To see the other types of publications on this topic, follow the link: Cybersecurity.

Journal articles on the topic 'Cybersecurity'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the top 50 journal articles for your research on the topic 'Cybersecurity.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.

1

Whyte, Jeffrey. "Cybersecurity, race, and the politics of truth." Security Dialogue 53, no. 4 (2022): 342–62. http://dx.doi.org/10.1177/09670106221101725.

Full text
Abstract:
This article explores the racial politics underwriting cybersecurity’s recent human turn toward the issues of online disinformation and ‘foreign influence’ in US politics. Through a case study of the Black Lives Matter (BLM) movement, this article’s first half considers how contemporary cybersecurity has produced ‘racial division’ as an object of security by framing the BLM movement as a geopolitical vulnerability open to foreign manipulation through social media. In its emphasis on the political protest as a site of insecurity, I argue that contemporary cybersecurity has widened its tradition
APA, Harvard, Vancouver, ISO, and other styles
2

Johri, Amar, and Shailendra Kumar. "Exploring Customer Awareness towards Their Cyber Security in the Kingdom of Saudi Arabia: A Study in the Era of Banking Digital Transformation." Human Behavior and Emerging Technologies 2023 (January 12, 2023): 1–10. http://dx.doi.org/10.1155/2023/2103442.

Full text
Abstract:
The annual rate of cybersecurity breaches has risen in the last few years, exposing millions of records in some cases. The average data breach cost in 2021 was a massive $4.24 million. This study examines customer awareness and satisfaction with cybersecurity in the context of the digital transformation of banking in Saudi Arabia. The study is empirical and based on the data collected from 355 banking customers in Saudi Arabia. Three significant aspects of cybersecurity, including cyberattacks, phishing, and hacking, have been analyzed through various dimensions. Customer satisfaction with ban
APA, Harvard, Vancouver, ISO, and other styles
3

Maurer, Chris, Kevin Kim, Dan Kim, and Leon A. Kappelman. "Cybersecurity." Communications of the ACM 64, no. 2 (2021): 28–30. http://dx.doi.org/10.1145/3399667.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Ratnayake, Deepthi. "Cybersecurity." ITNOW 64, no. 2 (2022): 49. http://dx.doi.org/10.1093/itnow/bwac056.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Ratnayake, Deepthi. "Cybersecurity." ITNOW 64, no. 1 (2022): 37. http://dx.doi.org/10.1093/itnow/bwac019.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Pullin, Dennis W. "Cybersecurity." Frontiers of Health Services Management 35, no. 1 (2018): 3–12. http://dx.doi.org/10.1097/hap.0000000000000038.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

CACM Staff. "Cybersecurity." Communications of the ACM 60, no. 4 (2017): 20–21. http://dx.doi.org/10.1145/3051455.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Campbell, Robert D. "Cybersecurity." ACM SIGCSE Bulletin 35, no. 2 (2003): 24–26. http://dx.doi.org/10.1145/782941.782965.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

BOHATY, ROCHELLE F. H. "CYBERSECURITY." Chemical & Engineering News 86, no. 44 (2008): 18–20. http://dx.doi.org/10.1021/cen-v086n044.p018.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Ratnayake, Deepthi. "Cybersecurity." ITNOW 64, no. 4 (2022): 39. http://dx.doi.org/10.1093/combul/bwac124.

Full text
APA, Harvard, Vancouver, ISO, and other styles
11

Al Ali, Naser Abdel Raheem, Anna A. Chebotareva, and Vladimir E. Chebotarev. "Cyber security in marine transport." Pomorstvo 35, no. 2 (2021): 248–55. http://dx.doi.org/10.31217/p.35.2.7.

