Academic literature on the topic 'Cybersecurity'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'Cybersecurity.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Journal articles on the topic "Cybersecurity"

1

Whyte, Jeffrey. "Cybersecurity, race, and the politics of truth." Security Dialogue 53, no. 4 (2022): 342–62. http://dx.doi.org/10.1177/09670106221101725.

Full text
Abstract:
This article explores the racial politics underwriting cybersecurity’s recent human turn toward the issues of online disinformation and ‘foreign influence’ in US politics. Through a case study of the Black Lives Matter (BLM) movement, this article’s first half considers how contemporary cybersecurity has produced ‘racial division’ as an object of security by framing the BLM movement as a geopolitical vulnerability open to foreign manipulation through social media. In its emphasis on the political protest as a site of insecurity, I argue that contemporary cybersecurity has widened its tradition
APA, Harvard, Vancouver, ISO, and other styles
2

Johri, Amar, and Shailendra Kumar. "Exploring Customer Awareness towards Their Cyber Security in the Kingdom of Saudi Arabia: A Study in the Era of Banking Digital Transformation." Human Behavior and Emerging Technologies 2023 (January 12, 2023): 1–10. http://dx.doi.org/10.1155/2023/2103442.

Full text
Abstract:
The annual rate of cybersecurity breaches has risen in the last few years, exposing millions of records in some cases. The average data breach cost in 2021 was a massive $4.24 million. This study examines customer awareness and satisfaction with cybersecurity in the context of the digital transformation of banking in Saudi Arabia. The study is empirical and based on the data collected from 355 banking customers in Saudi Arabia. Three significant aspects of cybersecurity, including cyberattacks, phishing, and hacking, have been analyzed through various dimensions. Customer satisfaction with ban
APA, Harvard, Vancouver, ISO, and other styles
3

Maurer, Chris, Kevin Kim, Dan Kim, and Leon A. Kappelman. "Cybersecurity." Communications of the ACM 64, no. 2 (2021): 28–30. http://dx.doi.org/10.1145/3399667.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Ratnayake, Deepthi. "Cybersecurity." ITNOW 64, no. 2 (2022): 49. http://dx.doi.org/10.1093/itnow/bwac056.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Ratnayake, Deepthi. "Cybersecurity." ITNOW 64, no. 1 (2022): 37. http://dx.doi.org/10.1093/itnow/bwac019.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Pullin, Dennis W. "Cybersecurity." Frontiers of Health Services Management 35, no. 1 (2018): 3–12. http://dx.doi.org/10.1097/hap.0000000000000038.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

CACM Staff. "Cybersecurity." Communications of the ACM 60, no. 4 (2017): 20–21. http://dx.doi.org/10.1145/3051455.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Campbell, Robert D. "Cybersecurity." ACM SIGCSE Bulletin 35, no. 2 (2003): 24–26. http://dx.doi.org/10.1145/782941.782965.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

BOHATY, ROCHELLE F. H. "CYBERSECURITY." Chemical & Engineering News 86, no. 44 (2008): 18–20. http://dx.doi.org/10.1021/cen-v086n044.p018.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Ratnayake, Deepthi. "Cybersecurity." ITNOW 64, no. 4 (2022): 39. http://dx.doi.org/10.1093/combul/bwac124.

Full text
APA, Harvard, Vancouver, ISO, and other styles
More sources

Dissertations / Theses on the topic "Cybersecurity"

1

Poluzzi, Lorenzo. "IA & Cybersecurity." Bachelor's thesis, Alma Mater Studiorum - Università di Bologna, 2020.

Find full text
Abstract:
L'integrazione tra Intelligenza Artificiale e Cybersecurity nasce per migliorare l'efficienza, la crescita e la possibilità di rendere sicuro un sistema col minore sforzo, perchè si creino già sistemi di protezione "intelligenti" in grado quindi di essere autonomi nel scovare nuovi attacchi e aggiornarsi, analizzare centinaia e centinaia di dati, traffico e prendere delle decisioni. Analizzerò separatamente diversi concetti di Cybersecurity, I.A. e come sia possibile integrare quest'ultima al fine di innalzare i livelli di sicurezza; si mostrerà anche un esempio pratico di un software (Attack
APA, Harvard, Vancouver, ISO, and other styles
2

Howard, David J. "Development of the Cybersecurity Attitudes Scale and Modeling Cybersecurity Behavior and its Antecedents." Scholar Commons, 2018. https://scholarcommons.usf.edu/etd/7306.

