To see the other types of publications on this topic, follow the link: 4604 Cybersecurity and privacy.

Journal articles on the topic '4604 Cybersecurity and privacy'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the top 50 journal articles for your research on the topic '4604 Cybersecurity and privacy.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.

1

Bojanova, Irena, Jeffrey Voas, Morris Chang, and Linda Wilbanks. "Cybersecurity or Privacy [Guest editors' introduction]." IT Professional 18, no. 5 (September 2016): 16–17. http://dx.doi.org/10.1109/mitp.2016.80.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Mishra, Neha. "Privacy, Cybersecurity, and GATS Article XIV: A New Frontier for Trade and Internet Regulation?" World Trade Review 19, no. 3 (May 2, 2019): 341–64. http://dx.doi.org/10.1017/s1474745619000120.

Full text
Abstract:
AbstractMeasures restricting data flows outside one's borders, including mandatory data/server localization measures, are not only a barrier to trade, but also largely ineffective in achieving better internet security or trust. Nevertheless, governments deploy such measures, primarily on grounds of cybersecurity and privacy, potentially violating their obligations under the General Agreement on Trade in Services (GATS). In this article, I investigate whether GATS-inconsistent measures may be justified under GATS Art. XIV when aimed at ensuring privacy or cybersecurity, and, if so, whether GATS Art. XIV effectively balances trade and internet policy. As the internet governance framework is complex and somewhat ambiguous, applying GATS Art. XIV to cybersecurity/privacy measures necessitates balancing of trade liberalization principles and domestic internet policy. This exercise can be effective in weeding out data localization measures disguised as privacy/cybersecurity measures, particularly by employing relevant technical and factual evidence. However, given the lack of binding international law/norms on these issues, GATS Art. XIV has a limited role, particularly in cases involving direct conflict between multistakeholder/transnational internet norms and domestic internet policies, or where the measures are founded on contentious standards/benchmarks on privacy/cybersecurity. Ultimately, ensuring free and secure data flows requires a multidimensional policy response, including strengthening linkages between trade law and internet governance.
APA, Harvard, Vancouver, ISO, and other styles
3

Barth, Susanne, Menno D. T. de Jong, and Marianne Junger. "Lost in privacy? Online privacy from a cybersecurity expert perspective." Telematics and Informatics 68 (March 2022): 101782. http://dx.doi.org/10.1016/j.tele.2022.101782.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Pehlivan, Ceyhun Necati. "Global Privacy News." Global Privacy Law Review 1, Issue 1 (March 1, 2020): 63–76. http://dx.doi.org/10.54648/gplr2020009.

Full text
Abstract:
This article tracks significant developments in some of the key jurisdictions in the area of privacy, data protection, and cybersecurity. It provides concise reports to keep the reader up to date with some of the most recent developments across the globe. privacy, data protection, cyber security, global, news
APA, Harvard, Vancouver, ISO, and other styles
5

Khatoun, Rida, and Sherali Zeadally. "Cybersecurity and Privacy Solutions in Smart Cities." IEEE Communications Magazine 55, no. 3 (March 2017): 51–59. http://dx.doi.org/10.1109/mcom.2017.1600297cm.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Landwehr, C., D. Boneh, J. C. Mitchell, S. M. Bellovin, S. Landau, and M. E. Lesk. "Privacy and Cybersecurity: The Next 100 Years." Proceedings of the IEEE 100, Special Centennial Issue (May 2012): 1659–73. http://dx.doi.org/10.1109/jproc.2012.2189794.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Pattanasri, Thanaphol. "Mandatory Data Breach Notification and Hacking the Smart Home: A Legal Response to Cybersecurity?" QUT Law Review 18, no. 2 (March 1, 2019): 268. http://dx.doi.org/10.5204/qutlr.v18i2.752.

Full text
Abstract:
This paper will investigate whether the Australian legal and regulatory framework sufficiently addresses cybersecurity concerns particular to the smart home. Specifically, the paper will analyse the extent to which the introduction of the data breach notification scheme in Australia will apply to smart home device manufacturers regulated by the federal Privacy Act 1988 (Cth) regarding device breaches. By examining Australian Privacy Principle 11 and the introduction of mandatory data breach notification, the paper aims to determine whether the Australian privacy model of Principles Based Regulation is capable of providing a market-based solution to cybersecurity concerns in the smart home.
APA, Harvard, Vancouver, ISO, and other styles
8

Pattanasri, Thanaphol. "Mandatory Data Breach Notification and Hacking the Smart Home: A Legal Response to Cybersecurity?" QUT Law Review 18, no. 2 (March 5, 2019): 268. http://dx.doi.org/10.5204/qutlr.v18i2.770.

Full text
Abstract:
This paper will investigate whether the Australian legal and regulatory framework sufficiently addresses cybersecurity concerns particular to the smart home. Specifically, the paper will analyse the extent to which the introduction of the data breach notification scheme in Australia will apply to smart home device manufacturers regulated by the federal Privacy Act 1988 (Cth) regarding device breaches. By examining Australian Privacy Principle 11 and the introduction of mandatory data breach notification, the paper aims to determine whether the Australian privacy model of Principles-Based Regulation is capable of providing a market-based solution to cybersecurity concerns in the smart home.
APA, Harvard, Vancouver, ISO, and other styles
9

Jofre, Marc, Diana Navarro-Llobet, Ramon Agulló, Jordi Puig, Gustavo Gonzalez-Granadillo, Juan Mora Zamorano, and Ramon Romeu. "Cybersecurity and Privacy Risk Assessment of Point-of-Care Systems in Healthcare—A Use Case Approach." Applied Sciences 11, no. 15 (July 21, 2021): 6699. http://dx.doi.org/10.3390/app11156699.

