Planning for Cyber Security in Schools: The Human Factor.

MD Richardson, PA Lemoine, WE Stephens… - Educational Planning, 2020 - ERIC
Cybersecurity has emerged as one of the most critical issues confronting schools in the 21st
century. Computer security is an essential instrument for protecting children, but K-12 …

Trends and best practices in health care cybersecurity insurance policy

UY Kabir, E Ezekekwu, SS Bhuyan… - Journal of healthcare …, 2020 - Wiley Online Library
Health care organizations are a major target for cyberattacks. This is primarily due to their
peculiar vulnerabilities and attractiveness to nefarious cyber actors. Data breaches from …

Risk and protective factors for intuitive and rational judgment of cybersecurity risks in a large sample of K-12 students and teachers

Z Yan, Y Xue, Y Lou - Computers in Human Behavior, 2021 - Elsevier
K-12 students and teachers are a vulnerable population for cybersecurity risks. Identifying
both risk factors and protective factors associated with intuitive and rational judgment of …

Human factors in the cybersecurity of autonomous vehicles: Trends in current research

V Linkov, P Zámečník, D Havlíčková… - Frontiers in psychology, 2019 - frontiersin.org
The cybersecurity of autonomous vehicles (AVs) is an important emerging area of research
in traffic safety. Because human failure is the most common reason for a successful …

Cybersecurity Career Requirements: A Literature Review

M Nkongolo, N Mennega, I van Zyl - arXiv preprint arXiv:2306.09599, 2023 - arxiv.org
This study employs a systematic literature review approach to identify the requirements of a
career as a cybersecurity professional. It aims to raise public awareness regarding …

Skills expectations in cybersecurity: semantic network analysis of job advertisements

CM Graham, Y Lu - Journal of Computer Information Systems, 2023 - Taylor & Francis
Cybersecurity jobs are in demand around the country in response to the rapidly growing
number of cyberattacks on businesses and government entities. While there is some …

[PDF][PDF] Design and analysis of a model for detection of information attacks in computer networks

I Dzhalladova, S Škapa, V Novotna… - Econ. Comput. Econ …, 2019 - academia.edu
DESIGN AND ANALYSIS OF A MODEL FOR DETECTION OF INFORMATION ATTACKS IN
COMPUTER NETWORKS Abstract. Information technology has taken the world by storm. Its …

[PDF][PDF] Disinformation as a strategic weapon: Roles of societal polarization, government's cybersecurity capability, and the rule of law

J Arayankalam - 2020 - scholar.archive.org
Disinformation through social media has emerged as a new form of cyberweapon for
countries to advance their strategic interests. However, there is a conspicuous dearth of …

[PDF][PDF] The human dimension as the core factor in dealing with cyberattacks in higher education

Z Othmana, N Rahimb, M Sadiqc - Int. J. Innov. Creat. Chang, 2020 - ijicc.net
Higher education institutions deal with an enormous amount of personal and critical data.
Thus, they have a great responsibility for data protection. In recent years, higher education …

Exploring How Universities Can Reduce Successful Cyberattacks by Incorporating Zero Trust

LF DeWeaver III - 2021 - search.proquest.com
This qualitative study aimed to explore how universities can incorporate the Zero Trust
Security Framework to help prevent cyber-attacks. The research question asked: How have …