Journal articles on the topic 'Cybersecurity'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the top 50 journal articles for your research on the topic 'Cybersecurity.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.
Whyte, Jeffrey. "Cybersecurity, race, and the politics of truth." Security Dialogue 53, no. 4 (August 2022): 342–62. http://dx.doi.org/10.1177/09670106221101725.
Full textJohri, Amar, and Shailendra Kumar. "Exploring Customer Awareness towards Their Cyber Security in the Kingdom of Saudi Arabia: A Study in the Era of Banking Digital Transformation." Human Behavior and Emerging Technologies 2023 (January 12, 2023): 1–10. http://dx.doi.org/10.1155/2023/2103442.
Full textAl Ali, Naser Abdel Raheem, Anna A. Chebotareva, and Vladimir E. Chebotarev. "Cyber security in marine transport." Pomorstvo 35, no. 2 (December 22, 2021): 248–55. http://dx.doi.org/10.31217/p.35.2.7.
Full textMaurer, Chris, Kevin Kim, Dan Kim, and Leon A. Kappelman. "Cybersecurity." Communications of the ACM 64, no. 2 (January 25, 2021): 28–30. http://dx.doi.org/10.1145/3399667.
Full textRatnayake, Deepthi. "Cybersecurity." ITNOW 64, no. 2 (May 12, 2022): 49. http://dx.doi.org/10.1093/itnow/bwac056.
Full textRatnayake, Deepthi. "Cybersecurity." ITNOW 64, no. 1 (February 17, 2022): 37. http://dx.doi.org/10.1093/itnow/bwac019.
Full textPullin, Dennis W. "Cybersecurity." Frontiers of Health Services Management 35, no. 1 (2018): 3–12. http://dx.doi.org/10.1097/hap.0000000000000038.
Full textCACM Staff. "Cybersecurity." Communications of the ACM 60, no. 4 (March 24, 2017): 20–21. http://dx.doi.org/10.1145/3051455.
Full textCampbell, Robert D. "Cybersecurity." ACM SIGCSE Bulletin 35, no. 2 (June 2003): 24–26. http://dx.doi.org/10.1145/782941.782965.
Full textBOHATY, ROCHELLE F. H. "CYBERSECURITY." Chemical & Engineering News 86, no. 44 (November 3, 2008): 18–20. http://dx.doi.org/10.1021/cen-v086n044.p018.
Full textRatnayake, Deepthi. "Cybersecurity." ITNOW 64, no. 4 (November 21, 2022): 39. http://dx.doi.org/10.1093/combul/bwac124.
Full textAgrawal, Garima, Kuntal Pal, Yuli Deng, Huan Liu, and Ying-Chih Chen. "CyberQ: Generating Questions and Answers for Cybersecurity Education Using Knowledge Graph-Augmented LLMs." Proceedings of the AAAI Conference on Artificial Intelligence 38, no. 21 (March 24, 2024): 23164–72. http://dx.doi.org/10.1609/aaai.v38i21.30362.
Full textMwansa, Gardner, Ricky Ngandu, and Onke Khala. "Cyberbullying Prevalence at a Rural Based University in the Eastern Cape, South Africa." International Journal of Social Science Research and Review 6, no. 12 (December 13, 2023): 361–86. http://dx.doi.org/10.47814/ijssrr.v7i1.1783.
Full textTsvilii, Olena. "Cybersecurity regulation: cybersecurity certification of operational technologies." Technology audit and production reserves 1, no. 2(57) (February 28, 2021): 54–60. http://dx.doi.org/10.15587/2706-5448.2021.225271.
Full textUlven, Joachim Bjørge, and Gaute Wangen. "A Systematic Review of Cybersecurity Risks in Higher Education." Future Internet 13, no. 2 (February 2, 2021): 39. http://dx.doi.org/10.3390/fi13020039.
Full textMorales-Sáenz, Francisco Isaí, José Melchor Medina-Quintero, and Miguel Reyna-Castillo. "Beyond Data Protection: Exploring the Convergence between Cybersecurity and Sustainable Development in Business." Sustainability 16, no. 14 (July 10, 2024): 5884. http://dx.doi.org/10.3390/su16145884.
Full textRana, Prateek. "Role of Machine Learning in Cybersecurity: Techniques and Challenges." International Journal for Research in Applied Science and Engineering Technology 12, no. 1 (January 31, 2024): 44–48. http://dx.doi.org/10.22214/ijraset.2023.57786.
