Journal articles on the topic '4604 Cybersecurity and privacy'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the top 50 journal articles for your research on the topic '4604 Cybersecurity and privacy.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.
Bojanova, Irena, Jeffrey Voas, Morris Chang, and Linda Wilbanks. "Cybersecurity or Privacy [Guest editors' introduction]." IT Professional 18, no. 5 (September 2016): 16–17. http://dx.doi.org/10.1109/mitp.2016.80.
Full textMishra, Neha. "Privacy, Cybersecurity, and GATS Article XIV: A New Frontier for Trade and Internet Regulation?" World Trade Review 19, no. 3 (May 2, 2019): 341–64. http://dx.doi.org/10.1017/s1474745619000120.
Full textBarth, Susanne, Menno D. T. de Jong, and Marianne Junger. "Lost in privacy? Online privacy from a cybersecurity expert perspective." Telematics and Informatics 68 (March 2022): 101782. http://dx.doi.org/10.1016/j.tele.2022.101782.
Full textPehlivan, Ceyhun Necati. "Global Privacy News." Global Privacy Law Review 1, Issue 1 (March 1, 2020): 63–76. http://dx.doi.org/10.54648/gplr2020009.
Full textKhatoun, Rida, and Sherali Zeadally. "Cybersecurity and Privacy Solutions in Smart Cities." IEEE Communications Magazine 55, no. 3 (March 2017): 51–59. http://dx.doi.org/10.1109/mcom.2017.1600297cm.
Full textLandwehr, C., D. Boneh, J. C. Mitchell, S. M. Bellovin, S. Landau, and M. E. Lesk. "Privacy and Cybersecurity: The Next 100 Years." Proceedings of the IEEE 100, Special Centennial Issue (May 2012): 1659–73. http://dx.doi.org/10.1109/jproc.2012.2189794.
Full textPattanasri, Thanaphol. "Mandatory Data Breach Notification and Hacking the Smart Home: A Legal Response to Cybersecurity?" QUT Law Review 18, no. 2 (March 1, 2019): 268. http://dx.doi.org/10.5204/qutlr.v18i2.752.
Full textPattanasri, Thanaphol. "Mandatory Data Breach Notification and Hacking the Smart Home: A Legal Response to Cybersecurity?" QUT Law Review 18, no. 2 (March 5, 2019): 268. http://dx.doi.org/10.5204/qutlr.v18i2.770.
Full textJofre, Marc, Diana Navarro-Llobet, Ramon Agulló, Jordi Puig, Gustavo Gonzalez-Granadillo, Juan Mora Zamorano, and Ramon Romeu. "Cybersecurity and Privacy Risk Assessment of Point-of-Care Systems in Healthcare—A Use Case Approach." Applied Sciences 11, no. 15 (July 21, 2021): 6699. http://dx.doi.org/10.3390/app11156699.
Full textLandwehr, Carl. "Prolog to the Section on Privacy and Cybersecurity." Proceedings of the IEEE 100, Special Centennial Issue (May 2012): 1657–58. http://dx.doi.org/10.1109/jproc.2012.2189820.
Full textKshetri, Nir. "Blockchain's roles in strengthening cybersecurity and protecting privacy." Telecommunications Policy 41, no. 10 (November 2017): 1027–38. http://dx.doi.org/10.1016/j.telpol.2017.09.003.
Full textde Fuentes, José M., Lorena González-Manzano, Juan Tapiador, and Pedro Peris-Lopez. "PRACIS: Privacy-preserving and aggregatable cybersecurity information sharing." Computers & Security 69 (August 2017): 127–41. http://dx.doi.org/10.1016/j.cose.2016.12.011.
Full textE. Larrea, Guillermo, and Juan Carlos Quinzaños. "Report: Privacy in Latin America During COVID-19 Times and Reasonable Digital Security." Global Privacy Law Review 2, Issue 2 (June 1, 2021): 162–68. http://dx.doi.org/10.54648/gplr2021021.
Full textKatzan, Jr., Harry. "Cybersecurity Service Model." Journal of Service Science (JSS) 5, no. 2 (December 28, 2012): 71–78. http://dx.doi.org/10.19030/jss.v5i2.7576.
Full textRiebe, Thea, Tom Biselli, Marc-André Kaufhold, and Christian Reuter. "Privacy Concerns and Acceptance Factors of OSINT for Cybersecurity: A Representative Survey." Proceedings on Privacy Enhancing Technologies 2023, no. 1 (January 2023): 477–93. http://dx.doi.org/10.56553/popets-2023-0028.
Full textLee, In. "Internet of Things (IoT) Cybersecurity: Literature Review and IoT Cyber Risk Management." Future Internet 12, no. 9 (September 18, 2020): 157. http://dx.doi.org/10.3390/fi12090157.
Full textAlodaynan, Abdullah Mohammed, and Adwan Alownie Alanazi. "A survey of cybersecurity vulnerabilities in healthcare systems." International Journal of ADVANCED AND APPLIED SCIENCES 8, no. 12 (December 2021): 48–55. http://dx.doi.org/10.21833/ijaas.2021.12.007.
