To see the other types of publications on this topic, follow the link: Cybersecurity Measures.

Journal articles on the topic 'Cybersecurity Measures'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the top 50 journal articles for your research on the topic 'Cybersecurity Measures.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.

1

Kissoon, Tara. "Optimum spending on cybersecurity measures." Transforming Government: People, Process and Policy 14, no. 3 (2020): 417–31. http://dx.doi.org/10.1108/tg-11-2019-0112.

Full text
Abstract:
Purpose This purpose of this paper is to provide insight through analysis of the data collected from a pilot study, into the decision-making process used by organizations in cybersecurity investments. Leveraging the review of literature, this paper aims to explore the strategic decisions made by organizations when implementing cybersecurity controls, and identifies economic models and theories from the economics of information security, and information security investment decision-making process. Using a survey study method, this paper explores the feasibility for development of a strategic de
APA, Harvard, Vancouver, ISO, and other styles
2

Talekar, P. R. "Cybersecurity Measures for Financial Data." International Journal of Advance and Applied Research 5, no. 10 (2024): 1–5. https://doi.org/10.5281/zenodo.11296420.

Full text
Abstract:
This article looks at a comprehensive approach to improving financial data cybersecurity. The safeguarding of sensitive information is critical in an era of rising digital transactions and interconnected financial systems. The report looks into fundamental measures for strengthening cyber defenses, including encryption, multi-factor authentication, and strong network architecture. It also emphasizes the importance of personnel training, frequent audits, and incident response plans in establishing a robust security system. Organizations may confidently traverse the complicated world of financia
APA, Harvard, Vancouver, ISO, and other styles
3

Nnenna, Ugwu Jovita, Ugwuanyi Ifeoma Perpetua, Asuma Mariita Nchaga, Tushabe Hadijah, Eric Mabonga, and Tom Ongesa Nyamboga. "Cybersecurity Measures in East African EGovernment Systems." IAA JOURNAL OF SOCIAL SCIENCES 10, no. 2 (2024): 12–24. http://dx.doi.org/10.59298/iaajss/2024/102.122400000.

Full text
Abstract:
This paper provides a comprehensive examination of cybersecurity measures within e-government systems in East Africa. It begins with an overview of the importance of cybersecurity in e-government, emphasizing the need to protect sensitive data and ensure the integrity of digital services. The paper then explores key aspects of cybersecurity, including risk assessment and management, data encryption, firewalls, intrusion detection/prevention systems, access control, and security awareness training. Each section highlights the significance of these measures in enhancing the security and resilien
APA, Harvard, Vancouver, ISO, and other styles
4

Sharma, Ravinder, and Rajvir Saini. "Analysis for Network Security Measures for Protecting Organizational Data." Journal of Lifestyle and SDGs Review 4, no. 4 (2024): e03599. http://dx.doi.org/10.47172/2965-730x.sdgsreview.v4.n04.pe03599.

Full text
Abstract:
Objectives: The number, severity, and sophistication of cybersecurity incidents are rising, suggesting that the next generation of cybersecurity threats cannot be fully mitigated by technical security controls alone. In order to strengthen cybersecurity in this day and age, end users must practise proper cyber hygiene. Methods: According to research, social culture affects reducing cybersecurity risk. The majority of research on the topic has been conducted in other nations, therefore it's possible that findings won't apply to India because of its distinct social and cultural norms. There is a
APA, Harvard, Vancouver, ISO, and other styles
5

Ross, Lester, and Kenneth Zhou. "China issues new cybersecurity review measures." Journal of Investment Compliance 22, no. 1 (2021): 47–52. http://dx.doi.org/10.1108/joic-10-2020-0039.

Full text
Abstract:
Purpose To describe and analyze the implications of the new Measures (the “Measures”) for Cybersecurity Review jointly promulgated on April 27, 2020 by twelve Chinese government departments led by the Cyberspace Administration of China (CAC). Design/methodology/approach Defines the scope of the Measures, explains the functions and obligations of critical information infrastructure operators (each, a CIIO), outlines the self-assessment and cybersecurity review process and discusses the implications of the Measures for foreign companies doing business in China. Findings The Measures impose an ob
APA, Harvard, Vancouver, ISO, and other styles
6

M. Kolesnikova. "Key Cybersecurity Measures in African Countries." International Affairs 68, no. 005 (2022): 140–44. http://dx.doi.org/10.21557/iaf.80763118.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Mishra, Neha. "The Trade: (Cyber)Security Dilemma and Its Impact on Global Cybersecurity Governance." Journal of World Trade 54, Issue 4 (2020): 567–90. http://dx.doi.org/10.54648/trad2020025.

