To see the other types of publications on this topic, follow the link: Cybersecurity frameworks.

Journal articles on the topic 'Cybersecurity frameworks'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the top 50 journal articles for your research on the topic 'Cybersecurity frameworks.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.

1

Milagros B. Barruga. "Cybersecurity Strategy for Higher Education Institutions: A Thematic Analysis on Standards and Frameworks." Journal of Information Systems Engineering and Management 10, no. 43s (2025): 1140–52. https://doi.org/10.52783/jisem.v10i43s.8533.

Full text
Abstract:
Higher education institutions (HEIs) are increasingly vulnerable to cybersecurity attacks. As HEIs shift their operations online, they inevitably employ open systems and decentralized processing, making them particularly susceptible to cyberattacks. The study aims to identify the cybersecurity frameworks that HEIs currently employ as well as the characteristics that these frameworks must have. Initially, a comprehensive literature review was conducted to determine current cybersecurity practices and frameworks used by HEIs. This is followed by expert interviews with IT and cybersecurity profes
APA, Harvard, Vancouver, ISO, and other styles
2

Eleonora Anggi Ardhaninggar and Kallamulah Ramli. "A Review of Cybersecurity Framework Implementation for Retail Industry-Challenges and Recommendation." ARRUS Journal of Engineering and Technology 4, no. 2 (2024): 211–19. https://doi.org/10.35877/jetech3434.

Full text
Abstract:
Efforts to improve services by opening online data access to customers have become straightforward targets for cybercrime. Unfortunately, the researchers' findings reveal that there is presently no cybersecurity framework that completely aligns with the fundamental principles of the retail industry. This paper then analyzes the deployment of cybersecurity frameworks across various industrial sectors to determine which framework—or combination of frameworks—best aligns with the fundamental values of the retail industry. We compare the essential points of each cybersecurity framework with the TW
APA, Harvard, Vancouver, ISO, and other styles
3

Taherdoost, Hamed. "Understanding Cybersecurity Frameworks and Information Security Standards—A Review and Comprehensive Overview." Electronics 11, no. 14 (2022): 2181. http://dx.doi.org/10.3390/electronics11142181.

Full text
Abstract:
Businesses are reliant on data to survive in the competitive market, and data is constantly in danger of loss or theft. Loss of valuable data leads to negative consequences for both individuals and organizations. Cybersecurity is the process of protecting sensitive data from damage or theft. To successfully achieve the objectives of implementing cybersecurity at different levels, a range of procedures and standards should be followed. Cybersecurity standards determine the requirements that an organization should follow to achieve cybersecurity objectives and facilitate against cybercrimes. Cyb
APA, Harvard, Vancouver, ISO, and other styles
4

Melaku, Henock Mulugeta. "A Dynamic and Adaptive Cybersecurity Governance Framework." Journal of Cybersecurity and Privacy 3, no. 3 (2023): 327–50. http://dx.doi.org/10.3390/jcp3030017.

Full text
Abstract:
Cybersecurity protects cyberspace from a wide range of cyber threats to reduce overall business risk, ensure business continuity, and maximize business opportunities and return on investments. Cybersecurity is well achieved by using appropriate sets of security governance frameworks. To this end, various Information Technology (IT) and cybersecurity governance frameworks have been reviewed along with their benefits and limitations. The major limitations of the reviewed frameworks are; they are complex and have complicated structures to implement, they are expensive and require high skill IT an
APA, Harvard, Vancouver, ISO, and other styles
5

Alghamdi, Ahmed. "Comparative Analysis of ISO27001 and NIST CSF." International Journal of Membrane Science and Technology 10, no. 4 (2023): 1423–29. http://dx.doi.org/10.15379/ijmst.v10i4.2258.

Full text
Abstract:
Recent developments in Information and Communication Technology (ICT) have had a significant impact on commercial organizations in achieving their goals and objectives. However, the introduction of ICT introduced new cyber risks and threats as well. To mitigate cyber threats, various cybersecurity frameworks and standards are available e.g., ISO/IEC27001 and NIST Cybersecurity Framework (CSF). These frameworks can be used to measure/ audit the maturity level of an organization’s cybersecurity status. In this study, we have compared the ISO 27001 and NIST CSF and map these frameworks with each
APA, Harvard, Vancouver, ISO, and other styles
6

Lee, In. "Internet of Things (IoT) Cybersecurity: Literature Review and IoT Cyber Risk Management." Future Internet 12, no. 9 (2020): 157. http://dx.doi.org/10.3390/fi12090157.

Full text
Abstract:
Along with the growing threat of cyberattacks, cybersecurity has become one of the most important areas of the Internet of Things (IoT). The purpose of IoT cybersecurity is to reduce cybersecurity risk for organizations and users through the protection of IoT assets and privacy. New cybersecurity technologies and tools provide potential for better IoT security management. However, there is a lack of effective IoT cyber risk management frameworks for managers. This paper reviews IoT cybersecurity technologies and cyber risk management frameworks. Then, this paper presents a four-layer IoT cyber
APA, Harvard, Vancouver, ISO, and other styles
7

Dedeke, Adenekan, and Katherine Masterson. "Contrasting cybersecurity implementation frameworks (CIF) from three countries." Information & Computer Security 27, no. 3 (2019): 373–92. http://dx.doi.org/10.1108/ics-10-2018-0122.

