Journal articles on the topic 'Cybersecurity policies'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the top 50 journal articles for your research on the topic 'Cybersecurity policies.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.
Mishra, Alok, Yehia Ibrahim Alzoubi, Asif Qumer Gill, and Memoona Javeria Anwar. "Cybersecurity Enterprises Policies: A Comparative Study." Sensors 22, no. 2 (2022): 538. http://dx.doi.org/10.3390/s22020538.
Full textTemitayo Oluwaseun Abrahams, Sarah Kuzankah Ewuga, Samuel Onimisi Dawodu, Abimbola Oluwatoyin Adegbite, and Azeez Olanipekun Hassan. "A REVIEW OF CYBERSECURITY STRATEGIES IN MODERN ORGANIZATIONS: EXAMINING THE EVOLUTION AND EFFECTIVENESS OF CYBERSECURITY MEASURES FOR DATA PROTECTION." Computer Science & IT Research Journal 5, no. 1 (2024): 1–25. http://dx.doi.org/10.51594/csitrj.v5i1.699.
Full textHossain, Sk Tahsin, Tan Yigitcanlar, Kien Nguyen, and Yue Xu. "Understanding Local Government Cybersecurity Policy: A Concept Map and Framework." Information 15, no. 6 (2024): 342. http://dx.doi.org/10.3390/info15060342.
Full textSzádeczky, Tamás. "Cybersecurity Authorities and Related Policies in the EU and Hungary." Central and Eastern European eDem and eGov Days 331 (July 12, 2018): 287–99. http://dx.doi.org/10.24989/ocg.v331.24.
Full textGelfond, Stuart, Una Dean, Dave N. Rao, and Justin Sedor. "SEC announces new guidance for public company disclosures on cybersecurity risks." Journal of Investment Compliance 19, no. 4 (2018): 22–25. http://dx.doi.org/10.1108/joic-06-2018-0041.
Full textDuic, Dunja. "The EEAS as a Navigator of EU Defence Aspects in Cyberspace." European Foreign Affairs Review 26, Issue 1 (2021): 101–14. http://dx.doi.org/10.54648/eerr2021009.
Full textChoodakowska, Aneta, Sławomira Kańduła, and Joanna Przybylska. "Cybersecurity in the Local Government Sector in Poland: More Work Needs to be Done." Lex localis - Journal of Local Self-Government 20, no. 1 (2022): 161–92. http://dx.doi.org/10.4335/20.1.161-192(2022).
Full textDawson, Maurice. "Applying a holistic cybersecurity framework for global IT organizations." Business Information Review 35, no. 2 (2018): 60–67. http://dx.doi.org/10.1177/0266382118773624.
Full textDursun, Faruk. "Digital Age Workplace Security: Cyber Hygiene Approach in Remote Work." İşletme Bilimi Dergisi 13, no. 1 (2025): 138–57. https://doi.org/10.22139/jobs.1623655.
Full textLale Kahraman, Aybala. "Is a Theory of Cyberspace Dominance Possible? An Assessment from the Perspective of China’s Cyber Sovereignty Approach." Güvenlik Stratejileri Dergisi, War and International System (December 30, 2024): 131–49. https://doi.org/10.17752/guvenlikstrtj.1486265.
Full textApillanes Jr., Leopoldo DG. "Factors Affecting the Implementation of Cybersecurity in the Philippine Coast Guard." International Journal of English Literature and Social Sciences 9, no. 3 (2024): 131–38. http://dx.doi.org/10.22161/ijels.93.14.
Full textTumkevič, Agnija. "CYBERSECURITY IN CENTRAL EASTERN EUROPE: FROM IDENTIFYING RISKS TO COUNTERING THREATS." Baltic Journal of Political Science 5, no. 5 (2017): 73. http://dx.doi.org/10.15388/bjps.2016.5.10337.
Full textAbassi, Ryma. "Refining Ethical Reflections in Cybersecurity Policy and Privacy: Insights for Policy Makers." JUCS - Journal of Universal Computer Science 31, no. (6) (2025): 572–602. https://doi.org/10.3897/jucs.125999.
Full textWadesango, Newman, and Edwin Maveneka. "Cyberthreats and their impact on financial integrity: Evaluating the effectiveness of local authorities’ cybersecurity policies in preventing and detecting fraud." Corporate Law and Governance Review 7, no. 2 (2025): 32–40. https://doi.org/10.22495/clgrv7i2p3.
Full textBocharova, A. "Information Security and Cybersecurity Policy." World Economy and International Relations 68, no. 4 (2024): 121–30. http://dx.doi.org/10.20542/0131-2227-2024-68-4-121-130.
Full textNarsina, Deekshith. "Impact of Cybersecurity Threats on Emerging Markets' Integration into Global Trade Networks." American Journal of Trade and Policy 9, no. 3 (2022): 141–48. https://doi.org/10.18034/ajtp.v9i3.741.
Full textKayonga, Daniel, Malgit Akims, and Festus Ndirang. "Cybersecurity Practices and International Relations Performance in Rwanda. A Case of Broadband Systems Corporation." Journal of International Relations 4, no. 4 (2024): 28–40. http://dx.doi.org/10.47604/jir.3055.