Full text
Abstract:
Governments are adopting various measures to address cybersecurity-related concerns. Some of these measures restrict cross-border flows of digital services/data, and thus inconsistent with obligations in trade agreements such as General Agreement on Trade in Services (‘GATS’). However, certain governments might argue that such measures are justified under the GATS security exception (Art. XIVbis) as they protect national security. This article investigates whether GATS Art. XIVbis is relevant in justifying cybersecurity measures and its potential impact on cybersecurity governance. It argues t
APA, Harvard, Vancouver, ISO, and other styles
8

Olamide Raimat Amosu, Praveen Kumar, Yewande Mariam Ogunsuji, Adesola Adelaja, Oladapo Faworaja, and Kikelomo Adetula. "Enhanced cybersecurity measures: Protect customer data in e-commerce and retail industry." World Journal of Advanced Research and Reviews 23, no. 2 (2024): 890–900. http://dx.doi.org/10.30574/wjarr.2024.23.2.2408.

Full text
Abstract:
This study explores developing and implementing advanced cybersecurity protocols to protect customer data and ensure secure transactions within the retail industry. By setting a high standard for data protection, these measures contribute significantly to national cybersecurity efforts. The research analyzes current threats, evaluates existing cybersecurity frameworks, and proposes robust protocols to mitigate potential risks. The findings demonstrate that enhanced cybersecurity measures safeguard sensitive information, reinforce consumer trust, and comply with regulatory requirements. For ins
APA, Harvard, Vancouver, ISO, and other styles
9

Olamide, Raimat Amosu, Kumar Praveen, Mariam Ogunsuji Yewande, Adelaja Adesola, Faworaja Oladapo, and Adetula Kikelomo. "Enhanced cybersecurity measures: Protect customer data in e-commerce and retail industry." World Journal of Advanced Research and Reviews 23, no. 2 (2024): 890–900. https://doi.org/10.5281/zenodo.14848480.

Full text
Abstract:
This study explores developing and implementing advanced cybersecurity protocols to protect customer data and ensure secure transactions within the retail industry. By setting a high standard for data protection, these measures contribute significantly to national cybersecurity efforts. The research analyzes current threats, evaluates existing cybersecurity frameworks, and proposes robust protocols to mitigate potential risks. The findings demonstrate that enhanced cybersecurity measures safeguard sensitive information, reinforce consumer trust, and comply with regulatory requirements. For ins
APA, Harvard, Vancouver, ISO, and other styles
10

Anwuli Nkemchor Obiki-Osafiele, Edith Ebele Agu, and Njideka Rita Chiekezie. "Protecting digital assets in Fintech: Essential cybersecurity measures and best practices." Computer Science & IT Research Journal 5, no. 8 (2024): 1884–96. http://dx.doi.org/10.51594/csitrj.v5i8.1449.

Full text
Abstract:
Cybersecurity is paramount for protecting digital assets and maintaining consumer trust in the rapidly evolving fintech sector. This review paper explores essential cybersecurity measures and best practices, focusing on encryption, multi-factor authentication, security audits, secure software development, and network security. The paper also examines the threat landscape, highlighting common cyber threats such as phishing, malware, insider threats, and data breaches and their impact on fintech operations. Future trends in fintech cybersecurity, including the role of emerging technologies like
APA, Harvard, Vancouver, ISO, and other styles
11

Kozubtsova, L. М. "RISK PROCESS APPROACH IN PLANNING CYBER SECURITY MEASURES OF CRITICAL INFRASTRUCTURE FACILITIES." Collection of scientific works of the Military Institute of Kyiv National Taras Shevchenko University, no. 71 (2021): 59–67. http://dx.doi.org/10.17721/2519-481x/2021/71-07.

Full text
Abstract:
Cybersecurity as a state of security of critical objects of the national information infrastructure and its individual components, which ensures their sustainable functioning and development, timely detection, prevention, neutralization of cyber threats is an urgent task of modern society. Ensuring cybersecurity and its management in an organization is a continuous cyclical process. It is based on the creative approach recommended in NIST Special Publication 800-53 and in the introduction of the process approach, presented in the ISO 9001: 2000 standard. The purpose of the study is to justify
APA, Harvard, Vancouver, ISO, and other styles
12

Nwankwo Charles Uzondu and Dominic Dummene Lele. "Challenges and strategies in securing smart environmental applications: A comprehensive review of cybersecurity measures." Computer Science & IT Research Journal 5, no. 7 (2024): 1695–720. http://dx.doi.org/10.51594/csitrj.v5i7.1353.

Full text
Abstract:
This study provides a comprehensive analysis of the cybersecurity challenges and strategies within smart environmental applications, emphasizing the critical importance of robust cybersecurity measures to protect these increasingly interconnected systems. Employing a systematic literature review and content analysis, the research scrutinizes peer-reviewed articles, conference proceedings, and industry reports from 2006 onwards, focusing on cybersecurity vulnerabilities, strategic approaches to security, and case studies of both successful and failed cybersecurity implementations. The methodolo
APA, Harvard, Vancouver, ISO, and other styles
13

Twain, Mark W. "Assessing the Effectiveness of Cybersecurity Measures in the United States Telecommunications Industry: A Comprehensive Analysis." Journal of Marketing and Communication 6, no. 1 (2023): 1–10. http://dx.doi.org/10.53819/81018102t4159.