Full text
Abstract:
Point-of-care systems are generally used in healthcare to respond rapidly and prevent critical health conditions. Hence, POC systems often handle personal health information; and consequently, their cybersecurity and privacy requirements are of crucial importance. While, assessing these requirements is a significant task. In this work, we propose a use case approach to assess specifications of cybersecurity and privacy requirements of POC systems in a structured and self-contained form. Such an approach is appropriate since use cases are one of the most common means adopted by developers to derive requirements. As a result, we detail a use case approach in the framework of a real-based healthcare IT infrastructure that includes a health information system, integration engines, application servers, web services, medical devices, smartphone apps and medical modalities (all data simulated) together with the interaction with participants. Since our use case also sustains the analysis of cybersecurity and privacy risks in different threat scenarios, it also supports decision making and the analysis of compliance considerations.
APA, Harvard, Vancouver, ISO, and other styles
10

Landwehr, Carl. "Prolog to the Section on Privacy and Cybersecurity." Proceedings of the IEEE 100, Special Centennial Issue (May 2012): 1657–58. http://dx.doi.org/10.1109/jproc.2012.2189820.

Full text
APA, Harvard, Vancouver, ISO, and other styles
11

Kshetri, Nir. "Blockchain's roles in strengthening cybersecurity and protecting privacy." Telecommunications Policy 41, no. 10 (November 2017): 1027–38. http://dx.doi.org/10.1016/j.telpol.2017.09.003.

Full text
APA, Harvard, Vancouver, ISO, and other styles
12

de Fuentes, José M., Lorena González-Manzano, Juan Tapiador, and Pedro Peris-Lopez. "PRACIS: Privacy-preserving and aggregatable cybersecurity information sharing." Computers & Security 69 (August 2017): 127–41. http://dx.doi.org/10.1016/j.cose.2016.12.011.

Full text
APA, Harvard, Vancouver, ISO, and other styles
13

E. Larrea, Guillermo, and Juan Carlos Quinzaños. "Report: Privacy in Latin America During COVID-19 Times and Reasonable Digital Security." Global Privacy Law Review 2, Issue 2 (June 1, 2021): 162–68. http://dx.doi.org/10.54648/gplr2021021.

Full text
Abstract:
The global COVID-19 pandemic has tested the business and human capacity in Latin America to adapt to the digital world. While the world has experienced similar developments in privacy and data protection, the Latin American region is rarely analysed as a whole in terms of privacy and data protection. Besides GDPR, Latin America has older and even more robust data protection regimes than the US and is now quickly shifting to cybersecurity. In this article, we provide a quick overview of the data protection regimes in Latin America to summarize representative actions that countries in Latin America took for the protection of privacy and personal data during the pandemic period. We examine the factors and circumstances that have affected the region’s privacy through this period, including unsuitable data processing, the design of new tracking technologies, teleworking, the risks of relying on digital platforms, and alleged new cybersecurity regulation. With that in mind, we are making a value proposition towards identifying common factors for a reasonable security in order to help companies preparing to confront risks. This digital trend will undoubtedly resonate on the complexity of data transfers inbound and outbound the region, and the consequences of security breaches for those improperly processing data in the region. Mexico, Latin America, COVID-19, Digital Transformation, Cybersecurity, Personal Data, Data Processing, Incident Response, Teleworking, Reasonable Security, Privacy
APA, Harvard, Vancouver, ISO, and other styles
14

Katzan, Jr., Harry. "Cybersecurity Service Model." Journal of Service Science (JSS) 5, no. 2 (December 28, 2012): 71–78. http://dx.doi.org/10.19030/jss.v5i2.7576.

Full text
Abstract:
The efficacy of modern computer systems is normally regarded as a function of five basic attributes of computer and information security: availability, accuracy, authenticity, confidentiality, and integrity. The concepts generally apply to government, business, education, and the ordinary lives of private individuals. The considerations normally involve extended applications of the Internet hence the name Cybersecurity. Achieving and maintaining a secure cyberspace is a complicated process, and some of the concerns involve personal identity, privacy and intellectual property, secure maintenance of the critical infrastructure, and the sustainability of organizations. The threats to a secure operating infrastructure are serious and profound: cyber terrorism, cyber war, cyber espionage, and cyber crime, to which the technical community has responded with a plethora of ad hoc safeguards and procedures, usually supplied by the competitive private sector. This paper proposes a fresh view of the cyber domain based on service science with the ultimate objective of developing a cybersecurity service model.
APA, Harvard, Vancouver, ISO, and other styles
15

Riebe, Thea, Tom Biselli, Marc-André Kaufhold, and Christian Reuter. "Privacy Concerns and Acceptance Factors of OSINT for Cybersecurity: A Representative Survey." Proceedings on Privacy Enhancing Technologies 2023, no. 1 (January 2023): 477–93. http://dx.doi.org/10.56553/popets-2023-0028.

Full text
Abstract:
The use of Open Source Intelligence (OSINT) to monitor and detect cybersecurity threats is gaining popularity among Cybersecurity Emergency or Incident Response Teams (CERTs/CSIRTs). They increasingly use semi-automated OSINT approaches when monitoring cyber threats for public infrastructure services and incident response. Most of the systems use publicly available data, often focusing on social media due to timely data for situational assessment. As indirect and affected stakeholders, the acceptance of OSINT systems by users, as well as the conditions which influence the acceptance, are relevant for the development of OSINT systems for cybersecurity. Therefore, as part of the ethical and social technology assessment, we conducted a survey (N=1,093), in which we asked participants about their acceptance of OSINT systems, their perceived need for open source surveillance, as well as their privacy behavior and concerns. Further, we tested if the awareness of OSINT is an interactive factor that affects other factors. Our results indicate that cyber threat perception and the perceived need for OSINT are positively related to acceptance, while privacy concerns are negatively related. The awareness of OSINT, however, has only shown effects on people with higher privacy concerns. Here, particularly high OSINT awareness and limited privacy concerns were associated with higher OSINT acceptance. Lastly, we provide implications for further research and the use of OSINT systems for cybersecurity by authorities. As OSINT is a framework rather than a single technology, approaches can be selected and combined to adhere to data minimization and anonymization as well as to leverage improvements in privacy-preserving computation and machine learning innovations. Regarding the use of OSINT, the results suggest to favor approaches that provide transparency to users regarding the use of the systems and the data they gather.
APA, Harvard, Vancouver, ISO, and other styles
16

Lee, In. "Internet of Things (IoT) Cybersecurity: Literature Review and IoT Cyber Risk Management." Future Internet 12, no. 9 (September 18, 2020): 157. http://dx.doi.org/10.3390/fi12090157.