Full text
Abstract:
In recent years, the number of cyber attacks, virus carriers, and cybercrime on maritime transport facilities has increased significantly. The emergence of new types of maritime vessels, such as autonomous vessels, dependent entirely on information and communication technologies used for passengers, cargo and baggage transportation, requires legal regulation of relations in this area. Therefore, ensuring cybersecurity in maritime transport and the need to adopt appropriate legal norms, standards and measures at both the international and national levels to manage maritime cyber risks are consi
APA, Harvard, Vancouver, ISO, and other styles
12

Dubov, D., and S. Dubova. "A GLOBAL SHORTFALL OF CYBER WORKFORCE: EVALUATING THE U.S. STRATEGY APPROACH AND UKRAINE'S EMERGING CHALLENGES." Actual Problems of International Relations, no. 162 (2025): 55–62. https://doi.org/10.17721/apmv.2025.162.1.55-62.

Full text
Abstract:
The article addresses the global shortage of cyber workforce, a challenge that directly impacts national security and international competition. The role of cybersecurity in large-scale military conflicts involving conventional weapons is examined, highlighting that while cyberspace has a limited direct impact on warfare, cybersecurity remains crucial for defense against cyberespionage and cyber sabotage. The study emphasizes that cybersecurity comprises three key components—technology, processes, and personnel—with the latter being the most critical. Effective technology use and process imple
APA, Harvard, Vancouver, ISO, and other styles
13

Student, Speaker: Isaik Agudelo Watstein, and Advisor: Leon Guillermo Marin Ortega Faculty. "CYBERSECURITY WITH A SOCIAL VISION PROTECTING RIGHTS IN THE DIGITAL AGE." International Journal of Engineering Technology Research & Management (IJETRM) 09, no. 05 (2025): 302–9. https://doi.org/10.5281/zenodo.15468798.

Full text
Abstract:
Nowadays, cybersecurity goes beyond computers and focuses on safeguarding people’s dignity and individualrights. Since we rely more on digital tools and AI, cybersecurity's social, ethical, and legal sides need to beconsidered with priority. This article addresses how cybersecurity ties in with the dignity of people and cites lawssuch as Law 1273 from 2009 and Law 1581 from 2012 in the context of Colombia. In addition, it analyzes theworldwide effects of the Budapest Treaty and compares them to international efforts like the CCPA in the UnitedStates. The study highlights that AI can assi
APA, Harvard, Vancouver, ISO, and other styles
14

pavan G, Dr Swapna. "Social Media Cybersecurity: A Behavioural and Technological Perspective." INTERNATIONAL JOURNAL OF SCIENTIFIC RESEARCH IN ENGINEERING AND MANAGEMENT 09, no. 05 (2025): 1–9. https://doi.org/10.55041/ijsrem48730.

Full text
Abstract:
Abstract Social media platforms' rapid expansion has made cybersecurity a major issue that affects billions of users globally. This study examines cybersecurity's function, effects, and safeguards in relation to social media. Users of social media are more vulnerable to a variety of online dangers, such as dangerous software, phishing scams, cyberbullying, identity theft, and phony profiles. These risks impact users' emotional health and organizational security in addition to compromising personal data. Although the majority of platforms have built-in security protections, the study emphasizes
APA, Harvard, Vancouver, ISO, and other styles
15

Tsvilii, Olena. "Cybersecurity regulation: cybersecurity certification of operational technologies." Technology audit and production reserves 1, no. 2(57) (2021): 54–60. http://dx.doi.org/10.15587/2706-5448.2021.225271.

Full text
Abstract:
The object of research is the system and schemes of conformity assessment (certification) of cybersecurity of operational technologies (OT), as a set of rules and procedures that describe the objects of certification, determine the specified requirements and provide a methodology for certification. The terminological base and conceptual apparatus of the study of cybersecurity certification of operational technologies are based on the international standard ISO 17000:2020 Conformity assessment – Vocabulary and general principles. Cybersecurity certification systems and schemes are based on asse
APA, Harvard, Vancouver, ISO, and other styles
16

Olena, Tsvilii. "Cybersecurity regulation: cybersecurity certification of operational technologies." Technology audit and production reserves 1, no. 2(57) (2021): 54–60. https://doi.org/10.15587/2706-5448.2021.225271.

