Academic literature on the topic 'Cybersecurity policies'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'Cybersecurity policies.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Journal articles on the topic "Cybersecurity policies"
Mishra, Alok, Yehia Ibrahim Alzoubi, Asif Qumer Gill, and Memoona Javeria Anwar. "Cybersecurity Enterprises Policies: A Comparative Study." Sensors 22, no. 2 (2022): 538. http://dx.doi.org/10.3390/s22020538.
Full textTemitayo Oluwaseun Abrahams, Sarah Kuzankah Ewuga, Samuel Onimisi Dawodu, Abimbola Oluwatoyin Adegbite, and Azeez Olanipekun Hassan. "A REVIEW OF CYBERSECURITY STRATEGIES IN MODERN ORGANIZATIONS: EXAMINING THE EVOLUTION AND EFFECTIVENESS OF CYBERSECURITY MEASURES FOR DATA PROTECTION." Computer Science & IT Research Journal 5, no. 1 (2024): 1–25. http://dx.doi.org/10.51594/csitrj.v5i1.699.
Full textHossain, Sk Tahsin, Tan Yigitcanlar, Kien Nguyen, and Yue Xu. "Understanding Local Government Cybersecurity Policy: A Concept Map and Framework." Information 15, no. 6 (2024): 342. http://dx.doi.org/10.3390/info15060342.
Full textSzádeczky, Tamás. "Cybersecurity Authorities and Related Policies in the EU and Hungary." Central and Eastern European eDem and eGov Days 331 (July 12, 2018): 287–99. http://dx.doi.org/10.24989/ocg.v331.24.
Full textGelfond, Stuart, Una Dean, Dave N. Rao, and Justin Sedor. "SEC announces new guidance for public company disclosures on cybersecurity risks." Journal of Investment Compliance 19, no. 4 (2018): 22–25. http://dx.doi.org/10.1108/joic-06-2018-0041.
Full textDuic, Dunja. "The EEAS as a Navigator of EU Defence Aspects in Cyberspace." European Foreign Affairs Review 26, Issue 1 (2021): 101–14. http://dx.doi.org/10.54648/eerr2021009.
Full textChoodakowska, Aneta, Sławomira Kańduła, and Joanna Przybylska. "Cybersecurity in the Local Government Sector in Poland: More Work Needs to be Done." Lex localis - Journal of Local Self-Government 20, no. 1 (2022): 161–92. http://dx.doi.org/10.4335/20.1.161-192(2022).
Full textDawson, Maurice. "Applying a holistic cybersecurity framework for global IT organizations." Business Information Review 35, no. 2 (2018): 60–67. http://dx.doi.org/10.1177/0266382118773624.
Full textDursun, Faruk. "Digital Age Workplace Security: Cyber Hygiene Approach in Remote Work." İşletme Bilimi Dergisi 13, no. 1 (2025): 138–57. https://doi.org/10.22139/jobs.1623655.
Full textLale Kahraman, Aybala. "Is a Theory of Cyberspace Dominance Possible? An Assessment from the Perspective of China’s Cyber Sovereignty Approach." Güvenlik Stratejileri Dergisi, War and International System (December 30, 2024): 131–49. https://doi.org/10.17752/guvenlikstrtj.1486265.
Full textDissertations / Theses on the topic "Cybersecurity policies"
Rawass, Johnny Fadel. "Cybersecurity Strategies to Protect Information Systems in Small Financial Institutions." ScholarWorks, 2019. https://scholarworks.waldenu.edu/dissertations/7183.
Full textAmir-Mohammadian, Sepehr. "A Formal Approach to Combining Prospective and Retrospective Security." ScholarWorks @ UVM, 2017. http://scholarworks.uvm.edu/graddis/802.
Full textПирха, А. М. "Кіберполіція як структурний підрозділ Національної поліції". Thesis, Сумський державний університет, 2016. http://essuir.sumdu.edu.ua/handle/123456789/46098.
Full textGhalloussi, Farah. "L'assurance des nouveaux risques maritimes." Thesis, Paris 1, 2019. http://www.theses.fr/2019PA01D021.
Full textOnumo, Aristotle, Andrea J. Cullen, and Irfan U. Awan. "Empirical study of cultural dimensions and cybersecurity development." 2017. http://hdl.handle.net/10454/12442.
Full textHerrera, Andrea Estefania Vaca. "National Cyber-Security Policies oriented to BYOD: a proposal to Ecuador." Master's thesis, 2017. http://hdl.handle.net/10400.8/3593.