Full text
Abstract:
As organizations have become more reliant on computers and technology to operate in a globalized world, they have also become more vulnerable to cyberattacks on their networks. The expense to organizations from cyberattacks now exceeds $400 billion USD annually. These costs highlight the need for behavioral research in the cyber domain. The first phase of this research developed an instrument to measure workers’ cybersecurity attitudes. An iterative process resulted in a scale with good psychometric properties - The Cybersecurity Attitudes Scale. The scale measures two factors: cyber policy ad
APA, Harvard, Vancouver, ISO, and other styles
3

Lingelbach, Kembley Kay. "Perceptions of Female Cybersecurity Professionals Toward Factors that Encourage Females to the Cybersecurity Field." Diss., NSUWorks, 2018. https://nsuworks.nova.edu/gscis_etd/1056.

Full text
Abstract:
Despite multiple national, educational, and industry initiatives, women continue to be underrepresented in the cybersecurity field. Only 11% of cybersecurity professionals, globally, are female. This contributes to the growing overall shortage of workers in the field. This research addressed the significant underrepresentation of females in the cybersecurity workforce. There are many practitioner and industry studies that suggest self-efficacy, discrimination and organizational culture play important roles in the low rate of women in the cybersecurity field. A limited number of scholarly studi
APA, Harvard, Vancouver, ISO, and other styles
4

Nilsen, Richard. "Measuring Cybersecurity Competency: An Exploratory Investigation of the Cybersecurity Knowledge, Skills, and Abilities Necessary for Organizational Network Access Privileges." NSUWorks, 2017. http://nsuworks.nova.edu/gscis_etd/1017.

Full text
Abstract:
Organizational information system users (OISU) that are victimized by cyber threats are contributing to major financial and information losses for individuals, businesses, and governments. Moreover, it has been argued that cybersecurity competency is critical for advancing economic prosperity and maintaining national security. The fact remains that technical cybersecurity controls may be rendered useless due to a lack of cybersecurity competency of OISUs. All OISUs, from accountants to cybersecurity forensics experts, can place organizational assets at risk. However, that risk is increased whe
APA, Harvard, Vancouver, ISO, and other styles
5

Reid, Rayne. "Guidelines for cybersecurity education campaigns." Thesis, Nelson Mandela University, 2017. http://hdl.handle.net/10948/14091.

Full text
Abstract:
In our technology- and information-infused world, cyberspace is an integral part of modern-day society. As the number of active cyberspace users increases, so too does the chances of a cyber threat finding a vulnerable target increase. All cyber users who are exposed to cyber risks need to be educated about cyber security. Human beings play a key role in the implementation and governing of an entire cybersecurity and cybersafety solution. The effectiveness of any cybersecurity and cybersafety solutions in a societal or individual context is dependent on the human beings involved in the process
APA, Harvard, Vancouver, ISO, and other styles
6

Tagert, Adam C. "Cybersecurity Challenges in Developing Nations." Research Showcase @ CMU, 2010. http://repository.cmu.edu/dissertations/22.

Full text
Abstract:
This thesis examines the guidance that is being given to developing nations that are rapidly deploying information and communication technologies. It studied the African countries of Rwanda and Tunisia to draw lessons of the situation and potential methods of improving the situation. The thesis found that developing nations are often recommended to implement a conglomeration of existing rules and regulations found in other countries especially in European countries and in the United States. Developing countries are also recommended to create national CERTs, organizations of cybersecurity exper
APA, Harvard, Vancouver, ISO, and other styles
7

Falco, Gregory J. "Cybersecurity for urban critical infrastructure." Thesis, Massachusetts Institute of Technology, 2018. http://hdl.handle.net/1721.1/118226.

