Journal articles on the topic 'Cybersecurity Measures'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the top 50 journal articles for your research on the topic 'Cybersecurity Measures.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.
Kissoon, Tara. "Optimum spending on cybersecurity measures." Transforming Government: People, Process and Policy 14, no. 3 (2020): 417–31. http://dx.doi.org/10.1108/tg-11-2019-0112.
Full textTalekar, P. R. "Cybersecurity Measures for Financial Data." International Journal of Advance and Applied Research 5, no. 10 (2024): 1–5. https://doi.org/10.5281/zenodo.11296420.
Full textNnenna, Ugwu Jovita, Ugwuanyi Ifeoma Perpetua, Asuma Mariita Nchaga, Tushabe Hadijah, Eric Mabonga, and Tom Ongesa Nyamboga. "Cybersecurity Measures in East African EGovernment Systems." IAA JOURNAL OF SOCIAL SCIENCES 10, no. 2 (2024): 12–24. http://dx.doi.org/10.59298/iaajss/2024/102.122400000.
Full textSharma, Ravinder, and Rajvir Saini. "Analysis for Network Security Measures for Protecting Organizational Data." Journal of Lifestyle and SDGs Review 4, no. 4 (2024): e03599. http://dx.doi.org/10.47172/2965-730x.sdgsreview.v4.n04.pe03599.
Full textRoss, Lester, and Kenneth Zhou. "China issues new cybersecurity review measures." Journal of Investment Compliance 22, no. 1 (2021): 47–52. http://dx.doi.org/10.1108/joic-10-2020-0039.
Full textM. Kolesnikova. "Key Cybersecurity Measures in African Countries." International Affairs 68, no. 005 (2022): 140–44. http://dx.doi.org/10.21557/iaf.80763118.
Full textMishra, Neha. "The Trade: (Cyber)Security Dilemma and Its Impact on Global Cybersecurity Governance." Journal of World Trade 54, Issue 4 (2020): 567–90. http://dx.doi.org/10.54648/trad2020025.
Full textOlamide Raimat Amosu, Praveen Kumar, Yewande Mariam Ogunsuji, Adesola Adelaja, Oladapo Faworaja, and Kikelomo Adetula. "Enhanced cybersecurity measures: Protect customer data in e-commerce and retail industry." World Journal of Advanced Research and Reviews 23, no. 2 (2024): 890–900. http://dx.doi.org/10.30574/wjarr.2024.23.2.2408.
Full textOlamide, Raimat Amosu, Kumar Praveen, Mariam Ogunsuji Yewande, Adelaja Adesola, Faworaja Oladapo, and Adetula Kikelomo. "Enhanced cybersecurity measures: Protect customer data in e-commerce and retail industry." World Journal of Advanced Research and Reviews 23, no. 2 (2024): 890–900. https://doi.org/10.5281/zenodo.14848480.
Full textAnwuli Nkemchor Obiki-Osafiele, Edith Ebele Agu, and Njideka Rita Chiekezie. "Protecting digital assets in Fintech: Essential cybersecurity measures and best practices." Computer Science & IT Research Journal 5, no. 8 (2024): 1884–96. http://dx.doi.org/10.51594/csitrj.v5i8.1449.
Full textKozubtsova, L. М. "RISK PROCESS APPROACH IN PLANNING CYBER SECURITY MEASURES OF CRITICAL INFRASTRUCTURE FACILITIES." Collection of scientific works of the Military Institute of Kyiv National Taras Shevchenko University, no. 71 (2021): 59–67. http://dx.doi.org/10.17721/2519-481x/2021/71-07.
Full textNwankwo Charles Uzondu and Dominic Dummene Lele. "Challenges and strategies in securing smart environmental applications: A comprehensive review of cybersecurity measures." Computer Science & IT Research Journal 5, no. 7 (2024): 1695–720. http://dx.doi.org/10.51594/csitrj.v5i7.1353.
Full textTwain, Mark W. "Assessing the Effectiveness of Cybersecurity Measures in the United States Telecommunications Industry: A Comprehensive Analysis." Journal of Marketing and Communication 6, no. 1 (2023): 1–10. http://dx.doi.org/10.53819/81018102t4159.
