Academic literature on the topic 'Cybersecurity and privacy'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'Cybersecurity and privacy.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Journal articles on the topic "Cybersecurity and privacy"

1

Katzan, Jr., Harry. "Cybersecurity Service Model." Journal of Service Science (JSS) 5, no. 2 (December 28, 2012): 71–78. http://dx.doi.org/10.19030/jss.v5i2.7576.

Full text
Abstract:
The efficacy of modern computer systems is normally regarded as a function of five basic attributes of computer and information security: availability, accuracy, authenticity, confidentiality, and integrity. The concepts generally apply to government, business, education, and the ordinary lives of private individuals. The considerations normally involve extended applications of the Internet hence the name Cybersecurity. Achieving and maintaining a secure cyberspace is a complicated process, and some of the concerns involve personal identity, privacy and intellectual property, secure maintenance of the critical infrastructure, and the sustainability of organizations. The threats to a secure operating infrastructure are serious and profound: cyber terrorism, cyber war, cyber espionage, and cyber crime, to which the technical community has responded with a plethora of ad hoc safeguards and procedures, usually supplied by the competitive private sector. This paper proposes a fresh view of the cyber domain based on service science with the ultimate objective of developing a cybersecurity service model.
APA, Harvard, Vancouver, ISO, and other styles
2

Bojanova, Irena, Jeffrey Voas, Morris Chang, and Linda Wilbanks. "Cybersecurity or Privacy [Guest editors' introduction]." IT Professional 18, no. 5 (September 2016): 16–17. http://dx.doi.org/10.1109/mitp.2016.80.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Mishra, Neha. "Privacy, Cybersecurity, and GATS Article XIV: A New Frontier for Trade and Internet Regulation?" World Trade Review 19, no. 3 (May 2, 2019): 341–64. http://dx.doi.org/10.1017/s1474745619000120.

Full text
Abstract:
AbstractMeasures restricting data flows outside one's borders, including mandatory data/server localization measures, are not only a barrier to trade, but also largely ineffective in achieving better internet security or trust. Nevertheless, governments deploy such measures, primarily on grounds of cybersecurity and privacy, potentially violating their obligations under the General Agreement on Trade in Services (GATS). In this article, I investigate whether GATS-inconsistent measures may be justified under GATS Art. XIV when aimed at ensuring privacy or cybersecurity, and, if so, whether GATS Art. XIV effectively balances trade and internet policy. As the internet governance framework is complex and somewhat ambiguous, applying GATS Art. XIV to cybersecurity/privacy measures necessitates balancing of trade liberalization principles and domestic internet policy. This exercise can be effective in weeding out data localization measures disguised as privacy/cybersecurity measures, particularly by employing relevant technical and factual evidence. However, given the lack of binding international law/norms on these issues, GATS Art. XIV has a limited role, particularly in cases involving direct conflict between multistakeholder/transnational internet norms and domestic internet policies, or where the measures are founded on contentious standards/benchmarks on privacy/cybersecurity. Ultimately, ensuring free and secure data flows requires a multidimensional policy response, including strengthening linkages between trade law and internet governance.
APA, Harvard, Vancouver, ISO, and other styles
4

Katzan, Harry. "Contemporary Issues in Cybersecurity." Journal of Cybersecurity Research (JCR) 1, no. 1 (June 21, 2016): 1–6. http://dx.doi.org/10.19030/jcr.v1i1.9745.

Full text
Abstract:
The effectiveness of modern computer applications is normally regarded as a function of five basic attributes of secure computer and information systems: availability, accuracy, authenticity, confidentiality, and integrity. The concepts generally apply to government, business, education, and the ordinary lives of private individuals. The considerations normally involve extended Internet applications – hence the name Cybersecurity. Achieving and maintaining a secure cyberspace is a complicated process, and some of the concerns involve personal identity, privacy, intellectual property, the critical infrastructure, and the sustainability of organizations. The threats to a secure operating infrastructure are serious and profound: cyber terrorism, cyber war, cyber espionage, and cyber crime, to which the technical community has responded with safeguards and procedures, usually supplied by the private sector. This paper provides a comprehensive view of security in the cyber domain with the ultimate objective of developing a science of cybersecurity.
APA, Harvard, Vancouver, ISO, and other styles
5

Barth, Susanne, Menno D. T. de Jong, and Marianne Junger. "Lost in privacy? Online privacy from a cybersecurity expert perspective." Telematics and Informatics 68 (March 2022): 101782. http://dx.doi.org/10.1016/j.tele.2022.101782.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Pehlivan, Ceyhun Necati. "Global Privacy News." Global Privacy Law Review 1, Issue 1 (March 1, 2020): 63–76. http://dx.doi.org/10.54648/gplr2020009.

