To see the other types of publications on this topic, follow the link: Cybersecurity risk management.

Journal articles on the topic 'Cybersecurity risk management'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the top 50 journal articles for your research on the topic 'Cybersecurity risk management.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.

1

Eaton, Tim V., Jonathan H. Grenier, and David Layman. "Accounting and Cybersecurity Risk Management." Current Issues in Auditing 13, no. 2 (2019): C1—C9. http://dx.doi.org/10.2308/ciia-52419.

Full text
Abstract:
SUMMARY As the number of cybersecurity incidents continue to rise and stakeholders are becoming increasingly concerned, companies are devoting considerable resources to their cybersecurity risk management efforts and related cybersecurity disclosures. This paper describes how accountants are uniquely positioned to assist companies with these efforts in advisory and assurance capacities. We present a model of effective cybersecurity risk management and discuss how accountants' core competencies can add significant value in each of the model's five stages. In addition, we use several recent high
APA, Harvard, Vancouver, ISO, and other styles
2

Jafarov, N. "REDUCING CYBERSECURITY RISKS BY AUTOMATIZING RISK MANAGEMENT." Znanstvena misel journal, no. 97 (December 30, 2024): 52–55. https://doi.org/10.5281/zenodo.14575450.

Full text
Abstract:
The article explains how to reduce cybersecurity risks by automating risk management. The capabilities of the Security Vision Cyber Risk System, which creates the basis for automating the full cycle of cyber risk management, are explained. The essence of risk management automation and what it is needed for are given, as well as the main advantages of risk management automation.
APA, Harvard, Vancouver, ISO, and other styles
3

Briscoe, Christopher, and Carl Young. "Scale, Complexity, and Cybersecurity Risk Management." Journal of Information Security 15, no. 04 (2024): 524–44. http://dx.doi.org/10.4236/jis.2024.154029.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Burrell, Darrell Norman. "Understanding Healthcare Cybersecurity Risk Management Complexity." Land Forces Academy Review 29, no. 1 (2024): 38–49. http://dx.doi.org/10.2478/raft-2024-0004.

Full text
Abstract:
Abstract It is important to fully comprehend the critical role of the healthcare and public health sector in safeguarding the economy from various threats, including terrorism, infectious diseases, and natural disasters. The private ownership of many healthcare assets underscores the need for enhanced collaboration and information sharing between the public and private sectors. The COVID-19 pandemic has accelerated the digitalization of this sector, leading to a heightened risk of cyber threats. The increasing reliance on emerging technologies such as blockchain, the metaverse, and virtual rea
APA, Harvard, Vancouver, ISO, and other styles
5

Almaiah, Mohammed Amin. "Editorial: STAP Journal of Security Risk Management." STAP Journal of Security Risk Management 2023, no. 1 (2023): 1–2. https://doi.org/10.63180/jsrm.thestap.2023.1.1.

Full text
Abstract:
Dear Readers, It is with great pleasure that we introduce to you our upcoming journal, " STAP Journal of Security Risk Management." This journal is dedicated to exploring the advancements in the field of cybersecurity and providing a platform for researchers and scholars to exchange ideas, fostering progress in the area of security and risk management. On behalf of the editorial team, I extend our heartfelt gratitude and a warm welcome to the scholars, experts, researchers, and readers who support and follow our journal. Purpose of the Journal The STAP Journal of Security Risk Management aims
APA, Harvard, Vancouver, ISO, and other styles
6

Olawoyin, Olayinka Michael. "Blockchain Technology in Risk Management: Strengthening Cybersecurity and Financial Integrity." International Journal of Research Publication and Reviews 5, no. 10 (2024): 2336–48. http://dx.doi.org/10.55248/gengpi.5.1024.2829.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Gruba, Łukasz. "Cybersecurity risk assessment in railway applications." WUT Journal of Transportation Engineering 137 (December 1, 2023): 153–65. https://doi.org/10.5604/01.3001.0054.9040.

