Journal articles on the topic 'Cybersecurity risk management'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the top 50 journal articles for your research on the topic 'Cybersecurity risk management.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.
Eaton, Tim V., Jonathan H. Grenier, and David Layman. "Accounting and Cybersecurity Risk Management." Current Issues in Auditing 13, no. 2 (2019): C1—C9. http://dx.doi.org/10.2308/ciia-52419.
Full textJafarov, N. "REDUCING CYBERSECURITY RISKS BY AUTOMATIZING RISK MANAGEMENT." Znanstvena misel journal, no. 97 (December 30, 2024): 52–55. https://doi.org/10.5281/zenodo.14575450.
Full textBriscoe, Christopher, and Carl Young. "Scale, Complexity, and Cybersecurity Risk Management." Journal of Information Security 15, no. 04 (2024): 524–44. http://dx.doi.org/10.4236/jis.2024.154029.
Full textBurrell, Darrell Norman. "Understanding Healthcare Cybersecurity Risk Management Complexity." Land Forces Academy Review 29, no. 1 (2024): 38–49. http://dx.doi.org/10.2478/raft-2024-0004.
Full textAlmaiah, Mohammed Amin. "Editorial: STAP Journal of Security Risk Management." STAP Journal of Security Risk Management 2023, no. 1 (2023): 1–2. https://doi.org/10.63180/jsrm.thestap.2023.1.1.
Full textOlawoyin, Olayinka Michael. "Blockchain Technology in Risk Management: Strengthening Cybersecurity and Financial Integrity." International Journal of Research Publication and Reviews 5, no. 10 (2024): 2336–48. http://dx.doi.org/10.55248/gengpi.5.1024.2829.
Full textGruba, Łukasz. "Cybersecurity risk assessment in railway applications." WUT Journal of Transportation Engineering 137 (December 1, 2023): 153–65. https://doi.org/10.5604/01.3001.0054.9040.
Full textKure, Halima Ibrahim, and Shareeful Islam. "Assets focus risk management framework for critical infrastructure cybersecurity risk management." IET Cyber-Physical Systems: Theory & Applications 4, no. 4 (2019): 332–40. http://dx.doi.org/10.1049/iet-cps.2018.5079.
Full textLi, He, Won Gyun No, and Tawei Wang. "SEC's cybersecurity disclosure guidance and disclosed cybersecurity risk factors." International Journal of Accounting Information Systems 30 (September 2018): 40–55. http://dx.doi.org/10.1016/j.accinf.2018.06.003.
Full textKeskin, Omer F., Kevin Matthe Caramancion, Irem Tatar, Owais Raza, and Unal Tatar. "Cyber Third-Party Risk Management: A Comparison of Non-Intrusive Risk Scoring Reports." Electronics 10, no. 10 (2021): 1168. http://dx.doi.org/10.3390/electronics10101168.
Full textAdebayo Omowunmi Temitope, LawalYusufAdedayo, and Braimoh Kareem. "Cybersecurity risk management in agile development: protecting data and system." International Journal of Science and Research Archive 8, no. 1 (2023): 988–94. http://dx.doi.org/10.30574/ijsra.2023.8.1.0188.
Full textChebib, Tom. "Digital Identity: A Human-Centered Risk Awareness Study." Muma Business Review 5 (2021): 031–33. http://dx.doi.org/10.28945/4826.
Full textSnigdha, Esrat Zahan, Muhammad Saqib Jalil, Fares Mohammed Dahwal, et al. "Cybersecurity in Healthcare IT Systems: Business Risk Management and Data Privacy Strategies." American Journal of Engineering and Technology 07, no. 03 (2025): 163–84. https://doi.org/10.37547/tajet/volume07issue03-15.
Full textSonia, Mishra. "Assessing Cyber security Risks in Project Life Cycles: An Integrated Model for Effective Risk Management." Sarcouncil Journal of Engineering and Computer Sciences 3, no. 6 (2024): 1–8. https://doi.org/10.5281/zenodo.14423341.
Full textMąkosa, Grzegorz. "Risk management as a determinant of cybersecurity." Nowoczesne Systemy Zarządzania 14, no. 3 (2021): 67–80. http://dx.doi.org/10.37055/nsz/132731.
Full textAbdulrahim, Nabihah R., Daniel O. Orwa, and Christopher A. Moturi. "Towards adequate cybersecurity risk management in SMEs." International Journal of Business Continuity and Risk Management 11, no. 4 (2021): 343. http://dx.doi.org/10.1504/ijbcrm.2021.10043709.
Full textKhan, Ashraf, and Majid Malaika. "Central Bank Risk Management, Fintech, and Cybersecurity." IMF Working Papers 2021, no. 105 (2021): 1. http://dx.doi.org/10.5089/9781513582344.001.
