To see the other types of publications on this topic, follow the link: Cyber crisis management.

Journal articles on the topic 'Cyber crisis management'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the top 50 journal articles for your research on the topic 'Cyber crisis management.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.

1

XU, Manshu, and Chuanying LU. "China–U.S. cyber-crisis management." China International Strategy Review 3, no. 1 (2021): 97–114. http://dx.doi.org/10.1007/s42533-021-00079-7.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Hytönen, Eveliina, and Harri Ruoslahti. "Crisis Communication Guidelines to Support Cyber Resilience." European Conference on Cyber Warfare and Security 24, no. 1 (2025): 222–29. https://doi.org/10.34190/eccws.24.1.3730.

Full text
Abstract:
Cyber-attacks have become a prominent issue in the digital society. Attacks can result in losses for individuals and organisations. Cyber-attacks such as data breaches can create a very real threat to all stakeholders with a strong perception of vulnerability because potential loss of sensitive data. Such crises place unique demands for crisis management and communication. Communication is crucial for promoting awareness and sharing information and instructions to stakeholders. Consequently, effective communication can help build dynamic organisational cyber resilience. The research question o
APA, Harvard, Vancouver, ISO, and other styles
3

Posea, Vlad, George Sharkov, Adrian Baumann, and Georgios Chatzichristos. "Towards Unified European Cyber Incident and Crisis Management Ontology." Information & Security: An International Journal 53 (2022): 33–44. http://dx.doi.org/10.11610/isij.5303.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Sapriel, Caroline. "Why crisis leadership competencies matter in the effective management of a cyber crisis." Cyber Security: A Peer-Reviewed Journal 8, no. 2 (2025): 160. http://dx.doi.org/10.69554/whzx4354.

Full text
Abstract:
This paper examines whether specific leadership competencies are relevant in a cyber crisis and what it takes to manage one effectively. Our increasing dependence on technology exposes us to risks and makes us more vulnerable to digital crises. Cyberattacks are more common and can affect even well-prepared companies. Leadership during a crisis can influence an organisation’s success or failure, no matter how primed and savvy its people are. The author compares crisis management to crisis leadership and emphasises the shift in crisis management responsibility from an operational response to pre
APA, Harvard, Vancouver, ISO, and other styles
5

Raissouni, Kenza, Zakia Errabih, Salmane Bourekkadi, and Rajaa Raissouni. "Cyber-attack crisis management in the context of energy companies." E3S Web of Conferences 412 (2023): 01076. http://dx.doi.org/10.1051/e3sconf/202341201076.

Full text
Abstract:
The aim of this research is to present and analyze a set of public or private energy companies that have been victims of cyber-attacks, while identifying various lessons that can guide other companies towards effective crisis management in response to this risk. To achieve this, we have adopted an exploratory approach that involves utilizing, in an original manner, the raw material derived from a collection of published articles and other documents that have addressed and presented the phenomenon of cyber-attacks on private and public energy companies. The main findings of this study demonstra
APA, Harvard, Vancouver, ISO, and other styles
6

Boeke, Sergei. "National cyber crisis management: Different European approaches." Governance 31, no. 3 (2017): 449–64. http://dx.doi.org/10.1111/gove.12309.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Coiciu, Irina, and Gheorghe Militaru. "Improvement of Cyber Resilience by Implementation of a Digital Business Continuity Management System: Evidence from Romania." Proceedings of the International Conference on Business Excellence 18, no. 1 (2024): 2492–505. http://dx.doi.org/10.2478/picbe-2024-0209.

Full text
Abstract:
Abstract This paper aims to present a model for increasing the cyber resilience of organizations. Under the business context when cyber incidents risk is the most important risk worldwide for organizations for the third consecutive year, the model proposes a solution for improvement of cyber resilience of organizations, by implementation of a management system based on Business Continuity Management framework and a related software solution for handling the Risk Management data, Business Impact Analysis, Emergency and Recovery Planning, as well as Cyber Crisis Management. The implementation of
APA, Harvard, Vancouver, ISO, and other styles
8

Kaczmarek, Krzysztof, Mirosław Karpiuk, and Jarosław Kostrubiec. "The Correlation of Digital Competence and Crisis Management : Evidence from the Polish Public Administration." Institutiones Administrationis 5, no. 1 (2025): 101–9. https://doi.org/10.54201/iajas.123.

Full text
Abstract:
In the age of digitalization, when almost all aspects of social activity are effected and novel threats to a rapidly changing environment are being posed, the ability of public servants to use digital tools competently is crucial for an effective crisis management. This article examines the two-dimensional importance of digital competence, which includes both an ability to operate modern technologies and an awareness of potential cyber threats. The study draws on a literature analysis coupled with qualitative and behavioral methods to explore how digital competence affects the effectiveness of
APA, Harvard, Vancouver, ISO, and other styles
9

Bakos, Levente, Dănuț Dumitru Dumitrașcu, and Katalin Harangus. "Human Factor Preparedness for Decentralized Crisis Management and Communication in Cyber-Physical Systems." Sustainability 11, no. 23 (2019): 6676. http://dx.doi.org/10.3390/su11236676.