Full textZybin, Serhii, Oleg Bondarchuk, Oleksandr Piroh, Olha Suprun, and Svitlana Kyshakevych. "Cybersecurity on Ukrainian Higher Education: Threats and protection measures." Eduweb 19, no. 2 (2025): 38–52. https://doi.org/10.46502/issn.1856-7576/2025.19.02.3.
Full textTara Kissoon, Sherita. "Optimum Spending on Cybersecurity Measures: Part II." Journal of Information Security 12, no. 01 (2021): 137–61. http://dx.doi.org/10.4236/jis.2021.121007.
Full textBrindha, Dr G., and Mrs P. Sudha Juliet. "Cybersecurity Attacks and Counter Measures- A Review." International Journal of Engineering Research and Applications 14, no. 6 (2024): 09–15. http://dx.doi.org/10.9790/9622-14060915.
Full textMohammed, Mustafa Khan. "Studying The Effectiveness of Current Cybersecurity Measures." European Journal of Advances in Engineering and Technology 7, no. 9 (2020): 94–99. https://doi.org/10.5281/zenodo.13950900.
Full textMakinde, Emmanuel Tunde, Joy Ishioma Obanigwe, Christiana Onyemowo Otaiku, and Simon Bem Tyoyila. "Integration of artificial intelligence (AI) driven security measures in library systems." Journal of Library Services and Technologies 7, no. 2 (2025): 142–53. https://doi.org/10.47524/jlst.v7i2.154.
Full textHenry Nwapali Ndidi Naiho, Oluwabunmi Layode, Gbenga Sheriff Adeleke, Ezekiel Onyekachukwu Udeh, and Talabi Temitope Labake. "Addressing cybersecurity challenges in smart grid technologies: Implications for sustainable energy infrastructure." Engineering Science & Technology Journal 5, no. 6 (2024): 1995–2015. http://dx.doi.org/10.51594/estj.v5i6.1218.
Full textTemitayo Oluwaseun Abrahams, Sarah Kuzankah Ewuga, Samuel Onimisi Dawodu, Abimbola Oluwatoyin Adegbite, and Azeez Olanipekun Hassan. "A REVIEW OF CYBERSECURITY STRATEGIES IN MODERN ORGANIZATIONS: EXAMINING THE EVOLUTION AND EFFECTIVENESS OF CYBERSECURITY MEASURES FOR DATA PROTECTION." Computer Science & IT Research Journal 5, no. 1 (2024): 1–25. http://dx.doi.org/10.51594/csitrj.v5i1.699.
Full textAl Ali, Naser Abdel Raheem, Anna A. Chebotareva, and Vladimir E. Chebotarev. "Cyber security in marine transport." Pomorstvo 35, no. 2 (2021): 248–55. http://dx.doi.org/10.31217/p.35.2.7.
Full textJuanda, Jessy. "A Comprehensive Literature Review on the Impact of Cyberattacks on Accounting Practices and Security Measures." Fairness 1, no. 1 (2025): 64–80. https://doi.org/10.70764/gdpu-fr.2025.1(1)-05.
Full textAdebimpe Bolatito Ige, Eseoghene Kupa, and Oluwatosin Ilori. "Aligning sustainable development goals with cybersecurity strategies: Ensuring a secure and sustainable future." GSC Advanced Research and Reviews 19, no. 3 (2024): 344–60. http://dx.doi.org/10.30574/gscarr.2024.19.3.0236.
Full textAdebimpe, Bolatito Ige, Kupa Eseoghene, and Ilori Oluwatosin. "Aligning sustainable development goals with cybersecurity strategies: Ensuring a secure and sustainable future." GSC Advanced Research and Reviews 19, no. 3 (2024): 344–60. https://doi.org/10.5281/zenodo.13622705.
Full textAkhtar Ali, Nayyab Zulfiqar, Muhammad Usama, and Rana Muhammad Ikraam. "Impact of Cyber security Measures on Risk Mitigation, with the Mediating Role of Data Protection." Indus Journal of Social Sciences 3, no. 1 (2025): 356–72. https://doi.org/10.59075/ijss.v3i1.659.