Full text
Abstract:
This article tracks significant developments in some of the key jurisdictions in the area of privacy, data protection, and cybersecurity. It provides concise reports to keep the reader up to date with some of the most recent developments across the globe. privacy, data protection, cyber security, global, news
APA, Harvard, Vancouver, ISO, and other styles
7

Khatoun, Rida, and Sherali Zeadally. "Cybersecurity and Privacy Solutions in Smart Cities." IEEE Communications Magazine 55, no. 3 (March 2017): 51–59. http://dx.doi.org/10.1109/mcom.2017.1600297cm.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Landwehr, C., D. Boneh, J. C. Mitchell, S. M. Bellovin, S. Landau, and M. E. Lesk. "Privacy and Cybersecurity: The Next 100 Years." Proceedings of the IEEE 100, Special Centennial Issue (May 2012): 1659–73. http://dx.doi.org/10.1109/jproc.2012.2189794.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Yuliana, Yuliana. "THE IMPORTANCE OF CYBERSECURITY AWARENESS FOR CHILDREN." Lampung Journal of International Law 4, no. 1 (June 30, 2022): 41–48. http://dx.doi.org/10.25041/lajil.v3i2.2526.

Full text
Abstract:
Online school during the COVID-19 pandemic makes the children prone to cyberattacks and malware. Therefore, cybersecurity awareness among children is critical. Online games and stories caused children to neglect their studying time. Therefore, this paper aims to describe the importance of cybersecurity awareness among children. Analyses were performed by using a literature review. Inclusion criteria are review and research articles. Inclusion criteria are review and research articles that were read twice to reduce the bias, then were summarized and narrated descriptively. Results revealed that cybersecurity awareness could be increased by digital literacy training. Children should be taught how to avoid risky behavior online. The cybersecurity awareness program is suitable for children to avoid phishing, pornography, cyberbullying, identity theft, and breaking of privacy. Children must be taught how to keep their passwords safe and private. They also need to be more cautious when playing online games. In conclusion, digital literacy and cybersecurity programs can be taught to children. These programs are suitable for raising cybersecurity among children.
APA, Harvard, Vancouver, ISO, and other styles
10

Yuliana, Yuliana. "THE IMPORTANCE OF CYBERSECURITY AWARENESS FOR CHILDREN." Lampung Journal of International Law 4, no. 1 (June 30, 2022): 41–48. http://dx.doi.org/10.25041/lajil.v4i1.2526.

Full text
Abstract:
Online school during the COVID-19 pandemic makes the children prone to cyberattacks and malware. Therefore, cybersecurity awareness among children is critical. Online games and stories caused children to neglect their studying time. Therefore, this paper aims to describe the importance of cybersecurity awareness among children. Analyses were performed by using a literature review. Inclusion criteria are review and research articles. Inclusion criteria are review and research articles that were read twice to reduce the bias, then were summarized and narrated descriptively. Results revealed that cybersecurity awareness could be increased by digital literacy training. Children should be taught how to avoid risky behavior online. The cybersecurity awareness program is suitable for children to avoid phishing, pornography, cyberbullying, identity theft, and breaking of privacy. Children must be taught how to keep their passwords safe and private. They also need to be more cautious when playing online games. In conclusion, digital literacy and cybersecurity programs can be taught to children. These programs are suitable for raising cybersecurity among children.
APA, Harvard, Vancouver, ISO, and other styles
More sources

Dissertations / Theses on the topic "Cybersecurity and privacy"

1

Akbari, Koochaksaraee Amir. "End-User Security & Privacy Behaviour on Social Media: Exploring Posture, Proficiency & Practice." Thesis, Université d'Ottawa / University of Ottawa, 2019. http://hdl.handle.net/10393/39310.

Full text
Abstract:
Security and privacy practices of end-users on social media are an important area of research, as well as a top-of-mind concern for individuals as well as organizations. In recent years, we have seen a sharp increase in data breaches and cyber security threats that have targeted social media users. Hence, it is imperative that we try to better understand factors that affect an end-user’s adoption of effective security safeguards and privacy protection practices. In this research, we propose and validate a theoretical model that posits several determinants of end-user security and privacy practices on social media. We hypothesize relationships among various cognitive, affective and behavioral factors identified under the themes of posture, proficiency, and practices. These constructs and hypotheses are validated through empirical research comprising an online survey questionnaire, and structural equation modeling (SEM) analysis. The key findings of this study highlight the importance of cyber threat awareness and social media security and privacy self-efficacy, which have a direct impact on end-user security and privacy practices. Additionally, our research shows that use of general technology applications for security and privacy impacts the adoption of security and privacy practices on social media. In totality, our research findings indicate that proficiency is a better predictor or security and privacy practices as compared to the posture of an end-user. Factors such as privacy disposition, privacy concerns, and perceived risk of privacy violations do not have as significant or direct effect on security and privacy practices. Based on our research findings, we provide some key take-aways in the form of theoretical contributions, suggestions for future research, as well as recommendations for organizational security awareness training programs.
APA, Harvard, Vancouver, ISO, and other styles
2

Dell'Elce, Martina. "Industria 4.0 ed Internet of Things, nuove sfide per la cybersecurity." Bachelor's thesis, Alma Mater Studiorum - Università di Bologna, 2020.