Full text
Abstract:
Crises are influencing the corporate sustainability. Long-term stakeholder value built in decades can be ruined by a middle scale crisis. In the new world of cyber-physical systems, scholars emphasize the decentralized, human–machine cooperation based disturbance handling. From information technology and communication (ICT) point of view the cyber-physical systems are ready for a sustainable, decentralized crisis management. The aim of the article is to present results of a research that has as objective to study the readiness of the human component of cyber-physical systems for a decentralize
APA, Harvard, Vancouver, ISO, and other styles
10

Blondin, Donald, and Arjen Boin. "Cooperation in the Face of Transboundary Crisis: A Framework for Analysis." Perspectives on Public Management and Governance 3, no. 3 (2020): 197–209. http://dx.doi.org/10.1093/ppmgov/gvz031.

Full text
Abstract:
Abstract The nation state is discovering the limits of its crisis management capacities. The Ebola and Zika outbreaks, the financial crisis, the downing of flight MH17 over Ukraine, sinking ships overfilled with refugees, cyber-attacks, urban terrorism and existential environmental threats serve as strong reminders of the complex origins and transboundary dimensions of many contemporary crises and disasters. As these transboundary aspects of modern crises become increasingly manifest, the need for international, collaborative responses appears ever clearer. But that collaboration does not alwa
APA, Harvard, Vancouver, ISO, and other styles
11

Mrozowska, Alicja. "EXEMPLIFICATION OF CYBER RISK MANAGEMENT IN THE MARITIME TRANSPORT." Rocznik Bezpieczeństwa Morskiego XVIII (November 6, 2024): 795–816. https://doi.org/10.5604/01.3001.0054.8330.

Full text
Abstract:
The paper presents the organization of cyber risk management in the maritime transport. The data collected will allow to achieve the main research aim that is to exemplify the stages of cyber risk management for supporting and ensuring safety and security of cargoes transport by sea.The work presents the usage of an iterative cyber risk management processes. They consist of six steps, but given that maritime transport is crucial to the global economy, it is presented that it should be adequately protected against cyber threats as a critical part of the maritime industry, which should be taken
APA, Harvard, Vancouver, ISO, and other styles
12

FEDYK, V., and H. DENYSENKO. "Theoretical and methodological approaches to the management of cyber security risks at critical infrastructure objects: response to cyber incidents and crisis managemen." INFORMATION AND LAW, no. 1(48) (March 6, 2024): 195–202. http://dx.doi.org/10.37750/2616-6798.2024.1(48).300822.

Full text
Abstract:
The research is devoted to analyzing and developing theoretical and methodological recommendations for cybersecurity risk management at critical infrastructure facilities. The paper defines and describes the cyber risk management process, identifies cyber challenges, and considers the cyber risk management system. Recommendations include expanding cooperation, improving monitoring systems, staff training, legal regulation, and participation in international initiatives. These measures are aimed at improving the effectiveness of cyber risk management to ensure national security.
APA, Harvard, Vancouver, ISO, and other styles
13

Sikder, Abu Sayed, and Kevin Harvey. "Techno-Resilience: Unraveling the Impact of Cutting-Edge Information Technology in Crisis Management and Emergency Response for Enhanced Disaster Preparedness and Response Efficiency." International Journal of Imminent Science & Technology. 1, no. 1 (2014): 138–69. http://dx.doi.org/10.70774/ijist.v1i1.17.

Full text
Abstract:
In the contemporary era marked by escalating crises, from natural disaster to cyber-attack, effective crisis management and emergency response have become imperative. This study investigates the profound influence of cutting-edge information technology (IT) on crisis management, accentuating the concept of "Techno-Resilience" — the interplay between advanced IT and the resilience of communities and organizations in navigating, adapting to, and recovering from crises. Emphasizing disaster preparedness and response efficiency, this research explores how IT tools, including Geographic Information
APA, Harvard, Vancouver, ISO, and other styles
14

PREDA, Marius, Valeria POPESCU, Cornel ARGINT, Niculae IANCU, Gabriel RAICU, and Gabriel ENE. "Enhancing Civil-Military Cyber Resilience Lessons from the ECYBRIDGE Tabletop Exercise." International Journal of Information Security and Cybercrime 14, no. 1 (2025): 11–27. https://doi.org/10.19107/ijisc.2025.01.01.