Full text
Abstract:
Along with the growing threat of cyberattacks, cybersecurity has become one of the most important areas of the Internet of Things (IoT). The purpose of IoT cybersecurity is to reduce cybersecurity risk for organizations and users through the protection of IoT assets and privacy. New cybersecurity technologies and tools provide potential for better IoT security management. However, there is a lack of effective IoT cyber risk management frameworks for managers. This paper reviews IoT cybersecurity technologies and cyber risk management frameworks. Then, this paper presents a four-layer IoT cyber risk management framework. This paper also applies a linear programming method for the allocation of financial resources to multiple IoT cybersecurity projects. An illustration is provided as a proof of concept.
APA, Harvard, Vancouver, ISO, and other styles
17

Alodaynan, Abdullah Mohammed, and Adwan Alownie Alanazi. "A survey of cybersecurity vulnerabilities in healthcare systems." International Journal of ADVANCED AND APPLIED SCIENCES 8, no. 12 (December 2021): 48–55. http://dx.doi.org/10.21833/ijaas.2021.12.007.

Full text
Abstract:
The security of healthcare servers and their applications from unauthorized access and hacking effect of patient file safety as a result of missing or modified data. Therefore, it is necessary to protect those servers and health systems and to know the cyber weaknesses in them and other related services to prevent them before they occur and treat them if they occur as soon as possible to reach the highest level of security and confidentiality of patient data and their privacy in addition to the safety of systems from malfunctions as a result of the attack. This research revolves around the concept of penetration and the motives of the attackers, in addition to the methods of penetration and vulnerability with mentioning some common attacks and clarifying their method of operation, and determining their effects on the victim. The research also deals with the most important basics and requirements to achieve privacy and security for health systems at different levels, including systems, users, and devices, with some intrusion protection techniques mentioned, and some challenges and solutions will be discussed in addition to some security issues in general, the research aims to gain the best level of security and privacy in the infrastructure of health systems.
APA, Harvard, Vancouver, ISO, and other styles
18

Rawat, Danda B. "Journal of Cybersecurity and Privacy: A New Open Access Journal." Journal of Cybersecurity and Privacy 1, no. 1 (March 19, 2021): 195–98. http://dx.doi.org/10.3390/jcp1010010.

Full text
APA, Harvard, Vancouver, ISO, and other styles
19

Jaccard, Julian Jang. "Cybersecurity threats in cloud computing." Australian Journal of Telecommunications and the Digital Economy 1, no. 1 (December 15, 2013): 58–74. http://dx.doi.org/10.18080/ajtde.v1n1.128.

Full text
Abstract:
Recently we have witnessed the emergence of cloud computing as a new computing model that offers resources (e.g., compute, storage, network, etc.) as general utilities to be leased and released on-demand by users through the Internet. Given its innovative nature and reliance on the Internet, the cloud inherently comes with a number of vulnerabilities that increase the space for cyber attacks. This paper aims to provide an overview of major potential risks to privacy and security in the cloud. Various emerging threats and attack methods are discussed, and some speculative future research directions are presented.
APA, Harvard, Vancouver, ISO, and other styles
20

Jaccard, Julian Jang. "Cybersecurity threats in cloud computing." Journal of Telecommunications and the Digital Economy 1, no. 1 (December 15, 2013): 58–74. http://dx.doi.org/10.18080/jtde.v1n1.128.

Full text
Abstract:
Recently we have witnessed the emergence of cloud computing as a new computing model that offers resources (e.g., compute, storage, network, etc.) as general utilities to be leased and released on-demand by users through the Internet. Given its innovative nature and reliance on the Internet, the cloud inherently comes with a number of vulnerabilities that increase the space for cyber attacks. This paper aims to provide an overview of major potential risks to privacy and security in the cloud. Various emerging threats and attack methods are discussed, and some speculative future research directions are presented.
APA, Harvard, Vancouver, ISO, and other styles
21

Petron, David, Michael Wolk, and Edward McNicholas. "Broker-dealers need to respond to recent focus on cybersecurity threats." Journal of Investment Compliance 15, no. 2 (June 3, 2014): 29–32. http://dx.doi.org/10.1108/joic-05-2014-0020.

Full text
Abstract:
Purpose – To alert broker-dealers to several regulatory developments relating to cybersecurity threats. Design/methodology/approach – Reviews four regulatory developments in the cybersecurity area and provides several steps broker-dealers should undertake to review and improve their cybersecurity and information technology protocols and practices. Findings – While FINRA’s new cybersecurity sweep appears to be an exploratory and learning exercise to obtain regulatory knowledge and intelligence, firms should be cognizant of the fact that both FINRA and the SEC have imposed significant sanctions against Firms when it has found inadequate cyber security policies and procedures. Practical implications – Broker-dealers should review the White House’s recent Framework for Improving Critical Infrastructure Cybersecurity and evaluate their own cybersecurity preparedness under the key areas of the Framework. Originality/value – Practical guidance from experienced privacy and securities regulatory lawyers that consolidates several recent developments in one piece.
APA, Harvard, Vancouver, ISO, and other styles
22

Katzan, Harry. "Contemporary Issues in Cybersecurity." Journal of Cybersecurity Research (JCR) 1, no. 1 (June 21, 2016): 1–6. http://dx.doi.org/10.19030/jcr.v1i1.9745.