Full text
Abstract:
Purpose This paper aims to explore the evolution of a trend in which countries are developing or adopting cybersecurity implementation frameworks that are intended to be used nationally. This paper contrasts the cybersecurity frameworks that have been developed in three countries, namely, Australia, UK and USA. Design/methodology/approach The paper uses literature review and qualitative document analysis for the study. The paper developed and used an assessment matrix as its coding protocol. The contents of the three cybersecurity frameworks were then scored to capture the degree to which they
APA, Harvard, Vancouver, ISO, and other styles
8

Vestad, Arnstein, and Bian Yang. "From Security Frameworks to Sustainable Municipal Cybersecurity Capabilities." Journal of Cybersecurity and Privacy 5, no. 2 (2025): 19. https://doi.org/10.3390/jcp5020019.

Full text
Abstract:
While security frameworks like the NIST CSF and ISO 27001 provide organizations with standardized best practices for cybersecurity, these practices must be implemented in organizations by people with the necessary skills and knowledge and be supported by effective technological solutions. This article explores the challenges and opportunities of building sustainable cybersecurity capabilities in resource-constrained organizations, specifically Norwegian municipalities. The research introduces the concept of sustainable cybersecurity capabilities, emphasizing the importance of a socio-technical
APA, Harvard, Vancouver, ISO, and other styles
9

Malatji, Masike, Annlizé L. Marnewick, and Suné Von Solms. "Cybersecurity capabilities for critical infrastructure resilience." Information & Computer Security 30, no. 2 (2021): 255–79. http://dx.doi.org/10.1108/ics-06-2021-0091.

Full text
Abstract:
Purpose For many innovative organisations, Industry 4.0 paves the way for significant operational efficiencies, quality of goods and services and cost reductions. One of the ways to realise these benefits is to embark on digital transformation initiatives that may be summed up as the intelligent interconnectivity of people, processes, data and cyber-connected things. Sadly, this interconnectivity between the enterprise information technology (IT) and industrial control systems (ICS) environment introduces new attack surfaces for critical infrastructure (CI) operators. As a result of the ICS cy
APA, Harvard, Vancouver, ISO, and other styles
10

Malatji, Masike, Annlizé L. Marnewick, and Suné Von Solms. "Cybersecurity capabilities for critical infrastructure resilience." Information & Computer Security 30, no. 2 (2021): 255–79. http://dx.doi.org/10.1108/ics-06-2021-0091.

Full text
Abstract:
Purpose For many innovative organisations, Industry 4.0 paves the way for significant operational efficiencies, quality of goods and services and cost reductions. One of the ways to realise these benefits is to embark on digital transformation initiatives that may be summed up as the intelligent interconnectivity of people, processes, data and cyber-connected things. Sadly, this interconnectivity between the enterprise information technology (IT) and industrial control systems (ICS) environment introduces new attack surfaces for critical infrastructure (CI) operators. As a result of the ICS cy
APA, Harvard, Vancouver, ISO, and other styles
11

MPHATHENI, Mandlenkosi Richard. "Cybersecurity: An Appraisal of Policy Frameworks and Related Conventions." International Journal of Information Security and Cybercrime 12, no. 1 (2023): 45–60. http://dx.doi.org/10.19107/ijisc.2023.01.06.

Full text
Abstract:
Cybercrime is a global threat to cybersecurity that crosses national borders and has no geographical boundaries. The global community establishes, ratifies, and implements common global accepted treaties and conventions to guide and direct cybersecurity. Nonetheless, the setting of internationally accepted standards for cybersecurity has been a difficult task. Cyberspace is a complex, erratic, and rapidly developing hybrid that is both physical and virtual. To eliminate chaos in cyberspace, improve cybersecurity, and eliminate cybercrime, a global framework of laws and conventions is required.
APA, Harvard, Vancouver, ISO, and other styles
12

AlSagri, Hatoon S., Shahab Saquib Sohail, and Shiju Sebastian. "The role of deep reinforcement learning in developing adaptive cybersecurity defenses for smart grid systems." Journal of Information and Optimization Sciences 45, no. 8 (2024): 2299–307. https://doi.org/10.47974/jios-1807.

Full text
Abstract:
The integration of profound fortification learning procedures inside cybersecurity techniques has risen as a promising approach to invigorate the flexibility of savvy network frameworks against advancing dangers. Savvy lattice frameworks, with their complex organize of interconnected gadgets and basic foundation, show special challenges for conventional cybersecurity measures. In this setting, DRL offers energetic and versatile arrangement by leveraging its capacity to memorize from involvement and optimize decision-making in complex, energetic situations. This paper looks at the part of DRL i
APA, Harvard, Vancouver, ISO, and other styles
13

Hidayatulloh, Syarif, and Aedah Binti Abd Rahman. "Balancing Cybersecurity Policies and Institutional Ethics: A Legal and Cultural Perspective on Higher Education Frameworks." Revista de Gestão Social e Ambiental 19, no. 1 (2025): e010788. https://doi.org/10.24857/rgsa.v19n1-049.

Full text
Abstract:
Objective: The objective of this study is to investigate the intersection of cybersecurity policies with legal and cultural considerations within higher education institutions (HEIs), with the aim of addressing key challenges and proposing a balanced framework that ensures institutional control while respecting ethical and cultural diversity. Theoretical Framework: This research is grounded in theories of ethical governance, legal compliance, and cultural sensitivity. Established frameworks such as ISO 27001 and NIST Cybersecurity Framework provide a foundational basis but are examined critica
APA, Harvard, Vancouver, ISO, and other styles
14

Shelly, Elizabeth. "Cybersecurity Frameworks for Cloud Computing Environments." International Journal of Computing and Engineering 6, no. 1 (2024): 30–44. http://dx.doi.org/10.47941/ijce.2058.