Find full text
Abstract:
Al giorno d'oggi siamo sempre più circondati da dispositivi interconnessi tra loro, i quali sono costantemente esposti ad attacchi informatici. In questo elaborato, dopo aver introdotto l'Internet of Things e i suoi molteplici ambiti applicativi, verrà svolta un'attenta analisi dei rischi e delle sfide riguardanti la cybersecurity che le aziende 4.0 dovranno affrontare. Verranno proposte delle possibili soluzioni attraverso l'impiego di tecnologie sempre più sofisticate ed innovative.
APA, Harvard, Vancouver, ISO, and other styles
3

Das, Sauvik. "Social Cybersecurity: Reshaping Security Through An Empirical Understanding of Human Social Behavior." Research Showcase @ CMU, 2017. http://repository.cmu.edu/dissertations/982.

Full text
Abstract:
Despite substantial effort made by the usable security community at facilitating the use of recommended security systems and behaviors, much security advice is ignored and many security systems are underutilized. I argue that this disconnect can partially be explained by the fact that security behaviors have myriad unaccounted for social consequences. For example, by using two-factor authentication, one might be perceived as “paranoid”. By encrypting an e-mail correspondence, one might be perceived as having something to hide. Yet, to date, little theoretical work in usable security has applied theory from social psychology to understand how these social consequences affect people’s security behaviors. Likewise, little systems work in usable security has taken social factors into consideration. To bridge these gaps in literature and practice, I begin to build a theory of social cybersecurity and apply those theoretical insights to create systems that encourage better cybersecurity behaviors. First, through a series of interviews, surveys and a large-scale analysis of how security tools diffuse through the social networks of 1.5 million Facebook users, I empirically model how social influences affect the adoption of security behaviors and systems. In so doing, I provide some of the first direct evidence that security behaviors are strongly driven by social influence, and that the design of a security system strongly influences its potential for social spread. Specifically, security systems that are more observable, inclusive, and stewarded are positively affected by social influence, while those that are not are negatively affected by social influence. Based on these empirical results, I put forth two prescriptions: (i) creating socially grounded interface “nudges” that encourage better cybersecurity behaviors, and (ii) designing new, more socially intelligent end-user facing security systems. As an example of a social “nudge”, I designed a notification that informs Facebook users that their friends use optional security systems to protect their own accounts. In an experimental evaluation with 50,000 Facebook users, I found that this social notification was significantly more effective than a non-social control notification at attracting clicks to improve account security and in motivating the adoption of promoted, optional security tools. As an example of a socially intelligent cybersecurity system, I designed Thumprint: an inclusive authentication system that authenticates and identifies individual group members of a small, local group through a single, shared secret knock. Through my evaluations, I found that Thumprint is resilient to casual but motivated adversaries and that it can reliably differentiate multiple group members who share the same secret knock. Taken together, these systems point towards a future of socially intelligent cybersecurity that encourages better security behaviors. I conclude with a set of descriptive and prescriptive takeaways, as well as a set of open problems for future work. Concretely, this thesis provides the following contributions: (i) an initial theory of social cybersecurity, developed from both observational and experimental work, that explains how social influences affect security behaviors; (ii) a set of design recommendations for creating socially intelligent security systems that encourage better cybersecurity behaviors; (iii) the design, implementation and comprehensive evaluation of two such systems that leverage these design recommendations; and (iv) a reflection on how the insights uncovered in this work can be utilized alongside broader design considerations in HCI, security and design to create an infrastructure of useful, usable and socially intelligent cybersecurity systems.
APA, Harvard, Vancouver, ISO, and other styles
4

Bheemanathini, Sai Nikhil. "A Systematic Review of Blockchain Technology: Privacy Concerns, Security Challenges, and Solutions." University of Cincinnati / OhioLINK, 2019. http://rave.ohiolink.edu/etdc/view?acc_num=ucin1563273858006378.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Doyle, Marc. "Comprehending the Safety Paradox and Privacy Concerns with Medical Device Remote Patient Monitoring." Diss., NSUWorks, 2019. https://nsuworks.nova.edu/gscis_etd/1090.

Full text
Abstract:
Medical literature identifies a number of technology-driven improvements in disease management such as implantable medical devices (IMDs) that are a standard treatment for candidates with specific diseases. Among patients using implantable cardiac defibrillators (ICD), for example, problems and issues are being discovered faster compared to patients without monitoring, improving safety. What is not known is why patients report not feeling safer, creating a safety paradox, and why patients identify privacy concerns in ICD monitoring. There is a major gap in the literature regarding the factors that contribute to perceived safety and privacy in remote patient monitoring (RPM). To address this gap, the research goal of this study was to provide an interpretive account of the experience of RPM patients. This study investigated two research questions: 1) How did RPM recipients perceive safety concerns?, and 2) How did RPM recipients perceive privacy concerns? To address the research questions, in-depth, semi-structured interviews were conducted with six participants to explore individual perceptions in rich detail using interpretative phenomenological analysis (IPA). Four themes were identified and described based on the analysis of the interviews that include — comfort with perceived risk, control over information, education, and security — emerged from the iterative review and data analysis. Participants expressed comfort with perceived risk, however being scared and anxious were recurrent subordinate themes. The majority of participants expressed negative feelings as a result of an initial traumatic event related to their devices and lived in fear of being shocked in inopportune moments. Most of these concerns stem from lack of information and inadequate education. Uncertainties concerning treatment tends to be common, due to lack of feedback from ICD RPM status. Those who knew others with ICD RPM became worrisome after hearing about incidences of sudden cardiac death (SCD) when the device either failed or did not work adequately to save their friend’s life. Participants also expressed cybersecurity concerns that their ICD might be hacked, maladjusted, manipulated with magnets, or turned off. They believed ICD RPM security was in place but inadequate as well as reported feeling a lack of control over information. Participants expressed wanting the right to be left alone and in most cases wanted to limit others’ access to their information, which in turn, created conflict within families and loved ones. Geolocation was a contentious node in this study, with most of participants reporting they did not want to be tracked under any circumstances. This research was needed because few researchers have explored how people live and interact with these newer and more advanced devices. These findings have implications for practice relating to RPM safety and privacy such as identifying a gap between device companies, practitioners, and participants and provided directions for future research to discover better ways to live with ICD RPM and ICD shock.
APA, Harvard, Vancouver, ISO, and other styles
6