Full textSayvaya, Inpaeng, and Mei Veronika Siagian. "Cybersecurity Awareness as a Component of HR Policies: Protecting Employee and Organizational Data in the Digital Era." Ambidextrous Journal of Innovation Efficiency and Technology in Organization 2, no. 02 (2025): 95–103. https://doi.org/10.61536/ambidextrous.v2i02.187.
Full textWaiganjo, Iyaloo, Jude Odiakaosa Osakwe, and Ambrose Azeta. "Strategic Framework for Cybersecurity Policy Compliance in Namibian Organizations." Journal of Information Systems and Informatics 7, no. 1 (2025): 21–44. https://doi.org/10.51519/journalisi.v7i1.927.
Full textMakeri, Yakubu Ajiji. "The Effectiveness of Cybersecurity Compliance in a Corporate Organization in Nigeria." International Journal on Recent and Innovation Trends in Computing and Communication 7, no. 6 (2019): 16–19. http://dx.doi.org/10.17762/ijritcc.v7i6.5312.
Full textTaylor, Rodriguez Vance. "Artificial Intelligence in Cybersecurity: A Survey of National Research, Investment and Policy Implementation." International Journal of Computer Science and Information Technology Research 11, no. 2 (2023): 18–25. https://doi.org/10.5281/zenodo.7858980.
Full textGórka, Marek. "The Cybersecurity Strategy of the Visegrad Group Countries." Politics in Central Europe 14, no. 2 (2018): 75–98. http://dx.doi.org/10.2478/pce-2018-0010.
Full textMaulidar, Maulidar, Edi Wanda, and Maudi Hijriatin. "Cybersecurity Awareness In HR: Protecting Employee Data in the Digital Era." International Journal of Engineering, Science and Information Technology 5, no. 2 (2025): 237–42. https://doi.org/10.52088/ijesty.v5i2.819.
Full textFreshtah Fazel, Sonia Arsalan, Madina Ahmadi, Zainab Bahaduri, and Tamanna Quraishi. "Examining the Impact of Cyberattacks on Women's Digital Security: Challenges and Solutions." Journal of Social and Humanities 3, no. 1 (2024): 1–9. https://doi.org/10.59535/jsh.v3i1.341.
Full textSterlini, Pierantonia, Fabio Massacci, Natalia Kadenko, Tobias Fiebig, and Michel van Eeten. "Governance Challenges for European Cybersecurity Policies: Stakeholder Views." IEEE Security & Privacy 18, no. 1 (2020): 46–54. http://dx.doi.org/10.1109/msec.2019.2945309.
Full textBajraktari, Halim, and Valeri Qatani. "Cybersecurity in the Western Balkans and European Regulation." West Science Law and Human Rights 1, no. 04 (2023): 204–13. http://dx.doi.org/10.58812/wslhr.v1i04.313.
Full textAmorosa, Katherine, and Benjamin Yankson. "Human Error - A Critical Contributing Factor to the Rise in Data Breaches: A Case Study of Higher Education." HOLISTICA – Journal of Business and Public Administration 14, no. 1 (2023): 110–32. http://dx.doi.org/10.2478/hjbpa-2023-0007.
Full textJayanthi Pankajakshan and Dr. Ruchi Maheshwari Bangur. "Organizational Strategies and Policies for Implementing Emerging Cybersecurity Technologies." International Journal of Information Technology and Management 19, no. 1 (2024): 81–92. http://dx.doi.org/10.29070/m75p4s25.
Full textDE SILVA, Banuka. "Exploring the Relationship Between Cybersecurity Culture and Cyber-Crime Prevention: A Systematic Review." International Journal of Information Security and Cybercrime 12, no. 1 (2023): 23–29. http://dx.doi.org/10.19107/ijisc.2023.01.03.
Full textKasper, Agnes, Anna-Maria Osula, and Anna Molnár. "EU cybersecurity and cyber diplomacy." IDP Revista de Internet Derecho y Política, no. 34 (December 13, 2021): 1–15. http://dx.doi.org/10.7238/idp.v0i34.387469.
Full textEvangelista, Medeiros Sabrina. "THE NEW EU CYBERSECURITY STRATEGY AND INTERAGENCY POLICIES EVOLVEMENTS." IA Policy Brief Series 1, no. 1 (2021): 1–3. https://doi.org/10.5281/zenodo.4495322.
Full textArief, Aulia Ramdhani. "An Analysis of Cybersecurity Policies and Practices in Public Administration." Journal of Public Representative and Society Provision 2, no. 2 (2022): 56–62. http://dx.doi.org/10.55885/jprsp.v2i2.211.
Full textMalatji, Masike, Annlizé L. Marnewick, and Suné von Solms. "Cybersecurity Policy and the Legislative Context of the Water and Wastewater Sector in South Africa." Sustainability 13, no. 1 (2020): 291. http://dx.doi.org/10.3390/su13010291.