Full text
Abstract:
This research study assessed the effectiveness of cybersecurity measures in the United States telecommunications industry through a comprehensive analysis. Descriptive survey design was employed to establish a theoretical foundation and draw insights from existing scholarly articles, industry reports, and relevant cybersecurity frameworks. The analysis focused on historical cyber threat data and incidents within the telecommunications sector to identify prevalent threats and vulnerabilities. The literature review provided valuable insights into the challenges faced by the industry and the evol
APA, Harvard, Vancouver, ISO, and other styles
14

Zybin, Serhii, Oleg Bondarchuk, Oleksandr Piroh, Olha Suprun, and Svitlana Kyshakevych. "Cybersecurity on Ukrainian Higher Education: Threats and protection measures." Eduweb 19, no. 2 (2025): 38–52. https://doi.org/10.46502/issn.1856-7576/2025.19.02.3.

Full text
Abstract:
The purpose of the study is to analyse the impact of cybersecurity on higher education in Ukraine, identify key threats and formulate key recommendations for improving the security of educational institutions. For this purpose, a cross-sectional survey study has been chosen. A purposive sample has been used to include participants. 79 questionnaires have been received; five have been rejected, and three more have refused to consent to data processing. The study involved 71 people, including 15 administrative staff (IT departments, managers), 30 teachers, and 26 students. The primary tool in th
APA, Harvard, Vancouver, ISO, and other styles
15

Tara Kissoon, Sherita. "Optimum Spending on Cybersecurity Measures: Part II." Journal of Information Security 12, no. 01 (2021): 137–61. http://dx.doi.org/10.4236/jis.2021.121007.

Full text
APA, Harvard, Vancouver, ISO, and other styles
16

Brindha, Dr G., and Mrs P. Sudha Juliet. "Cybersecurity Attacks and Counter Measures- A Review." International Journal of Engineering Research and Applications 14, no. 6 (2024): 09–15. http://dx.doi.org/10.9790/9622-14060915.

Full text
Abstract:
Every system is vulnerable to attacks, as the current plague of data breaches demonstrates. Establishing and enforcing procedures to monitor their cyber environment, spot vulnerabilities, and promptly patch security gaps is critical for any business that handles, saves, transmits, or maintains data in any other way. Understanding the difference between cyber threats and vulnerabilities is essential before pinpointing specific risks to contemporary data systems. Common security threat categories include, for instance, phishing assaults that cause the installing malware that corrupts your data,
APA, Harvard, Vancouver, ISO, and other styles
17

Mohammed, Mustafa Khan. "Studying The Effectiveness of Current Cybersecurity Measures." European Journal of Advances in Engineering and Technology 7, no. 9 (2020): 94–99. https://doi.org/10.5281/zenodo.13950900.

Full text
Abstract:
The defense-in-depth approach is a fundamental approach that organizations have widely adopted due to the nature of sophisticated cyber threats used by cybercriminals to compromise data or damage IT systems. The current cyber threat landscape is an overgrowing field that requires multiple techniques and tactics to counteract them. The rise of cyberattacks has forced organizations to comply with one universal non-negotiable thing, which is cyber security, to ensure confidentiality, integrity, and availability of data and IT systems. Organizations employ various cyber security measures to ensure
APA, Harvard, Vancouver, ISO, and other styles
18

Makinde, Emmanuel Tunde, Joy Ishioma Obanigwe, Christiana Onyemowo Otaiku, and Simon Bem Tyoyila. "Integration of artificial intelligence (AI) driven security measures in library systems." Journal of Library Services and Technologies 7, no. 2 (2025): 142–53. https://doi.org/10.47524/jlst.v7i2.154.

Full text
Abstract:
With an emphasis on data protection, this research investigates the role of the systems librarian in maintaining cybersecurity within library information systems. The paper highlights the vital roles that systems librarians play in protecting sensitive user data by reviewing the body of literature on the changing state of cybersecurity in libraries using secondary research. Important cybersecurity practices like encryption, access control, and AIpowered security tools are examined, and their effectiveness in library environments is assessed. Proactive measures like frequent security audits, pr
APA, Harvard, Vancouver, ISO, and other styles
19

Henry Nwapali Ndidi Naiho, Oluwabunmi Layode, Gbenga Sheriff Adeleke, Ezekiel Onyekachukwu Udeh, and Talabi Temitope Labake. "Addressing cybersecurity challenges in smart grid technologies: Implications for sustainable energy infrastructure." Engineering Science & Technology Journal 5, no. 6 (2024): 1995–2015. http://dx.doi.org/10.51594/estj.v5i6.1218.