Full text
Abstract:
<em>The object of research is the system and schemes of conformity assessment (certification) of cybersecurity of operational technologies (OT), as a set of rules and procedures that describe the objects of certification, determine the specified requirements and provide a methodology for certification. The terminological base and conceptual apparatus of the study of cybersecurity certification of operational technologies are based on the international standard ISO 17000:2020 Conformity assessment &ndash; Vocabulary and general principles. Cybersecurity certification systems and schemes are bas
APA, Harvard, Vancouver, ISO, and other styles
17

Agrawal, Garima, Kuntal Pal, Yuli Deng, Huan Liu, and Ying-Chih Chen. "CyberQ: Generating Questions and Answers for Cybersecurity Education Using Knowledge Graph-Augmented LLMs." Proceedings of the AAAI Conference on Artificial Intelligence 38, no. 21 (2024): 23164–72. http://dx.doi.org/10.1609/aaai.v38i21.30362.

Full text
Abstract:
Building a skilled cybersecurity workforce is paramount to building a safer digital world. However, the diverse skill set, constantly emerging vulnerabilities, and deployment of new cyber threats make learning cybersecurity challenging. Traditional education methods struggle to cope with cybersecurity's rapidly evolving landscape and keep students engaged and motivated. Different studies on students' behaviors show that an interactive mode of education by engaging through a question-answering system or dialoguing is one of the most effective learning methodologies. There is a strong need to cr
APA, Harvard, Vancouver, ISO, and other styles
18

Mwansa, Gardner, Ricky Ngandu, and Onke Khala. "Cyberbullying Prevalence at a Rural Based University in the Eastern Cape, South Africa." International Journal of Social Science Research and Review 6, no. 12 (2023): 361–86. http://dx.doi.org/10.47814/ijssrr.v7i1.1783.

Full text
Abstract:
Defences within the digital space against cybersecurity include detection, prevention and response to threats using software tools, however, there no significant technology-based defence systems that deal with cyberbullying related threats. A lack of cybersecurity defence systems and limited cybersecuriy awareness may expose students to cyberbullying and students are likely to suffer, resulting in effects such as psychological and emotional abuse that may eventually contribute towards high drop-outs rates. The objective of this study was to investigate the prevalence of cyberbullying among stu
APA, Harvard, Vancouver, ISO, and other styles
19

Ulven, Joachim Bjørge, and Gaute Wangen. "A Systematic Review of Cybersecurity Risks in Higher Education." Future Internet 13, no. 2 (2021): 39. http://dx.doi.org/10.3390/fi13020039.

Full text
Abstract:
The demands for information security in higher education will continue to increase. Serious data breaches have occurred already and are likely to happen again without proper risk management. This paper applies the Comprehensive Literature Review (CLR) Model to synthesize research within cybersecurity risk by reviewing existing literature of known assets, threat events, threat actors, and vulnerabilities in higher education. The review included published studies from the last twelve years and aims to expand our understanding of cybersecurity’s critical risk areas. The primary finding was that e
APA, Harvard, Vancouver, ISO, and other styles
20

Morales-Sáenz, Francisco Isaí, José Melchor Medina-Quintero, and Miguel Reyna-Castillo. "Beyond Data Protection: Exploring the Convergence between Cybersecurity and Sustainable Development in Business." Sustainability 16, no. 14 (2024): 5884. http://dx.doi.org/10.3390/su16145884.

Full text
Abstract:
The increase in the use of information technology (IT) poses a challenge derived from the risks and threats of computer security in all areas of society. In this sense, cybersecurity emerges as an important pillar of support for protecting infrastructures essential for countries’ sustainable economic and social development. This paper explores the possible links between cybersecurity and sustainable development within the high-impact scientific literature. The study uses a systematic literature review methodology based on the Preferred Reporting Items for Systematic Reviews and Meta-Analyses (
APA, Harvard, Vancouver, ISO, and other styles
21

Rana, Prateek. "Role of Machine Learning in Cybersecurity: Techniques and Challenges." International Journal for Research in Applied Science and Engineering Technology 12, no. 1 (2024): 44–48. http://dx.doi.org/10.22214/ijraset.2023.57786.