Full textRawat, Danda B. "Journal of Cybersecurity and Privacy: A New Open Access Journal." Journal of Cybersecurity and Privacy 1, no. 1 (March 19, 2021): 195–98. http://dx.doi.org/10.3390/jcp1010010.
Full textJaccard, Julian Jang. "Cybersecurity threats in cloud computing." Australian Journal of Telecommunications and the Digital Economy 1, no. 1 (December 15, 2013): 58–74. http://dx.doi.org/10.18080/ajtde.v1n1.128.
Full textJaccard, Julian Jang. "Cybersecurity threats in cloud computing." Journal of Telecommunications and the Digital Economy 1, no. 1 (December 15, 2013): 58–74. http://dx.doi.org/10.18080/jtde.v1n1.128.
Full textPetron, David, Michael Wolk, and Edward McNicholas. "Broker-dealers need to respond to recent focus on cybersecurity threats." Journal of Investment Compliance 15, no. 2 (June 3, 2014): 29–32. http://dx.doi.org/10.1108/joic-05-2014-0020.
Full textKatzan, Harry. "Contemporary Issues in Cybersecurity." Journal of Cybersecurity Research (JCR) 1, no. 1 (June 21, 2016): 1–6. http://dx.doi.org/10.19030/jcr.v1i1.9745.
Full textNte, Ngboawaji Daniel, Brebina Kelvin Enoke, and Joda Adekunbi Omolara. "An Evaluation of the Challenges of Mainstreaming Cybersecurity Laws and Privacy Protection in Nigeria." Journal of Law and Legal Reform 3, no. 2 (April 30, 2022): 246–66. http://dx.doi.org/10.15294/jllr.v3i2.56484.
Full textDunn Cavelty, Myriam, and Matthias Leese. "Politicising Security at the Boundaries: Privacy in Surveillance and Cybersecurity." Special Issue: The Politicisation of Security: Controversy, Mobilisation, Arena Shifting, no. 3-2018 (February 18, 2019): 49–69. http://dx.doi.org/10.3224/eris.v5i3.03.
Full textChen, Su-Yen, Hsin-Yu Kuo, and Chiachun Lee. "Preparing Society for Automated Vehicles: Perceptions of the Importance and Urgency of Emerging Issues of Governance, Regulations, and Wider Impacts." Sustainability 12, no. 19 (September 23, 2020): 7844. http://dx.doi.org/10.3390/su12197844.
Full textAlmanza Olmedo, Moreno. "e-commerce cybersecurity vulnerability, http protocol case." Minerva 2, no. 6 (November 22, 2021): 23–31. http://dx.doi.org/10.47460/minerva.v2i6.39.
Full textYuliana, Yuliana. "THE IMPORTANCE OF CYBERSECURITY AWARENESS FOR CHILDREN." Lampung Journal of International Law 4, no. 1 (June 30, 2022): 41–48. http://dx.doi.org/10.25041/lajil.v3i2.2526.
Full textFerreira, Ana, and Ricardo Cruz-Correia. "COVID-19 and Cybersecurity: Finally, an Opportunity to Disrupt?" JMIRx Med 2, no. 2 (May 6, 2021): e21069. http://dx.doi.org/10.2196/21069.
Full textYuliana, Yuliana. "THE IMPORTANCE OF CYBERSECURITY AWARENESS FOR CHILDREN." Lampung Journal of International Law 4, no. 1 (June 30, 2022): 41–48. http://dx.doi.org/10.25041/lajil.v4i1.2526.
Full textBalan, Shilpa, Sanchita Gawand, and Priyanka Purushu. "Application of Machine Learning Classification Algorithm to Cybersecurity Awareness." Information Technology and Management Science 21 (December 14, 2018): 45–48. http://dx.doi.org/10.7250/itms-2018-0006.
Full textAliyu, Aliyu, Leandros Maglaras, Ying He, Iryna Yevseyeva, Eerke Boiten, Allan Cook, and Helge Janicke. "A Holistic Cybersecurity Maturity Assessment Framework for Higher Education Institutions in the United Kingdom." Applied Sciences 10, no. 10 (May 25, 2020): 3660. http://dx.doi.org/10.3390/app10103660.
Full textSebastian, Glorin. "A Descriptive Study on Metaverse." International Journal of Security and Privacy in Pervasive Computing 15, no. 1 (January 1, 2023): 1–14. http://dx.doi.org/10.4018/ijsppc.315591.
Full textS. Resende, João, Rolando Martins, and Luís Antunes. "A Survey on Using Kolmogorov Complexity in Cybersecurity." Entropy 21, no. 12 (December 5, 2019): 1196. http://dx.doi.org/10.3390/e21121196.
Full textTrappe, Wade, and Jeremy Straub. "Journal of Cybersecurity and Privacy: A New Open Access Journal." Journal of Cybersecurity and Privacy 1, no. 1 (June 14, 2018): 1–3. http://dx.doi.org/10.3390/jcp1010001.