Full text
Abstract:
This study systematically reviews the cybersecurity challenges in smart grid technologies and their implications for sustainable energy infrastructure. The primary objective is to analyze the vulnerabilities inherent in smart grids, evaluate existing cybersecurity measures, and propose strategic recommendations for enhancing security. Employing a systematic literature review and content analysis, this research scrutinizes peer-reviewed articles, technical reports, and standards documents published between 2014 and 2024. The methodology focuses on identifying cybersecurity threats, vulnerabilit
APA, Harvard, Vancouver, ISO, and other styles
20

Temitayo Oluwaseun Abrahams, Sarah Kuzankah Ewuga, Samuel Onimisi Dawodu, Abimbola Oluwatoyin Adegbite, and Azeez Olanipekun Hassan. "A REVIEW OF CYBERSECURITY STRATEGIES IN MODERN ORGANIZATIONS: EXAMINING THE EVOLUTION AND EFFECTIVENESS OF CYBERSECURITY MEASURES FOR DATA PROTECTION." Computer Science & IT Research Journal 5, no. 1 (2024): 1–25. http://dx.doi.org/10.51594/csitrj.v5i1.699.

Full text
Abstract:
In an era where digital threats are increasingly pervasive, understanding the evolution and efficacy of cybersecurity strategies in modern organizations is paramount. This study provides a comprehensive analysis of the dynamic landscape of cybersecurity, exploring its progression from traditional methods to innovative, technology-driven approaches. The digital age has ushered in complex cyber threats, necessitating robust cybersecurity measures. This study examines cybersecurity strategies' historical development, current trends, and future directions across different organizational contexts a
APA, Harvard, Vancouver, ISO, and other styles
21

Al Ali, Naser Abdel Raheem, Anna A. Chebotareva, and Vladimir E. Chebotarev. "Cyber security in marine transport." Pomorstvo 35, no. 2 (2021): 248–55. http://dx.doi.org/10.31217/p.35.2.7.

Full text
Abstract:
In recent years, the number of cyber attacks, virus carriers, and cybercrime on maritime transport facilities has increased significantly. The emergence of new types of maritime vessels, such as autonomous vessels, dependent entirely on information and communication technologies used for passengers, cargo and baggage transportation, requires legal regulation of relations in this area. Therefore, ensuring cybersecurity in maritime transport and the need to adopt appropriate legal norms, standards and measures at both the international and national levels to manage maritime cyber risks are consi
APA, Harvard, Vancouver, ISO, and other styles
22

Juanda, Jessy. "A Comprehensive Literature Review on the Impact of Cyberattacks on Accounting Practices and Security Measures." Fairness 1, no. 1 (2025): 64–80. https://doi.org/10.70764/gdpu-fr.2025.1(1)-05.

Full text
Abstract:
Objective: This research aims to investigate the increasing cybersecurity threats to accounting information systems and assess the effectiveness of cybersecurity governance in mitigating these risks. This research emphasizes the importance of integrating cybersecurity measures into accounting practices to enhance resilience against cyberattacks. Research Design & Methods: This study uses the Systematic Mapping Study method to comprehensively analyze the existing literature, identify research gaps, and provide a structured overview of cybersecurity governance in accounting. A total of 45 ar
APA, Harvard, Vancouver, ISO, and other styles
23

Adebimpe Bolatito Ige, Eseoghene Kupa, and Oluwatosin Ilori. "Aligning sustainable development goals with cybersecurity strategies: Ensuring a secure and sustainable future." GSC Advanced Research and Reviews 19, no. 3 (2024): 344–60. http://dx.doi.org/10.30574/gscarr.2024.19.3.0236.

Full text
Abstract:
This study explores the critical intersection between cybersecurity and sustainable development, aiming to understand how cybersecurity measures can support the achievement of the Sustainable Development Goals (SDGs). Employing a systematic literature review and content analysis, the research scrutinizes peer-reviewed articles, conference proceedings, and reports from international organizations, focusing on literature published from 2010 to 2024. The inclusion criteria targeted works that directly address the role of cybersecurity in sustainable development, particularly those discussing emer
APA, Harvard, Vancouver, ISO, and other styles
24

Adebimpe, Bolatito Ige, Kupa Eseoghene, and Ilori Oluwatosin. "Aligning sustainable development goals with cybersecurity strategies: Ensuring a secure and sustainable future." GSC Advanced Research and Reviews 19, no. 3 (2024): 344–60. https://doi.org/10.5281/zenodo.13622705.

Full text
Abstract:
This study explores the critical intersection between cybersecurity and sustainable development, aiming to understand how cybersecurity measures can support the achievement of the Sustainable Development Goals (SDGs). Employing a systematic literature review and content analysis, the research scrutinizes peer-reviewed articles, conference proceedings, and reports from international organizations, focusing on literature published from 2010 to 2024. The inclusion criteria targeted works that directly address the role of cybersecurity in sustainable development, particularly those discussing emer
APA, Harvard, Vancouver, ISO, and other styles
25

Akhtar Ali, Nayyab Zulfiqar, Muhammad Usama, and Rana Muhammad Ikraam. "Impact of Cyber security Measures on Risk Mitigation, with the Mediating Role of Data Protection." Indus Journal of Social Sciences 3, no. 1 (2025): 356–72. https://doi.org/10.59075/ijss.v3i1.659.