Full text
Abstract:
Purpose: The general objective of this study was to explore cybersecurity frameworks for cloud computing environments. Methodology: The study adopted a desktop research methodology. Desk research refers to secondary data or that which can be collected without fieldwork. Desk research is basically involved in collecting data from existing resources hence it is often considered a low cost technique as compared to field research, as the main cost is involved in executive’s time, telephone charges and directories. Thus, the study relied on already published studies, reports and statistics. This se
APA, Harvard, Vancouver, ISO, and other styles
15

Pulatov, Temurbek. "Cybersecurity in Financial Technologies: Civil Law Measures for Prevention and Damage Compensation." Uzbek Journal of Law and Digital Policy 3, no. 3 (2025): 34–44. https://doi.org/10.59022/ujldp.338.

Full text
Abstract:
The digitization of financial services has created unprecedented cybersecurity challenges requiring comprehensive civil law frameworks for prevention and damage compensation. The article examines the evolution of cybersecurity regulations in financial technology, analyzing civil law remedies and preventive measures across jurisdictions, with particular focus on Uzbekistan's emerging regulatory framework. Through comparative legal analysis and examination of recent enforcement actions, this research identifies key gaps in current civil law approaches and proposes enhanced mechanisms for cyberse
APA, Harvard, Vancouver, ISO, and other styles
16

Bernardo, Luís, Silvestre Malta, and João Magalhães. "An Evaluation Framework for Cybersecurity Maturity Aligned with the NIST CSF." Electronics 14, no. 7 (2025): 1364. https://doi.org/10.3390/electronics14071364.

Full text
Abstract:
Cybersecurity is critical for mitigating the economic and reputational impacts of cyberattacks. To address these risks, frameworks like the NIST Cybersecurity Framework (NIST CSF) provide standardized guidelines for managing and reducing cybersecurity threats. This paper presents a maturity assessment approach aligned with the NIST CSF, incorporating a dual-survey methodology. The first survey engages cybersecurity experts to calibrate question importance, while the second targets organizations across management, IT staff, and other roles. The approach employs algorithms to deliver consistent
APA, Harvard, Vancouver, ISO, and other styles
17

Ankur Partap Kotwal. "Leveraging Big Data Analytics for Enhanced Cybersecurity: A Comprehensive Analysis of Threat Detection, Incident Response, and SIEM Systems." International Journal of Scientific Research in Computer Science, Engineering and Information Technology 10, no. 6 (2024): 2158–64. https://doi.org/10.32628/cseit2410612414.

Full text
Abstract:
This article comprehensively analyzes big data analytics applications in cybersecurity, focusing on threat detection, incident response, and Security Information and Event Management (SIEM) systems. The article explores how organizations leverage big data analytics to enhance their cybersecurity posture through advanced threat detection mechanisms, improved incident response capabilities, and sophisticated SIEM implementations. The article examines various aspects of modern cybersecurity systems, including anomaly detection, predictive analytics, real-time monitoring architectures, and root ca
APA, Harvard, Vancouver, ISO, and other styles
18

Kamal, Aldin Yousif Yaseen, and Abdulrauof Osman Israa. "Security Staffing Strategic Plan for Organizations Security Posture Enhancement." International Journal of Innovative Science and Research Technology (IJISRT) 10, no. 2 (2025): 909–16. https://doi.org/10.5281/zenodo.14942742.

Full text
Abstract:
In this paper several key elements will be addressed to enhance the organizations cybersecurity posture and align it with its business objectives, the introductory letter outlined the organizations recent assessment of cybersecurity policies and vulnerabilities, emphasizing the need for a proactive cybersecurity approach to protect critical information assets. The significance of strong cybersecurity measures in the face of evolving cyber threats was underscored, highlighting the potential catastrophic implications of data breaches. The call to action for all stakeholders to embrace and drive
APA, Harvard, Vancouver, ISO, and other styles
19

Folorunsho, O. S., A. Q. Ayinde, M. A. Olagoke, and O. E. Fatoye. "Evaluating Cybersecurity Theories, Models, Standards and Frameworks." Advances in Multidisciplinary and scientific Research Journal Publication 5, no. 4 (2019): 61–66. http://dx.doi.org/10.22624/aims/bhi/v5n4p7.

Full text
Abstract:
Businesses and organizations around the world are increasingly concerned about cyber security. Understanding the various theories, models, standards and frameworks that underpin current practices is necessary to develop effective cybersecurity strategies. The existing cyber security theories, models, standards and frameworks are assessed in this review paper with a view to comparing their strengths and weaknesses. This paper summarizes findings from a thorough review of relevant peer-reviewed articles and lists key research areas for the coming years. Indeed, the Schwartz theory seems to be pr
APA, Harvard, Vancouver, ISO, and other styles
20

Von Solms, Sune. "The Identification of Cybersecurity Work Roles for the Water Sector in South Africa." European Conference on Cyber Warfare and Security 22, no. 1 (2023): 510–16. http://dx.doi.org/10.34190/eccws.22.1.1109.