Full text
Abstract:
Abstract: Cybersecurity has become an extremely important aspect in the modern world, and its importance extends to various sectors, including railway transport. Particularly noteworthy is cybersecurity in the field of systems and products that have a direct impact on the safety of rail traffic. For such solutions, it is necessary to develop a common approach to cybersecurity management that will ensure adequate resistance of the product to intentional or unintentional attacks from the outside, covering all stages of the product's life. The article focuses on presenting the issue of cybersecur
APA, Harvard, Vancouver, ISO, and other styles
8

Kure, Halima Ibrahim, and Shareeful Islam. "Assets focus risk management framework for critical infrastructure cybersecurity risk management." IET Cyber-Physical Systems: Theory & Applications 4, no. 4 (2019): 332–40. http://dx.doi.org/10.1049/iet-cps.2018.5079.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Li, He, Won Gyun No, and Tawei Wang. "SEC's cybersecurity disclosure guidance and disclosed cybersecurity risk factors." International Journal of Accounting Information Systems 30 (September 2018): 40–55. http://dx.doi.org/10.1016/j.accinf.2018.06.003.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Keskin, Omer F., Kevin Matthe Caramancion, Irem Tatar, Owais Raza, and Unal Tatar. "Cyber Third-Party Risk Management: A Comparison of Non-Intrusive Risk Scoring Reports." Electronics 10, no. 10 (2021): 1168. http://dx.doi.org/10.3390/electronics10101168.

Full text
Abstract:
Cybersecurity is a concern for organizations in this era. However, strengthening the security of an organization’s internal network may not be sufficient since modern organizations depend on third parties, and these dependencies may open new attack paths to cybercriminals. Cyber Third-Party Risk Management (C-TPRM) is a relatively new concept in the business world. All vendors or partners possess a potential security vulnerability and threat. Even if an organization has the best cybersecurity practice, its data, customers, and reputation may be at risk because of a third party. Organizations s
APA, Harvard, Vancouver, ISO, and other styles
11

Adebayo Omowunmi Temitope, LawalYusufAdedayo, and Braimoh Kareem. "Cybersecurity risk management in agile development: protecting data and system." International Journal of Science and Research Archive 8, no. 1 (2023): 988–94. http://dx.doi.org/10.30574/ijsra.2023.8.1.0188.

Full text
Abstract:
The rapid evolution of technology and the increasing complexity of systems have made cybersecurity a critical concern for organizations, particularly in the context of Agile development. Agile methodologies prioritize flexibility, collaboration, and iterative progress, which can inadvertently introduce unique cybersecurity risks. This paper explores the integration of cybersecurity risk management practices within Agile development frameworks, emphasizing the need for organizations to proactively address vulnerabilities while maintaining the agility of their development processes. By examining
APA, Harvard, Vancouver, ISO, and other styles
12

Chebib, Tom. "Digital Identity: A Human-Centered Risk Awareness Study." Muma Business Review 5 (2021): 031–33. http://dx.doi.org/10.28945/4826.

Full text
Abstract:
Cybersecurity breaches have been at the forefront of most news outlets, recently. People’s Digital Identity has been at the epicenter of cybersecurity breaches. Defining the composition of digital identity is the first step at risk identification and the first step towards risk mitigation. Cybersecurity risk management tools are lacking in user-centricity. Organizations like the National Institute of Standards and Technology have to craft user-centric personal cybersecurity risk management frameworks.
APA, Harvard, Vancouver, ISO, and other styles
13

Snigdha, Esrat Zahan, Muhammad Saqib Jalil, Fares Mohammed Dahwal, et al. "Cybersecurity in Healthcare IT Systems: Business Risk Management and Data Privacy Strategies." American Journal of Engineering and Technology 07, no. 03 (2025): 163–84. https://doi.org/10.37547/tajet/volume07issue03-15.

Full text
Abstract:
The security threats against healthcare IT systems create multiple significant hazards to patient data purity together with compliance requirements and ongoing organizational operations. These days growing healthcare digitization has caused cyberattacks like ransomware and data breaches and phishing attacks to increase sharply while creating financial damage and reputation loss for healthcare facilities. The research will examine how business risk management combines with data privacy strategies to safeguard healthcare cybersecurity structures through analysis of risk mitigation plans and regu
APA, Harvard, Vancouver, ISO, and other styles
14

Sonia, Mishra. "Assessing Cyber security Risks in Project Life Cycles: An Integrated Model for Effective Risk Management." Sarcouncil Journal of Engineering and Computer Sciences 3, no. 6 (2024): 1–8. https://doi.org/10.5281/zenodo.14423341.