Full text
Abstract:
The effectiveness of modern computer applications is normally regarded as a function of five basic attributes of secure computer and information systems: availability, accuracy, authenticity, confidentiality, and integrity. The concepts generally apply to government, business, education, and the ordinary lives of private individuals. The considerations normally involve extended Internet applications – hence the name Cybersecurity. Achieving and maintaining a secure cyberspace is a complicated process, and some of the concerns involve personal identity, privacy, intellectual property, the critical infrastructure, and the sustainability of organizations. The threats to a secure operating infrastructure are serious and profound: cyber terrorism, cyber war, cyber espionage, and cyber crime, to which the technical community has responded with safeguards and procedures, usually supplied by the private sector. This paper provides a comprehensive view of security in the cyber domain with the ultimate objective of developing a science of cybersecurity.
APA, Harvard, Vancouver, ISO, and other styles
23

Nte, Ngboawaji Daniel, Brebina Kelvin Enoke, and Joda Adekunbi Omolara. "An Evaluation of the Challenges of Mainstreaming Cybersecurity Laws and Privacy Protection in Nigeria." Journal of Law and Legal Reform 3, no. 2 (April 30, 2022): 246–66. http://dx.doi.org/10.15294/jllr.v3i2.56484.

Full text
Abstract:
The goal of this study is to discuss cybercrimes and review cybersecurity threats, with a focus on cybersecurity legislations in Nigeria that seek to protect the privacy and digital property of the Nigerian people and the country’s institutions. The study’s methodology includes a qualitative examination of Nigeria's present national cybersecurity laws. It explores how effective they are and interrogates the additional measures that may be needed-notably in cybersecurity and related national laws-to ensure that individuals, institutions are protected and that society and the national economy function well in the 21st Century. Individuals have a right to privacy, so do companies and various other institutions in post- modern societies. This right varies widely across different countries across the globe. In some countries it is minimal or non-existent, in others it is hard fought for constitutional right. In order to reap the benefits of advanced technologies in the information age, personal and institutional data have to be made available to merchants, institutions and government. The benefits of advanced technologies are immense-and vital to modern economies. However, this process involves risks. Abuse of the data is a risk, and criminal abuse has become widespread.
APA, Harvard, Vancouver, ISO, and other styles
24

Dunn Cavelty, Myriam, and Matthias Leese. "Politicising Security at the Boundaries: Privacy in Surveillance and Cybersecurity." Special Issue: The Politicisation of Security: Controversy, Mobilisation, Arena Shifting, no. 3-2018 (February 18, 2019): 49–69. http://dx.doi.org/10.3224/eris.v5i3.03.

Full text
Abstract:
This article looks into the politicisation of security. Politicisation, in contrast to securitisation, presupposes that security issues are controversially debated in a public arena without foregone conclusions as to how they are going to be handled. In order to locate and observe politicisation processes empirically, we suggest to look at privacy, a key notion and main tool for resistance vis-à-vis security logics. By examining two issue areas (video surveillance and cybersecurity), we highlight different tactics through which privacy is mobilised as a boundary object to politicise security. The invocation of privacy offers an alternative viewpoint on security, one where the human (digital) body and a human centred notion of security is at the centre. The value of its integrity and the need for its protection is a weighty counter to the abstract and often absolute claims of ‘more security’ through technological means.
APA, Harvard, Vancouver, ISO, and other styles
25

Chen, Su-Yen, Hsin-Yu Kuo, and Chiachun Lee. "Preparing Society for Automated Vehicles: Perceptions of the Importance and Urgency of Emerging Issues of Governance, Regulations, and Wider Impacts." Sustainability 12, no. 19 (September 23, 2020): 7844. http://dx.doi.org/10.3390/su12197844.

Full text
Abstract:
This study explores the overall picture of how people perceive the importance level and urgency level regarding issues associated with automated vehicles, by sorting out ten issues, developing a questionnaire with 66 measurement items, and investigating how Artificial Intelligence (AI) experts and Computer Science (CS)/Electrical Engineering (EE) majors assessed these issues. The findings suggest that AI experts in Taiwan believed that the top five issues for preparing a society for autonomous vehicles (AVs) should include (1) data privacy and cybersecurity, (2) regulation considerations, (3) infrastructure, (4) governance, and (5) public acceptance. On the other hand, for their student counterparts, the results (1) demonstrate a somewhat different order from the third to the fifth place, (2) show an attention-focused profile on the issue of cybersecurity and data privacy, and (3) indicate that gender and a few wider-impact variables (technology innovation, infrastructure) are significant predictors for the assessment on the importance level of AVs, while some wider-impact variables (technology innovation, governance, economic benefits, infrastructure), which are positively associated, as well as concerns variables (cybersecurity and data privacy, regulations), which are negatively associated, could be predictors for the urgency level of AVs. Suggestions for future research and policymakers are provided.
APA, Harvard, Vancouver, ISO, and other styles
26

Almanza Olmedo, Moreno. "e-commerce cybersecurity vulnerability, http protocol case." Minerva 2, no. 6 (November 22, 2021): 23–31. http://dx.doi.org/10.47460/minerva.v2i6.39.

Full text
Abstract:
This paper was designed with the intention of analyzing the vulnerability of e-commerce web sites. We are going to describe the transmission of data in clear text without encryption by hypertext transfer protocol (HTTP), reason why we argue that by means of a sniffer technique this information can be captured and this way violating customer privacy information.
APA, Harvard, Vancouver, ISO, and other styles
27

Yuliana, Yuliana. "THE IMPORTANCE OF CYBERSECURITY AWARENESS FOR CHILDREN." Lampung Journal of International Law 4, no. 1 (June 30, 2022): 41–48. http://dx.doi.org/10.25041/lajil.v3i2.2526.