Santos, Susana Isabel da Silva. "“Estudo das perceções de cibersegurança e cibercrime e das implicações na formulação de Políticas Públicas - estudo exploratório do caso português." Master's thesis, Instituto Superior de Ciências Sociais e Políticas, 2018. http://hdl.handle.net/10400.5/16235.

Full text
Abstract:
Dissertação de Mestrado em Gestão e Políticas Públicas
Os serviços online tornaram-se uma parte importante das nossas vidas, nomeadamente porque permitem o acesso à informação em qualquer sítio, a qualquer momento. Por assim ser, este tipo de serviços é útil não apenas para os utilizadores, mas para qualquer empresa ou instituição pública, nomeadamente por ajudar a reduzir os seus custos operacionais – por via da redução da infraestrutura física, da menor necessidade de recursos humanos, apresentando-se ainda menos dispendiosa, mais célere e cômoda para qualquer utente, se pensarmos por exemplo nos serviços públicos. Posto isso, este projeto de dissertação procurou descrever as perceções de cibercrime e cibersegurança dos cidadãos portugueses. Os dados necessários à elaboração da investigação foram recolhidos entre os dias 6 de julho e 6 de setembro de 2015, totalizando um total de 431 respostas, de inquiridos nacionais. Os resultados obtidos demonstram a preocupação com a privacidade, nomeadamente com os dados pessoais. Das três dimensões encontradas, com impacto na dimensão depende – Perceção da Ação do Estado – salienta-se “Segurança de Dados e Familiarização” o que leva a crer que maiores níveis de conhecimento e consciencialização levam a melhores níveis de satisfação. A formação de dois clusters permitiu verificar que a característica mais evidente é o género do indivíduo, razão pela qual, posteriormente, foram analisas as variáveis com diferenças estatisticamente significantes. Desta análise, salientam-se as variáveis relativas ao entendimento sobre a matéria, e à satisfação com a Ação do Estado.
Online services have become an important part of our lives, in particular, because they allow access to information anywhere, anytime. Because of that, this type of service is useful not only for mere users but for any company or public institution, in particular by helping to reduce its operating costs – by reducing physical infrastructure, the need for human resources, for being even cheaper, faster and comfortable for any user, if we think, for example, of public services. Thus, this dissertation project aims to describe the perceptions of cybercrime and cybersecurity of Portuguese citizens. The data was collected between July 6 and September 6, 2015, with a total of 431 responses, from national respondents. The results obtained prove the concern for privacy, particularly with personal data. Of the three dimensions found, with impact on the dimension depends - State Action Perception - highlights "Data Security and Familiarization" which leads to believe that higher levels of knowledge and awareness lead to better levels of satisfaction. The formation of two clusters allowed us to verify that the most obvious characteristic is the gender of the individual, reason why, afterward, differences in the means of variables were analyzed. From this analysis, we highlight the variables related to the understanding of the subject and the satisfaction with the State Action.
N/A
APA, Harvard, Vancouver, ISO, and other styles
7

Conzo, Naomi. "Privacy e "Social dilemma": aspetti etico-informatici legati al trattamento online dei dati personali sui social media." Bachelor's thesis, Alma Mater Studiorum - Università di Bologna, 2021.

Find full text
Abstract:
Il fine di questo elaborato di tesi è analizzare per quali scopi e secondo quali metodologie le piattaforme online di Social Media trattano i nostri dati online. L'analisi sarà incentrata in primo luogo in luce delle regolamentazioni vigenti, quali tipi e come tutelano i dati in ambito privacy; seguirà un approfondimento delle informative sui dati (privacy policy) di alcuni importanti Social dal quale verranno estrapolati e riconosciuti concetti come la profilazione. Lo studio di che cosa è la profilazione avrà come scopo l'introduzioni di questioni molto importanti riguardo i sistemi utilizzati per profilare - sistemi che sono nel modo più assoluto automatizzati, composti da algoritmi sviluppati sulla base di "deep learning" e "machine learning" in modo da non richiedere l'intervento umano - le conseguenze sul piano etico-sociale e i problemi di sicurezza informatica che me derivano. Nella parte finale, in particolare, verrà fatto notare come l'atto dell'invio di contenuti personalizzati non sia stato seriamente considerato e come il GDPR tratta questa situazione.
APA, Harvard, Vancouver, ISO, and other styles
8

Raad, Eliana. "Towards better privacy preservation by detecting personal events in photos shared within online social networks." Thesis, Dijon, 2015. http://www.theses.fr/2015DIJOS079/document.