Full text
Abstract:
Abstract: Machine learning (ML) plays a crucial role in cybersecurity across various aspects of threat detection, prevention, and response. Here are specific roles and applications of machine learning in cybersecurity. Machine Learning (ML) represents a pivotal technology for current and future information systems, and many domains already leverage the capabilities of ML. However, deployment of ML in cybersecurity is still at an early stage, revealing a significant discrepancy between research and practice. Such a discrepancy has its root cause in the current state of the art, which does not a
APA, Harvard, Vancouver, ISO, and other styles
22

Rana, Prateek. "Role of Machine Learning in Cybersecurity: Techniques and Challenges." International Journal for Research in Applied Science and Engineering Technology 12, no. 1 (2024): 44–48. http://dx.doi.org/10.22214/ijraset.2024.57786.

Full text
Abstract:
Abstract: Machine learning (ML) plays a crucial role in cybersecurity across various aspects of threat detection, prevention, and response. Here are specific roles and applications of machine learning in cybersecurity. Machine Learning (ML) represents a pivotal technology for current and future information systems, and many domains already leverage the capabilities of ML. However, deployment of ML in cybersecurity is still at an early stage, revealing a significant discrepancy between research and practice. Such a discrepancy has its root cause in the current state of the art, which does not a
APA, Harvard, Vancouver, ISO, and other styles
23

POPESCU, Eugen F. "Complementary Cybersecurity." International Journal of Information Security and Cybercrime 9, no. 2 (2020): 33–37. http://dx.doi.org/10.19107/ijisc.2020.02.05.

Full text
Abstract:
The paper presents the need for enhancing the classical Cybersecurity domain of study with a set of complementary perspectives that are meant to support and facilitate a proper long-term human evolution, as well as a balanced and healthy environment. It describes the influence of human decisions on the technology, in its entire lifecycle, and likewise the technological feedback that is experienced both by the human and the nature, in return. It emphasizes the need for profound analysis of the influences that technology brings on humans – as individuals and as society – and on the surrounding e
APA, Harvard, Vancouver, ISO, and other styles
24

Oleinik, Margarita, and Tatyana Porubel. "Agroholdings cybersecurity." Proceedings of the Kuban State Agrarian University 1, no. 78 (2019): 33–41. http://dx.doi.org/10.21515/1999-1703-78-33-41.

Full text
APA, Harvard, Vancouver, ISO, and other styles
25

Voas, Jeffrey. "Crying “Cybersecurity!”." Computer 55, no. 10 (2022): 14–15. http://dx.doi.org/10.1109/mc.2022.3178862.

Full text
APA, Harvard, Vancouver, ISO, and other styles
26

Ratnayake, Deepthi. "Insight: Cybersecurity." ITNOW 63, no. 2 (2021): 41. http://dx.doi.org/10.1093/itnow/bwab052.

Full text
APA, Harvard, Vancouver, ISO, and other styles
27

Ratnayake, Deepthi. "Insight: Cybersecurity." ITNOW 63, no. 3 (2021): 39. http://dx.doi.org/10.1093/itnow/bwab082.

Full text
APA, Harvard, Vancouver, ISO, and other styles
28

Gritzalis, Dimitris A., Grammati Pantziou, and Rodrigo Román-Castro. "Sensors Cybersecurity." Sensors 21, no. 5 (2021): 1762. http://dx.doi.org/10.3390/s21051762.

Full text
APA, Harvard, Vancouver, ISO, and other styles
29

Ratnayake, Deepthi. "Insight: cybersecurity." ITNOW 63, no. 4 (2021): 39. http://dx.doi.org/10.1093/itnow/bwab118.

Full text
APA, Harvard, Vancouver, ISO, and other styles
30

Maconachy, W. V., and D. Kinsey. "Cybersecurity Education." Journal of The Colloquium for Information Systems Security Education 9, no. 1 (2022): 4. http://dx.doi.org/10.53735/cisse.v9i1.138.