Full text
Abstract:
This research paper considers how cybersecurity and data protection method influence the reduction of risk to a company. It also considers how technologies like firewalls, encryption, and multi-factor authentication work to reduce the incidence of cyber-attacks and data leaks. Scientists have also stepped into thinking about the use of data protection to make the various cybersecurity procedures more effective. Stemming from a quantitative research paradigm, authors distributed questionnaires to IT managers together with cybersecurity specialists as well as data protection officers within vari
APA, Harvard, Vancouver, ISO, and other styles
26

Edith Ebele Agu, Anwuli Nkemchor Obiki-Osafiele, and Njideka Rita Chiekezie. "Addressing advanced cybersecurity measures for protecting personal data in online financial transactions." World Journal of Engineering and Technology Research 3, no. 1 (2024): 029–37. http://dx.doi.org/10.53346/wjetr.2024.3.1.0052.

Full text
Abstract:
This review paper examines the imperative of advanced cybersecurity measures for protecting personal data in online financial transactions. The discussion encompasses a comprehensive analysis of current cyber threats, including phishing, malware, and ransomware, and their impact on financial transactions. Key technologies such as encryption, multi-factor authentication (MFA), and artificial intelligence (AI) are explored for their roles in enhancing cybersecurity resilience. Regulatory frameworks like GDPR and CCPA are scrutinized for their influence on cybersecurity practices in financial ins
APA, Harvard, Vancouver, ISO, and other styles
27

Wycliff Nagalila, Amos Nyombi, Mark Sekinobe, Jimmy Ampe, and Barbra Happy. "Fortifying national security: The integration of advanced financial control and cybersecurity measures." World Journal of Advanced Research and Reviews 23, no. 2 (2024): 1095–101. http://dx.doi.org/10.30574/wjarr.2024.23.2.2444.

Full text
Abstract:
In an increasingly interconnected and digital world, fortifying national security transcends traditional borders and military strategies. This publication, "Fortifying National Security: The Integration of Advanced Financial Control and Cybersecurity Measures," explores the critical intersection of advanced financial control and cybersecurity as essential components in enhancing national security frameworks. Advanced financial control employs sophisticated methodologies and technologies to protect national financial systems from fraud, money laundering, and illicit financial activities. Concur
APA, Harvard, Vancouver, ISO, and other styles
28

Wycliff, Nagalila, Nyombi Mark Sekinobe Amos, Ampe Jimmy, and Happy Barbra. "Fortifying national security: The integration of advanced financial control and cybersecurity measures." World Journal of Advanced Research and Reviews 23, no. 2 (2024): 1095–101. https://doi.org/10.5281/zenodo.14850697.

Full text
Abstract:
In an increasingly interconnected and digital world, fortifying national security transcends traditional borders and military strategies. This publication, "Fortifying National Security: The Integration of Advanced Financial Control and Cybersecurity Measures," explores the critical intersection of advanced financial control and cybersecurity as essential components in enhancing national security frameworks. Advanced financial control employs sophisticated methodologies and technologies to protect national financial systems from fraud, money laundering, and illicit financial activities. Concur
APA, Harvard, Vancouver, ISO, and other styles
29

Khydyntsev, M. M. "Conceptual Provisions for Insuring Cybersecurity of the Energy Industry of Ukraine." Èlektronnoe modelirovanie 45, no. 1 (2023): 80–97. http://dx.doi.org/10.15407/emodel.45.01.080.

Full text
Abstract:
The spheres of cybersecurity (ensuring cybersecurity), as well as the functioning and protection of critical infrastructure and its objects in Ukraine, are defined by the Cybersecurity Strategy of Ukraine (2016), the laws of Ukraine "On the Basic Principles of Cybersecurity of Ukraine" (2017) and "About Critical Infrastructure" (2021). The formation and implementation of state policy in the mentioned spheres, and planning and execution of related measures by cybersecurity entities and critical infrastructure facilities take place at the regulatory, organizational, and technical levels. The wor
APA, Harvard, Vancouver, ISO, and other styles
30

Adebimpe Bolatito Ige, Eseoghene Kupa, and Oluwatosin Ilori. "Best practices in cybersecurity for green building management systems: Protecting sustainable infrastructure from cyber threats." International Journal of Science and Research Archive 12, no. 1 (2024): 2960–77. http://dx.doi.org/10.30574/ijsra.2024.12.1.1185.

Full text
Abstract:
This study explores the critical intersection of cybersecurity and sustainable infrastructure, with a focus on Green Building Management Systems (GBMS). Recognizing the increasing sophistication of cyber threats and the integration of digital technologies in sustainable buildings, this research aims to understand the challenges and prospects of cybersecurity within this context. Employing a systematic literature review and content analysis, the study examines peer-reviewed articles, conference proceedings, and industry reports from 2010 to 2024. The methodology facilitates a comprehensive unde
APA, Harvard, Vancouver, ISO, and other styles
31

Nikolov, Borislav. "Maritime Cybersecurity Education and Training at Nikola Vaptsarov Naval Academy." Pedagogika-Pedagogy 95, no. 6s (2023): 48–55. http://dx.doi.org/10.53656/ped2023-6s.05.