Full text
Abstract:
Cybersecurity risks are a growing concern across project life cycles, especially as digital dependencies increase. This study presents an integrated model designed to identify, assess, and mitigate cybersecurity risks within each phase of a project life cycle, from initiation through closure. Through a combination of qualitative interviews, case studies, and statistical analysis, this study maps specific cyber threats to project phases, analyzes the effectiveness of various cybersecurity software tools (including FireEye, Splunk, and Cylance), and examines the impact of industry type, project
APA, Harvard, Vancouver, ISO, and other styles
15

Mąkosa, Grzegorz. "Risk management as a determinant of cybersecurity." Nowoczesne Systemy Zarządzania 14, no. 3 (2021): 67–80. http://dx.doi.org/10.37055/nsz/132731.

Full text
Abstract:
Celem artykułu jest wykazanie zależności bezpieczeństwa i cyberbezpieczeństwa od ryzyka i zarządzania ryzykiem. Praca przedstawia definicje oraz proces zarządzania ryzykiem zdefiniowany w normie PN EN ISO 27005:2014 Technika informatyczna – Techniki bezpieczeństwa – Zarządzanie ryzykiem w bezpieczeństwie informacji, składający się z procesów ustanowienia kontekstu, szacowania ryzyka, czyli identyfikacji, analizy oraz oceny ryzyka, postępowania z ryzykiem, informowania i konsultowania oraz monitorowania i przeglądu. W dalszej części artykułu autor przechodzi od definicji bezpieczeństwa, cyberbe
APA, Harvard, Vancouver, ISO, and other styles
16

Abdulrahim, Nabihah R., Daniel O. Orwa, and Christopher A. Moturi. "Towards adequate cybersecurity risk management in SMEs." International Journal of Business Continuity and Risk Management 11, no. 4 (2021): 343. http://dx.doi.org/10.1504/ijbcrm.2021.10043709.

Full text
APA, Harvard, Vancouver, ISO, and other styles
17

Khan, Ashraf, and Majid Malaika. "Central Bank Risk Management, Fintech, and Cybersecurity." IMF Working Papers 2021, no. 105 (2021): 1. http://dx.doi.org/10.5089/9781513582344.001.

Full text
APA, Harvard, Vancouver, ISO, and other styles
18

Brandao, Pedro, and Paulo Branco. "Cybersecurity risk management in the industry 4.0." International Journal of Scientific Research and Management 10, no. 03 (2022): 747–54. http://dx.doi.org/10.18535/ijsrm/v10i3.ec01.

Full text
Abstract:
A referential and abstract model will be presented to be applied in risk management on cloud computing and industry ICS platforms in general. we are looking at the types of assessments that are out there, we explore the different approaches and techniques behind information technology systems risk assessments and complexity of conducting industrial control system safely at-risk control level.
APA, Harvard, Vancouver, ISO, and other styles
19

Moturi, Christopher A., Nabihah R. Abdulrahim, and Daniel O. Orwa. "Towards adequate cybersecurity risk management in SMEs." International Journal of Business Continuity and Risk Management 11, no. 4 (2021): 343. http://dx.doi.org/10.1504/ijbcrm.2021.119943.

Full text
APA, Harvard, Vancouver, ISO, and other styles
20

Suryaprakash Nalluri, Murali Mohan Malyala, SukanyaKonatam, and Kiran Kumar Kandagiri. "Cybersecurity risk management in cloud computing environment." International Journal of Science and Research Archive 10, no. 1 (2023): 1062–68. http://dx.doi.org/10.30574/ijsra.2023.10.1.1127.

