[HTML][HTML] Balancing software and training requirements for information security

D Fujs, S Vrhovec, D Vavpotič - Computers & security, 2023 - Elsevier
Abstract Information security is one of the key areas of consideration to assure reliable and
dependable information systems (IS). Achieving an appropriate level of IS security requires …

[HTML][HTML] Appraising the manifestation of optimism bias and its impact on human perception of cyber security: A meta analysis

KM Alnifie, C Kim - Journal of Information Security, 2023 - scirp.org
Cyber threats and risks are increasing exponentially with time. For preventing and defense
against these threats and risks, precise risk perception for effective mitigation is the first step …

Designing an Effective Organizational Culture to Guard Against the Cyber Risks of Emerging Technologies

ME Watkins - Journal of Healthcare Management, 2023 - journals.lww.com
Abstract The Internet of Medical Things (IoMT) and interoperable technologies have
transformed how patient data affect medical care; such technological innovations …

ISO/IEC 27001 kapsamında bilgi güvenliği yönetim farkındalığının değerlendirilmesi: Ankara ili sağlık kurumları bilgi işlem birimi çalışanları örneği

H Soysal - 2023 - search.proquest.com
Sağlık kurumları hastaların kişisel bilgilerinin yanı sıra tıbbi ve idari verilerin yoğun bir
şekilde kullanıldığı ve bu bilgilerin tanımlaması, değerlendirilmesi, uygulanması, saklanması …

An investigation of the current loopholes in bank ABC's cybersecurity system: supporting a more resilient and trustworthy cybersecurity system

H Almansoori - 2024 - stax.strath.ac.uk
This dissertation extensively analyses ways to make UAE financial institutions more resilient
to cyber-attacks. The primary objective is to assess and enhance these institutions' cyber risk …

Data Approach to Biometrics in Cybersecurity with Related Risks

A Arteche, C Asher, C Bull, H Dare… - 2022 International …, 2022 - ieeexplore.ieee.org
This paper will research the implications that biometrics have on cybersecurity. The paper
will introduce topics such as what biometrics are, the recent advancements in it, and how …