Full text
Abstract:
This paper presents the results of a content analysis conducted on the work roles of cybersecurity practitioners for the water sector of South Africa. The paper presents literature review findings on national and international frameworks and guidelines detailing cyber security considerations for the South African water sector as well as national and international guidelines and frameworks which detail the various work roles carried out by cybersecurity practitioners in an organisation. The study found that cyber security considerations and work roles such as physical security of assets, testin
APA, Harvard, Vancouver, ISO, and other styles
21

Abisoye, Ajayi, and Joshua Idowu Akerele. "A High-Impact Data-Driven Decision-Making Model for Integrating Cutting-Edge Cybersecurity Strategies into Public Policy, Governance, and Organizational Frameworks." International Journal of Multidisciplinary Research and Growth Evaluation 2, no. 1 (2021): 623–37. https://doi.org/10.54660/.ijmrge.2021.2.1.623-637.

Full text
Abstract:
The increasing prevalence of cyber threats in the digital age underscores the urgent need for innovative and data-driven approaches to cybersecurity. This study proposes a high-impact decision-making model designed to integrate cutting-edge cybersecurity strategies into public policy, governance, and organizational frameworks. The model emphasizes leveraging big data, artificial intelligence (AI), and advanced analytics to inform policy design, risk assessment, and strategic planning in diverse institutional contexts. Key components of the model include real-time data aggregation, predictive a
APA, Harvard, Vancouver, ISO, and other styles
22

Abisoye, Ajayi, and Joshua Idowu Akerele. "A High-Impact Data-Driven Decision-Making Model for Integrating Cutting-Edge Cybersecurity Strategies into Public Policy, Governance, and Organizational Frameworks." International Journal of Multidisciplinary Research and Growth Evaluation 2, no. 1 (2021): 702–16. https://doi.org/10.54660/.ijmrge.2021.2.1.702-716.

Full text
Abstract:
The increasing prevalence of cyber threats in the digital age underscores the urgent need for innovative and data-driven approaches to cybersecurity. This study proposes a high-impact decision-making model designed to integrate cutting-edge cybersecurity strategies into public policy, governance, and organizational frameworks. The model emphasizes leveraging big data, artificial intelligence (AI), and advanced analytics to inform policy design, risk assessment, and strategic planning in diverse institutional contexts. Key components of the model include real-time data aggregation, predictive a
APA, Harvard, Vancouver, ISO, and other styles
23

Lawrence Damilare Oyeniyi, Chinonye Esther Ugochukwu, and Noluthando Zamanjomane Mhlongo. "DEVELOPING CYBERSECURITY FRAMEWORKS FOR FINANCIAL INSTITUTIONS: A COMPREHENSIVE REVIEW AND BEST PRACTICES." Computer Science & IT Research Journal 5, no. 4 (2024): 903–25. http://dx.doi.org/10.51594/csitrj.v5i4.1049.

Full text
Abstract:
In the digital epoch, where the financial sector stands as the cornerstone of global economic stability, the escalating sophistication of cyber threats poses an unprecedented challenge. This scholarly pursuit aimed to dissect the intricate web of cybersecurity within the financial domain, elucidating the evolving threat landscape, scrutinizing the efficacy of existing cybersecurity frameworks, and delineating strategic pathways for fortification against digital adversaries. Anchored in a qualitative methodology, the study embarked on a systematic literature review, meticulously sifting through
APA, Harvard, Vancouver, ISO, and other styles
24

Chowdhury, Rakibul Hasan. "Cybersecurity Accounting Frameworks for Critical Infrastructure Protection: Integrating Advanced Accounting Systems and Cybersecurity Protocols to Safeguard National Financial Data." International Journal of Management and Organizational Research 1, no. 1 (2022): 127–39. https://doi.org/10.54660/ijmor.2022.1.1.127-139.

Full text
Abstract:
This study addresses the critical need to integrate robust cybersecurity practices within accounting frameworks, particularly focusing on safeguarding financial data within national critical infrastructure sectors. Given the escalating frequency and severity of cyber threats targeting vital sectors such as finance, energy, healthcare, and public infrastructure, traditional accounting information systems (AIS) have become insufficiently equipped to manage contemporary cybersecurity risks. Employing a qualitative research approach comprising a systematic literature review and expert interviews,
APA, Harvard, Vancouver, ISO, and other styles
25

Srbaz, Nidham Othman, Mahmood Jawad Aqeel, Hameed Raed, Tomaa Kawad Raad, and Khlaponin Dmytro. "The impact of cybersecurity law in the middle east." ENCUENTROS. Revista de Ciencias Humanas, Teoría Social y Pensamiento Crítico. 23, Universidad Nacional Experimental Rafael Maria Baralt. (2024): 392–420. https://doi.org/10.5281/zenodo.14291287.

Full text
Abstract:
Due to the growing digitalization in the Middle East, there has been a significant increase in cyberattacks in the region. The escalating magnitude of cyber assaults underscores the urgent need for robust cybersecurity measures and regulatory frameworks to safeguard digital assets and infrastructures. The articles aim to assess the repercussions of cybersecurity legislation in the Middle East, with a focus on the challenges and accomplishments of the region in establishing effective cybersecurity defenses. A comprehensive analysis of scholarly articles, media reports, and government records wa
APA, Harvard, Vancouver, ISO, and other styles
26

Jaiswal, Bhargav Dilipkumar. "Designing Scalable Software Automation Frameworks for Cybersecurity Threat Detection and Response." International Journal of Scientific Research and Management (IJSRM) 13, no. 02 (2025): 1958–80. https://doi.org/10.18535/ijsrm/v13i02.ec03.