Full text
Abstract:
Online school during the COVID-19 pandemic makes the children prone to cyberattacks and malware. Therefore, cybersecurity awareness among children is critical. Online games and stories caused children to neglect their studying time. Therefore, this paper aims to describe the importance of cybersecurity awareness among children. Analyses were performed by using a literature review. Inclusion criteria are review and research articles. Inclusion criteria are review and research articles that were read twice to reduce the bias, then were summarized and narrated descriptively. Results revealed that cybersecurity awareness could be increased by digital literacy training. Children should be taught how to avoid risky behavior online. The cybersecurity awareness program is suitable for children to avoid phishing, pornography, cyberbullying, identity theft, and breaking of privacy. Children must be taught how to keep their passwords safe and private. They also need to be more cautious when playing online games. In conclusion, digital literacy and cybersecurity programs can be taught to children. These programs are suitable for raising cybersecurity among children.
APA, Harvard, Vancouver, ISO, and other styles
28

Ferreira, Ana, and Ricardo Cruz-Correia. "COVID-19 and Cybersecurity: Finally, an Opportunity to Disrupt?" JMIRx Med 2, no. 2 (May 6, 2021): e21069. http://dx.doi.org/10.2196/21069.

Full text
Abstract:
COVID-19 has challenged cybersecurity to meet the ultimate need of guaranteeing the privacy and security of human beings. Although personal and sensitive health data are needed to better understand, detect, and control the disease, many related cybersecurity challenges and vulnerabilities require further analysis and proper discussion. The aims of this viewpoint are to explore the consequences of COVID-19 on cybersecurity and health care as well as to foster awareness regarding the need for a change in paradigm on how cybersecurity is approached. Education and information technology literacy are important when they are suitably provided; however, they are certainly not a complete solution. Disruption needs to occur at the core of human-device interactions. Building trust, providing novel means to interact with technology (eg, digital humans), and supporting people—the most important cybersecurity asset—are only some of the recommendations for a more human and resilient approach to cybersecurity, during or after the pandemic.
APA, Harvard, Vancouver, ISO, and other styles
29

Yuliana, Yuliana. "THE IMPORTANCE OF CYBERSECURITY AWARENESS FOR CHILDREN." Lampung Journal of International Law 4, no. 1 (June 30, 2022): 41–48. http://dx.doi.org/10.25041/lajil.v4i1.2526.

Full text
Abstract:
Online school during the COVID-19 pandemic makes the children prone to cyberattacks and malware. Therefore, cybersecurity awareness among children is critical. Online games and stories caused children to neglect their studying time. Therefore, this paper aims to describe the importance of cybersecurity awareness among children. Analyses were performed by using a literature review. Inclusion criteria are review and research articles. Inclusion criteria are review and research articles that were read twice to reduce the bias, then were summarized and narrated descriptively. Results revealed that cybersecurity awareness could be increased by digital literacy training. Children should be taught how to avoid risky behavior online. The cybersecurity awareness program is suitable for children to avoid phishing, pornography, cyberbullying, identity theft, and breaking of privacy. Children must be taught how to keep their passwords safe and private. They also need to be more cautious when playing online games. In conclusion, digital literacy and cybersecurity programs can be taught to children. These programs are suitable for raising cybersecurity among children.
APA, Harvard, Vancouver, ISO, and other styles
30

Balan, Shilpa, Sanchita Gawand, and Priyanka Purushu. "Application of Machine Learning Classification Algorithm to Cybersecurity Awareness." Information Technology and Management Science 21 (December 14, 2018): 45–48. http://dx.doi.org/10.7250/itms-2018-0006.

Full text
Abstract:
Cybersecurity plays a vital role in protecting the privacy and data of people. In the recent times, there have been several issues relating to cyber fraud, data breach and cyber theft. Many people in the United States have been a victim of identity theft. Thus, understanding of cybersecurity plays an important role in protecting their information and devices. As the adoption of smart devices and social networking are increasing, cybersecurity awareness needs to be spread. The research aims at building a classification machine learning algorithm to determine the awareness of cybersecurity by the common masses in the United States. We were able to attain a good F-measure score when evaluating the performance of the classification model built for this study.
APA, Harvard, Vancouver, ISO, and other styles
31

Aliyu, Aliyu, Leandros Maglaras, Ying He, Iryna Yevseyeva, Eerke Boiten, Allan Cook, and Helge Janicke. "A Holistic Cybersecurity Maturity Assessment Framework for Higher Education Institutions in the United Kingdom." Applied Sciences 10, no. 10 (May 25, 2020): 3660. http://dx.doi.org/10.3390/app10103660.

Full text
Abstract:
As organisations are vulnerable to cyberattacks, their protection becomes a significant issue. Capability Maturity Models can enable organisations to benchmark current maturity levels against best practices. Although many maturity models have been already proposed in the literature, a need for models that integrate several regulations exists. This article presents a light, web-based model that can be used as a cybersecurity assessment tool for Higher Education Institutes (HEIs) of the United Kingdom. The novel Holistic Cybersecurity Maturity Assessment Framework incorporates all security regulations, privacy regulations, and best practices that HEIs must be compliant to, and can be used as a self assessment or a cybersecurity audit tool.
APA, Harvard, Vancouver, ISO, and other styles
32

Sebastian, Glorin. "A Descriptive Study on Metaverse." International Journal of Security and Privacy in Pervasive Computing 15, no. 1 (January 1, 2023): 1–14. http://dx.doi.org/10.4018/ijsppc.315591.

Full text
Abstract:
Maximalist, interconnected set of experiences straight out of sci-fi, based on 3D virtual environment through personal computing, and augmented reality headsets—a world known as the Metaverse—this is the futuristic vision of internet that technology giants are investing in. There has been some research on data privacy risks in the metaverse; however, detailed research on the cybersecurity risks of virtual reality platforms like metaverse have not been performed. This research paper addresses this gap of understanding the various possible cybersecurity risks on metaverse platforms. This study tries to understand the risks associated with metaverse by describing the technologies supporting metaverse platform and understanding the inherent cybersecurity threats in each of these technologies. Further, the paper proposes a cybersecurity risk governance regulatory framework to mitigate these risks.
APA, Harvard, Vancouver, ISO, and other styles
33

S. Resende, João, Rolando Martins, and Luís Antunes. "A Survey on Using Kolmogorov Complexity in Cybersecurity." Entropy 21, no. 12 (December 5, 2019): 1196. http://dx.doi.org/10.3390/e21121196.