Full text
Abstract:
It starts with a case review of the special characteristics of the cloud computing threat and vulnerability, such as data leakage, inside threats, shared resources vulnerabilities. A review of the literature on current models and tools for managing these risks, including the most relevant studies as well as Good Practice Guidelines. The book addresses how traditional security models need to be adapted for the cloud and outlines the efficacy of various security technologies - including encryption, IAM (identity and access management), and IDS, the work presented a reliable risk management frame
APA, Harvard, Vancouver, ISO, and other styles
21

Folorunsho, O. S., A. Q. Ayinde, M. A. Olagoke, and O. E. Fatoye. "Implementation of Cybersecurity Risk Theory and Model in Healthcare." Advances in Multidisciplinary and scientific Research Journal Publication 13, no. 4 (2022): 65–72. http://dx.doi.org/10.22624/aims/cisdi/v13n4p4.

Full text
Abstract:
This review paper examines the implementation of cybersecurity risk theory and models in Healthcare, including their benefits and challenges. The paper begins with an overview of cybersecurity risk theory and models, including the STAMP theory and various types of models. It then compares different cybersecurity risk models and discusses their strengths and weaknesses. The paper also explores case studies of the successful implementation of cybersecurity risk models in Healthcare and the challenges these organizations face. The importance of risk assessment and management in healthcare cyberse
APA, Harvard, Vancouver, ISO, and other styles
22

Apsari, Ratna Ditha, and Tubagus Muhamad Yusuf Khudri. "An Evaluation of Cybersecurity Risk Management Implementation at Bank Pembangunan XYZ." Greenation International Journal of Economics and Accounting 3, no. 1 (2025): 102–15. https://doi.org/10.38035/gijea.v3i1.366.

Full text
Abstract:
Cybersecurity risk management in the financial sector is crucial for mitigating cybersecurity threats. The main objective of this study is to evaluate the implementation of cybersecurity risk management at Bank Pembangunan Daerah XYZ. This research employs a qualitative method with a case study strategy, using primary and secondary data sources through semi structured interviews and surveys conducted with employees and managers of Bank Pembangunan Daerah XYZ. The data is processed using narrative analysis techniques. The findings of this study reveal gaps in the implementation of cybersecurity
APA, Harvard, Vancouver, ISO, and other styles
23

Lee, In. "Internet of Things (IoT) Cybersecurity: Literature Review and IoT Cyber Risk Management." Future Internet 12, no. 9 (2020): 157. http://dx.doi.org/10.3390/fi12090157.

Full text
Abstract:
Along with the growing threat of cyberattacks, cybersecurity has become one of the most important areas of the Internet of Things (IoT). The purpose of IoT cybersecurity is to reduce cybersecurity risk for organizations and users through the protection of IoT assets and privacy. New cybersecurity technologies and tools provide potential for better IoT security management. However, there is a lack of effective IoT cyber risk management frameworks for managers. This paper reviews IoT cybersecurity technologies and cyber risk management frameworks. Then, this paper presents a four-layer IoT cyber
APA, Harvard, Vancouver, ISO, and other styles
24

Ganin, Alexander A., Phuoc Quach, Mahesh Panwar, et al. "Multicriteria Decision Framework for Cybersecurity Risk Assessment and Management." Risk Analysis 40, no. 1 (2017): 183–99. http://dx.doi.org/10.1111/risa.12891.

Full text
APA, Harvard, Vancouver, ISO, and other styles
25

Wright, Jorja. "Healthcare cybersecurity and cybercrime supply chain risk management." Health Economics and Management Review 4, no. 4 (2023): 17–27. http://dx.doi.org/10.61093/hem.2023.4-02.

Full text
Abstract:
Cybersecurity is paramount in today’s rapidly evolving healthcare industry, particularly as supply chain management and logistics undergo digital transformation. This study examines the substantial threat posed by cybercrime to patient safety, data security, and operational efficiency within healthcare logistics and supply chain management. These risks can significantly impact an organization’s reputation and financial stability, necessitating vigilant detection and mitigation efforts by healthcare companies. As the primary defence against online threats, cybersecurity plays a pivotal role in
APA, Harvard, Vancouver, ISO, and other styles
26

Shikhaliyev, Ramiz H. "CYBERSECURITY RISKS MANAGEMENT OF INDUSTRIAL CONTROL SYSTEMS: A REVIEW." Problems of Information Technology 15, no. 1 (2024): 37–43. http://dx.doi.org/10.25045/jpit.v15.i1.05.