Full text
Abstract:
Cybersecurity threats are rapidly evolving, posing significant challenges to organizations seeking to protect critical digital assets. Traditional security approaches, such as rule-based detection and manual incident response, have proven inadequate in addressing the complexity and scale of modern cyber threats, particularly those involving zero-day vulnerabilities, ransomware, and advanced persistent threats (APTs). In response, scalable software automation frameworks have emerged as a critical solution for real-time threat detection and response. This paper presents a comprehensive study on
APA, Harvard, Vancouver, ISO, and other styles
27

Temitayo Oluwaseun Abrahams, Sarah Kuzankah Ewuga, Simon Kaggwa `, Prisca Ugomma Uwaoma `, Azeez Olanipekun Hassan, and Samuel Onimisi Dawodu. "MASTERING COMPLIANCE: A COMPREHENSIVE REVIEW OF REGULATORY FRAMEWORKS IN ACCOUNTING AND CYBERSECURITY." Computer Science & IT Research Journal 5, no. 1 (2024): 120–40. http://dx.doi.org/10.51594/csitrj.v5i1.709.

Full text
Abstract:
In the rapidly evolving landscape of business and technology, the intersection of accounting and cybersecurity has become a focal point for organizations striving to maintain integrity, security, and regulatory adherence. This paper presents a meticulous examination of regulatory frameworks governing both accounting and cybersecurity domains. The study aims to provide a comprehensive understanding of the intricate compliance landscape, offering valuable insights for practitioners, policymakers, and scholars. The investigation unfolds through a dual lens, meticulously dissecting the regulatory
APA, Harvard, Vancouver, ISO, and other styles
28

Anyanna, Iremise Fidel, Griffiths Onus, Uchenna Mikel-Olisa, and Noah Ayanbode. "Theoretical Frameworks for Addressing Cybersecurity Challenges in Financial Institutions: Lessons from Africa-US Collaborations." International Journal of Social Science Exceptional Research 3, no. 1 (2024): 51–55. https://doi.org/10.54660/ijsser.2024.3.1.51-55.

Full text
Abstract:
This review paper explores the theoretical frameworks and strategies developed through Africa-US collaborations to address cybersecurity challenges in financial institutions. It examines foundational theories in risk management, information security governance, and compliance models and their evolution to meet the dynamic cybersecurity landscape. The paper highlights the successes and challenges these international collaborations face, emphasizing the emerging strategic advancements and best practices. It discusses the common and unique cybersecurity challenges across regions, showcasing the c
APA, Harvard, Vancouver, ISO, and other styles
29

Turk, Žiga, Muammer Semih Sonkor, and Robert Klinc. "CYBERSECURITY ASSESSMENT OF BIM/CDE DESIGN ENVIRONMENT USING CYBER ASSESSMENT FRAMEWORK." JOURNAL OF CIVIL ENGINEERING AND MANAGEMENT 28, no. 5 (2022): 349–64. http://dx.doi.org/10.3846/jcem.2022.16682.

Full text
Abstract:
Digitalisation of the construction industry is exposing it to cybersecurity risks. All phases of construction can be affected. Particularly vulnerable are information-intensive phases such as building design and building operation. Construction is among the last industries that are discovering its cybersecurity risks and can rely on frameworks developed for other contexts. In this paper, we evaluate the cybersecurity risks of the design phase of construction using the Cyber Assessment Framework from the National Cybersecurity Centre (NCSC) of the UK. The goal of this study is twofold. First, t
APA, Harvard, Vancouver, ISO, and other styles
30

Babajide Tolulope Familoni and Philip Olaseni Shoetan. "CYBERSECURITY IN THE FINANCIAL SECTOR: A COMPARATIVE ANALYSIS OF THE USA AND NIGERIA." Computer Science & IT Research Journal 5, no. 4 (2024): 850–77. http://dx.doi.org/10.51594/csitrj.v5i4.1046.

Full text
Abstract:
This paper provides a comprehensive review and comparative analysis of cybersecurity challenges and strategies within the financial sectors of the United States of America (USA) and Nigeria. It aims to elucidate the complexities and variances in cybersecurity practices, focusing on the different approaches taken by these nations to safeguard their financial data against increasing cyber threats. Through a detailed examination of existing literature, including academic journals, industry reports, and cybersecurity incident databases, this study identifies the unique and common cybersecurity vul
APA, Harvard, Vancouver, ISO, and other styles
31

Chinmay Mukeshbhai Gangani. "Cybersecurity Frameworks for Cloud-Hosted Financial Applications." Kuwait Journal of Software Design and Development 1, no. 1 (2024): 11–23. https://doi.org/10.52783/kjsdd.272.

Full text
Abstract:
The use of cloud hosting is growing in popularity among managers. The hazards and threats are increased when the data is stored in the cloud. To optimise security and effectively manage risks, a robust security model is necessary. Cyber threats are efforts to get private information without authorisation, alter, or remove it, demand money from victims, or interfere with corporate operations. Identity theft, virus threats, online and email fraud, and bank fraud are all considered forms of cybercrime. This technique is used by both people and businesses to protect their digital systems, includin
APA, Harvard, Vancouver, ISO, and other styles
32

Mooghala, Sridhar. "An In - Depth Analysis of Cybersecurity Frameworks for Payment Applications." International Journal of Science and Research (IJSR) 10, no. 8 (2021): 1250–54. http://dx.doi.org/10.21275/sr24304153706.