Full text
Abstract:
Security and privacy concerns are challenging the way users interact with devices. The number of devices connected to a home or enterprise network increases every day. Nowadays, the security of information systems is relevant as user information is constantly being shared and moving in the cloud; however, there are still many problems such as, unsecured web interfaces, weak authentication, insecure networks, lack of encryption, among others, that make services insecure. The software implementations that are currently deployed in companies should have updates and control, as cybersecurity threats increasingly appearing over time. There is already some research towards solutions and methods to predict new attacks or classify variants of previous known attacks, such as (algorithmic) information theory. This survey combines all relevant applications of this topic (also known as Kolmogorov Complexity) in the security and privacy domains. The use of Kolmogorov-based approaches is resource-focused without the need for specific knowledge of the topic under analysis. We have defined a taxonomy with already existing work to classify their different application areas and open up new research questions.
APA, Harvard, Vancouver, ISO, and other styles
34

Trappe, Wade, and Jeremy Straub. "Journal of Cybersecurity and Privacy: A New Open Access Journal." Journal of Cybersecurity and Privacy 1, no. 1 (June 14, 2018): 1–3. http://dx.doi.org/10.3390/jcp1010001.

Full text
Abstract:
Journal of Cybersecurity and Privacy is critical to society at large, and its importance is growing daily. The rapid advancement in technology has caused a large-scale integration of computing, communication, and information technologies into virtually every aspect of our modern society[...]
APA, Harvard, Vancouver, ISO, and other styles
35

Peter Margulies. "Global Cybersecurity, Surveillance, and Privacy: The Obama Administration's Conflicted Legacy." Indiana Journal of Global Legal Studies 24, no. 2 (2017): 459. http://dx.doi.org/10.2979/indjglolegstu.24.2.0459.

Full text
APA, Harvard, Vancouver, ISO, and other styles
36

Sankar, Lalitha, Wade Trappe, H. Vincent Poor, and Merouane Debbah. "Signal Processing for Cybersecurity and Privacy [From the Guest Editors]." IEEE Signal Processing Magazine 30, no. 5 (September 2013): 14–15. http://dx.doi.org/10.1109/msp.2013.2264854.

Full text
APA, Harvard, Vancouver, ISO, and other styles
37

Lee, Jae Kyu, Younghoon Chang, Hun Yeong Kwon, and Beopyeon Kim. "Reconciliation of Privacy with Preventive Cybersecurity: The Bright Internet Approach." Information Systems Frontiers 22, no. 1 (January 22, 2020): 45–57. http://dx.doi.org/10.1007/s10796-020-09984-5.

Full text
APA, Harvard, Vancouver, ISO, and other styles
38

Wang, Yunpeng, Yinghui Wang, Hongmao Qin, Haojie Ji, Yanan Zhang, and Jian Wang. "A Systematic Risk Assessment Framework of Automotive Cybersecurity." Automotive Innovation 4, no. 3 (March 23, 2021): 253–61. http://dx.doi.org/10.1007/s42154-021-00140-6.

Full text
Abstract:
AbstractThe increasingly intelligent and connected vehicles have brought many unprecedented automotive cybersecurity threats, which may cause privacy breaches, personal injuries, and even national security issues. Before providing effective security solutions, a comprehensive risk assessment of the automotive cybersecurity must be carried out. A systematic cybersecurity risk assessment framework for automobiles is proposed in this study. It consists of an assessment process and systematic assessment methods considering the changes of threat environment, evaluation target, and available information in vehicle lifecycle. In the process of risk identification and risk analysis, the impact level and attack feasibility level are assessed based on the STRIDE model and attack tree method. An automotive cybersecurity risk matrix using a global rating algorithm is then constructed to create a quantitative risk metric. Finally, the applicability and feasibility of the proposed risk assessment framework are demonstrated through a use case, and the results prove that the proposed framework is effective. The proposed assessment framework helps to systematically derive automotive cybersecurity requirements.
APA, Harvard, Vancouver, ISO, and other styles
39

Razaque, Abdul, Abrar Al Ajlan, Noussaiba Melaoune, Munif Alotaibi, Bandar Alotaibi, Issabekov Dias, Ammar Oad, Salim Hariri, and Chenglin Zhao. "Avoidance of Cybersecurity Threats with the Deployment of a Web-Based Blockchain-Enabled Cybersecurity Awareness System." Applied Sciences 11, no. 17 (August 26, 2021): 7880. http://dx.doi.org/10.3390/app11177880.

Full text
Abstract:
Modern information technology (IT) is well developed, and almost everyone uses the features of IT and services within the Internet. However, people are being affected due to cybersecurity threats. People can adhere to the recommended cybersecurity guidelines, rules, adopted standards, and cybercrime preventive measures to largely mitigate these threats. The ignorance of or lack of cybersecurity knowledge also causes a critical problem regarding confidentiality and privacy. It is not possible to fully avoid cybercrimes that often lead to sufficient business losses and spread forbidden themes (disgust, extremism, child porn, etc.). Therefore, to reduce the risk of cybercrimes, a web-based Blockchain-enabled cybersecurity awareness program (WBCA) process is introduced in this paper. The proposed WBCA trains users to improve their security skills. The proposed program helps with understanding the common behaviors of cybercriminals and improves user knowledge of cybersecurity hygiene, best cybersecurity practices, modern cybersecurity vulnerabilities, and trends. Furthermore, the proposed WBCA uses Blockchain technology to protect the program from potential threats. The proposed program is validated and tested using real-world cybersecurity topics with real users and cybersecurity experts. We anticipate that the proposed program can be extended to other domains, such as national or corporate courses, to increase the cybersecurity awareness level of users. A CentOS-based virtual private server is deployed for testing the proposed WBCA to determine its effectiveness. Finally, WBCA is also compared with other state-of-the-art web-based programs designed for cybersecurity awareness.
APA, Harvard, Vancouver, ISO, and other styles
40

Silva, Sónia. "Web 3.0 and Cybersecurity – Short Paper." ARIS2 - Advanced Research on Information Systems Security 2, no. 2 (December 30, 2022): 39–49. http://dx.doi.org/10.56394/aris2.v2i2.21.