Full textBrandao, Pedro, and Paulo Branco. "Cybersecurity risk management in the industry 4.0." International Journal of Scientific Research and Management 10, no. 03 (2022): 747–54. http://dx.doi.org/10.18535/ijsrm/v10i3.ec01.
Full textMoturi, Christopher A., Nabihah R. Abdulrahim, and Daniel O. Orwa. "Towards adequate cybersecurity risk management in SMEs." International Journal of Business Continuity and Risk Management 11, no. 4 (2021): 343. http://dx.doi.org/10.1504/ijbcrm.2021.119943.
Full textSuryaprakash Nalluri, Murali Mohan Malyala, SukanyaKonatam, and Kiran Kumar Kandagiri. "Cybersecurity risk management in cloud computing environment." International Journal of Science and Research Archive 10, no. 1 (2023): 1062–68. http://dx.doi.org/10.30574/ijsra.2023.10.1.1127.
Full textFolorunsho, O. S., A. Q. Ayinde, M. A. Olagoke, and O. E. Fatoye. "Implementation of Cybersecurity Risk Theory and Model in Healthcare." Advances in Multidisciplinary and scientific Research Journal Publication 13, no. 4 (2022): 65–72. http://dx.doi.org/10.22624/aims/cisdi/v13n4p4.
Full textApsari, Ratna Ditha, and Tubagus Muhamad Yusuf Khudri. "An Evaluation of Cybersecurity Risk Management Implementation at Bank Pembangunan XYZ." Greenation International Journal of Economics and Accounting 3, no. 1 (2025): 102–15. https://doi.org/10.38035/gijea.v3i1.366.
Full textLee, In. "Internet of Things (IoT) Cybersecurity: Literature Review and IoT Cyber Risk Management." Future Internet 12, no. 9 (2020): 157. http://dx.doi.org/10.3390/fi12090157.
Full textGanin, Alexander A., Phuoc Quach, Mahesh Panwar, et al. "Multicriteria Decision Framework for Cybersecurity Risk Assessment and Management." Risk Analysis 40, no. 1 (2017): 183–99. http://dx.doi.org/10.1111/risa.12891.
Full textWright, Jorja. "Healthcare cybersecurity and cybercrime supply chain risk management." Health Economics and Management Review 4, no. 4 (2023): 17–27. http://dx.doi.org/10.61093/hem.2023.4-02.
Full textShikhaliyev, Ramiz H. "CYBERSECURITY RISKS MANAGEMENT OF INDUSTRIAL CONTROL SYSTEMS: A REVIEW." Problems of Information Technology 15, no. 1 (2024): 37–43. http://dx.doi.org/10.25045/jpit.v15.i1.05.
Full textSong, Ju Myung, Tawei Wang, Ju-Chun Yen, and Yu-Hung Chen. "Does cybersecurity maturity level assurance improve cybersecurity risk management in supply chains?" International Journal of Accounting Information Systems 54 (September 2024): 100695. http://dx.doi.org/10.1016/j.accinf.2024.100695.
Full textOhrt, Andrew, Kevin M. Morley, Dan Groves, and Joel Cox. "Tackle Cybersecurity and AWIA Compliance With AWWA's New Cybersecurity Risk Management Tool." Journal - American Water Works Association 112, no. 3 (2020): 70–73. http://dx.doi.org/10.1002/awwa.1466.
Full textSetiawan, Agung, Ahmad Mufti, Fajli Aijat Mau, Ahmad Purkoni, and Agus Setiawan. "Bridging Cybersecurity and Enterprise Risk Management in the Digital Era." TechComp Innovations: Journal of Computer Science and Technology 2, no. 1 (2025): 28–38. https://doi.org/10.70063/techcompinnovations.v2i1.66.
Full textMelaku, Henock Mulugeta. "Context-Based and Adaptive Cybersecurity Risk Management Framework." Risks 11, no. 6 (2023): 101. http://dx.doi.org/10.3390/risks11060101.
Full textGao, Lei, Thomas G. Calderon, and Fengchun Tang. "Public companies' cybersecurity risk disclosures." International Journal of Accounting Information Systems 38 (September 2020): 100468. http://dx.doi.org/10.1016/j.accinf.2020.100468.
Full textGoel, Rajni, Anupam Kumar, and James Haddow. "PRISM: a strategic decision framework for cybersecurity risk assessment." Information & Computer Security 28, no. 4 (2020): 591–625. http://dx.doi.org/10.1108/ics-11-2018-0131.
Full textKuhlman, Richard, and Jason Kempf. "FINRA publishes its 2015 “Report on Cybersecurity Practices”." Journal of Investment Compliance 16, no. 2 (2015): 47–51. http://dx.doi.org/10.1108/joic-04-2015-0025.
Full textNkambule, Mafika, and Joey Jansen van Vuuren. "Integrating Enterprise Architecture into Cybersecurity Risk Management in Higher Education." International Conference on Cyber Warfare and Security 19, no. 1 (2024): 501–10. http://dx.doi.org/10.34190/iccws.19.1.2189.
