Differentiating Insider and Outsider Cyberattacks on Businesses

TE Dearden, K Parti, J Hawdon, R Gainey… - American Journal of …, 2023 - Springer
The use of information and communication technologies in business has opened several
new ways for employees to commit cybercrimes against their employers. Utilizing …

Evaluating the barriers affecting cybersecurity behavior in the Metaverse using PLS-SEM and fuzzy sets (fsQCA)

M Al-Emran, MA Al-Sharafi, B Foroughi… - Computers in Human …, 2024 - Elsevier
While offering novel user experiences, the Metaverse introduces complex cybersecurity
challenges due to the sophisticated interaction of augmented reality (AR), virtual reality (VR) …

The role of organizational culture in cybersecurity: Building a security-first culture

MM Willie - Journal of Research, Innovation and Technologies, 2023 - ceeol.com
In today's digital age, organisations have harnessed unprecedented connectivity and
technological advancements, leading to enhanced efficiency and productivity. However, this …

Android malware detection with classification based on hybrid analysis and N-gram feature extraction

E Ravi, MU Kumar - International Conference on Advancements in Smart …, 2022 - Springer
Mobile devices will have the potential to expose to various cyber-attacks with the explosive
growth of mobile networks. Unknown malware may proliferate dramatically in areas where …

Decoding the significant role of social context in SMEs' implementation of management innovation during the digital revolution

M Robert, R Le Goff, S Mignon, P Giuliani - Annals of Operations Research, 2023 - Springer
In this research, we explore the implementation phase of adopted management innovation
(MI) in small and medium-sized enterprises (SMEs) during the digital revolution. Our study …

Towards Hybrid NIDS: Combining Rule-Based SIEM with AI-Based Intrusion Detectors

F Uccello, M Pawlicki, S D'Antonio, R Kozik… - … on Advances in …, 2024 - Springer
The current threat landscape identifies Distributed Denial of Service (DDoS) attacks as one
of the most critical hazards for network security. Given the constant variation in attack …

Emerging technologies, evolving threats: Next-generation security challenges

T Bonaci, K Michael, P Rivas… - … on Technology and …, 2022 - ieeexplore.ieee.org
Security is a fundamental human requirement. We desire the security of our person against
injury, security of our capability to provide for our families, security of income linked to needs …

[PDF][PDF] Enhancing cybersecurity awareness among banking employees in malaysia: Strategies, implications, and research insights

SG Krishnan, A Al-Nahari… - Int. J. Acad. Res. Bus …, 2023 - pdfs.semanticscholar.org
Cybersecurity awareness is important for employees in Malaysia's banking sector.
Protecting valuable data from theft and misuse requires fostering a culture of awareness and …

[PDF][PDF] Cybersecurity Incident Response Readiness in Organisations.

A Aldabjan, S Furnell, X Carpent, M Papadaki - ICISSP, 2024 - scitepress.org
The number and nature of cyber-attacks is continuously evolving, disrupting the productivity
and operations of organisations worldwide. Timely and effective detection and response to …

[PDF][PDF] The Role of Cyber security in a Digitalizing Economy: A Development Perspective

CI Erondu, UI Erondu - … Journal of Research and Innovation in …, 2023 - researchgate.net
ABSTRACT A transforming economy undergoes several transformations including
digitalization. The 21st-century economy must be driven on the wheels of digital …