Full text
APA, Harvard, Vancouver, ISO, and other styles
33

Abhilash Maroju, Srinivas A Vaddadi, Sravanthi Dontu, Rohith Vallabhaneni,. "An Empirical Paradigm on Cybersecurity Vulnerability Mitigation Framework." International Journal on Recent and Innovation Trends in Computing and Communication 11, no. 9s (2023): 786–92. http://dx.doi.org/10.17762/ijritcc.v11i9s.9484.

Full text
Abstract:
Current cybersecurity vulnerability assessment tools were developed in accordance with guidelines established by entities like the National Institute of Standards and Technology (NIST) and the United States Department of Energy. When assessing their facility's cybersecurity maturity, owners and operators of critical infrastructure frequently use frameworks like the NIST Cybersecurity Framework (CSF) and the cybersecurity capability maturity model (C2M2). These frameworks are great at finding vulnerabilities and doing qualitative cybersecurity analysis, but they don't help you get to the level
APA, Harvard, Vancouver, ISO, and other styles
34

Fatai Adeshina Adelani, Enyinaya Stefano Okafor, Boma Sonimiteim Jacks, and Olakunle Abayomi Ajala. "THEORETICAL FRAMEWORKS FOR THE ROLE OF AI AND MACHINE LEARNING IN WATER CYBERSECURITY: INSIGHTS FROM AFRICAN AND U.S. APPLICATIONS." Computer Science & IT Research Journal 5, no. 3 (2024): 681–92. http://dx.doi.org/10.51594/csitrj.v5i3.928.

Full text
Abstract:
This review paper explores the theoretical frameworks underpinning the application of Artificial Intelligence (AI) and Machine Learning (ML) in enhancing cybersecurity within the water sector, with a focus on both African and U.S. contexts. It delves into the unique cybersecurity challenges faced by the water sector, emphasizing the critical role of AI and ML in identifying, predicting, and mitigating cyber threats. The paper discusses the ethical considerations and regulatory frameworks influencing the deployment of these technologies alongside the technical, socioeconomic, and data privacy c
APA, Harvard, Vancouver, ISO, and other styles
35

Himanshu. "Cybersecurity Law: Challenges and Legal Frameworks for Protecting Digital Assets and Privacy Rights." Indian Journal of Law 2, no. 2 (2024): 18–22. http://dx.doi.org/10.36676/ijl.v2.i2.05.

Full text
Abstract:
Provides an overview of the complex landscape of cybersecurity law, highlighting the challenges and legal frameworks aimed at safeguarding digital assets and privacy rights in an increasingly interconnected and digital world. the evolving nature of cybersecurity threats, the legal principles underpinning cybersecurity regulation, and the tensions between security imperatives and individual rights. Cybersecurity law encompasses a broad range of legal principles, regulations, and policies designed to protect digital assets, information systems, and privacy rights from cyber threats and attacks.
APA, Harvard, Vancouver, ISO, and other styles
36

Rahul Khanna. "Cybersecurity Law: Challenges and Legal Frameworks for Protecting Digital Assets and Privacy Rights." Indian Journal of Law 2, no. 3 (2024): 15–20. http://dx.doi.org/10.36676/ijl.v2.i3.28.

Full text
Abstract:
Provides an overview of the complex landscape of cybersecurity law, highlighting the challenges and legal frameworks aimed at safeguarding digital assets and privacy rights in an increasingly interconnected and digital world. the evolving nature of cybersecurity threats, the legal principles underpinning cybersecurity regulation, and the tensions between security imperatives and individual rights. Cybersecurity law encompasses a broad range of legal principles, regulations, and policies designed to protect digital assets, information systems, and privacy rights from cyber threats and attacks.
APA, Harvard, Vancouver, ISO, and other styles
37

Sharma, Monu. "Cybersecurity Platforms: Tackling Challenges in a Digital Age." INTERANTIONAL JOURNAL OF SCIENTIFIC RESEARCH IN ENGINEERING AND MANAGEMENT 08, no. 11 (2024): 1–9. http://dx.doi.org/10.55041/ijsrem12257.

Full text
Abstract:
We will examine the dynamic cybersecurity landscape and offer practical strategies to assist businesses in managing the challenges of cybersecurity during this era of digital transformation. New technologies offer significant advantages for businesses and consumers, yet they also introduce new risks and challenges for cybersecurity. We examine how organizations can assess the impact of emerging technologies on their cybersecurity posture and strategy. By exploring key aspects such as risk evaluation, integration challenges, and potential vulnerabilities, we provide a framework for understandin
APA, Harvard, Vancouver, ISO, and other styles
38

Nejood Abedyasir ibadi. "Innovative Strategies for Enhancing Cybersecurity in Information Systems: A Holistic Approach in Computer Engineering." Journal of Information Systems Engineering and Management 10, no. 35s (2025): 826–39. https://doi.org/10.52783/jisem.v10i35s.6151.