Full textPeter Margulies. "Global Cybersecurity, Surveillance, and Privacy: The Obama Administration's Conflicted Legacy." Indiana Journal of Global Legal Studies 24, no. 2 (2017): 459. http://dx.doi.org/10.2979/indjglolegstu.24.2.0459.
Full textSankar, Lalitha, Wade Trappe, H. Vincent Poor, and Merouane Debbah. "Signal Processing for Cybersecurity and Privacy [From the Guest Editors]." IEEE Signal Processing Magazine 30, no. 5 (September 2013): 14–15. http://dx.doi.org/10.1109/msp.2013.2264854.
Full textLee, Jae Kyu, Younghoon Chang, Hun Yeong Kwon, and Beopyeon Kim. "Reconciliation of Privacy with Preventive Cybersecurity: The Bright Internet Approach." Information Systems Frontiers 22, no. 1 (January 22, 2020): 45–57. http://dx.doi.org/10.1007/s10796-020-09984-5.
Full textWang, Yunpeng, Yinghui Wang, Hongmao Qin, Haojie Ji, Yanan Zhang, and Jian Wang. "A Systematic Risk Assessment Framework of Automotive Cybersecurity." Automotive Innovation 4, no. 3 (March 23, 2021): 253–61. http://dx.doi.org/10.1007/s42154-021-00140-6.
Full textRazaque, Abdul, Abrar Al Ajlan, Noussaiba Melaoune, Munif Alotaibi, Bandar Alotaibi, Issabekov Dias, Ammar Oad, Salim Hariri, and Chenglin Zhao. "Avoidance of Cybersecurity Threats with the Deployment of a Web-Based Blockchain-Enabled Cybersecurity Awareness System." Applied Sciences 11, no. 17 (August 26, 2021): 7880. http://dx.doi.org/10.3390/app11177880.
Full textSilva, Sónia. "Web 3.0 and Cybersecurity – Short Paper." ARIS2 - Advanced Research on Information Systems Security 2, no. 2 (December 30, 2022): 39–49. http://dx.doi.org/10.56394/aris2.v2i2.21.
Full textMaqsood, Sana, and Sonia Chiasson. "Design, Development, and Evaluation of a Cybersecurity, Privacy, and Digital Literacy Game for Tweens." ACM Transactions on Privacy and Security 24, no. 4 (November 30, 2021): 1–37. http://dx.doi.org/10.1145/3469821.
Full textKim, Kyounggon. "Security and Privacy Liability Policy in the Arab World." Security Policy Paper 2, no. 1 (March 31, 2021): 1–11. http://dx.doi.org/10.26735/outi8333.
Full textMorrow, Paul J. "The New Age Of Cybersecurity Privacy, Criminal Procedure And Cyber Corporate Ethics." Journal of Cybersecurity Research (JCR) 3, no. 1 (December 20, 2018): 19–28. http://dx.doi.org/10.19030/jcr.v3i1.10241.
Full textComizio, V. Gerard, Behnam Dayanim, and Laura Bain. "Cybersecurity as a global concern in need of global solutions: an overview of financial regulatory developments in 2015." Journal of Investment Compliance 17, no. 1 (May 3, 2016): 101–11. http://dx.doi.org/10.1108/joic-01-2016-0003.
Full textKim, Euiyoung, JungKyoon Yoon, Jieun Kwon, Tiffany Liaw, and Alice M. Agogino. "From Innocent Irene to Parental Patrick: Framing User Characteristics and Personas to Design for Cybersecurity." Proceedings of the Design Society: International Conference on Engineering Design 1, no. 1 (July 2019): 1773–82. http://dx.doi.org/10.1017/dsi.2019.183.
Full textDremliuga, Roman, and Mohd Hazmi bin Mohd Rusli. "The Development of the Legal Framework for Autonomous Shipping: Lessons Learned from a Regulation for a Driverless Car." Journal of Politics and Law 13, no. 3 (August 30, 2020): 295. http://dx.doi.org/10.5539/jpl.v13n3p295.
Full textJun, Sung-In. "National Security or Privacy: A Second Thought on the DNC Hack." AJIL Unbound 110 (2016): 352–57. http://dx.doi.org/10.1017/aju.2017.4.
Full textRenee Staton, A., and Michele Kielty. "A Lurking Threat: Counselor Practices to Guard Against Cyber Threats." Journal of Mental Health Counseling 45, no. 1 (January 1, 2023): 20–33. http://dx.doi.org/10.17744/mehc.45.1.02.
Full textLeszczyna, Rafał. "Cybersecurity and privacy in standards for smart grids – A comprehensive survey." Computer Standards & Interfaces 56 (February 2018): 62–73. http://dx.doi.org/10.1016/j.csi.2017.09.005.
Full textDawson, Sophie, and Emma Croft. "Missing (in) Action: Where Are the Australian Data Breach Class Actions?" Global Privacy Law Review 3, Issue 3 (September 1, 2022): 190–94. http://dx.doi.org/10.54648/gplr2022019.
Full text