Full textMatos, Pedro Carvalhais de Abreu. "Cibersegurança: políticas públicas para uma cultura de cibersegurança nas empresas." Master's thesis, 2018. http://hdl.handle.net/10071/17630.
Full textBooks on the topic "Cybersecurity policies"
Richet, Jean-Loup. Cybersecurity policies and strategies for cyberwarfare prevention. Information Science Reference, An Imprint of IGI Global, 2015.
Find full textSantos, Omar. Developing Cybersecurity Programs and Policies. Pearson Education, Limited, 2018.
Find full textSantos, Omar. Developing Cybersecurity Programs and Policies. Pearson Education, Limited, 2018.
Find full textDeveloping Cybersecurity Programs and Policies (Pearson IT Cybersecurity Curriculum (ITCC)). Pearson IT Certification, 2018.
Find full textCybersecurity for Beginners and Dummies: Developing Cybersecurity Programs and Policies. Independently Published, 2021.
Find full textPriyadarshini, Ishaani, and Chase Cotton. Cybersecurity: Ethics, Legal, Risks, and Policies. Apple Academic Press, Incorporated, 2021.
Find full textPriyadarshini, Ishaani, and Chase Cotton. Cybersecurity: Ethics, Legal, Risks, and Policies. Apple Academic Press, Incorporated, 2021.
Find full textPriyadarshini, Ishaani, and Chase Cotton. Cybersecurity: Ethics, Legal, Risks, and Policies. Apple Academic Press, Incorporated, 2021.
Find full textPriyadarshini, Ishaani, and Chase Cotton. Cybersecurity: Ethics, Legal, Risks, and Policies. Apple Academic Press, Incorporated, 2021.
Find full textBook chapters on the topic "Cybersecurity policies"
Evans, Ariel. "Cybersecurity Policies." In Enterprise Cybersecurity in Digital Business. Routledge, 2022. http://dx.doi.org/10.4324/9781003052616-16.
Full textPriyadarshini, Ishaani, and Chase Cotton. "Introduction to Cybersecurity Policies." In Cybersecurity. Apple Academic Press, 2022. http://dx.doi.org/10.1201/9781003187127-10.
Full textDas, Ravi. "Cybersecurity Insurance Policies." In Assessing and Insuring Cybersecurity Risk. Auerbach Publications, 2021. http://dx.doi.org/10.1201/9781003023685-3.
Full textEdwards, Dr Jason. "Security Policies and Procedures." In Mastering Cybersecurity. Apress, 2024. http://dx.doi.org/10.1007/979-8-8688-0297-3_12.
Full textAikawa, Wataru. "Japan’s Cybersecurity Policy." In Telecommunications Policies of Japan. Springer Singapore, 2020. http://dx.doi.org/10.1007/978-981-15-1033-5_7.
Full textSingh, Thangjam K. "Evolution of Cybersecurity Policies." In India’s Cybersecurity Policy. Routledge India, 2024. http://dx.doi.org/10.4324/9781003482680-2.
Full textBryan, Elliot, and Alexander Larsen. "Cybersecurity Policies and Procedures." In The Cyber Risk Handbook. John Wiley & Sons, Inc., 2017. http://dx.doi.org/10.1002/9781119309741.ch4.
Full textJiang, Min. "Cybersecurity Policies in China." In CyberBRICS. Springer International Publishing, 2021. http://dx.doi.org/10.1007/978-3-030-56405-6_5.
Full textBishop, Gulsebnem. "Importance of policies, procedures, and compliance in cybersecurity culture." In Cybersecurity Culture. CRC Press, 2025. https://doi.org/10.1201/9781003368496-9.
Full textTomic, Dusko, Eldar Saljic, and Danilo Cupic. "Cybersecurity Policies of East European Countries." In Handbook of Cyber-Development, Cyber-Democracy, and Cyber-Defense. Springer International Publishing, 2018. http://dx.doi.org/10.1007/978-3-319-06091-0_59-1.
Full textConference papers on the topic "Cybersecurity policies"
Aboukadri, Sara, Aafaf Ouaddah, and Abdellatif Mezrioui. "Boosted-3R: Towards a Novel Framework for Inferring ABAC Policies." In 2024 4th Intelligent Cybersecurity Conference (ICSC). IEEE, 2024. https://doi.org/10.1109/icsc63108.2024.10895219.
Full textSwain, Kamakshi P., and Krishnan Venkatraman. "Application of Cybersecurity Policies and Standards in Indian Power Sector." In 2024 23rd National Power Systems Conference (NPSC). IEEE, 2024. https://doi.org/10.1109/npsc61626.2024.10987184.