Full text
Abstract:
Industrial control systems (ICS) form the basis of critical infrastructures, managing complex processes in various sectors of industry, energy, etc. With the increasing frequency and complexity of cyber threats, effective management of ICS cybersecurity risks is critical. This paper is devoted to the analysis of approaches used in the field of cybersecurity risk management of automated process control systems. The study examines the cybersecurity risks of ICS and the role of international standards in managing cybersecurity risks. The results of the analysis carried out in this paper can serve
APA, Harvard, Vancouver, ISO, and other styles
27

Song, Ju Myung, Tawei Wang, Ju-Chun Yen, and Yu-Hung Chen. "Does cybersecurity maturity level assurance improve cybersecurity risk management in supply chains?" International Journal of Accounting Information Systems 54 (September 2024): 100695. http://dx.doi.org/10.1016/j.accinf.2024.100695.

Full text
APA, Harvard, Vancouver, ISO, and other styles
28

Ohrt, Andrew, Kevin M. Morley, Dan Groves, and Joel Cox. "Tackle Cybersecurity and AWIA Compliance With AWWA's New Cybersecurity Risk Management Tool." Journal - American Water Works Association 112, no. 3 (2020): 70–73. http://dx.doi.org/10.1002/awwa.1466.

Full text
APA, Harvard, Vancouver, ISO, and other styles
29

Setiawan, Agung, Ahmad Mufti, Fajli Aijat Mau, Ahmad Purkoni, and Agus Setiawan. "Bridging Cybersecurity and Enterprise Risk Management in the Digital Era." TechComp Innovations: Journal of Computer Science and Technology 2, no. 1 (2025): 28–38. https://doi.org/10.70063/techcompinnovations.v2i1.66.

Full text
Abstract:
This paper explores the strategic integration of cybersecurity into enterprise risk management (ERM) frameworks to enhance digital resilience in modern organizations. Drawing on a qualitative library research method, the study synthesizes literature, models, and case analyses to identify best practices and governance structures that align technical cybersecurity measures with broader organizational goals. The research reveals that treating cybersecurity as an isolated IT function weakens risk visibility and incident response, while embedding it within ERM enables proactive identification, prio
APA, Harvard, Vancouver, ISO, and other styles
30

Melaku, Henock Mulugeta. "Context-Based and Adaptive Cybersecurity Risk Management Framework." Risks 11, no. 6 (2023): 101. http://dx.doi.org/10.3390/risks11060101.

Full text
Abstract:
Currently, organizations are faced with a variety of cyber-threats and are possibly challenged by a wide range of cyber-attacks of varying frequency, complexity, and impact. However, they can do something to prevent, or at least mitigate, these cyber-attacks by first understanding and addressing their common problems regarding cybersecurity culture, developing a cyber-risk management plan, and devising a more proactive and collaborative approach that is suitable according to their organization context. To this end, firstly various enterprise, Information Technology (IT), and cybersecurity risk
APA, Harvard, Vancouver, ISO, and other styles
31

Gao, Lei, Thomas G. Calderon, and Fengchun Tang. "Public companies' cybersecurity risk disclosures." International Journal of Accounting Information Systems 38 (September 2020): 100468. http://dx.doi.org/10.1016/j.accinf.2020.100468.

Full text
APA, Harvard, Vancouver, ISO, and other styles
32

Goel, Rajni, Anupam Kumar, and James Haddow. "PRISM: a strategic decision framework for cybersecurity risk assessment." Information & Computer Security 28, no. 4 (2020): 591–625. http://dx.doi.org/10.1108/ics-11-2018-0131.