Full textRana, Prateek. "Role of Machine Learning in Cybersecurity: Techniques and Challenges." International Journal for Research in Applied Science and Engineering Technology 12, no. 1 (January 31, 2024): 44–48. http://dx.doi.org/10.22214/ijraset.2024.57786.
Full textPOPESCU, Eugen F. "Complementary Cybersecurity." International Journal of Information Security and Cybercrime 9, no. 2 (December 30, 2020): 33–37. http://dx.doi.org/10.19107/ijisc.2020.02.05.
Full textOleinik, Margarita, and Tatyana Porubel. "Agroholdings cybersecurity." Proceedings of the Kuban State Agrarian University 1, no. 78 (2019): 33–41. http://dx.doi.org/10.21515/1999-1703-78-33-41.
Full textVoas, Jeffrey. "Crying “Cybersecurity!”." Computer 55, no. 10 (October 2022): 14–15. http://dx.doi.org/10.1109/mc.2022.3178862.
Full textRatnayake, Deepthi. "Insight: Cybersecurity." ITNOW 63, no. 2 (June 1, 2021): 41. http://dx.doi.org/10.1093/itnow/bwab052.
Full textRatnayake, Deepthi. "Insight: Cybersecurity." ITNOW 63, no. 3 (August 16, 2021): 39. http://dx.doi.org/10.1093/itnow/bwab082.
Full textGritzalis, Dimitris A., Grammati Pantziou, and Rodrigo Román-Castro. "Sensors Cybersecurity." Sensors 21, no. 5 (March 4, 2021): 1762. http://dx.doi.org/10.3390/s21051762.
Full textRatnayake, Deepthi. "Insight: cybersecurity." ITNOW 63, no. 4 (December 1, 2021): 39. http://dx.doi.org/10.1093/itnow/bwab118.
Full textMaconachy, W. V., and D. Kinsey. "Cybersecurity Education." Journal of The Colloquium for Information Systems Security Education 9, no. 1 (March 8, 2022): 4. http://dx.doi.org/10.53735/cisse.v9i1.138.
Full textCraigen, Dan, Nadia Diakun-Thibault, and Randy Purse. "Defining Cybersecurity." Technology Innovation Management Review 4, no. 10 (October 30, 2014): 13–21. http://dx.doi.org/10.22215/timreview/835.
Full textCraigen, Dan, Nadia Diakun-Thibault, and Randy Purse. "Defining Cybersecurity." Technology Innovation Management Review 4, no. 10 (October 30, 2014): 13–21. http://dx.doi.org/10.22215/timreview835.
Full textBaranchuk, Adrian, Bryce Alexander, Debra Campbell, Sohaib Haseeb, Damian Redfearn, Chris Simpson, and Ben Glover. "Pacemaker Cybersecurity." Circulation 138, no. 12 (September 18, 2018): 1272–73. http://dx.doi.org/10.1161/circulationaha.118.035261.
Full textReagin, Michael J., and Michael V. Gentry. "Enterprise Cybersecurity." Frontiers of Health Services Management 35, no. 1 (2018): 13–22. http://dx.doi.org/10.1097/hap.0000000000000037.
Full textRadziwill, Nicole M. "Cybersecurity Leadership." Quality Management Journal 25, no. 2 (April 3, 2018): 109. http://dx.doi.org/10.1080/10686967.2018.1436356.
Full textKim, Lee. "Cybersecurity awareness." Nursing 47, no. 6 (June 2017): 65–67. http://dx.doi.org/10.1097/01.nurse.0000516242.05454.b4.
Full textTalbot, Edward B., Deborah Frincke, and Matt Bishop. "Demythifying Cybersecurity." IEEE Security & Privacy Magazine 8, no. 3 (May 2010): 56–59. http://dx.doi.org/10.1109/msp.2010.95.
Full textLukowiak, Marcin, Stanisław Radziszowski, James Vallino, and Christopher Wood. "Cybersecurity Education." ACM Transactions on Computing Education 14, no. 1 (March 2014): 1–20. http://dx.doi.org/10.1145/2538029.
Full textKim, Lee. "Cybersecurity awareness." Nursing Management (Springhouse) 48, no. 4 (April 2017): 16–19. http://dx.doi.org/10.1097/01.numa.0000514066.30572.f3.