Full text
Abstract:
De nos jours, les réseaux sociaux ont considérablement changé la façon dont les personnes prennent des photos qu’importe le lieu, le moment, le contexte. Plus que 500 millions de photos sont partagées chaque jour sur les réseaux sociaux, auxquelles on peut ajouter les 200 millions de vidéos échangées en ligne chaque minute. Plus particulièrement, avec la démocratisation des smartphones, les utilisateurs de réseaux sociaux partagent instantanément les photos qu’ils prennent lors des divers événements de leur vie, leurs voyages, leurs aventures, etc. Partager ce type de données présente un danger pour la vie privée des utilisateurs et les expose ensuite à une surveillance grandissante. Ajouté à cela, aujourd’hui de nouvelles techniques permettent de combiner les données provenant de plusieurs sources entre elles de façon jamais possible auparavant. Cependant, la plupart des utilisateurs des réseaux sociaux ne se rendent même pas compte de la quantité incroyable de données très personnelles que les photos peuvent renfermer sur eux et sur leurs activités (par exemple, le cas du cyberharcèlement). Cela peut encore rendre plus difficile la possibilité de garder l’anonymat sur Internet dans de nombreuses situations où une certaine discrétion est essentielle (politique, lutte contre la fraude, critiques diverses, etc.).Ainsi, le but de ce travail est de fournir une mesure de protection de la vie privée, visant à identifier la quantité d’information qui permettrait de ré-identifier une personne en utilisant ses informations personnelles accessibles en ligne. Premièrement, nous fournissons un framework capable de mesurer le risque éventuel de ré-identification des personnes et d’assainir les documents multimédias destinés à être publiés et partagés. Deuxièmement, nous proposons une nouvelle approche pour enrichir le profil de l’utilisateur dont on souhaite préserver l’anonymat. Pour cela, nous exploitons les évènements personnels à partir des publications des utilisateurs et celles partagées par leurs contacts sur leur réseau social. Plus précisément, notre approche permet de détecter et lier les évènements élémentaires des personnes en utilisant les photos (et leurs métadonnées) partagées au sein de leur réseau social. Nous décrivons les expérimentations que nous avons menées sur des jeux de données réelles et synthétiques. Les résultats montrent l’efficacité de nos différentes contributions
Today, social networking has considerably changed why people are taking pictures all the time everywhere they go. More than 500 million photos are uploaded and shared every day, along with more than 200 hours of videos every minute. More particularly, with the ubiquity of smartphones, social network users are now taking photos of events in their lives, travels, experiences, etc. and instantly uploading them online. Such public data sharing puts at risk the users’ privacy and expose them to a surveillance that is growing at a very rapid rate. Furthermore, new techniques are used today to extract publicly shared data and combine it with other data in ways never before thought possible. However, social networks users do not realize the wealth of information gathered from image data and which could be used to track all their activities at every moment (e.g., the case of cyberstalking). Therefore, in many situations (such as politics, fraud fighting and cultural critics, etc.), it becomes extremely hard to maintain individuals’ anonymity when the authors of the published data need to remain anonymous.Thus, the aim of this work is to provide a privacy-preserving constraint (de-linkability) to bound the amount of information that can be used to re-identify individuals using online profile information. Firstly, we provide a framework able to quantify the re-identification threat and sanitize multimedia documents to be published and shared. Secondly, we propose a new approach to enrich the profile information of the individuals to protect. Therefore, we exploit personal events in the individuals’ own posts as well as those shared by their friends/contacts. Specifically, our approach is able to detect and link users’ elementary events using photos (and related metadata) shared within their online social networks. A prototype has been implemented and several experiments have been conducted in this work to validate our different contributions
APA, Harvard, Vancouver, ISO, and other styles
9

Kaijankoski, Eric A. "Cybersecurity information sharing between public–private sector agencies." Thesis, Monterey, California: Naval Postgraduate School, 2015. http://hdl.handle.net/10945/45204.

Full text
Abstract:
Approved for public release; distribution is unlimited
Government agencies, businesses, and individuals alike have become more dependent on technology, and the desire and need for interconnectedness has led to increasing network vulnerability affecting both government and private sectors. Recognizing both government and private sector agencies individually lack the capabilities to defend against cyber threats, President Obama has called for a more robust and resilient cybersecurity alliance that encourages information-sharing partnerships with private sector owners and operators in charge of protecting U.S. critical infrastructure. Despite the recent drive for cyber legislation and policies, government agencies and private companies have seemed reluctant to share information related to cyber-attacks and threats with one another. To discover the deeper underlying issues that inhibit public-private cooperation, and to evaluate the effectiveness of public-private partnerships (PPPs) to advance cyber information sharing, this thesis examines the banking and finance sector of U.S. critical infrastructure sector. In doing so, it identifies reasons why information-sharing problems exist between government agencies and private companies; investigates how PPPs satisfy national cybersecurity needs; and, in turn, reveals issues for policymakers to consider when shaping policies that encourage an open dialog between the public and private sector.
APA, Harvard, Vancouver, ISO, and other styles
10

Gadirova, Nurlana. "The Impacts of Cyberattacks on Private Firms' Cash Holdings." Thesis, Université d'Ottawa / University of Ottawa, 2021. http://hdl.handle.net/10393/41924.