Full text
Abstract:
Purpose This study aims to develop a framework for cybersecurity risk assessment in an organization. Existing cybersecurity frameworks are complex and implementation oriented. The framework can be systematically used to assess the strategic orientation of a firm with respect to its cybersecurity posture. The goal is to assist top-management-team with tailoring their decision-making about security investments while managing cyber risk at their organization. Design/methodology/approach A thematic analysis of existing publications using content analysis techniques generates the initial set of key
APA, Harvard, Vancouver, ISO, and other styles
33

Kuhlman, Richard, and Jason Kempf. "FINRA publishes its 2015 “Report on Cybersecurity Practices”." Journal of Investment Compliance 16, no. 2 (2015): 47–51. http://dx.doi.org/10.1108/joic-04-2015-0025.

Full text
Abstract:
Purpose – To summarize and comment on FINRA’s report on cybersecurity practices, published on February 4, 2015, which arose from its 2014 targeted examination of firms’ cybersecurity preparedness. Design/methodology/approach – Explains the implications of the FINRA report and general guidance FINRA provides and expects all firms to consider in connection with developing their respective cybersecurity programs in eight areas: governance and risk management for cybersecurity; cybersecurity risk assessment; technical controls; incident response planning; vendor management; staff training; cyber i
APA, Harvard, Vancouver, ISO, and other styles
34

Nkambule, Mafika, and Joey Jansen van Vuuren. "Integrating Enterprise Architecture into Cybersecurity Risk Management in Higher Education." International Conference on Cyber Warfare and Security 19, no. 1 (2024): 501–10. http://dx.doi.org/10.34190/iccws.19.1.2189.

Full text
Abstract:
Cybercriminals constantly seek new methods to infiltrate a company's defences, making cybersecurity investments essential. Enterprise architecture (EA) provides a systematic risk detection and mitigation process by emphasising the interdependencies between systems, data, processes, people, and other factors. This paper provides a comprehensive approach, also referred to as a process, based on EA to assist African universities in developing a comprehensive cybersecurity plan. The EA process comprises four pillars: business architecture, data architecture, application architecture, and technolog
APA, Harvard, Vancouver, ISO, and other styles
35

Wan Mohamad, Wan Azlena, Noor Hayani Abd Rahim, and Nurul Nuha Abdul Molok. "Leadership Commitment: A Key Factor in Implementation of Event-Based Cybersecurity Risk Assessment." Malaysian Journal of Social Sciences and Humanities (MJSSH) 10, no. 4 (2025): e003365. https://doi.org/10.47405/mjssh.v10i4.3365.

Full text
Abstract:
Implementing event-based cybersecurity risk assessment offers organisations a proactive approach to managing cyber threats in real-time. Unlike the asset-based approach, the event-based approach focuses on identifying and analysing potential cyber-attacks or events, rather than relying on static asset inventories. However, successful cybersecurity implementation relies not only on technical expertise but also on managerial expertise, such as strong leadership commitment. Leadership plays an important role in prioritising cybersecurity initiatives. It secures the necessary resources and ensures
APA, Harvard, Vancouver, ISO, and other styles
36

Shires, James. "Enacting Expertise: Ritual and Risk in Cybersecurity." Politics and Governance 6, no. 2 (2018): 31–40. http://dx.doi.org/10.17645/pag.v6i2.1329.

Full text
Abstract:
This article applies the concept of ritual to cybersecurity expertise, beginning with the cybersecurity “skills gap”: the perceived lack of suitably qualified professionals necessary to tackle contemporary cybersecurity challenges. It proposes that cybersecurity expertise is best understood as a skilled performance which satisfies decision-makers’ demands for risk management. This alternative understanding of cybersecurity expertise enables investigation of the types of performance involved in key events which congregate experts together: cybersecurity conferences. The article makes two key cl
APA, Harvard, Vancouver, ISO, and other styles
37

Halachev, Petar. "A big data approach to risk management and control: Cybersecurity in accounting." Periodicals of Engineering and Natural Sciences (PEN) 12, no. 2 (2024): 331–42. https://doi.org/10.21533/pen.v12.i2.39.

