[HTML][HTML] Towards a cybersecurity culture-behaviour framework: A rapid evidence review

A Sutton, L Tompson - Computers & Security, 2024 - Elsevier
A strong organisational cybersecurity culture (CSC) is critical to the success of any
cybersecurity effort, and understanding and measuring CSC is essential if it is to succeed …

Enhancing relationships between criminology and cybersecurity

B Dupont, C Whelan - Journal of criminology, 2021 - journals.sagepub.com
'Cybercrime'is an umbrella concept used by criminologists to refer to traditional crimes that
are enhanced via the use of networked technologies (ie cyber-enabled crimes) and newer …

Research productivity and network visualization on digital evidence: A bibliometric study

D Chhtrapati, SP Chaudhari, D Mevada… - Science & …, 2021 - Taylor & Francis
The present study focuses on evaluating the research productivity in the domain of digital
evidence using various bibliometric indicators. Total 4458 scientific publications were …

[HTML][HTML] Decoding National Innovation Capacities: A Comparative Analysis of Publication Patterns in Cybersecurity, Privacy, and Blockchain

E Bran, R Rughiniș, D Țurcanu, AR Stăiculescu - Applied Sciences, 2024 - mdpi.com
Featured Application This analysis can guide national science policy for enhancing research
in blockchain, privacy, and cybersecurity. Policymakers can use the findings to allocate …

Mapping the cybersecurity research: A scientometric analysis of Indian publications

B Elango, S Matilda, M Martina Jose Mary… - Journal of Computer …, 2023 - Taylor & Francis
In addition to physical treats, cyber-threats and crimes are on the rise, which necessitates a
greater focus on cybersecurity research. The goal of this study is to identify and characterize …

[PDF][PDF] Blocking Dangerous Content in Electronic Communications Networks: Evidence from Netherlands, United States and Singapore

I Mulyawarman, G Adhi… - Journal of Human …, 2024 - pdfs.semanticscholar.org
Advances in global technology and information have implications for the use of the internet
for e-commerce, e-business, and e-banking activities, as well as providing cyber freedom …

[HTML][HTML] Technical Innovations and Social Implications: Mapping Global Research Focus in AI, Blockchain, Cybersecurity, and Privacy

E Bran, R Rughiniș, D Țurcanu, G Nadoleanu - Computers, 2024 - mdpi.com
This study examines the balance between technical and social focus in artificial intelligence,
blockchain, cybersecurity, and privacy publications in Web of Science across countries …

Identifying cyber security competencies and skills from online job advertisements through topic modeling

O Ozyurt, A Ayaz - Security Journal, 2024 - Springer
This study aims to reveal the competence areas and skill sets needed in the business world
in the field of cyber security (CS). For this purpose, descriptive analysis, topic modeling …

A scientometrics analysis of cybersecurity using e-csti

K Omote, Y Inoue, Y Terada, N Shichijo, T Shirai - IEEE Access, 2024 - ieeexplore.ieee.org
The research area of cybersecurity covers a wide range of fields from networking, software,
and hardware to cryptography, authentication, and cyberattack countermeasures …

Growth, diversification, and disconnection: an analysis of 70 years of intelligence scholarship (1950-2020)

S Coulthart, A Rorissa - Intelligence and National Security, 2023 - Taylor & Francis
Intelligence studies scholarship is growing exponentially but is siloed in disciplinary clusters.
After reviewing a citation dataset of nearly 6,000 articles on intelligence, we found that article …