Full text
Abstract:
The compounded nature of cyber threats, such as ransomware, phishing, and supply chain attacks, has revealed the inadequacy of conventional security controls. AI and machine learning-based solutions offer promising improvements in near-instant threat detection and neutralization, responding to the increasing demand for adaptive cybersecurity measures.This research assesses AI-based cybersecurity models, derives security insights from historical cyber-attacks, measures the effectiveness of regulatory compliance frameworks, and formulates a multi-layered AI-based security strategy. The research
APA, Harvard, Vancouver, ISO, and other styles
39

Adebimpe, Bolatito Ige, Kupa Eseoghene, and Ilori Oluwatosin. "Developing comprehensive cybersecurity frameworks for protecting green infrastructure: Conceptual models and practical applications." GSC Biological and Pharmaceutical Sciences 20, no. 1 (2024): 025–41. https://doi.org/10.5281/zenodo.13638293.

Full text
Abstract:
This study investigates the critical intersection of cybersecurity and green infrastructure (GI), aiming to elucidate the challenges, opportunities, and strategic approaches necessary for safeguarding these essential systems against cyber threats. Employing a systematic literature review and content analysis, the research scrutinizes peer-reviewed articles, industry reports, and regulatory publications from 2014 to 2024. The methodology focuses on identifying prevalent cybersecurity vulnerabilities within GI, the evolution of protective practices, the impact of regulatory frameworks, and the s
APA, Harvard, Vancouver, ISO, and other styles
40

Poonsawat, Thipphawan. "CYBER SECURITY IN THAILAND: A MISSION TOWARDS SAFETY IN THE DIGITAL AGE." Proceeding of International Conference on Social Science and Humanity 2, no. 2 (2025): 81–94. https://doi.org/10.61796/icossh.v2i2.21.

Full text
Abstract:
Objective: This article aims to examine the development and implementation of cybersecurity measures in Thailand, focusing on the creation of cybersecurity frameworks, national policies, and strategic guidelines. Method: The study employs a qualitative descriptive approach using secondary data from government documents, legal frameworks, and cybersecurity policy analyses. Results: The findings reveal that Thailand has taken significant steps toward enhancing cybersecurity through legislative measures on personal data protection, public awareness campaigns on cyber threats, and the establishmen
APA, Harvard, Vancouver, ISO, and other styles
41

Rahul Kumar Jha, Amit Patel, and Birendra Kumar Shah. "Synergies and Challenges: Integrating Machine Learning, Blockchain Technology, and Regulatory Frameworks in Biomedical Cybersecurity." Journal of ISMAC 5, no. 3 (2023): 237–56. http://dx.doi.org/10.36548/jismac.2023.3.004.

Full text
Abstract:
This study explores the integration of machine learning, blockchain technology, and regulatory frameworks in biomedical cybersecurity. It highlights the potential of machine learning in enhancing biomedical device and healthcare information system security, while blockchain technology is crucial for ensuring security, integrity, and privacy in healthcare data management. The study also examines the global regulatory framework for biological cybersecurity, identifying challenges, gaps, and best practices. The analysis includes case studies, effective integration strategies, and future research
APA, Harvard, Vancouver, ISO, and other styles
42

Esther Chinwe Eze, Shakirat O. Raji, Grace A. Durotolu, and Fen Danjuma John. "The role of AI in national cybersecurity policy and resilience planning: A comprehensive analysis of the United States' strategic approach." World Journal of Advanced Research and Reviews 27, no. 1 (2025): 1381–93. https://doi.org/10.30574/wjarr.2025.27.1.2656.

Full text
Abstract:
The integration of artificial intelligence (AI) into national cybersecurity frameworks represents a paradigmatic shift in how democratic nations approach digital defense and resilience planning. This article examines the multifaceted role of AI in shaping United States cybersecurity policy, analyzing current implementations, strategic frameworks, and emerging challenges. Through comprehensive analysis of policy documents, threat assessments, and technological capabilities, this study demonstrates that AI serves both as a critical enabler of cybersecurity resilience and a potential vector for s
APA, Harvard, Vancouver, ISO, and other styles
43

Zucca, Maria Vittoria, and Gaia Fiorinelli. "Regulating AI to Combat Tech-Crimes: Fighting the Misuse of Generative AI for Cyber Attacks and Digital Offenses." Technology and Regulation 2025 (July 2, 2025): 247–62. https://doi.org/10.71265/23nqtq40.

Full text
Abstract:
Looking back at the progress made in cybersecurity regulation in the EU, significant accomplishments have been achieved. Looking to the future, this paper argues that further milestones in cybersecurity regulation could be attained through comprehensive integration with diverse legal frameworks related to ICT technologies, and in particular by combating the proliferation and misuse of tools that have the potential to facilitate cyberattacks and cybercrime. Within this framework, the present research is primarily focused on Generative AI and the need to prevent its malicious use for cyber-attac
APA, Harvard, Vancouver, ISO, and other styles
44

Emmanni, Phani Sekhar. "Federated Learning for Cybersecurity in Edge and Cloud Computing." International Journal of Computing and Engineering 5, no. 4 (2024): 27–38. http://dx.doi.org/10.47941/ijce.1829.