Full text
Abstract:
The ECYBRIDGE Tabletop Exercise (TTX), organized by the Romanian National Cyber Security Directorate in October 2024, brought together civilian and military cybersecurity stakeholders to respond to a simulated cyber crisis impacting critical infrastructure jointly. This paper presents a comprehensive analysis of TTX, highlighting insights at the organizational, technical, and policy levels. The exercise scenario - a multi-phase cyber attack on significant port and military unit infrastructures - provided a realistic test of incident response plans and civil-military cooperation. TTX successful
APA, Harvard, Vancouver, ISO, and other styles
15

Ramadhianto, Rizky, Tahan Samuel Lumban Toruan, Susaningtyas Nefo Handayani Kertopati, and Hikmat Zakky Almubaroq. "Analysis of presidential regulations concerning cyber security to bolster defense policy management." Defense and Security Studies 4 (October 4, 2023): 84–93. http://dx.doi.org/10.37868/dss.v4.id244.

Full text
Abstract:
As a developing country, Indonesia must effectively manage its national defense by implementing defense policies which can be interpreted as management activities that transform into defense policy management entities. The objective is to protect against various dangerous threats resulting from the dynamics of the current strategic environment, which continues to undergo rapid and significant changes. Cyber threats pose a potentially dangerous threat that has a multidimensional impact. Therefore, this article analyzes one of the Indonesian government's efforts to deal with cyber threats, which
APA, Harvard, Vancouver, ISO, and other styles
16

Verma, Ruchi, Vivek Kumar Sehgal, and Nitin. "Crisis Management Using Centrality Measurement in Social Networks." International Journal of Mobile Computing and Multimedia Communications 8, no. 1 (2017): 19–33. http://dx.doi.org/10.4018/ijmcmc.2017010102.

Full text
Abstract:
Increasing use of IP enabled smart gadgets, rapidly increasing the formation of cyber centric social networks. Any human discussion reflects its emotions and ego centric thoughts among the masses which results the formation of pro and anti-groups. Identification of various categories of groups and communities in social network is very important to eliminate the chances of human created crisis. This paper predicts the migration of individuals from one community to other community and the person who bridges the two communities. The prediction of social networks is carried out by mapping various
APA, Harvard, Vancouver, ISO, and other styles
17

Prabaswari, Yusuf Ali, Rudy A. G. Gultom, Luhut Simbolon, and Anak Agung Ngurah Gunawan. "A Novel Socio-Technical Framework for Enhancing Cyber Crisis Management Capabilities." International Journal of Safety and Security Engineering 14, no. 4 (2024): 1181–93. http://dx.doi.org/10.18280/ijsse.140415.

Full text
APA, Harvard, Vancouver, ISO, and other styles
18

Pronichev, A. P., A. A. Chechulin, and L. A. Vitkova. "Approach to management of heterogeneous swarms of devices." Informatization and communication 5 (December 2020): 119–24. http://dx.doi.org/10.34219/2078-8320-2020-11-5-119-124.

Full text
Abstract:
The paper describes an approach to management of heterogeneous swarm of cyber-physical devices. This approach includes 3 functional levels: the aggregation level, the peripheral level and the data collection level. Variants of using this approach are considered: a crisis management network, a robotic complex for monitoring premises and a system for detecting security incidents in premises.
APA, Harvard, Vancouver, ISO, and other styles
19

Johnson, Margaret Mavins. "Guidelines for non-profit organisation governance in cyber resilience." Cyber Security: A Peer-Reviewed Journal 8, no. 2 (2025): 169. http://dx.doi.org/10.69554/hqqa9393.

Full text
Abstract:
Previous research on corporate governance and cyber security risk management has focused primarily on large for-profit organisations. Although this paper includes a focus on cyber resilience strategies non-profit organisation leaders use, a significant aspect of the research exploration is applicable to the growing need for both for-profit and non-profit businesses to develop cyber resilience guidelines to sustain their organisations’ abilities to detect, withstand and recover from cyberattacks and threats. Despite the growing awareness of the importance of cyber resilience, the problem addres
APA, Harvard, Vancouver, ISO, and other styles
20

VASILEVA, Violeta, and Veselina ALEKSANDROVA GAGAMOVA. "Application of NATO Models for Building Information Infrastructure in Crisis Situations." Romanian Military Thinking 2024, no. 4 (2024): 232–47. https://doi.org/10.55535/rmt.2024.4.15.

Full text
Abstract:
The effective functioning of the national security system during disasters, accidents and other crisis situations related to cyber security and cyber defence requires the realization of opportunities for inter-institutional interaction of all elements of the system. This paper presents certain opportunities as part of the methodology to apply NATO models to develop the system design of information infrastructure with capabilities to achieve the required levels of operational interoperability to respond to cyber threats to national security. For the architectural configuration, the NATO Technic
APA, Harvard, Vancouver, ISO, and other styles
21

Fardal, PhD, Harald, and Ann-Kristin Elstad, PhD. "Decision-making in crisis management of a serious digital incident: A garbage can approach." Journal of Emergency Management 18, no. 6 (2020): 489–98. http://dx.doi.org/10.5055/jem.2020.0503.