Full text
Abstract:
This research reviews into the critical interplay between big data applications and cybersecurity risks within the accounting sector. Aimed at understanding how big data can mitigate these risks, the study develops a novel theoretical model using differential equations. This model, rooted in a thorough empirical approach, undergoes validation through logistic regression analysis of responses from 200 participants. The analysis particularly focuses on how demographic and socio-economic factors influence cybersecurity perceptions. Data Breach Consistency emerges as a key factor, evidenced by a c
APA, Harvard, Vancouver, ISO, and other styles
38

Abel Uzoka, Emmanuel Cadet, and Pascal Ugochukwu Ojukwu. "Applying artificial intelligence in Cybersecurity to enhance threat detection, response, and risk management." Computer Science & IT Research Journal 5, no. 10 (2024): 2511–38. http://dx.doi.org/10.51594/csitrj.v5i10.1677.

Full text
Abstract:
This paper explores the application of Artificial Intelligence (AI) in cybersecurity, emphasizing its potential to enhance threat detection, response, and risk management. The study's primary objective is to analyze how AI-driven tools and techniques can improve the efficiency and effectiveness of cybersecurity measures in organizations. Employing a comprehensive literature review and case study analysis, the research investigates current AI applications in threat detection, including machine learning algorithms, anomaly detection systems, and predictive analytics. The findings reveal that AI
APA, Harvard, Vancouver, ISO, and other styles
39

Gunawan, Budi, Barito Mulyo Ratmono, Denok Kurniasih, and Paulus Israwan Setyoko. "Cybersecurity effectiveness: The role of internal auditor certification, risk assessment and senior management." International Journal of Data and Network Science 7, no. 4 (2023): 1805–14. http://dx.doi.org/10.5267/j.ijdns.2023.7.011.

Full text
Abstract:
This study aims to analyze and examine the influence of internal auditor certification, risk assessment, and the role of senior management on the effectiveness of cybersecurity for internal auditors who have experience in cybersecurity and information technology. This research method is a quantitative method, data analysis uses structural equation modeling (SEM) with SmartPLS 3.0 software tools. The population of this study is internal auditors who have experience in cybersecurity and information technology. The sample for this study was 480 respondents who were determined by the snowball samp
APA, Harvard, Vancouver, ISO, and other styles
40

Saveliev, D. V. "Risk Management and Assessment in Software Development Projects." Èlektronnoe modelirovanie 43, no. 4 (2021): 113–24. http://dx.doi.org/10.15407/emodel.43.04.113.

Full text
Abstract:
The article defines the concept of threat model. Described a list of current security guidelines for the development and administration of web systems. Formed the list of cybersecurity threats, the consequences of their implementation are determined. Described the process of forming a model of cybersecurity threats of web systems. Defined the list of threats based on the recommendations and experience of authoritative organizations in the world and Ukraine. Defined the concepts of risk, risk index and risk status for the security of web systems. Defined the main principles of risk management i
APA, Harvard, Vancouver, ISO, and other styles
41

Veiga, Bruna. "Evolution of Compliance and Cybersecurity: A Risk Management Perspective in Financial Markets." International Journal of Science and Research (IJSR) 13, no. 10 (2024): 1205–7. http://dx.doi.org/10.21275/sr241011004135.

Full text
APA, Harvard, Vancouver, ISO, and other styles
42

Singgalen, Yerik Afrianto, Hindriyanto Dwi Purnomo, and Irwan Sembiring. "Exploring MSMEs Cybersecurity Awareness and Risk Management : Information Security Awareness." IJCCS (Indonesian Journal of Computing and Cybernetics Systems) 15, no. 3 (2021): 233. http://dx.doi.org/10.22146/ijccs.67010.

Full text
Abstract:
The use of information technology in the management of Micro, Small, and Medium Enterprises (MSMEs) is not limited to business performance and productivity but also aspects of data security and transactions using various mobile, website, and desktop-based applications. This article offers an idea to explore cybersecurity awareness and risk management of MSME actors who adopt information technology. The research method used is qualitative with a case study approach in the Coffeeshop X business and the Y Souvenir business in Salatiga City, Central Java, Indonesia. The data collection technique u
APA, Harvard, Vancouver, ISO, and other styles
43

Gbenga Femi, Asere, and Madu Medugu. "ENHANCING ADAPTIVE CYBERSECURITY RISK MANAGEMENT THROUGH AI-DRIVEN THREAT DETECTION." International Journal Of Trendy Research In Engineering And Technology 09, no. 02 (2025): 106–10. https://doi.org/10.54473/ijtret.2025.9210.