Full text
Abstract:
The Web 3.0 ecosystem is growing exponentially, which also adds to the cybersecurity concerns it imposes. There is a continuous shift in the Internet architecture, from a read/write model to a newer model known as Web 3.0. Global companies are exploring web 3.0 opportunities in their business processes. Along with opportunities, Web 3.0 poses several cybersecurity risks to organizations that need to detect and mitigate efficiently. Data breaches, computer attacks, and social engineering defined the cybersecurity risk landscape of Web 2.0. This work aims to identify solutions to the problem between the evolution of web 3.0 and companies to evolve their infrastructures promptly to ensure the privacy and security of their data.
APA, Harvard, Vancouver, ISO, and other styles
41

Maqsood, Sana, and Sonia Chiasson. "Design, Development, and Evaluation of a Cybersecurity, Privacy, and Digital Literacy Game for Tweens." ACM Transactions on Privacy and Security 24, no. 4 (November 30, 2021): 1–37. http://dx.doi.org/10.1145/3469821.

Full text
Abstract:
Tweens are avid users of digital media, which exposes them to various online threats. Teachers are primarily expected to teach children safe online behaviours, despite not necessarily having the required training or classroom tools to support this education. Using the theory of procedural rhetoric and established game design principles, we designed a classroom-based cybersecurity, privacy, and digital literacy game for tweens that has since been deployed to over 300 Canadian elementary schools. The game, A Day in the Life of the JOs , teaches children about 25 cybersecurity, privacy, and digital literacy topics and allows them to practice what they have learned in a simulated environment. We employed a user-centered design process to create the game, iteratively testing its design and effectiveness with children and teachers through five user studies (with a total of 63 child participants and 21 teachers). Our summative evaluation with children showed that the game improved their cybersecurity, privacy, and digital literacy knowledge and behavioural intent and was positively received by them. Our summative evaluation with teachers also showed positive results. Teachers liked that the game represented the authentic experiences of children on digital media and that it aligned with their curriculum requirements; they were interested in using it in their classrooms. In this article, we discuss our process and experience of designing a production quality game for children and provide evidence of its effectiveness with both children and teachers.
APA, Harvard, Vancouver, ISO, and other styles
42

Kim, Kyounggon. "Security and Privacy Liability Policy in the Arab World." Security Policy Paper 2, no. 1 (March 31, 2021): 1–11. http://dx.doi.org/10.26735/outi8333.

Full text
Abstract:
Focusing on Cooperation, Capability, and Assessment (ACC) approach performed in top-down, bottom-up, short-term, and long-term (TBSL). Cooperation between countries is essential to proactively respond to various cyber threats such as cyber criminals and cyber terrorists and to show rapid recovery resilience. Develop a cybersecurity evaluation model and a gap analysis model and spread them to the remaining Arab countries.
APA, Harvard, Vancouver, ISO, and other styles
43

Morrow, Paul J. "The New Age Of Cybersecurity Privacy, Criminal Procedure And Cyber Corporate Ethics." Journal of Cybersecurity Research (JCR) 3, no. 1 (December 20, 2018): 19–28. http://dx.doi.org/10.19030/jcr.v3i1.10241.

Full text
Abstract:
This paper reviews cybersecurity and the new criminal procedure standards of searches and seizures based on the perspectives of probable cause in the digital age involving cell phones. Also, this paper examines the civil corporate policy perspectives involving data breaches as the topic relates to the consumer using social media and provides guidance for executives to enact proper and responsible corporate policies navigating the new cybersecurity landscape in the post - Carpenter vs. U.S. era. Reading this paper is worth your time because: (1) you will learn the new cybercrimes legal standards involved with cyber-privacy and the criminal process which is necessary to develop director competencies; (2) you will gain knowledge which is the key to proposing ethical systems within the corporation required by law; (3) moving forward, we are at a critical point in America and good guidance is vitally important.
APA, Harvard, Vancouver, ISO, and other styles
44

Comizio, V. Gerard, Behnam Dayanim, and Laura Bain. "Cybersecurity as a global concern in need of global solutions: an overview of financial regulatory developments in 2015." Journal of Investment Compliance 17, no. 1 (May 3, 2016): 101–11. http://dx.doi.org/10.1108/joic-01-2016-0003.

Full text
Abstract:
Purpose To provide financial institutions an overview of the developments in cybersecurity regulation of financial institutions during 2015 by the United States, the United Kingdom, and the European Union, as well as guidance for developing effective cyber-risk management programs in light of evolving cyber-threats and cyber-regulatory expectations. Design/methodology/approach Reviews US, UK and EU regulatory developments in the cybersecurity area and provides several best practice tips financial institutions should consider and implement to improve their cybersecurity compliance programs. Findings While cyber-threats and financial regulators’ expectations for cyber-security are constantly evolving, recent guidance and enforcement efforts by the US, UK and EU illustrate the need for financial institutions to develop effective cybersecurity programs that address current regulatory compliance requirements and prepare for emergency cyber responses. Practical implications Financial institutions should utilize the Federal Financial Institutions Examination Council’s Cybersecurity Assessment Tool to assess their cyber-risk profile and cyber-preparedness. Originality/value Practical guidance from experienced financial regulatory and privacy lawyers that provides a survey of the current regulatory environment and recommendations for cyber-security compliance.
APA, Harvard, Vancouver, ISO, and other styles
45

Kim, Euiyoung, JungKyoon Yoon, Jieun Kwon, Tiffany Liaw, and Alice M. Agogino. "From Innocent Irene to Parental Patrick: Framing User Characteristics and Personas to Design for Cybersecurity." Proceedings of the Design Society: International Conference on Engineering Design 1, no. 1 (July 2019): 1773–82. http://dx.doi.org/10.1017/dsi.2019.183.