Full textKim, Lee. "Cybersecurity matters." Nursing Management (Springhouse) 49, no. 2 (February 2018): 16–22. http://dx.doi.org/10.1097/01.numa.0000529921.97762.be.
Full textKuhn, Rick. "Introduction: Cybersecurity." IT Professional 12, no. 4 (July 2010): 18–19. http://dx.doi.org/10.1109/mitp.2010.110.
Full textAlDaajeh, Saleh, and Saed Alrabaee. "Strategic cybersecurity." Computers & Security 141 (June 2024): 103845. http://dx.doi.org/10.1016/j.cose.2024.103845.
Full textWadia, Reena. "Cybersecurity threats." British Dental Journal 237, no. 10 (November 22, 2024): 793. http://dx.doi.org/10.1038/s41415-024-8121-1.
Full textNesterov, E. A., and V. Ya Tsvetkov. "Transport Cybersecurity." World of Transport and Transportation 21, no. 6 (August 16, 2024): 103–9. http://dx.doi.org/10.30932/1992-3252-2023-21-6-12.
Full textKhan, Mohammed Mustafa. "CYBERSECURITY AWARENESS." INTERANTIONAL JOURNAL OF SCIENTIFIC RESEARCH IN ENGINEERING AND MANAGEMENT 08, no. 10 (October 7, 2024): 1–14. http://dx.doi.org/10.55041/ijsrem36233.
Full textGołębiowska, Anna, and Dariusz Prokopowicz. "CYBER SECURITY AND OTHER DETERMINANTS OF THE INTERNETIZATION OF LOCAL AND MUNICIPAL MAGAZINES." Zeszyty Naukowe SGSP 87 (September 29, 2023): 219–46. http://dx.doi.org/10.5604/01.3001.0053.9119.
Full textPanchamia, Virti, Archita Harchwani, and Tirath Momaya. "Cybersecurity Renaissance: Navigating Threats, Ethical Hacking, and Risk Mitigation in the Digital Era." INTERANTIONAL JOURNAL OF SCIENTIFIC RESEARCH IN ENGINEERING AND MANAGEMENT 08, no. 01 (January 15, 2024): 1–10. http://dx.doi.org/10.55041/ijsrem28181.
Full textBurley, Diana L., Jon Eisenberg, and Seymour E. Goodman. "Would cybersecurity professionalization help address the cybersecurity crisis?" Communications of the ACM 57, no. 2 (February 2014): 24–27. http://dx.doi.org/10.1145/2556936.
Full textTewari, Shweta. "Cryptocurrency and Cybersecurity." International Journal of Scientific Engineering and Research 6, no. 1 (January 27, 2018): 49. https://doi.org/10.70729/ijser172242.
Full textPerälä, Piia, and Martti Lehto. "Educating Cybersecurity Experts: Analysis of Cybersecurity Education in Finnish Universities." European Conference on Cyber Warfare and Security 23, no. 1 (June 21, 2024): 371–78. http://dx.doi.org/10.34190/eccws.23.1.2256.
Full textP, Dr Rachana. "Strategic Approaches to Cybersecurity Audits for Control Evaluation." INTERANTIONAL JOURNAL OF SCIENTIFIC RESEARCH IN ENGINEERING AND MANAGEMENT 08, no. 12 (December 24, 2024): 1–5. https://doi.org/10.55041/ijsrem40065.
Full textCrabb, James, Clemente Izurieta, Bernard Van Wie, Olusola Adesope, and Assefaw Gebremedhin. "Cybersecurity Education: Insights From a Novel Cybersecurity Summer Workshop." IEEE Security & Privacy 22, no. 6 (November 2024): 89–98. https://doi.org/10.1109/msec.2024.3473188.
Full textHeinl, Caitríona H. "Regional Cybersecurity: Moving Toward a Resilient ASEAN Cybersecurity Regime." Asia Policy 18, no. 1 (2014): 131–59. http://dx.doi.org/10.1353/asp.2014.0026.
Full textLi, He, Won Gyun No, and Tawei Wang. "SEC's cybersecurity disclosure guidance and disclosed cybersecurity risk factors." International Journal of Accounting Information Systems 30 (September 2018): 40–55. http://dx.doi.org/10.1016/j.accinf.2018.06.003.
Full text