Full text
Abstract:
Managing crisis challenges the ability to make numerous decisions under great uncertainty. This study address the decision-making process, and how the mix of involved individuals, prior knowledge, and available decision-makers forms the decisions made during a crisis. A large-scale exercise with a cyberattack scenario was chosen as the study’s case. The organization studied have highly skilled crisis management personnel; however, they are not used to manage a large-scale cyber-attack scenario. The garbage can model (GCM) of Organizational Choice with a few modifications is used as the analyti
APA, Harvard, Vancouver, ISO, and other styles
22

Eliades, Demetrios, Kleanthis Malialis, Stelios Vrachimis, and Marios Polycarpou. "Smart Water Networks as Cyber-Physical-Socio-Environmental Systems." IEEE Transactions on Industrial Cyber-Physical Systems 3 (December 30, 2024): 95–105. https://doi.org/10.1109/TICPS.2024.3520558.

Full text
Abstract:
This position paper introduces a novel Cyber-Physical-Socio-Environmental Systems (CPSES) framework for Smart Water Networks (SWN). The proposed framework introduces environmental aspects as a key constituent, which is important for addressing the interconnected challenges of water systems, such as climate change impacts, contamination risk, and sustainability. The CPSES framework dynamically incorporates interactions between physical components (sensors, actuators), cyber systems (control, monitoring, digital twins), social factors (policy, demand management, crisis response), and enviro
APA, Harvard, Vancouver, ISO, and other styles
23

Memon, Ubedullah, Muhammad Waseem, Muhammad Zain ul Abidin, Zeeshan Junejo, and Masroor Ali. "Turning crisis into opportunity: the emergence of cyber risk takaful in the digital world." Emerald Emerging Markets Case Studies 14, no. 3 (2024): 1–24. http://dx.doi.org/10.1108/eemcs-12-2023-0467.

Full text
Abstract:
Learning outcomes After reading this case study, students will be able to understand the impact of cyber threats on businesses; explore the intersection of innovation and ethical considerations; understand the proactive role of entrepreneurs in identifying gaps in traditional industries, such as insurance, and innovating solutions that align with local dynamics; and learn to formulate strategies addressing cultural factors, market gaps and challenges. Case overview/synopsis The case study follows Hasnain, a prosperous entrepreneur in Pakistan, who was surprised by the news of a cyberattack on
APA, Harvard, Vancouver, ISO, and other styles
24

Covarrubias, Jersain Zadamig Llamas. "Effective Communication as A Pillar of Cybersecurity: Managing Incidents and Crises in the Digital Era." Journal of Risk Analysis and Crisis Response 15, no. 2 (2025): 34. https://doi.org/10.54560/jracr.v15i2.564.

Full text
Abstract:
Effective communication is a critical yet often overlooked component of cybersecurity incident response and crisis management. While existing frameworks, such as ISO/IEC 27035 and NIST SP 800-61, focus on technical measures, they provide limited guidance on structured communication strategies that enhance resilience, mitigate reputational risks, and ensure regulatory compliance. This research addresses this gap by examining the role of strategic communication in cybersecurity through a qualitative, descriptive-analytical approach. Drawing from international standards, regulatory frameworks (e.
APA, Harvard, Vancouver, ISO, and other styles
25

Ayesha Abrar. "Nuclear Deterrence in the Cyber Age: Intricacies and Prospects." sjesr 7, no. 2 (2024): 1–7. https://doi.org/10.36902/sjesr-vol7-iss2-2024(1-7).

Full text
Abstract:
Nuclear deterrence is confronting unprecedented challenges in the contemporary era, particularly with the emergence of cyber warfare. As the world becomes increasingly dependent on digital technologies, the intersection of cyber and nuclear domains will have significant implications for global security. Nonetheless, prominent theorists, policymakers, and military strategists are attempting to reconsider its application in a post-Internet and cyber-ready world. There exists a C4ISR vulnerability to attacks on adversary command and control systems. Nuclear deterrence and cyber warfare are separa
APA, Harvard, Vancouver, ISO, and other styles
26

Cimbala, Stephen J. "Nuclear Crisis Management and Deterrence: America, Russia, and the Shadow of Cyber War." Journal of Slavic Military Studies 30, no. 4 (2017): 487–505. http://dx.doi.org/10.1080/13518046.2017.1377007.

Full text
APA, Harvard, Vancouver, ISO, and other styles
27

Trim, Peter R. J., and Yang-Im Lee. "Combining Sociocultural Intelligence with Artificial Intelligence to Increase Organizational Cyber Security Provision through Enhanced Resilience." Big Data and Cognitive Computing 6, no. 4 (2022): 110. http://dx.doi.org/10.3390/bdcc6040110.

Full text
Abstract:
Although artificial intelligence (AI) and machine learning (ML) can be deployed to improve cyber security management, not all managers understand the different types of AI/ML and how they are to be deployed alongside the benefits associated with sociocultural intelligence. The aim of this paper was to provide a context within which managers can better appreciate the role that sociocultural intelligence plays so that they can better utilize AI/ML to facilitate cyber threat intelligence (CTI). We focused our attention on explaining how different approaches to intelligence (i.e., the intelligence
APA, Harvard, Vancouver, ISO, and other styles
28

Lee, Mu Seon. "A Study on the Actual Status and Countermeasures of Cyber Stalking." Korean Association of Criminal Psychology 19, no. 2 (2023): 65–76. http://dx.doi.org/10.25277/kcpr.2023.19.2.65.