Full text
Abstract:
AbstractWith the surging number of digital devices penetrating our daily routines, the risks inherent to cybersecurity—the protection of data on digital products connected to the Internet—have also increased since these devices (e.g., connected home devices, personal monitoring) collect, process, analyze and store users’ sensitive personal information. Thus, there is a pressing need to assist users in being aware of and dealing with potential cybersecurity threats. With the proposition that fulfilling the need starts with developing an in-depth understanding of the user behaviors in the context of cybersecurity, an exploratory study was conducted that employed three mixed qualitative and quantitative research methods—a trend analysis, an interview study, and an online survey study. The paper reports the user characteristics on (1) awareness levels of cybersecurity issues, (2) uses of digital devices, and (3) means of dealing with the privacy issues in product use. The results of the studies were translated into eight personas that systematically reflect distinct characteristics of users, which can help designers empathize with their potential users vulnerable to cybersecurity risks.
APA, Harvard, Vancouver, ISO, and other styles
46

Dremliuga, Roman, and Mohd Hazmi bin Mohd Rusli. "The Development of the Legal Framework for Autonomous Shipping: Lessons Learned from a Regulation for a Driverless Car." Journal of Politics and Law 13, no. 3 (August 30, 2020): 295. http://dx.doi.org/10.5539/jpl.v13n3p295.

Full text
Abstract:
This article focuses on the regulation of maritime autonomous surface vessels from the perspective of international law of the sea. The article discusses on the possibility of developing a legal framework to regulate autonomous maritime navigation based on laws and regulation of autonomous driving of landed vehicles. The authors opine that existing legal framework does not conform to the goal of regulation of autonomous navigation. However, the regulation of autonomous car testing and exploitation could be imitated to design a new legal framework for autonomous shipping. Despite the divergent approaches, some principles remain in common particularly of cybersecurity and privacy. As computer systems are replacing the need of a master and crew for digitally managed ships, low level of cybersecurity implies an increase in risk of losing control over the vessel. The authors are of the opinion that that current legal acts, standards and their drafts do not pay necessary attention to the problem of cybersecurity of autonomous ships. Moreover, current legislations do not provide mechanisms of influence on behavior of shipowner and shipbuilder to make them apply the best measures. The similar situation is with privacy. Factually, an autonomous ship is a natural tool for surveillance, as to effectively navigate through the seas, it must collect and process information pertaining to navigational safety and other related matters. The question raises how this information has to be collected, kept, processed and deleted. Thus, the maritime community may consider adopting the approach on privacy from regulation for autonomous cars.
APA, Harvard, Vancouver, ISO, and other styles
47

Jun, Sung-In. "National Security or Privacy: A Second Thought on the DNC Hack." AJIL Unbound 110 (2016): 352–57. http://dx.doi.org/10.1017/aju.2017.4.

Full text
Abstract:
The recent U.S. Democratic National Committee (DNC) hack raises several difficult questions in the fields of cybersecurity and privacy. Obviously, this was first and foremost a matter of security in that the hack likely involved a foreign government attempting to intervene in a presidential election process with the possible motive of influencing its outcome. From another perspective, however, the incident was also a matter of privacy, in that the fundamental motive of the DNC hack was to reveal “information that the victim wants to keep private” and to influence its future decision through the compromise of privacy.
APA, Harvard, Vancouver, ISO, and other styles
48

Renee Staton, A., and Michele Kielty. "A Lurking Threat: Counselor Practices to Guard Against Cyber Threats." Journal of Mental Health Counseling 45, no. 1 (January 1, 2023): 20–33. http://dx.doi.org/10.17744/mehc.45.1.02.

Full text
Abstract:
As a result of shifts in global power, the growth of cyber capabilities worldwide, and the impact of COVID-19 on the increasing use of technology in varied workplaces, the potential for threat and disruption to mental health facilities is expected to increase. Counselors and their clients are vulnerable to these threats any time they share data online with each other, with third-party payers, and with allied health professionals. In fact, any private information stored digitally is potentially at risk for exploitation or theft. This current environment highlights the need for an intentional process and approach that can help mental health counselors understand their digital assets and vulnerabilities in order to anticipate and protect against potential cyber threats. This type of process can be facilitated through the application of cyber intelligence and cybersecurity principles to online counseling services in order to address ethical and legal obligations of counselors and to assuage client fears about potential privacy breaches. When counselors keep client data safe, Health Information Portability and Accountability Act and Family Educational Rights and Privacy Act violations are less likely to occur in a variety of settings where clients may be seen. An overview of the need for cybersecurity, a framework for bolstering cybersecurity, and specific guidelines for counselors are provided.
APA, Harvard, Vancouver, ISO, and other styles
49

Leszczyna, Rafał. "Cybersecurity and privacy in standards for smart grids – A comprehensive survey." Computer Standards & Interfaces 56 (February 2018): 62–73. http://dx.doi.org/10.1016/j.csi.2017.09.005.

Full text
APA, Harvard, Vancouver, ISO, and other styles
50

Dawson, Sophie, and Emma Croft. "Missing (in) Action: Where Are the Australian Data Breach Class Actions?" Global Privacy Law Review 3, Issue 3 (September 1, 2022): 190–94. http://dx.doi.org/10.54648/gplr2022019.

Full text
Abstract:
Data breach class actions have been a feature of the privacy landscape in the US and UK since as early as 2002. While Australia has experienced a surge in regulatory actions brought in respect of data breaches, we have yet to see an uptick in consumer actions in Australia. An action was brought in 2018, however it settled prior to receiving judicial consideration. This article provides some examples of the difficulties of bringing such actions in Australia, both at a substantive and procedural law level. We also highlight some proposed upcoming legislative changes which may have an impact in this space, including the proposed introduction of a tort of privacy and direct right of action in respect of interferences with privacy under the Privacy Act 1988 (Cth) (Privacy Act). Privacy, Data, Breach, Cybersecurity, Australia, Litigation, Court, Class Action, Reform
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!

To the bibliography