Full textEdith Ebele Agu, Anwuli Nkemchor Obiki-Osafiele, and Njideka Rita Chiekezie. "Addressing advanced cybersecurity measures for protecting personal data in online financial transactions." World Journal of Engineering and Technology Research 3, no. 1 (2024): 029–37. http://dx.doi.org/10.53346/wjetr.2024.3.1.0052.
Full textWycliff Nagalila, Amos Nyombi, Mark Sekinobe, Jimmy Ampe, and Barbra Happy. "Fortifying national security: The integration of advanced financial control and cybersecurity measures." World Journal of Advanced Research and Reviews 23, no. 2 (2024): 1095–101. http://dx.doi.org/10.30574/wjarr.2024.23.2.2444.
Full textWycliff, Nagalila, Nyombi Mark Sekinobe Amos, Ampe Jimmy, and Happy Barbra. "Fortifying national security: The integration of advanced financial control and cybersecurity measures." World Journal of Advanced Research and Reviews 23, no. 2 (2024): 1095–101. https://doi.org/10.5281/zenodo.14850697.
Full textKhydyntsev, M. M. "Conceptual Provisions for Insuring Cybersecurity of the Energy Industry of Ukraine." Èlektronnoe modelirovanie 45, no. 1 (2023): 80–97. http://dx.doi.org/10.15407/emodel.45.01.080.
Full textAdebimpe Bolatito Ige, Eseoghene Kupa, and Oluwatosin Ilori. "Best practices in cybersecurity for green building management systems: Protecting sustainable infrastructure from cyber threats." International Journal of Science and Research Archive 12, no. 1 (2024): 2960–77. http://dx.doi.org/10.30574/ijsra.2024.12.1.1185.
Full textNikolov, Borislav. "Maritime Cybersecurity Education and Training at Nikola Vaptsarov Naval Academy." Pedagogika-Pedagogy 95, no. 6s (2023): 48–55. http://dx.doi.org/10.53656/ped2023-6s.05.
Full textJapinye, A. O. "Enhancing Anti-Money Laundering and Counter-Terrorist Financing Strategies through Integrated Cybersecurity and Compliance Measures." International Journal of Novel Research in Marketing Management and Economics 11, no. 1 (2024): 180–96. https://doi.org/10.5281/zenodo.10973122.
Full textPulatov, Temurbek. "Cybersecurity in Financial Technologies: Civil Law Measures for Prevention and Damage Compensation." Uzbek Journal of Law and Digital Policy 3, no. 3 (2025): 34–44. https://doi.org/10.59022/ujldp.338.
Full textJayanthi Pankajakshan and Dr. Ruchi Maheshwari Bangur. "Employee Awareness and Attitudes Towards Cybersecurity Technologies." Journal of Advances and Scholarly Researches in Allied Education 21, no. 5 (2024): 113–20. http://dx.doi.org/10.29070/1ym5q439.
Full textAkash, V. S., P. Johnson Akshay, P. S. Alakanandha, and Reji C. Joy Dr. "Cybersecurity in the Digital Age: Benefits and Protective Measures." Recent Trends in Cyber Criminology Research 1, no. 1 (2025): 22–31. https://doi.org/10.5281/zenodo.15188459.
Full textDarlington Eze Ekechukwu and Peter Simpa. "The future of Cybersecurity in renewable energy systems: A review, identifying challenges and proposing strategic solutions." Computer Science & IT Research Journal 5, no. 6 (2024): 1265–99. http://dx.doi.org/10.51594/csitrj.v5i6.1197.
Full textNambiar, Ryan, and Flavia Gonsalves. "A Systematic Review on Cybersecurity & Data Protection." Journal of Cyber Security, Privacy Issues and Challenges 1, no. 2 (2022): 8–18. http://dx.doi.org/10.46610/jcspic.2022.v01i02.002.