Full text
Abstract:
Recently, in September, 2022, the so-called Sindang Station Murder in which a man obsessed with love killed a woman cruelly has been arousing public resentment. Besides, these days, cyber stalking, stalking on SNSs, is occurring in many ways; therefore, it is urgent for us to come up with countermeasures for it. Of course, the Stalking Punishment Act has been in effect since the end of 2021; however, there are a lot of difficulties in punishing cyber stalking. Now is the time to discuss countermeasures for it. The purpose of this study is to examine the concept, trend, and actual status of cyb
APA, Harvard, Vancouver, ISO, and other styles
29

Ofir, Anna, and Rafael Koren. "Cyber-shock and “digital withdrawal”: Organizational lLeadership and Crisis Management During a Hospital-wide Computer Shutdown Following a Ransomware Attack." Prehospital and Disaster Medicine 38, S1 (2023): s98. http://dx.doi.org/10.1017/s1049023x23002728.

Full text
Abstract:
Introduction:In October 2021, Hillel Yaffe, MC, suffered a ransomware attack which shutdown most hospital computer systems, including patient EMR, pharmacy, communications, administration and backup systems. Staff were left in a state of “cyber-shock” without access to essential information for maintaining safety, quality and continuity of care. The aim of this presentation is to share the hospitals' experience and insights of this cyber-attack, outlining preparedness and response strategies.Method:This attack required a multifaceted emergency response strategy, including: Immediate response a
APA, Harvard, Vancouver, ISO, and other styles
30

Ahmed, N. B., N. Daclin, M. Olivaux, and G. Dusserre. "Addressing the Dilemma of a “Crisis within a crisis”: Exploring the Penetration Testing challenges in a Mobile Field Hospital Setting." Advances in Multidisciplinary and scientific Research Journal Publication 2, no. 2 (2023): 67–80. http://dx.doi.org/10.22624/aims/csean-smart2023p9.

Full text
Abstract:
This paper focuses on evaluating the security challenges faced by mobile field hospitals, which play a crucial role in emergency response and disaster management in remote and austere environments. The authors conducted a penetration test using the Open Source Security Testing Methodology Manual (OSSTMM) framework to assess the security posture of a mobile field hospital. The methodology employed in the study included a combination of automated and manual techniques such as network scanning, vulnerability assessments, social engineering, and exploitation. The penetration test revealed several
APA, Harvard, Vancouver, ISO, and other styles
31

Vaivode, Laila. "JOINT INFORMATION SYSTEM MODEL APPLIANCE IN MAN-MADE CRISIS MANAGEMENT." ENVIRONMENT. TECHNOLOGY. RESOURCES. Proceedings of the International Scientific and Practical Conference 5 (June 8, 2025): 317–22. https://doi.org/10.17770/etr2025vol5.8503.

Full text
Abstract:
Several crisis communication models can be applied in the discourse of man-made crises occurrence, such as terrorist attacks, cyber-attacks, or explosions caused by negligence and other similar events. However, one of the most comprehensive models in practical terms- and yet one of the least scientifically researched- is the Joint Information System (JIS) model. By nature, the resolution of such critical incidents, which are driven by human intention and action, requires the involvement of multiple actors, primarily state security institutions, as well as non-governmental organizations and pos
APA, Harvard, Vancouver, ISO, and other styles
32

Urbanovics, Anna. "Cybersecurity Policy-Related Developments in Latin America." Academic and Applied Research in Military and Public Management Science 21, no. 1 (2022): 79–94. http://dx.doi.org/10.32565/aarms.2022.1.6.

Full text
Abstract:
Latin American countries begin to develop their national-level cyber policy including their cybersecurity strategy. The paper aims to provide a comparative analysis of the strategy development processes in six Latin American countries including Argentina, Brazil, Chile, Colombia, Mexico and Peru. The methodology is based on a mixed approach. For the quantitative analysis, the National Cyber Security Index and UNIDIR Cyber Policy Portal were used, while for the qualitative analysis a document analysis was carried out on the national strategies. Analysing national data based on the NCSI, Chile s
APA, Harvard, Vancouver, ISO, and other styles
33

Ostrowska, Monika, Michal Pružinský, and Cezary Podlasiński. "Potencjał bezzałogowych statków powietrznych wykorzystywanych w zarządzaniu kryzysowym w Polsce." Perspektywy Kultury 46, no. 3 (2024): 185–202. http://dx.doi.org/10.35765/pk.2024.4603.14.