Full text
Abstract:
As of the beginning of 2021, a set of new requirements has been introduced by the International Maritime Organization (IMO), necessitating established rules and measures about the cybersecurity of the ship’s systems. That is to ensure a certain level of cybersecurity onboard, as well as re-occurring training of onboard staff, is required, to maintain cybersecurity measures. That leads to a new vector of postgraduate certification and namely – ships’ system cybersecurity and cybersecurity management. Its purpose is to provide the necessary knowledge and skills, related to fulfilling the require
APA, Harvard, Vancouver, ISO, and other styles
32

Japinye, A. O. "Enhancing Anti-Money Laundering and Counter-Terrorist Financing Strategies through Integrated Cybersecurity and Compliance Measures." International Journal of Novel Research in Marketing Management and Economics 11, no. 1 (2024): 180–96. https://doi.org/10.5281/zenodo.10973122.

Full text
Abstract:
<strong>Abstract:</strong> This research study investigated the integration of cybersecurity measures into Anti-Money Laundering (AML) and Counter-Terrorist Financing (CTF) strategies within financial institutions. The study aimed to assess the current state of AML/CTF strategies, evaluate the integration of cybersecurity measures, and investigate the impact of integrated cybersecurity and compliance measures on AML/CTF effectiveness. A quantitative approach was employed, utilizing surveys and statistical analyses to collect and analyze data from 400 participants in financial institutions. The
APA, Harvard, Vancouver, ISO, and other styles
33

Pulatov, Temurbek. "Cybersecurity in Financial Technologies: Civil Law Measures for Prevention and Damage Compensation." Uzbek Journal of Law and Digital Policy 3, no. 3 (2025): 34–44. https://doi.org/10.59022/ujldp.338.

Full text
Abstract:
The digitization of financial services has created unprecedented cybersecurity challenges requiring comprehensive civil law frameworks for prevention and damage compensation. The article examines the evolution of cybersecurity regulations in financial technology, analyzing civil law remedies and preventive measures across jurisdictions, with particular focus on Uzbekistan's emerging regulatory framework. Through comparative legal analysis and examination of recent enforcement actions, this research identifies key gaps in current civil law approaches and proposes enhanced mechanisms for cyberse
APA, Harvard, Vancouver, ISO, and other styles
34

Jayanthi Pankajakshan and Dr. Ruchi Maheshwari Bangur. "Employee Awareness and Attitudes Towards Cybersecurity Technologies." Journal of Advances and Scholarly Researches in Allied Education 21, no. 5 (2024): 113–20. http://dx.doi.org/10.29070/1ym5q439.

Full text
Abstract:
This study explores employee awareness and attitudes towards cybersecurity technologies. As organizations strive to improve their cybersecurity measures, the human element remains a critical yet often overlooked factor. This research investigates the correlation between employee awareness and the adoption of emerging cybersecurity technologies, the impact of these technologies on cybersecurity incident rates, and the relationship between employee satisfaction and cybersecurity awareness. A qualitative exploration approach was employed, utilizing data from peer-reviewed publications, technology
APA, Harvard, Vancouver, ISO, and other styles
35

Akash, V. S., P. Johnson Akshay, P. S. Alakanandha, and Reji C. Joy Dr. "Cybersecurity in the Digital Age: Benefits and Protective Measures." Recent Trends in Cyber Criminology Research 1, no. 1 (2025): 22–31. https://doi.org/10.5281/zenodo.15188459.

Full text
Abstract:
<em>Cyber attacks are malicious attempts to compromise systems, disrupt operations, and steal data, posing significant risks to individuals, organizations, and governments. These attacks exploit vulnerabilities through malware, phishing, ransom ware, and DoS attacks, leading to financial losses, reputational damage, and security threats. Preventive measures, such as strong passwords, multifactor authentication, and encryption, enhance cybersecurity. Firewalls, IDSs, and IPSs play a crucial role in defending networks. Advanced techniques like SYN flood monitoring and DoS filtering mitigate thre
APA, Harvard, Vancouver, ISO, and other styles
36

Darlington Eze Ekechukwu and Peter Simpa. "The future of Cybersecurity in renewable energy systems: A review, identifying challenges and proposing strategic solutions." Computer Science & IT Research Journal 5, no. 6 (2024): 1265–99. http://dx.doi.org/10.51594/csitrj.v5i6.1197.

Full text
Abstract:
This study provides a comprehensive examination of cybersecurity within renewable energy systems, highlighting the critical role of cybersecurity measures in ensuring the sustainability and reliability of these systems. With the increasing reliance on renewable energy sources, the need for robust cybersecurity frameworks to protect against evolving cyber threats has never been more pressing. Through a systematic literature review and content analysis, this research identifies the prevalent cyber threats and vulnerabilities specific to renewable energy infrastructures, evaluates the effectivene
APA, Harvard, Vancouver, ISO, and other styles
37

Nambiar, Ryan, and Flavia Gonsalves. "A Systematic Review on Cybersecurity & Data Protection." Journal of Cyber Security, Privacy Issues and Challenges 1, no. 2 (2022): 8–18. http://dx.doi.org/10.46610/jcspic.2022.v01i02.002.