Full text
Abstract:
This research investigates 202 data breach events occurring between 2015 and 2019 and the related financial effects on the USA's impacted private firms. From examining previous research, it is obvious that no known studies evaluate the financial impacts of cybercrimes on private firms. Prior studies mostly focus on public firms and stock market reactions even though there is the increasing number of cyberattacks on private firms too. This study seeks to fill the gap by providing the empirical evidence of the impacts on those firms' cash holding after experiencing a cybersecurity attack. Overall, the results of this research show if the private firms that have been cyberattacked face the connate aftermath and follow the similar precautions as public firms with data breaches or not. I find that the firms that experienced an attack two years ago increase their cash holdings significantly, while an attack that happened a year ago can only impact cash holdings while interacting with tangibility and ROA of a firm. These results are essential as the private firms draw up a budget and reform strategies for coping with cyber incidents.
APA, Harvard, Vancouver, ISO, and other styles
More sources

Books on the topic "Cybersecurity and privacy"

1

Maleh, Yassine, Mohammad Shojafar, Mamoun Alazab, and Imed Romdhani, eds. Blockchain for Cybersecurity and Privacy. First edition. | Boca Raton, FL : CRC Press, 2020. | Series: Internal audit and it audit: CRC Press, 2020. http://dx.doi.org/10.1201/9780429324932.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Choo, Kim-Kwang Raymond, Ali Dehghantanha, and Reza M. Parizi, eds. Blockchain Cybersecurity, Trust and Privacy. Cham: Springer International Publishing, 2020. http://dx.doi.org/10.1007/978-3-030-38181-3.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Moallem, Abbas, ed. HCI for Cybersecurity, Privacy and Trust. Cham: Springer International Publishing, 2021. http://dx.doi.org/10.1007/978-3-030-77392-2.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Lukings, Melissa, and Arash Habibi Lashkari. Understanding Cybersecurity Law and Digital Privacy. Cham: Springer International Publishing, 2022. http://dx.doi.org/10.1007/978-3-030-88704-9.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Moallem, Abbas, ed. HCI for Cybersecurity, Privacy and Trust. Cham: Springer International Publishing, 2022. http://dx.doi.org/10.1007/978-3-031-05563-8.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Sørensen, Lene, Knud Erik Skouby, and Samant Khajuria. Cybersecurity and Privacy - Bridging the Gap. New York: River Publishers, 2022. http://dx.doi.org/10.1201/9781003337812.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Moallem, Abbas, ed. HCI for Cybersecurity, Privacy and Trust. Cham: Springer International Publishing, 2019. http://dx.doi.org/10.1007/978-3-030-22351-9.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Moallem, Abbas, ed. HCI for Cybersecurity, Privacy and Trust. Cham: Springer International Publishing, 2020. http://dx.doi.org/10.1007/978-3-030-50309-3.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Cybersecurity litigation: Consumer data protection and privacy. Washington, D.C: Bloomberg BNA, 2015.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
10

Schünemann, Wolf J., and Max-Otto Baumann, eds. Privacy, Data Protection and Cybersecurity in Europe. Cham: Springer International Publishing, 2017. http://dx.doi.org/10.1007/978-3-319-53634-7.

Full text
APA, Harvard, Vancouver, ISO, and other styles
More sources

Book chapters on the topic "Cybersecurity and privacy"

1

Wilbanks, Linda R. "CyberSecurity Privacy Risks." In Advances in Human Factors in Robots, Unmanned Systems and Cybersecurity, 191–98. Cham: Springer International Publishing, 2021. http://dx.doi.org/10.1007/978-3-030-79997-7_24.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Manjikian, Mary. "The Problem of Privacy." In Cybersecurity Ethics, 69–99. 2nd ed. London: Routledge, 2022. http://dx.doi.org/10.4324/9781003248828-6.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Qaddoura, Raneem, and Nameer N. El-Emam. "Privacy Preservation Tools and Techniques in Artificial Intelligence." In Cybersecurity, 161–82. Boca Raton: CRC Press, 2021. http://dx.doi.org/10.1201/9781003145042-11.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Nurse, Jason R. C. "Cybersecurity Awareness." In Encyclopedia of Cryptography, Security and Privacy, 1–4. Berlin, Heidelberg: Springer Berlin Heidelberg, 2021. http://dx.doi.org/10.1007/978-3-642-27739-9_1596-1.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Hodson, Christopher. "Cybersecurity Skills." In Encyclopedia of Cryptography, Security and Privacy, 1–5. Berlin, Heidelberg: Springer Berlin Heidelberg, 2021. http://dx.doi.org/10.1007/978-3-642-27739-9_1577-1.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Phillips, Joshua, and Mark D. Ryan. "A Future for Privacy." In SpringerBriefs in Cybersecurity, 91–115. London: Springer London, 2014. http://dx.doi.org/10.1007/978-1-4471-6530-9_2.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Lukings, Melissa, and Arash Habibi Lashkari. "Cybersecurity and Cybercrimes." In Understanding Cybersecurity Law and Digital Privacy, 59–96. Cham: Springer International Publishing, 2021. http://dx.doi.org/10.1007/978-3-030-88704-9_3.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Wong, Rebecca. "Cybersecurity Directive 2013." In Data Security Breaches and Privacy in Europe, 39–42. London: Springer London, 2013. http://dx.doi.org/10.1007/978-1-4471-5586-7_9.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Jiang, Honglu, Yifeng Gao, S. M. Sarwar, Luis GarzaPerez, and Mahmudul Robin. "Differential Privacy in Privacy-Preserving Big Data and Learning: Challenge and Opportunity." In Silicon Valley Cybersecurity Conference, 33–44. Cham: Springer International Publishing, 2022. http://dx.doi.org/10.1007/978-3-030-96057-5_3.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Kilpala, Minna, Tommi Kärkkäinen, and Timo Hämäläinen. "Differential Privacy: An Umbrella Review." In Artificial Intelligence and Cybersecurity, 167–83. Cham: Springer International Publishing, 2022. http://dx.doi.org/10.1007/978-3-031-15030-2_8.