Full text
Abstract:
Recent cyber events within the U. S. cyber ecosystem present the alarming fact that attacks with both denial of service and kinetic consequences are now prevalent in non-governmental systems. This paper examines the need to expand studies of cyber and other warfare modalities into the cybersecurity curricula now being taught in American universities.
APA, Harvard, Vancouver, ISO, and other styles
31

Craigen, Dan, Nadia Diakun-Thibault, and Randy Purse. "Defining Cybersecurity." Technology Innovation Management Review 4, no. 10 (2014): 13–21. http://dx.doi.org/10.22215/timreview/835.

Full text
APA, Harvard, Vancouver, ISO, and other styles
32

Craigen, Dan, Nadia Diakun-Thibault, and Randy Purse. "Defining Cybersecurity." Technology Innovation Management Review 4, no. 10 (2014): 13–21. http://dx.doi.org/10.22215/timreview835.

Full text
APA, Harvard, Vancouver, ISO, and other styles
33

Baranchuk, Adrian, Bryce Alexander, Debra Campbell, et al. "Pacemaker Cybersecurity." Circulation 138, no. 12 (2018): 1272–73. http://dx.doi.org/10.1161/circulationaha.118.035261.

Full text
APA, Harvard, Vancouver, ISO, and other styles
34

Reagin, Michael J., and Michael V. Gentry. "Enterprise Cybersecurity." Frontiers of Health Services Management 35, no. 1 (2018): 13–22. http://dx.doi.org/10.1097/hap.0000000000000037.

Full text
APA, Harvard, Vancouver, ISO, and other styles
35

Wadia, Reena. "Cybersecurity threats." British Dental Journal 237, no. 10 (2024): 793. http://dx.doi.org/10.1038/s41415-024-8121-1.

Full text
APA, Harvard, Vancouver, ISO, and other styles
36

Khan, Mohammed Mustafa. "CYBERSECURITY AWARENESS." INTERANTIONAL JOURNAL OF SCIENTIFIC RESEARCH IN ENGINEERING AND MANAGEMENT 08, no. 10 (2024): 1–14. http://dx.doi.org/10.55041/ijsrem36233.

Full text
Abstract:
Technology is advancing at a very high speed, becoming more sophisticated and complex. Similarly, due to the vastness of the digital world, cyber threats have also increased in complexity and frequency. The rapid advancement of technology has brought unprecedented conveniences but also significant risks. Therefore, security awareness is essential for every individual and organization. Cyber threats such as phishing attacks, malware attacks, social engineering, Denial of service attacks, and insider threats have become sophisticated, proving to be a challenge to individuals and organizations. T
APA, Harvard, Vancouver, ISO, and other styles
37

Nesterov, E. A., and V. Ya Tsvetkov. "Transport Cybersecurity." World of Transport and Transportation 21, no. 6 (2024): 103–9. http://dx.doi.org/10.30932/1992-3252-2023-21-6-12.

Full text
Abstract:
A feature of the digital transformation of the transport industry is the trend to increased number of cyberattacks that are among the information threats. Transport cybersecurity is a broader phenomenon compared to cyberattacks and information security. It includes organisational security and other types of security that are not found purely in the information field. The relevance of transport cybersecurity is additionally due to the widespread use of information and computer networks and information space. Cyberspace in the transport sector can be interpreted as an aggregate of networks, info
APA, Harvard, Vancouver, ISO, and other styles
38

Radziwill, Nicole M. "Cybersecurity Leadership." Quality Management Journal 25, no. 2 (2018): 109. http://dx.doi.org/10.1080/10686967.2018.1436356.

Full text
APA, Harvard, Vancouver, ISO, and other styles
39

Kim, Lee. "Cybersecurity awareness." Nursing 47, no. 6 (2017): 65–67. http://dx.doi.org/10.1097/01.nurse.0000516242.05454.b4.

Full text
APA, Harvard, Vancouver, ISO, and other styles
40

Talbot, Edward B., Deborah Frincke, and Matt Bishop. "Demythifying Cybersecurity." IEEE Security & Privacy Magazine 8, no. 3 (2010): 56–59. http://dx.doi.org/10.1109/msp.2010.95.