Full text
Abstract:
This paper identifies the understanding of Cybersecurity. This paper analyses the awareness, presence and challenges of Cybersecurity and Data protection. This paper also identifies what people think about Cybersecurity as well as measures we can use to strengthen Cybersecurity.
APA, Harvard, Vancouver, ISO, and other styles
38

Khot, Abhishek. "Artificial Intelligence in Cybersecurity." International Journal for Research in Applied Science and Engineering Technology 12, no. 6 (2024): 2025–29. http://dx.doi.org/10.22214/ijraset.2024.63434.

Full text
Abstract:
Abstract: Artificial Intelligence (AI) has become integral to cybersecurity, offering advanced solutions for monitoring, detecting, reporting, and countering cyber threats. As cyberattacks grow in number and sophistication, traditional security measures prove inadequate. AI's ability to quickly adapt and learn makes it a vital tool in defending against these evolving threats. It automates routine tasks, accelerates threat detection and response, and improves the accuracy of security measures. However, AI also presents risks, such as potential misuse by cybercriminals, necessitating continuous
APA, Harvard, Vancouver, ISO, and other styles
39

Darlington Eze Ekechukwu and Peter Simpa. "The importance of cybersecurity in protecting renewable energy investment: A strategic analysis of threats and solutions." Engineering Science & Technology Journal 5, no. 6 (2024): 1845–83. http://dx.doi.org/10.51594/estj.v5i6.1186.

Full text
Abstract:
This study explores the critical nexus between cybersecurity and the viability of renewable energy systems, emphasizing the importance of robust cybersecurity measures for the sustainability and success of renewable energy initiatives. Employing a systematic literature review and content analysis, the research scrutinizes peer-reviewed journals, conference proceedings, industry reports, and policy documents from 2014 to 2024. The methodology focuses on identifying gaps, opportunities, and strategic recommendations for enhancing cybersecurity resilience within the renewable energy sector. Key f
APA, Harvard, Vancouver, ISO, and other styles
40

Daniel Ajiga, Patrick Azuka Okeleke, Samuel Olaoluwa Folorunsho, and Chinedu Ezeigweneme. "Designing Cybersecurity Measures for Enterprise Software Applications to Protect Data Integrity." Computer Science & IT Research Journal 5, no. 8 (2024): 1920–41. http://dx.doi.org/10.51594/csitrj.v5i8.1451.

Full text
Abstract:
In an era of escalating cyber threats, safeguarding data integrity in enterprise software applications is critical for maintaining trust and operational stability. Designing robust cybersecurity measures is essential to protect sensitive information from unauthorized access, alteration, and loss. This review explores key strategies and methodologies for developing comprehensive cybersecurity frameworks tailored for enterprise software applications. Effective cybersecurity begins with a thorough risk assessment to identify potential vulnerabilities and threats specific to the enterprise's softw
APA, Harvard, Vancouver, ISO, and other styles
41

Boorugupalli, Kiran Kumar, Adokshaja Krishnarao Kulkarni, Amala Suzana, Diwakaran M, Sivakumar Ponnusamy, and Senthil Kumar S. "Cybersecurity Measures in Financial Institutions Protecting Sensitive Data from Emerging Threats and Vulnerabilities." ITM Web of Conferences 76 (2025): 02002. https://doi.org/10.1051/itmconf/20257602002.

Full text
Abstract:
As financial institutions increasingly digitized, they are up against a growing suite of cybersecurity threats such as ransomware, cryptojacking, AI-enabled phishing, and quantum computing attacks. Other research work and government reports reinforce general cybersecurity concerns but are not technical or applied. They do not cater specifically to financial institutions. To fill these gaps, this study introduces an AI-based cybersecurity framework focusing on effective protection of financial data, compliance with regulations, and minimizing time for detecting threats.Building upon the existin
APA, Harvard, Vancouver, ISO, and other styles
42

Mishra, Neha. "Privacy, Cybersecurity, and GATS Article XIV: A New Frontier for Trade and Internet Regulation?" World Trade Review 19, no. 3 (2019): 341–64. http://dx.doi.org/10.1017/s1474745619000120.

Full text
Abstract:
AbstractMeasures restricting data flows outside one's borders, including mandatory data/server localization measures, are not only a barrier to trade, but also largely ineffective in achieving better internet security or trust. Nevertheless, governments deploy such measures, primarily on grounds of cybersecurity and privacy, potentially violating their obligations under the General Agreement on Trade in Services (GATS). In this article, I investigate whether GATS-inconsistent measures may be justified under GATS Art. XIV when aimed at ensuring privacy or cybersecurity, and, if so, whether GATS
APA, Harvard, Vancouver, ISO, and other styles
43

Adebiaye, Richmond. "Mitigating Vulnerability Risks in Cybersecurity Using Predictive Measures." International Journal of Advanced Scientific Research & Development (IJASRD) 4, no. 10 (2017): 12. http://dx.doi.org/10.26836/ijasrd/2017/v4/i10/4106.