Full text
APA, Harvard, Vancouver, ISO, and other styles

Conference papers on the topic "Cybersecurity and privacy"

1

Wu, Yuxi, W. Keith Edwards, and Sauvik Das. "SoK: Social Cybersecurity." In 2022 IEEE Symposium on Security and Privacy (SP). IEEE, 2022. http://dx.doi.org/10.1109/sp46214.2022.9833757.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Scott, Charles, Devin Wynne, and Chutima Boonthum-Denecke. "Examining the Privacy of Login Credentials Using Web-Based Single Sign-on - Are We Giving Up Security and Privacy for Convenience?" In 2016 Cybersecurity Symposium (CYBERSEC). IEEE, 2016. http://dx.doi.org/10.1109/cybersec.2016.019.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Bonfanti, Matteo E. "Enhancing Cybersecurity by Safeguarding Information Privacy." In ARES 2018: International Conference on Availability, Reliability and Security. New York, NY, USA: ACM, 2018. http://dx.doi.org/10.1145/3230833.3233289.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Bhatia, Jaspreet, Travis D. Breaux, Liora Friedberg, Hanan Hibshi, and Daniel Smullen. "Privacy Risk in Cybersecurity Data Sharing." In CCS'16: 2016 ACM SIGSAC Conference on Computer and Communications Security. New York, NY, USA: ACM, 2016. http://dx.doi.org/10.1145/2994539.2994541.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Vakilinia, Iman, Deepak K. Tosh, and Shamik Sengupta. "Privacy-preserving cybersecurity information exchange mechanism." In 2017 International Symposium on Performance Evaluation of Computer and Telecommunication Systems (SPECTS). IEEE, 2017. http://dx.doi.org/10.23919/spects.2017.8046783.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

SPÂNU, Constantin. "A Survey of Privacy and Security Issues in Social Networks." In International Conference on Cybersecurity and Cybercrime. Romanian Association for Information Security Assurance, 2014. http://dx.doi.org/10.19107/cybercon.2014.08.

Full text
Abstract:
Social networking sites such as Facebook and Twitter have gained more popularity in recent years. Because of its large user base, and large amount of information, they become a potential channel for attackers to exploit. Many social networking sites try to prevent those exploitations, but many attackers are still able to overcome those security countermeasures by using different techniques. Social network users may not be aware of such threats. Therefore, this paper will present a survey on different privacy and security issues in online social networks. The issues include privacy issues, identity theft, social networks spam, social networks malware, and physical threats. Social network privacy issues, social network security issues, social network threats, identity Theft, social network spam, social network malware, Facebook worms, Twitter Worms.
APA, Harvard, Vancouver, ISO, and other styles
7

Tavakolan, Mona, and Ismaeel A. Faridi. "Applying Privacy-Aware Policies in IoT Devices Using Privacy Metrics." In 2020 International Conference on Communications, Computing, Cybersecurity, and Informatics (CCCI). IEEE, 2020. http://dx.doi.org/10.1109/ccci49893.2020.9256605.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Beckerle, Matthias, Argyro Chatzopoulou, and Simone Fischer-Hubner. "Towards Cybersecurity MOOC Certification." In 2021 IEEE European Symposium on Security and Privacy Workshops (EuroS&PW). IEEE, 2021. http://dx.doi.org/10.1109/eurospw54576.2021.00008.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Beuran, Razvan, Cuong Pham, Dat Tang, Ken-ichi Chinen, Yasuo Tan, and Yoichi Shinoda. "CyTrONE: An Integrated Cybersecurity Training Framework." In 3rd International Conference on Information Systems Security and Privacy. SCITEPRESS - Science and Technology Publications, 2017. http://dx.doi.org/10.5220/0006206401570166.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Hutschenreuter, Helmar, Salva Çakmakçı, Christian Maeder, and Thomas Kemmerich. "Ontology-based Cybersecurity and Resilience Framework." In 7th International Conference on Information Systems Security and Privacy. SCITEPRESS - Science and Technology Publications, 2021. http://dx.doi.org/10.5220/0010233604580466.