Full text
Abstract:
The article explores the integration of Unmanned Aerial Vehicles (UAVs) within the Crisis Management System (CMS), highlighting their potential to enhance crisis response and management through operational efficiency. It examines how UAVs can be effectively employed in crisis situations, presenting updates to the CMS that incorporate UAV capabilities. The article details the functions and key components of the CMS, which spans multiple levels of governance, from central to local authorities and executive agencies. The focus is on the preventative role of UAVs in crisis scenarios. Our research
APA, Harvard, Vancouver, ISO, and other styles
34

Rathore, Sunaina, and Manpreet Arora. "Strategizing in Turmoil: Unveiling Effective Internal Crisis Communication Practices amidst Contemporary Disruptions." Journal of Communication and Management 3, no. 03 (2024): 265–75. http://dx.doi.org/10.58966/jcm20243312.

Full text
Abstract:
This study explores the theoretical development of literature on “internal crisis communication strategies” particularly during and post COVID-19 pandemic. The study underlines the importance of internal communication management, particularly during the crisis and post-crisis, as crisis affects internal communication initially and external communication subsequently. Also, the field of internal crisis communication has become more relevant post-pandemic. Through Scopus database analysis, literature review, and news analysis, it identifies that “crisis response” is an emerging area of research
APA, Harvard, Vancouver, ISO, and other styles
35

Maltseva, Irina, Yuliya Chernysh, and Viacheslav Ovsiannikov. "ANALYSIS OF CYBER RESISTANCE ASSESSMENT METHODS OF CRITICAL INFRASTRUCTURE." Cybersecurity: Education, Science, Technique 12, no. 4 (2021): 29–35. http://dx.doi.org/10.28925/2663-4023.2021.12.2935.

Full text
Abstract:
The availability of critical infrastructure through cyberspace makes national security dependent on the degree of its security. Critical infrastructure is a set of automated management systems, which provide the interaction of information and telecommunications networks that solve problems of public administration, defense, security and law enforcement, and others. The protection of critical infrastructure directly depends on the possession of the relevant structures of new weapons, the degree of its effectiveness, methods of use and means of protection against the same weapons of the enemy. I
APA, Harvard, Vancouver, ISO, and other styles
36

Atanasov, Atanas, Veselina Gagamova, Ivan Hristozov, and Elitsa Pavlova. "Modeling Scenarios Combining Cyber Intelligence Procedures, Methods, Technologies and Techniques." International conference KNOWLEDGE-BASED ORGANIZATION 30, no. 3 (2024): 1–4. http://dx.doi.org/10.2478/kbo-2024-0078.

Full text
Abstract:
Abstract This paper presents the capabilities of specialized simulation software to develop a visual model that represents a cyber intelligence scenario. The architecture development method is applied to create an operational view for the tactics to conduct an intelligence attack by a team in the Computer Security Incident Response Centre in the structures related to crisis management and response. For this purpose, a prognostic scenario for reconnaissance attack tactics was developed using the toolkit of the simulation software, in which the Gather information about the victim’s network techn
APA, Harvard, Vancouver, ISO, and other styles
37

Susilo, Anindita, and Ahmad Fauzy. "Cross platform Social Media Management: A Case Study on Cyber Public Relations Implementation of Indonesia’s Private TV Station in Building External Stakeholders Engagement." Technium Social Sciences Journal 20 (June 8, 2021): 287–301. http://dx.doi.org/10.47577/tssj.v20i1.3485.

Full text
Abstract:
As a media company, Metro TV implemented Cyber Public Relations activities in order to build engagement with the public. The engagement value between Metro TV and its followers on the three social media accounts are able to reach high number. This study aims to see the implementation of cyber public relations by Metro TV as a media company in building public engagement on social media. This study uses the concept of Public Relations management initiated by Cutlip which is then linked to the concept of Cyber PR and engagement. The research method used is case study with a qualitative approach.
APA, Harvard, Vancouver, ISO, and other styles
38

VASILEVA, Violeta, and Veselina ALEKSANDROVA GAGAMOVA. "Aplicarea modelelor NATO pentru constituirea infrastructurii informaționale în situații de criză." Gândirea Militară Românească 2024, no. 4 (2024): 226–43. https://doi.org/10.55535/gmr.2024.4.14.

Full text
Abstract:
The effective functioning of the national security system during disasters, accidents and other crisis situations related to cyber security and cyber defence requires the realization of opportunities for inter-institutional interaction of all elements of the system. This paper presents certain opportunities as part of the methodology to apply NATO models to develop the system design of information infrastructure with capabilities to achieve the required levels of operational interoperability to respond to cyber threats to national security. For the architectural configuration, the NATO Technic
APA, Harvard, Vancouver, ISO, and other styles
39

Petrukha, Nina M., Serhii V. Petrukha, Anatolii Yu Zhmaiev, and Maksym E. Synkevych. "Cyber Security of the Economy and Public Finances: Historiography and Post-War Trajectory of Development." Business Inform 6, no. 557 (2024): 64–79. http://dx.doi.org/10.32983/2222-4459-2024-6-64-79.