Full textWan Mohamad, Wan Azlena, Noor Hayani Abd Rahim, and Nurul Nuha Abdul Molok. "Leadership Commitment: A Key Factor in Implementation of Event-Based Cybersecurity Risk Assessment." Malaysian Journal of Social Sciences and Humanities (MJSSH) 10, no. 4 (2025): e003365. https://doi.org/10.47405/mjssh.v10i4.3365.
Full textShires, James. "Enacting Expertise: Ritual and Risk in Cybersecurity." Politics and Governance 6, no. 2 (2018): 31–40. http://dx.doi.org/10.17645/pag.v6i2.1329.
Full textHalachev, Petar. "A big data approach to risk management and control: Cybersecurity in accounting." Periodicals of Engineering and Natural Sciences (PEN) 12, no. 2 (2024): 331–42. https://doi.org/10.21533/pen.v12.i2.39.
Full textAbel Uzoka, Emmanuel Cadet, and Pascal Ugochukwu Ojukwu. "Applying artificial intelligence in Cybersecurity to enhance threat detection, response, and risk management." Computer Science & IT Research Journal 5, no. 10 (2024): 2511–38. http://dx.doi.org/10.51594/csitrj.v5i10.1677.
Full textGunawan, Budi, Barito Mulyo Ratmono, Denok Kurniasih, and Paulus Israwan Setyoko. "Cybersecurity effectiveness: The role of internal auditor certification, risk assessment and senior management." International Journal of Data and Network Science 7, no. 4 (2023): 1805–14. http://dx.doi.org/10.5267/j.ijdns.2023.7.011.
Full textSaveliev, D. V. "Risk Management and Assessment in Software Development Projects." Èlektronnoe modelirovanie 43, no. 4 (2021): 113–24. http://dx.doi.org/10.15407/emodel.43.04.113.
Full textVeiga, Bruna. "Evolution of Compliance and Cybersecurity: A Risk Management Perspective in Financial Markets." International Journal of Science and Research (IJSR) 13, no. 10 (2024): 1205–7. http://dx.doi.org/10.21275/sr241011004135.
Full textSinggalen, Yerik Afrianto, Hindriyanto Dwi Purnomo, and Irwan Sembiring. "Exploring MSMEs Cybersecurity Awareness and Risk Management : Information Security Awareness." IJCCS (Indonesian Journal of Computing and Cybernetics Systems) 15, no. 3 (2021): 233. http://dx.doi.org/10.22146/ijccs.67010.
Full textGbenga Femi, Asere, and Madu Medugu. "ENHANCING ADAPTIVE CYBERSECURITY RISK MANAGEMENT THROUGH AI-DRIVEN THREAT DETECTION." International Journal Of Trendy Research In Engineering And Technology 09, no. 02 (2025): 106–10. https://doi.org/10.54473/ijtret.2025.9210.
Full textAlexander, Cheryl Ann, and Lidong Wang. "Cyber risk management: Theories, frameworks, models, and practices." Computer and Telecommunication Engineering 3, no. 1 (2025): 3118. https://doi.org/10.54517/cte3118.
Full textOkolo, Francess, and Arume Ighoroje. "Security Awareness Programs and Behavioral Patterns in Nigeria Deposit Money Banks: Adopting a Robust Cybersecurity Culture." International Journal of Research and Innovation in Social Science VIII, no. VI (2024): 239–56. http://dx.doi.org/10.47772/ijriss.2024.806019.
Full textLee, In. "Cybersecurity: Risk management framework and investment cost analysis." Business Horizons 64, no. 5 (2021): 659–71. http://dx.doi.org/10.1016/j.bushor.2021.02.022.
Full textRoldán Álvarez, Miguel Ángel, and Héctor Fernando Vargas Montoya. "Cybersecurity in Mobile Telecommunication Networks and Management Risk." Ingeniería y Desarrollo 38, no. 2 (2021): 279–97. http://dx.doi.org/10.14482/inde.38.2.006.31.
Full textAwasthi, Amit. "ADAPTING CYBERSECURITY RISK MANAGEMENT FOR THE QUANTUM FUTURE." INTERNATIONAL JOURNAL OF RESEARCH IN COMPUTER APPLICATIONS AND INFORMATION TECHNOLOGY 8, no. 1 (2025): 703–14. https://doi.org/10.34218/ijrcait_08_01_054.
Full textCam, Hasan, and Pierre Mouallem. "Mission assurance policy and risk management in cybersecurity." Environment Systems and Decisions 33, no. 4 (2013): 500–507. http://dx.doi.org/10.1007/s10669-013-9468-z.
Full textKim, Dong-Won, Jin-Young Choi, and Keun-Hee Han. "Medical Device Safety Management Using Cybersecurity Risk Analysis." IEEE Access 8 (2020): 115370–82. http://dx.doi.org/10.1109/access.2020.3003032.
Full text