Full textKhot, Abhishek. "Artificial Intelligence in Cybersecurity." International Journal for Research in Applied Science and Engineering Technology 12, no. 6 (2024): 2025–29. http://dx.doi.org/10.22214/ijraset.2024.63434.
Full textDarlington Eze Ekechukwu and Peter Simpa. "The importance of cybersecurity in protecting renewable energy investment: A strategic analysis of threats and solutions." Engineering Science & Technology Journal 5, no. 6 (2024): 1845–83. http://dx.doi.org/10.51594/estj.v5i6.1186.
Full textDaniel Ajiga, Patrick Azuka Okeleke, Samuel Olaoluwa Folorunsho, and Chinedu Ezeigweneme. "Designing Cybersecurity Measures for Enterprise Software Applications to Protect Data Integrity." Computer Science & IT Research Journal 5, no. 8 (2024): 1920–41. http://dx.doi.org/10.51594/csitrj.v5i8.1451.
Full textBoorugupalli, Kiran Kumar, Adokshaja Krishnarao Kulkarni, Amala Suzana, Diwakaran M, Sivakumar Ponnusamy, and Senthil Kumar S. "Cybersecurity Measures in Financial Institutions Protecting Sensitive Data from Emerging Threats and Vulnerabilities." ITM Web of Conferences 76 (2025): 02002. https://doi.org/10.1051/itmconf/20257602002.
Full textMishra, Neha. "Privacy, Cybersecurity, and GATS Article XIV: A New Frontier for Trade and Internet Regulation?" World Trade Review 19, no. 3 (2019): 341–64. http://dx.doi.org/10.1017/s1474745619000120.
Full textAdebiaye, Richmond. "Mitigating Vulnerability Risks in Cybersecurity Using Predictive Measures." International Journal of Advanced Scientific Research & Development (IJASRD) 4, no. 10 (2017): 12. http://dx.doi.org/10.26836/ijasrd/2017/v4/i10/4106.
Full textPark, Joohui. "Governing Cybersecurity Measures in the Digital Trade Agreements." Korean Journal of International Economic Law 19, no. 2 (2021): 75–115. http://dx.doi.org/10.46271/kjiel.2021.07.19.2.75.
Full textKhanna, Anirudh, Pradeep Chintale, Laxminarayana Korada, Gopi Desaboyina, and Harsha Vardhan Nerella. "AI-Enhanced Cybersecurity Measures for Protecting Financial Assets." International Journal on Recent and Innovation Trends in Computing and Communication 11, no. 4 (2024): 427–32. https://doi.org/10.5281/zenodo.14057656.
Full textSharma, Pawan Kumar. "Securing software development: A comprehensive and comparative analysis of cybersecurity measures." SADGAMAYA 1, no. 1 (2024): 17–20. http://dx.doi.org/10.3126/sadgamaya.v1i1.66881.
Full textPoonsawat, Thipphawan. "CYBER SECURITY IN THAILAND: A MISSION TOWARDS SAFETY IN THE DIGITAL AGE." Proceeding of International Conference on Social Science and Humanity 2, no. 2 (2025): 81–94. https://doi.org/10.61796/icossh.v2i2.21.
Full textEzekiel Onyekachukwu Udeh, Prisca Amajuoyi, Kudirat Bukola Adeusi, and Anwulika Ogechukwu Scott. "The integration of artificial intelligence in cybersecurity measures for sustainable finance platforms: An analysis." Computer Science & IT Research Journal 5, no. 6 (2024): 1221–46. http://dx.doi.org/10.51594/csitrj.v5i6.1195.
Full textAnusha, Chitneni. "STUDY OF EMERGING TRENDS ON LATEST TECHNOLOGIES AND ITS CYBERSECURITY CHALLENGES." Journal For Innovative Development in Pharmaceutical and Technical Science (JIDPTS) 3, no. 5 (2020): 15–18. https://doi.org/10.5281/zenodo.4277475.
Full textDe Barros, Martina. "Cybersecurity in Mozambique: Status and Challenges." European Conference on Cyber Warfare and Security 22, no. 1 (2023): 553–58. http://dx.doi.org/10.34190/eccws.22.1.1194.
Full text