Full text
Abstract:
Thesis: Ph. D., Massachusetts Institute of Technology, Department of Urban Studies and Planning, 2018.<br>Cataloged from PDF version of thesis.<br>Includes bibliographical references (pages 110-116).<br>Our cities are under attack. Urban critical infrastructure which includes the electric grid, water networks, transportation systems and public health and safety services are constantly being targeted by cyberattacks. Urban critical infrastructure has been increasingly connected to the internet for the purpose of operational convenience and efficiency as part of the growing Industrial Internet o
APA, Harvard, Vancouver, ISO, and other styles
8

Pierce, Adam O. "Exploring the Cybersecurity Hiring Gap." ScholarWorks, 2016. https://scholarworks.waldenu.edu/dissertations/3198.

Full text
Abstract:
Cybersecurity is one of the fastest growing segments of information technology. The Commonwealth of Virginia has 30,000 cyber-related jobs open because of the lack of skilled candidates. The study is necessary because some business managers lack strategies for hiring cybersecurity professionals for U.S. Department of Defense (DoD) contracts. The purpose of this case study was to explore strategies business managers in DoD contracting companies used to fill cybersecurity positions. The conceptual framework used for this study was the organizational learning theory. A purposeful sample of 8 succ
APA, Harvard, Vancouver, ISO, and other styles
9

Taiola, Matteo. "Cybersecurity in impianti dell'industria di processo." Master's thesis, Alma Mater Studiorum - Università di Bologna, 2021.

Find full text
Abstract:
Nel corso degli ultimi decenni, i processi industriali hanno subito una sempre maggiore automatizzazione e una crescente connessione con reti esterne. Nell’industria di processo, dove il livello di automazione è sempre stato elevato, l’innovazione tecnologica ha richiesto sempre una maggiore interconnessione tra i sistemi di produzione e sistemi esterni di gestione. La connessione dei sistemi ha portato a una crescita economica, ottimizzazione dei processi e un aumento della velocità di produzione, dovuti alla gestione dei controlli del processo e dei dati di funzionamento; ciò però, ha port
APA, Harvard, Vancouver, ISO, and other styles
10

Schluderberg, Larry E. "Addressing the cybersecurity Malicious Insider threat." Thesis, Utica College, 2015. http://pqdtopen.proquest.com/#viewpdf?dispub=1571095.

Full text
Abstract:
<p> Malicious Insider threats consist of employees, contractors, or business partners who either have current authorized access, or have had authorized access to an organization's critical information and have intentionally misused that access in a manner that compromised the organization. Although incidents initiated by malicious insiders are fewer in number than those initiated by external threats, insider incidents are more costly on average because the threat is already trusted by the organization and often has privileged access to the organization's most sensitive information. In spite of
APA, Harvard, Vancouver, ISO, and other styles
More sources

Books on the topic "Cybersecurity"

1

Guiora, Amos N. Cybersecurity. Routledge, 2017. http://dx.doi.org/10.1201/9781315370231.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Kumar, Gautam, Om Prakash Singh, and Hemraj Saini. Cybersecurity. CRC Press, 2021. http://dx.doi.org/10.1201/9781003145042.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Abd El-Latif, Ahmed A., and Christos Volos, eds. Cybersecurity. Springer International Publishing, 2022. http://dx.doi.org/10.1007/978-3-030-92166-8.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Brooks, Charles J., Christopher Grow, Philip Craig, and Donald Short. Cybersecurity. John Wiley & Sons, Inc., 2018. http://dx.doi.org/10.1002/9781119369141.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Price, Tom. Cybersecurity. CQ Press, 2015. http://dx.doi.org/10.4135/cqr_ht_cybersecurity_2015.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Marshall, Patrick. Cybersecurity. CQ Press, 2003. http://dx.doi.org/10.4135/cqrglobal20030926.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Daim, Tugrul U., and Marina Dabić, eds. Cybersecurity. Springer International Publishing, 2023. http://dx.doi.org/10.1007/978-3-031-34843-3.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Marshall, Patrick. Cybersecurity. CQ Press, 2010. http://dx.doi.org/10.4135/cqresrre20100226.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Jøsang, Audun. Cybersecurity. Springer Nature Switzerland, 2025. http://dx.doi.org/10.1007/978-3-031-68483-8.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Praça, Isabel, Simona Bernardi, and Pedro R. M. Inácio, eds. Cybersecurity. Springer Nature Switzerland, 2025. https://doi.org/10.1007/978-3-031-94855-8.