Full text
Abstract:
The article examines the evolution of the cyber security paradigm in the context of the ontogenesis of the economy and public finances with an emphasis on the triggers of pre-war and war-oriented institutional memory and challenges in the post-war reconstruction of Ukraine. The scientific novelty consists in a comprehensive study of historiographical processes in cyber security and their impact on dynamic shifts in the economy and public finances, considering endo- and exogenous cyber challenges and opportunities for digital transformation and all-encompassing digitalization formed by the new
APA, Harvard, Vancouver, ISO, and other styles
40

SKRZYNECKI, Damian. "ACTIVITIES TO ENHANCE THE CYBER SECURITY OF OBJECTSIN SPACE." Cybersecurity & Cybercrime 1, no. 1 (2021): 101–17. http://dx.doi.org/10.5604/01.3001.0053.8013.

Full text
Abstract:
Nowadays, the space industry is the most promising development environment and theamount of technology used in it covers practically all aspects of the modern economy.Ensuring safety is therefore crucial to avoid a global economic crisis, for example asa result of the lack of access to navigation services. Much of this is a digitalenvironment that is vulnerable to cyber-attacks. The security of space objects must beensured against a number of threats, such as jamming, spoofing and eavesdropping, atthe level of three management segments - ground control station, communicationbetween the object
APA, Harvard, Vancouver, ISO, and other styles
41

Zhyvylo, Y. О. "SITUATION CENTER OF THE MINISTRY OF DEFENSE OF UKRAINE – A MODEL OF EARLY DETECTION AND ANALYSIS OF CRISIS SITUATIONS IN THE STATE SECURITY SECTOR." 1, no. 1 (September 29, 2022): 27–41. http://dx.doi.org/10.26565/1684-8489-2022-1-02.

Full text
Abstract:
The article examines the issue of creating and ensuring the functioning of the situation center in the system of the Ministry of Defense of Ukraine. The necessity of creating a specialized organizational structure, one of the main tasks of which is to respond to military cyber threats directly under the general coordination of the National Coordination Center for Cyber Security in cooperation with other actors in the field of cyber security. The ways of creation and functioning of the situation center are analyzed, the list of threats to which the separate structure (or its separate elements)
APA, Harvard, Vancouver, ISO, and other styles
42

Beev, Ivaylo. "Economic challenges: crisis, recovery, sustainability." Economic Thought journal 66, no. 6 (2021): 107–15. http://dx.doi.org/10.56497/etj2166607.

Full text
Abstract:
On November 12, 2021 at the University of National and World Economy under the patronage of the Rector Prof. Dr. Dimitar Dimitrov was held an annual scientific conference on "Economic challenges: crisis, recovery, sustainability". The special guest of the event was Mr. Atanas Pekanov, Deputy Prime Minister for the Management of EU Funds. The forum was attended by representatives of employers, trade unions, central and local government and NGOs. Guests were also Prof. Dr. Mihail Musov, Deputy Rector for Research and International Cooperation, and Prof. Dr. Rosen Kirilov, Deputy Rector for Digit
APA, Harvard, Vancouver, ISO, and other styles
43

Mirnenko, Volodymyr, Oleh Hudyma, and Vadym Artamoshchenko. "Variant of Organizational and Functional Adaptation Structures of a Typical Situational Centre to the Emergence of Crisis Situations." Qubahan Academic Journal 4, no. 4 (2024): 1–15. http://dx.doi.org/10.48161/qaj.v4n4a248.

Full text
Abstract:
Due to the growing number of crisis situations (CS) in the modern world, such as natural disasters, man-made accidents, pandemics, cyber-attacks, financial crises, wars, and other negative events, it is important for the state to develop and adapt the organizational and functional structures of information and analytical units, including situation centers (SC), to respond effectively to such cases, thereby ensuring the country’s resilience in the face of negative circumstances. The purpose of the study is to consider and analyze a possible option for adapting the organizational and functional
APA, Harvard, Vancouver, ISO, and other styles
44

Tumalavičius, Vladas, and Anatolijs Kriviņš. "SOME ASPECTS OF ACTIONS TO RESPONSE TO EXTERNAL SECURITY THREATS AND CRISES OF THE EUROPEAN UNION." Sociālo Zinātņu Vēstnesis=Social Sciences Bulletin 38, no. 1 (2024): 103–12. http://dx.doi.org/10.9770/szv.2024.1(6).

Full text
Abstract:
The European Union is taking action in various areas of security to improve its ability to respond to crises and increase its resilience to future challenges, so this article examines the evolution of crisis response actions of the European Union countries in the face of challenges and threats in a rapidly changing geopolitical environment in relation to European security. This, in turn, is reflected in the speed of decision-making by the competent associations of the European Union regarding legal regulation that corresponds to the current situation. The authors identify and analyze the main
APA, Harvard, Vancouver, ISO, and other styles
45

ДЬЯКОВ, С. А., and Д. В. ТКАЧЕВА. "IMPACT OF DIGITAL TRANSFORMATION ON ANTI-CRISIS MANAGEMENT OF AN ENTERPRISE." Экономика и предпринимательство, no. 3(152) (June 12, 2023): 340–44. http://dx.doi.org/10.34925/eip.2023.152.3.068.