Full text
Abstract:
Purpose: The article explores the integration of federated learning within edge and cloud computing frameworks to address complex cybersecurity challenges. It aims to illustrate how federated learning, by enabling collaborative model training across decentralized devices without data exchange, can serve as an effective mechanism for enhancing cybersecurity defenses. This study investigates the potential of federated learning to improve privacy-preserving data analysis and augment real-time threat detection capabilities in the context of the growing Internet of Things (IoT) ecosystem. Methodolo
APA, Harvard, Vancouver, ISO, and other styles
45

Wallis, Tania, and Paul Dorey. "Implementing Partnerships in Energy Supply Chain Cybersecurity Resilience." Energies 16, no. 4 (2023): 1868. http://dx.doi.org/10.3390/en16041868.

Full text
Abstract:
This study describes the implementation of an energy sector community to examine the practice of cybersecurity for operational technology environments and their supply chains. Evaluating cybersecurity from the perspectives of different actors participating in the energy sector, the progress and challenges of operators and suppliers in delivering cybersecurity for the sector are explored. While regulatory frameworks incentivize individual organizations to improve their cybersecurity, operational services contain contributions from many organizations, and this supply chain of activity needs to b
APA, Harvard, Vancouver, ISO, and other styles
46

Yunisa, Bintu, Safina Abdullahi Jantullu, and Offia Ogochukwu Judith. "OPERATION OF CYBER SECURITY IN TERTIARY INSTITUTION IN NIGERIA: PROBLEMS AND WAY FORWARD." Academic Journal Research 3, no. 1 (2025): 70–77. https://doi.org/10.61796/acjoure.v3i1.312.

Full text
Abstract:
Objective: This study examines the challenges affecting the operation of cybersecurity systems in Nigerian tertiary institutions and proposes strategic solutions to enhance cybersecurity resilience in higher education. Method: This position paper is based on a comprehensive review of secondary data sourced from print and online publications, focusing on existing cybersecurity policies, infrastructure, and institutional frameworks. Results: The findings reveal critical challenges, including poor funding, inadequate cybersecurity infrastructure, weak cybercrime laws, lack of standardized nationa
APA, Harvard, Vancouver, ISO, and other styles
47

Gummadi, Jaya Chandra Srikanth. "Cybersecurity in International Trade Agreements: A New Paradigm for Economic Diplomacy." American Journal of Trade and Policy 11, no. 1 (2024): 39–48. https://doi.org/10.18034/ajtp.v11i1.738.

Full text
Abstract:
This research shows that cybersecurity in international trade agreements is essential to contemporary economic diplomacy. Cybersecurity is crucial for trade infrastructure, intellectual property, and digital supply chains as global commerce digitizes. This research evaluates how trade agreements might improve cybersecurity and digital commerce. The qualitative research uses secondary data to analyze trade agreements, including the USMCA and CPTPP, policy frameworks, and multilateral activities. Significant results show that cybersecurity is now a strategic concern in international commerce, wi
APA, Harvard, Vancouver, ISO, and other styles
48

Ibitamuno, Pamela Victor. "Legal Frameworks for Cybersecurity in Nigeria - Adapting The Fourth Industrial Revolution." Advances in Multidisciplinary and scientific Research Journal Publication 2, no. 1 (2023): 97–104. http://dx.doi.org/10.22624/aims/csean-smart2023p12.

Full text
Abstract:
In this article titled "The Legal Framework for Cybersecurity in Nigeria: Adapting the Fourth Industrial Revolution," the author explores the legal landscape governing cybersecurity in Nigeria in the context of the Fourth Industrial Revolution (Industry 4.0). The Fourth Industrial Revolution is characterized by the integration of digital technologies such as the Internet of Things, cyber-physical systems, and cloud computing, which has created a hyper-connected system. As this revolution progresses, cybersecurity becomes critical to ensuring the security of the digital space. The article empha
APA, Harvard, Vancouver, ISO, and other styles
49

Venkata, Baladari. "Adaptive Cybersecurity Strategies: Mitigating Cyber Threats and Protecting Data Privacy." Journal of Scientific and Engineering Research 7, no. 8 (2020): 279–88. https://doi.org/10.5281/zenodo.15044844.

Full text
Abstract:
The rapid growth of digital technologies has heightened cybersecurity and data protection issues, putting individuals and organizations at risk of surveillance, cyber-attacks, and data misuse. The collection of large amounts of data by governments and companies has sparked worries about ethics and the law and cyberattacks such as ransomware and significant data theft incidents demonstrate major security weaknesses. This paper examines the nexus of cybersecurity and privacy, specifically investigating state-sponsored espionage, algorithmic data profiling, and regulatory frameworks. The analysis
APA, Harvard, Vancouver, ISO, and other styles
50

Agboola, Oluwademilade Aderemi, Jeffrey Chidera Ogeawuchi, Oyinomomo-emi Emmanuel Akpe, and Abraham Ayodeji Abayomi. "A Conceptual Model for Integrating Cyber security and Intrusion Detection Architecture into Grid Modernization Initiatives." International Journal of Multidisciplinary Research and Growth Evaluation 3, no. 1 (2022): 1099–105. https://doi.org/10.54660/.ijmrge.2022.3.1.1099-1105.

Full text
Abstract:
The integration of cybersecurity measures, specifically Intrusion Detection Systems (IDS), into grid modernization initiatives is essential to protect critical energy infrastructures from evolving cyber threats. This paper presents a conceptual model for embedding cybersecurity frameworks into the modernization of power grids, focusing on the seamless integration of IDS within the grid architecture. With the increasing digitization of energy systems, traditional grids face heightened vulnerabilities, making robust cybersecurity strategies a priority. Through an in-depth review of existing cybe
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!