Full text
APA, Harvard, Vancouver, ISO, and other styles
44

Park, Joohui. "Governing Cybersecurity Measures in the Digital Trade Agreements." Korean Journal of International Economic Law 19, no. 2 (2021): 75–115. http://dx.doi.org/10.46271/kjiel.2021.07.19.2.75.

Full text
APA, Harvard, Vancouver, ISO, and other styles
45

Khanna, Anirudh, Pradeep Chintale, Laxminarayana Korada, Gopi Desaboyina, and Harsha Vardhan Nerella. "AI-Enhanced Cybersecurity Measures for Protecting Financial Assets." International Journal on Recent and Innovation Trends in Computing and Communication 11, no. 4 (2024): 427–32. https://doi.org/10.5281/zenodo.14057656.

Full text
APA, Harvard, Vancouver, ISO, and other styles
46

Sharma, Pawan Kumar. "Securing software development: A comprehensive and comparative analysis of cybersecurity measures." SADGAMAYA 1, no. 1 (2024): 17–20. http://dx.doi.org/10.3126/sadgamaya.v1i1.66881.

Full text
Abstract:
In the rapidly evolving digital age, the integrity and security of software development have emerged as paramount concerns amidst the increasing prevalence of cyber threats. This study presents a comprehensive and comparative analysis of cybersecurity measures within the software development lifecycle, focusing on a multi-layered technological framework comprising AWS hosting, Java Spring Boot backend, MySQL databases, Flutter/Dart frontend, and Android/iOS mobile applications, alongside RestAPIs. Through an adaptable methodology, this research delves into the cybersecurity challenges and solu
APA, Harvard, Vancouver, ISO, and other styles
47

Poonsawat, Thipphawan. "CYBER SECURITY IN THAILAND: A MISSION TOWARDS SAFETY IN THE DIGITAL AGE." Proceeding of International Conference on Social Science and Humanity 2, no. 2 (2025): 81–94. https://doi.org/10.61796/icossh.v2i2.21.

Full text
Abstract:
Objective: This article aims to examine the development and implementation of cybersecurity measures in Thailand, focusing on the creation of cybersecurity frameworks, national policies, and strategic guidelines. Method: The study employs a qualitative descriptive approach using secondary data from government documents, legal frameworks, and cybersecurity policy analyses. Results: The findings reveal that Thailand has taken significant steps toward enhancing cybersecurity through legislative measures on personal data protection, public awareness campaigns on cyber threats, and the establishmen
APA, Harvard, Vancouver, ISO, and other styles
48

Ezekiel Onyekachukwu Udeh, Prisca Amajuoyi, Kudirat Bukola Adeusi, and Anwulika Ogechukwu Scott. "The integration of artificial intelligence in cybersecurity measures for sustainable finance platforms: An analysis." Computer Science & IT Research Journal 5, no. 6 (2024): 1221–46. http://dx.doi.org/10.51594/csitrj.v5i6.1195.

Full text
Abstract:
This study delves into the integration of Artificial Intelligence (AI) in cybersecurity measures within smart cities, aiming to uncover both the challenges and opportunities this fusion presents. With the burgeoning reliance on interconnected digital infrastructures and the vast data ecosystems within urban environments, smart cities are increasingly susceptible to sophisticated cyber threats. Through a systematic literature review and content analysis, this research identifies the unique cybersecurity vulnerabilities faced by smart cities and evaluates how AI technologies can fortify urban cy
APA, Harvard, Vancouver, ISO, and other styles
49

Anusha, Chitneni. "STUDY OF EMERGING TRENDS ON LATEST TECHNOLOGIES AND ITS CYBERSECURITY CHALLENGES." Journal For Innovative Development in Pharmaceutical and Technical Science (JIDPTS) 3, no. 5 (2020): 15–18. https://doi.org/10.5281/zenodo.4277475.

Full text
Abstract:
<strong>Abstract</strong><strong> :</strong> Cyber Security assumes a significant part in the field of information technology. Securing the data have gotten perhaps the most crucial test in the current day. At whatever point we consider cybersecurity, the main thing that rings a bell is &#39;cyber crimes,&#39; which are expanding hugely step by step. Different Governments and organizations are taking numerous measures to forestall these cybercrimes. Other than different measures, cybersecurity is as yet a significant worry to many. This paper focuses on centers around challenges looked at by c
APA, Harvard, Vancouver, ISO, and other styles
50

De Barros, Martina. "Cybersecurity in Mozambique: Status and Challenges." European Conference on Cyber Warfare and Security 22, no. 1 (2023): 553–58. http://dx.doi.org/10.34190/eccws.22.1.1194.

Full text
Abstract:
Digital technologies became one of the most important components of societies day to day life. In Africa, they brought several benefits as well as challenges. For instance, the number of cyber-crimes and cyber-attacks are increasing. Yet, not all 54 African countries have implemented proper cybersecurity measures such as the adoption of national cybersecurity strategy, technical and organizational measures, development of cyber capacity and fostering national and engaging in regional and international cooperation. However, the adoption of these measures are vital and imperative. Mozambique is
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!