Full text
Abstract:
Исследование посвящено изучению влияния цифровой трансформации на антикризисное управление российскими предприятиями. Авторами проанализированы преимущества и недостатки цифровизации систем антикризисного управления предприятиями. Определено, что основными положительными сторонами цифровизации антикризисного управления предприятиями является повышение точности и полноты информационной базы, на основе которой строятся управленческие решения и антикризисная программа в целом, а также предоставление субъектам возможности моделировать и прогнозировать работу предприятия на будущие периоды на основ
APA, Harvard, Vancouver, ISO, and other styles
46

Nehodenko, Vitalii. "APPLICATION OF THE MATHEMATICAL CATASTROPHE THEORY TO ENSURE THE STABILITY OF THE INFORMATION SECURITY MANAGEMENT SYSTEM." Cybersecurity: Education, Science, Technique 2, no. 26 (2024): 212–22. https://doi.org/10.28925/2663-4023.2024.26.692.

Full text
Abstract:
The Information Security Management System is an important element in preventing possible threats and failures, exposure to various internal and external factors, which could lead to irreversible consequences. Predicting the impact of various types of incidents allows to ensure the stability and balance of complex dynamic systems, their confidentiality, integrity and availability. The resilience of the information security management system to different types of cyber incidents has been researched. Mathematical Catastrophe theory has been applied to model the dynamics of the information system
APA, Harvard, Vancouver, ISO, and other styles
47

Jeong, Chan Gwon. "The Direction of National Crisis Management System Consistent with the New Security Environment." National Crisisonomy Institute, Chungbuk National University 5, no. 1 (2021): 17–39. http://dx.doi.org/10.51394/ccmr.2021.5.1.17.

Full text
Abstract:
Today, Corona-19, the threat of new security such as climate change, the increasing of US-China hegemony, and the provocation using North Korea's advanced science ICT have become commonplace. Despite the changes in the era of security threats, the government is holding back effective crisis management due to the fact that it is separated from reality, weak control towers, and lack of presidential leadership. To improve this, first, the revision of the law, such as the “Cyber Announcement Act” that meets the security environment, is the second, the operation of the security control tower coordi
APA, Harvard, Vancouver, ISO, and other styles
48

Andrii Rohulia. "Ensuring Security in Crisis: Risk Mitigation Strategies and Response Planning." Journal of Information Systems Engineering and Management 10, no. 12s (2025): 524–36. https://doi.org/10.52783/jisem.v10i12s.1861.

Full text
Abstract:
Introduction: National security is ensured through the formation and implementation of strategic management policy. The process is aimed primarily at overcoming risks and threats, preventing them and recurrence. Security management is particularly relevant in the current crisis conditions caused by the Russian invasion of Ukraine, external pressure and instability in all areas of national security. Objectives: The study aims to theoretically analyse and formulate practical recommendations on national security management in a crisis in the context of strategies and mechanisms for ensuring it. M
APA, Harvard, Vancouver, ISO, and other styles
49

Georgiadou, Anna, Ariadni Michalitsi-Psarrou, Fotios Gioulekas, et al. "Hospitals’ Cybersecurity Culture during the COVID-19 Crisis." Healthcare 9, no. 10 (2021): 1335. http://dx.doi.org/10.3390/healthcare9101335.

Full text
Abstract:
The coronavirus pandemic led to an unprecedented crisis affecting all aspects of the concurrent reality. Its consequences vary from political and societal to technical and economic. These side effects provided fertile ground for a noticeable cyber-crime increase targeting critical infrastructures and, more specifically, the health sector; the domain suffering the most during the pandemic. This paper aims to assess the cybersecurity culture readiness of hospitals’ workforce during the COVID-19 crisis. Towards that end, a cybersecurity awareness webinar was held in December 2020 targeting Greek
APA, Harvard, Vancouver, ISO, and other styles
50

Patrick Keenan, Kevin. "Creating spaces of public insecurity in times of terror: The implications of code/space for urban vulnerability analyses." Environment and Planning C: Politics and Space 37, no. 1 (2018): 81–101. http://dx.doi.org/10.1177/2399654418776660.

Full text
Abstract:
From data leaks of sensitive information to the degrading or halting of complete systems upon which integral societal process rely, there are daily reminders of the precariousness of networked institutions. This form of vulnerability extends beyond services to also threaten foundational values, such as privacy, movement, and free speech. Yet, given the awareness of vulnerability to cyber disruption, little is known about how massive cyber failures might disrupt the lives of ordinary people at a micro-scale. Because technology is imbued in everyday life, and people use internet systems in bundl
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!