Full textMartínez, Ferney, Francisco Guevara, Luis Enrique Sánchez, and Antonio Santos-Olmo. "Cybersecurity: a general framework in the maritime and military world." Ciencia y tecnología de buques 17, no. 33 (2023): 51–60. http://dx.doi.org/10.25043/19098642.242.
Full textBhandari, Bhuwan. "Cybersecurity Awareness amongst University Students: Legal Remedies and Policies to Mitigate Risks." Unity Journal 6, no. 1 (2025): 120–35. https://doi.org/10.3126/unityj.v6i1.75557.
Full textSipos, Zoltán. "Cybersecurity in Algeria." Journal of Security and Sustainability Issues 13, no. 1 (2023): 65–73. http://dx.doi.org/10.47459/jssi.2023.13.6.
Full textLucky Bamidele Benjamin, Ayodeji Enoch Adegbola, Prisca Amajuoyi, Mayokun Daniel Adegbola, and Kudirat Bukola Adeusi. "Digital transformation in SMEs: Identifying cybersecurity risks and developing effective mitigation strategies." Global Journal of Engineering and Technology Advances 19, no. 2 (2024): 134–53. http://dx.doi.org/10.30574/gjeta.2024.19.2.0084.
Full textLucky, Bamidele Benjamin, Enoch Adegbola Ayodeji, Amajuoyi Prisca, Daniel Adegbola Mayokun, and Bukola Adeusi Kudirat. "Digital transformation in SMEs: Identifying cybersecurity risks and developing effective mitigation strategies." Global Journal of Engineering and Technology Advances 19, no. 2 (2024): 134–53. https://doi.org/10.5281/zenodo.13691790.
Full textSujata Arya. "Creating Comprehensive Cybersecurity Policies: Balancing Network Protection and Compliance with Privacy Laws." Network Security 2024, no. 8 (2024): 32–39. https://doi.org/10.70985/ns.v2024i8.52.
Full textIsmail, Dr Walaa Saber. "Threat Detection and Response Using AI and NLP in Cybersecurity." Journal of Internet Services and Information Security 14, no. 1 (2024): 195–205. http://dx.doi.org/10.58346/jisis.2024.i1.013.
Full textHidayatulloh, Syarif, and Aedah Binti Abd Rahman. "Balancing Cybersecurity Policies and Institutional Ethics: A Legal and Cultural Perspective on Higher Education Frameworks." Revista de Gestão Social e Ambiental 19, no. 1 (2025): e010788. https://doi.org/10.24857/rgsa.v19n1-049.
Full textSetiyawan, Anang. "NATIONAL CYBERSECURITY POLICY IN THE U.S AND INDONESIA." UNTAG Law Review 3, no. 1 (2019): 71. http://dx.doi.org/10.36356/ulrev.v3i1.1071.
Full textKamal, Aldin Yousif Yaseen, and Abdulrauof Osman Israa. "Security Staffing Strategic Plan for Organizations Security Posture Enhancement." International Journal of Innovative Science and Research Technology (IJISRT) 10, no. 2 (2025): 909–16. https://doi.org/10.5281/zenodo.14942742.
Full textOliver, Gillian, Chris Lawrence, Narissa Timbery, et al. "Cybersecurity: Putting Indigenous Peoples First." Proceedings of the Association for Information Science and Technology 61, no. 1 (2024): 616–20. http://dx.doi.org/10.1002/pra2.1068.
Full textStoddart, Kristan. "Live Free or Die Hard: U.S.-UK Cybersecurity Policies." Political Science Quarterly 131, no. 4 (2016): 803–42. http://dx.doi.org/10.1002/polq.12535.
Full textRistolainen, Mari. "Role of Techno-Economic Coalitions in Future Cyberspace Governance: 'Backcasting' as a Method for Strategic Foresight." European Conference on Cyber Warfare and Security 22, no. 1 (2023): 395–402. http://dx.doi.org/10.34190/eccws.22.1.1078.
Full textTambe-Jagtap, Swapnali N. "Human-Centric Cybersecurity: Understanding and Mitigating the Role of Human Error in Cyber Incidents." SHIFRA 2023 (July 1, 2023): 53–59. http://dx.doi.org/10.70470/shifra/2023/007.
Full textOmorinsola Bibire Seyi- Lande, Oluwabunmi Layode, Henry Nwapali Ndidi Naiho, et al. "Circular economy and cybersecurity: Safeguarding information and resources in sustainable business models." Finance & Accounting Research Journal 6, no. 6 (2024): 953–77. http://dx.doi.org/10.51594/farj.v6i6.1214.
Full textHimanshu. "Cybersecurity Law: Challenges and Legal Frameworks for Protecting Digital Assets and Privacy Rights." Indian Journal of Law 2, no. 2 (2024): 18–22. http://dx.doi.org/10.36676/ijl.v2.i2.05.
Full textRahul Khanna. "Cybersecurity Law: Challenges and Legal Frameworks for Protecting Digital Assets and Privacy Rights." Indian Journal of Law 2, no. 3 (2024): 15–20. http://dx.doi.org/10.36676/ijl.v2.i3.28.
Full text