Full text
APA, Harvard, Vancouver, ISO, and other styles
More sources

Book chapters on the topic "Cybersecurity"

1

Bishop, Gulsebnem. "Cybersecurity and cybersecurity culture." In Cybersecurity Culture. CRC Press, 2025. https://doi.org/10.1201/9781003368496-1.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Wichum, Ricky. "Cybersecurity." In Handbuch Virtualität. Springer Fachmedien Wiesbaden, 2020. http://dx.doi.org/10.1007/978-3-658-16342-6_36.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Wichum, Ricky. "Cybersecurity." In Handbuch Virtualität. Springer Fachmedien Wiesbaden, 2018. http://dx.doi.org/10.1007/978-3-658-16358-7_36-1.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Wolfe, Jennifer C. "Cybersecurity." In Disruption in the Boardroom. Apress, 2020. http://dx.doi.org/10.1007/978-1-4842-6159-0_4.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Refsdal, Atle, Bjørnar Solhaug, and Ketil Stølen. "Cybersecurity." In Cyber-Risk Management. Springer International Publishing, 2015. http://dx.doi.org/10.1007/978-3-319-23570-7_4.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Roy, Jeffrey. "Cybersecurity." In Public Administration and Information Technology. Springer New York, 2013. http://dx.doi.org/10.1007/978-1-4614-7221-6_5.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Jackson, Scott, and Ricardo Moraes dos Santos. "Cybersecurity." In Systems Approach to the Design of Commercial Aircraft. CRC Press, 2020. http://dx.doi.org/10.1201/9781003053750-12.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Siers, Rhea. "Cybersecurity." In Security Studies. Routledge, 2018. http://dx.doi.org/10.4324/9781315228358-38.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Islam, Md Shariful. "Cybersecurity." In Routledge Companion to Global Cyber-Security Strategy. Routledge, 2020. http://dx.doi.org/10.4324/9780429399718-29.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Zaffar, Ehsan. "Cybersecurity." In Understanding Homeland Security. Routledge, 2019. http://dx.doi.org/10.4324/9780323296243-8.

Full text
APA, Harvard, Vancouver, ISO, and other styles

Conference papers on the topic "Cybersecurity"

1

Taylor, Steve, Norbert Goetze, Joerg Abendroth, et al. "Cybersecurity Indicators Within a Cybersecurity Testing and Monitoring Framework." In 10th International Conference on Internet of Things, Big Data and Security. SCITEPRESS - Science and Technology Publications, 2025. https://doi.org/10.5220/0013465100003944.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Kyranoudi, Pinelopi, Nineta Polemi, Paresh Rathod, Ricardo Gregorio Lugo, Sotiris Ioannidis, and Paulinus Ofem. "Sectoral Cybersecurity Skills Gap: The Case of Maritime Cybersecurity Certification Training." In 2024 IEEE International Conference on Engineering, Technology, and Innovation (ICE/ITMC). IEEE, 2024. https://doi.org/10.1109/ice/itmc61926.2024.10794272.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Alhassani, Mariam, Moatsum Alawida, and Hamzah Alamaireh. "ChatGPT in Cybersecurity: A Double-Sided Weapon within the Cybersecurity Realm." In 2025 1st International Conference on Computational Intelligence Approaches and Applications (ICCIAA). IEEE, 2025. https://doi.org/10.1109/icciaa65327.2025.11013583.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Cao, Xuanyu, Jiaxing Zhang, Peifeng Zheng, Shuai Bu, and Keshu Cheng. "Global Cybersecurity Situation Assessment Combining K-means Clustering and Cybersecurity Index." In 2025 5th International Symposium on Computer Technology and Information Science (ISCTIS). IEEE, 2025. https://doi.org/10.1109/isctis65944.2025.11066008.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Kemmerer, R. A. "Cybersecurity." In 25th International Conference on Software Engineering, 2003. Proceedings. IEEE, 2003. http://dx.doi.org/10.1109/icse.2003.1201257.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Maymí, Fernando J. "Cybersecurity." In SIGITE '19: The 20th Annual Conference on Information Technology Education. ACM, 2019. http://dx.doi.org/10.1145/3349266.3355613.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Abdulla, Aysha, Omer Bin Hussain, and Numa Fatima. "Cybersecurity." In 2024 International Conference on Artificial Intelligence, Computer, Data Sciences and Applications (ACDSA). IEEE, 2024. http://dx.doi.org/10.1109/acdsa59508.2024.10467741.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

