument for a methodology to detect and prevent cyber-based corporate espionage. The focus of this paper will be on the human domain and …