Full text
Abstract:
Adaptive cybersecurity risk management is a dynamic approach to addressing evolving security threats, and artificial intelligence (AI) plays a crucial role in enhancing its effectiveness. This paper explores how AI-driven threat detection can strengthen adaptive cybersecurity frameworks by enabling faster, more accurate identification and response to emerging risks. By leveraging machine learning, neural networks, and predictive analytics, AI systems can continuously monitor network environments, detect anomalies, and predict potential vulnerabilities before they are exploited. These AI techno
APA, Harvard, Vancouver, ISO, and other styles
44

Alexander, Cheryl Ann, and Lidong Wang. "Cyber risk management: Theories, frameworks, models, and practices." Computer and Telecommunication Engineering 3, no. 1 (2025): 3118. https://doi.org/10.54517/cte3118.

Full text
Abstract:
<p align="justify">Cyber risks have been a major concern even if more advanced technologies have been used to deter or mitigate cyberattacks. Much research has been conducted in the areas of cyber risks and cybersecurity. Handling cyber risks needs the specific support of the theories, frameworks, and models of cyber risk management. This paper introduces theories for managing cyber risks, frameworks for handling cyber risks, models for managing cyber risks, and cyber risk management and practices. Cyber risk management and threat intelligence provide their technologies and standards. He
APA, Harvard, Vancouver, ISO, and other styles
45

Okolo, Francess, and Arume Ighoroje. "Security Awareness Programs and Behavioral Patterns in Nigeria Deposit Money Banks: Adopting a Robust Cybersecurity Culture." International Journal of Research and Innovation in Social Science VIII, no. VI (2024): 239–56. http://dx.doi.org/10.47772/ijriss.2024.806019.

Full text
Abstract:
In an era marked by evolving cybersecurity threats, understanding the interplay between Security Awareness Programs, Behavioral Patterns, and Cybersecurity Culture is essential for safeguarding organizational assets and maintaining trust in financial institutions. This study investigated this relationship within Nigeria’s Deposit Money Banks, employing a comprehensive analysis of key variables such as Compliance Adherence, Security Policy Acknowledgements, Training Completion Rate, Risk Awareness and Management, Behavioral Analytics, Employee Feedback and Engagement, and Incident Response Time
APA, Harvard, Vancouver, ISO, and other styles
46

Lee, In. "Cybersecurity: Risk management framework and investment cost analysis." Business Horizons 64, no. 5 (2021): 659–71. http://dx.doi.org/10.1016/j.bushor.2021.02.022.

Full text
APA, Harvard, Vancouver, ISO, and other styles
47

Roldán Álvarez, Miguel Ángel, and Héctor Fernando Vargas Montoya. "Cybersecurity in Mobile Telecommunication Networks and Management Risk." Ingeniería y Desarrollo 38, no. 2 (2021): 279–97. http://dx.doi.org/10.14482/inde.38.2.006.31.

Full text
APA, Harvard, Vancouver, ISO, and other styles
48

Awasthi, Amit. "ADAPTING CYBERSECURITY RISK MANAGEMENT FOR THE QUANTUM FUTURE." INTERNATIONAL JOURNAL OF RESEARCH IN COMPUTER APPLICATIONS AND INFORMATION TECHNOLOGY 8, no. 1 (2025): 703–14. https://doi.org/10.34218/ijrcait_08_01_054.

Full text
APA, Harvard, Vancouver, ISO, and other styles
49

Cam, Hasan, and Pierre Mouallem. "Mission assurance policy and risk management in cybersecurity." Environment Systems and Decisions 33, no. 4 (2013): 500–507. http://dx.doi.org/10.1007/s10669-013-9468-z.

Full text
APA, Harvard, Vancouver, ISO, and other styles
50

Kim, Dong-Won, Jin-Young Choi, and Keun-Hee Han. "Medical Device Safety Management Using Cybersecurity Risk Analysis." IEEE Access 8 (2020): 115370–82. http://dx.doi.org/10.1109/access.2020.3003032.

Full text
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!