Full text
APA, Harvard, Vancouver, ISO, and other styles

Reports on the topic "Cybersecurity and privacy"

1

O'Reilly, Patrick, Kristina Rigopoulos, Larry Feldman, and Greg Witte. 2020 Cybersecurity and Privacy Annual Report. National Institute of Standards and Technology, September 2021. http://dx.doi.org/10.6028/nist.sp.800-214.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

O'Reilly, Patrick D. 2021 Cybersecurity and Privacy Annual Report. Gaithersburg, MD: National Institute of Standards and Technology, 2022. http://dx.doi.org/10.6028/nist.sp.800-220.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Mitchell, Matt, and Catalina Vallejo. Cybersecurity, Surveillance, and Privacy: An Interview with Matt Mitchell. Just Tech, Social Science Research Council, March 2022. http://dx.doi.org/10.35650/jt.3031.d.2022.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Boeckl, Katie, Michael Fagan, William Fisher, Naomi Lefkovitz, Katerina N. Megas, Ellen Nadeau, Danna Gabel O'Rourke, Ben Piccarreta, and Karen Scarfone. Considerations for managing Internet of Things (IoT) cybersecurity and privacy risks. Gaithersburg, MD: National Institute of Standards and Technology, June 2019. http://dx.doi.org/10.6028/nist.ir.8228.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Prowell, Stacy, David Manz, Candace Culhane, Sheikh Ghafoor, Martine Kalke, Kate Keahey, Celeste Matarazzo, Chris Oehmen, Sean Peisert, and Ali Pinar. Position Papers for the ASCR Workshop on Cybersecurity and Privacy for Scientific Computing Ecosystems. Office of Scientific and Technical Information (OSTI), November 2021. http://dx.doi.org/10.2172/1843573.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Pookulangara, Sanjukta. Does Gender Matter: An Exploratory Study of Influence of Cybersecurity, Privacy, and Trust on Purchase Intention. Ames: Iowa State University, Digital Repository, November 2015. http://dx.doi.org/10.31274/itaa_proceedings-180814-52.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Hakmeh, Joyce, Emily Taylor, Allison Peters, and Sophia Ignatidou. The COVID-19 pandemic and trends in technology. Royal Institute of International Affairs, February 2021. http://dx.doi.org/10.55317/9781784134365.

Full text
Abstract:
Focusing on the dynamics between governments and big tech, on cybercrime, and on disinformation and fake news, this paper examines some of the risks that have been highlighted and aggravated as societies have transitioned at speed to a more virtual way of living. The COVID-19 pandemic has been called the ‘great accelerator’ of digital transformation, with technology at the forefront of countries’ response to the crisis. The experience of the past year has underscored that tech governance must be based on human-centric values that protect the rights of individuals but also work towards a public good. In the case of the development of track-and-trace apps, for instance, a successful solution should simultaneously be both respectful of individual privacy and robust from a cybersecurity perspective, while also effectively serving essential epidemiological goals. Ensuring a sound approach to tech policy has been made all the more complex by the context of the pandemic, as decision-makers have found themselves having to respond swiftly and decisively in a public health emergency. While there is considerable uncertainty as to the long-term consequences of their responses, the paper’s authors emphasize that a whole-of-society approach is needed that will restore and build greater public trust in the ability of governments and public-serving bodies to protect them, respect their rights and ensure the information they receive is solid and reliable.
APA, Harvard, Vancouver, ISO, and other styles
8

Bukauskas, Linas, Agnė Brilingaitė, Kęstutis Ikamas, Aušrius Juozapavičius, and Daiva Lepaitė. Cybersecurity competence map of Lithuania. Vilnius University, Lithuania, August 2022. http://dx.doi.org/10.15388/cibersek.2022.

Full text
Abstract:
This work aims to prepare the first Lithuanian cyber competence map together with recommendations on how to attract specialists to the CS sector and how to advance their competencies. During the research phase, we explored the demand for CS specialists in Lithuania and the world, surveyed the opinions of CS professionals, management and specialists from private and public sector organizations, including national defence sector. Also, we determined the career path of the specialists, analysed job offers, distinguished work roles, and gathered findings and recommendations from scientific research papers and similar reports of other countries. The results of the work include a publicly available database of collected data, expert findings of the research and recommendations for stakeholders, and a submitted scientific article to promote the results.
APA, Harvard, Vancouver, ISO, and other styles
9

Goode, Kayla, Ali Crawford, and Christopher Back. U.S. High School Cybersecurity Competitions: Building Cyber Talent Through Extracurricular Activities. Center for Security and Emerging Technology, July 2022. http://dx.doi.org/10.51593/2021ca012.

Full text
Abstract:
In the current cyber-threat environment, a well-educated workforce is critical to U.S. national security. Today, however, nearly six hundred thousand cybersecurity positions remain unfilled across the public and private sectors. This report explores high school cybersecurity competitions as a potential avenue for increasing the domestic cyber talent pipeline. The authors examine the competitions, their reach, and their impact on students’ educational and professional development.
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!

To the bibliography