Full textRaja, Rohit Singh. "“Promoting Health through Transformative Innovation Policies and Emerging Technologies”." In 2025 IEEE 4th International Conference on AI in Cybersecurity (ICAIC). IEEE, 2025. https://doi.org/10.1109/icaic63015.2025.10848838.
Full textMarek, James. "Cybersecurity and Risk Management Framework in Avionics." In Vertical Flight Society 74th Annual Forum & Technology Display. The Vertical Flight Society, 2018. http://dx.doi.org/10.4050/f-0074-2018-12893.
Full textRaja, Rohit Singh. "Expression of Concern for: “Promoting Health through Transformative Innovation Policies and Emerging Technologies”." In 2025 IEEE 4th International Conference on AI in Cybersecurity (ICAIC). IEEE, 2025. https://doi.org/10.1109/icaic63015.2025.11071525.
Full textM, Preethish Kumar, Usha B. A, Basavaraj G. N, Mohan B. A, Prithvi G, and Rajkumar. "Empowering Consumers and Sustainability: A Global Review of Right to Repair Policies." In 2024 International Conference on Distributed Systems, Computer Networks and Cybersecurity (ICDSCNC). IEEE, 2024. https://doi.org/10.1109/icdscnc62492.2024.10939830.
Full textFathurrozi, Ahmad, Tri Ginanjar Laksana, Achmad Noe’Man, et al. "Establishing a Sustainable Cybersecurity Ecosystem in Indonesia: A Global Comparison of Policies and Initiatives." In 2024 Ninth International Conference on Informatics and Computing (ICIC). IEEE, 2024. https://doi.org/10.1109/icic64337.2024.10957598.
Full textK, Priyanka, Chikka Harshini, Srinivas Aluvala, Haider Mohammed Abbas, and Ramaswamy Padmanathan Ram Kumar. "Chaotic Water Wave Optimization and Support Vector Machine of Role-Based Access Control Policies in Enterprise IAM." In 2024 International Conference on Distributed Systems, Computer Networks and Cybersecurity (ICDSCNC). IEEE, 2024. https://doi.org/10.1109/icdscnc62492.2024.10939257.
Full textPandey, Radhika, Shaik Anjimoon, V. Asha, Atul Singla, Irfan Khan, and Zain Alabdeen Hasan Abed. "Developing Robust Cybersecurity Policies and Governance Frameworks in Response to Evolving Legal and Regulatory Landscapes." In 2024 OPJU International Technology Conference (OTCON) on Smart Computing for Innovation and Advancement in Industry 4.0. IEEE, 2024. http://dx.doi.org/10.1109/otcon60325.2024.10687438.
Full textHasibuan, Muhammad Dzifii, and Rio Guntur Utomo. "Analyzing the Impact of Cybersecurity Policies on Individual’s Behavior Through the Lens of Regulatory Focus Theory." In 2024 International Conference on Information Technology Systems and Innovation (ICITSI). IEEE, 2024. https://doi.org/10.1109/icitsi65188.2024.10929109.
Full textReports on the topic "Cybersecurity policies"
Lewis, James Andrew. Advanced Experiences in Cybersecurity Policies and Practices: An Overview of Estonia, Israel, South Korea, and the United States. Inter-American Development Bank, 2016. http://dx.doi.org/10.18235/0007970.
Full textHendrick, Stephen, and Martin Mckeay. Addressing Cybersecurity Challenges in Open Source Software. The Linux Foundation, 2022. https://doi.org/10.70828/jxey9389.
Full textBoyens, Jon M. Cybersecurity Supply Chain Risk Management for Systems and Organizations. National Institute of Standards and Technology, 2022. http://dx.doi.org/10.6028/nist.sp.800-161r1.
Full textLewis, James Andrew. Advanced Experiences in Cybersecurity Policies and Practices: An Overview of Estonia, Israel, South Korea, and the United States. Edited by Miguel Angel Porrúa and Ana Catalina García de Alba Díaz. Inter-American Development Bank, 2016. http://dx.doi.org/10.18235/0000420.
Full textKelly, Luke. Emerging Trends Within the Women, Peace and Security (WPS) Agenda. Institute of Development Studies (IDS), 2022. http://dx.doi.org/10.19088/k4d.2022.019.
Full textThe Israeli Cyber Emergency Response Team (CERT) Principles of Operation: Cybersecurity Best Practices. Inter-American Development Bank, 2024. http://dx.doi.org/10.18235/0013180.
Full textUnlocking the Potential of Digital Services Trade in Asia and the Pacific. Asian Development Bank, 2022. http://dx.doi.org/10.22617/tcs220524-2.
Full text