Full text
APA, Harvard, Vancouver, ISO, and other styles
41

Lukowiak, Marcin, Stanisław Radziszowski, James Vallino, and Christopher Wood. "Cybersecurity Education." ACM Transactions on Computing Education 14, no. 1 (2014): 1–20. http://dx.doi.org/10.1145/2538029.

Full text
APA, Harvard, Vancouver, ISO, and other styles
42

Kim, Lee. "Cybersecurity awareness." Nursing Management (Springhouse) 48, no. 4 (2017): 16–19. http://dx.doi.org/10.1097/01.numa.0000514066.30572.f3.

Full text
APA, Harvard, Vancouver, ISO, and other styles
43

Kim, Lee. "Cybersecurity matters." Nursing Management (Springhouse) 49, no. 2 (2018): 16–22. http://dx.doi.org/10.1097/01.numa.0000529921.97762.be.

Full text
APA, Harvard, Vancouver, ISO, and other styles
44

Kuhn, Rick. "Introduction: Cybersecurity." IT Professional 12, no. 4 (2010): 18–19. http://dx.doi.org/10.1109/mitp.2010.110.

Full text
APA, Harvard, Vancouver, ISO, and other styles
45

AlDaajeh, Saleh, and Saed Alrabaee. "Strategic cybersecurity." Computers & Security 141 (June 2024): 103845. http://dx.doi.org/10.1016/j.cose.2024.103845.

Full text
APA, Harvard, Vancouver, ISO, and other styles
46

Sanjana, Gadalay. "Cybersecurity Assessments." International Journal of Recent Technology and Engineering (IJRTE) 9, no. 4 (2020): 330–32. https://doi.org/10.35940/ijrte.D5004.119420.

Full text
Abstract:
The purpose of this study is to review the existing cybersecurity assessments and practices used by technology companies to protect their assets from potential harm and damage. Today, the software systems have thousands of vulnerabilities and, when breached, can cost the companies millions of dollars. A clear path for identifying risks, detecting threats, and responding to them is imperative. However, it is not easy to quantify cybersecurity risks as the networks and networks of networks are becoming complicated and, so most risk assessments use relevant parameters to calculate a risk score. I
APA, Harvard, Vancouver, ISO, and other styles
47

Ravikumar, Rangachary. "Strengthening Cybersecurity." Technical Notes and Manuals 2025, no. 006 (2025): 1. https://doi.org/10.5089/9798400296864.005.

Full text
APA, Harvard, Vancouver, ISO, and other styles
48

Burley, Diana L., Jon Eisenberg, and Seymour E. Goodman. "Would cybersecurity professionalization help address the cybersecurity crisis?" Communications of the ACM 57, no. 2 (2014): 24–27. http://dx.doi.org/10.1145/2556936.

Full text
APA, Harvard, Vancouver, ISO, and other styles
49

Tewari, Shweta. "Cryptocurrency and Cybersecurity." International Journal of Scientific Engineering and Research 6, no. 1 (2018): 49. https://doi.org/10.70729/ijser172242.

Full text
APA, Harvard, Vancouver, ISO, and other styles
50

Gołębiowska, Anna, and Dariusz Prokopowicz. "CYBER SECURITY AND OTHER DETERMINANTS OF THE INTERNETIZATION OF LOCAL AND MUNICIPAL MAGAZINES." Zeszyty Naukowe SGSP 87 (September 29, 2023): 219–46. http://dx.doi.org/10.5604/01.3001.0053.9119.

Full text
Abstract:
The main purpose of this article was to point out the growing importance of the issue of cybersecurityin the use of new Internet media in the development of electronic local and local governmentmagazines. This article identifies the importance and impact of the development of new onlinemedia in the process of digitization of documents and the development of electronic, digital versionsof local and self-government magazines. In the context of the conducted research, the followingresearch thesis was formulated: The development of cybercrime related to the theft of sensitivedata on the Internet d
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!