de Bruin, Rossouw, and S. H. von Solms. "Humanitarian perspective of cybersecurity and cybersecurity governance." In 2017 IST-Africa Week Conference (IST-Africa). IEEE, 2017. http://dx.doi.org/10.23919/istafrica.2017.8102388.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Murphy, Diane R., and Richard H. Murphy. "Teaching Cybersecurity." In the 2013. ACM Press, 2013. http://dx.doi.org/10.1145/2528908.2528913.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Xu, Shouhuai. "Cybersecurity dynamics." In the 2014 Symposium and Bootcamp. ACM Press, 2014. http://dx.doi.org/10.1145/2600176.2600190.

Full text
APA, Harvard, Vancouver, ISO, and other styles

Reports on the topic "Cybersecurity"

1

Florakis, Chris, Christodoulos Louca, Roni Michaely, and Michael Weber. Cybersecurity Risk. National Bureau of Economic Research, 2020. http://dx.doi.org/10.3386/w28196.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Alecu, Iulian, Costel Ciuchi, Toma Cimpeanu, et al. Cybersecurity Guide. Romanian Association for Information Security Assurance, 2021. http://dx.doi.org/10.19107/cybersec.2021.en.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Guice, Leslie K. Cybersecurity Laboratory & Cybersecurity Research Program at the CRL. Defense Technical Information Center, 2014. http://dx.doi.org/10.21236/ada608802.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Newhouse, William, Stephanie Keith, Benjamin Scribner, and Greg Witte. National Initiative for Cybersecurity Education (NICE) Cybersecurity Workforce Framework. National Institute of Standards and Technology, 2017. http://dx.doi.org/10.6028/nist.sp.800-181.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

NIST, Gaithersburg MD. Using the Cybersecurity Framework to Minimize Emergent Cybersecurity Risk:. National Institute of Standards and Technology, 2025. https://doi.org/10.6028/nist.sp.1331.ipd.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Wright, Virginia, and Marc Sachs. Engineering-In Cybersecurity. Office of Scientific and Technical Information (OSTI), 2023. http://dx.doi.org/10.2172/1964083.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

LaSalle, Connie, Gema Howell, and Leilani Martinez. Cybersecurity for Research:. National Institute of Standards and Technology, 2025. https://doi.org/10.6028/nist.ir.8481.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Eliot, Daniel. Small Business Cybersecurity:. National Institute of Standards and Technology, 2025. https://doi.org/10.6028/nist.ir.7621r2.ipd.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Newhouse, William, Stephanie Keith, Benjamin Scribner, and Greg Witte. National Initiative for Cybersecurity Education (NICE) Cybersecurity Workforce Framework (Portuguese translation). National Institute of Standards and Technology, 2022. http://dx.doi.org/10.6028/nist.sp.800-181pt.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Newhouse, William, Stephanie Keith, Benjamin Scribner, and Greg Witte. National Initiative for Cybersecurity Education (NICE) Cybersecurity Workforce Framework (Spanish translation). National Institute of Standards and Technology, 2022. http://dx.doi.org/10.6028/nist.sp.800-181es.

Full text
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!