To see the other types of publications on this topic, follow the link: ENISA.

Journal articles on the topic 'ENISA'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the top 50 journal articles for your research on the topic 'ENISA.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.

1

Štitilis, Darius, Irmantas Rotomskis, Marius Laurinaitis, Sergiy Nadvynychnyy, and Nadiya Khorunzhak. "National cyber security strategies: management, unification and assessment." Independent Journal of Management & Production 11, no. 9 (2020): 2341. http://dx.doi.org/10.14807/ijmp.v11i9.1431.

Full text
Abstract:
Cyber security has become an important issue both on the EU and the national level. Cyber security is now perceived as a part of national security. The newly emerging cyber security policy, comprising national cyber security strategies as an important constituent part, has been recently paid considerable attention. Speaking of national cyber security strategies, a positive thing is that the majority of EU member states have already approved such strategies. However, the approved strategies differ considerably in terms of their content and implementation. The present article aims at identifying
APA, Harvard, Vancouver, ISO, and other styles
2

McKenna, Brian. "ENISA set to join Internet governance debate." Computer Fraud & Security 2004, no. 10 (2004): 1. http://dx.doi.org/10.1016/s1361-3723(04)00115-0.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Aditya Putra, Fandi. "Pembentukan Ekosistem Local Government Information Sharing and Analysis Center (LocalGov-ISAC) dengan Toolkit ENISA ISAC in a Box pada Sektor Pemerintah Daerah Indonesia." Info Kripto 16, no. 3 (2022): 95–102. http://dx.doi.org/10.56706/ik.v16i3.58.

Full text
Abstract:
Information and Analysis Center (ISAC) merupakan best practice yang dapat diterapkan untuk membantu organisasi dalam mengatasi dampak serangan siber, salah satunya yaitu pada layanan sistem pemerintahan berbasis elektronik sektor Pemerintah Daerah di Indonesia. Penelitian ini mengusulkan pembentukan ekosistem Local Government Information Sharing and Analysis Center (LocalGov-ISAC) di Indonesia dengan memanfaatkan toolkit ENISA ISAC in a Box. Hasil penelitian ini yaitu kondisi sektor Pemerintah Daerah di Indonesia masih belum menerapkan analisis dan berbagi informasi keamanan siber. Pembentukan
APA, Harvard, Vancouver, ISO, and other styles
4

Paskauskas, R. Andrew. "ENISA: 5G design and architecture of global mobile networks; threats, risks, vulnerabilities; cybersecurity considerations." Open Research Europe 2 (November 22, 2022): 125. http://dx.doi.org/10.12688/openreseurope.15219.1.

Full text
Abstract:
Abstract —The literature on 5G design and architecture numbers in the hundreds of thousands, which makes analyzing this vast corpus of technical knowledge impossible within the scope of a single article. A rigorous literature scan has revealed investigations of various specific 5G components, or specific aspects of 5G design, architecture, or security, but none that are comprehensive in scope, encompassing all of the aforementioned categories, or that take into account the associated vulnerabilities, threats and risks to the basic 5G infrastructure. In this sense the 5G framework advocated by
APA, Harvard, Vancouver, ISO, and other styles
5

Paskauskas, R. Andrew. "ENISA: 5G design and architecture of global mobile networks; threats, risks, vulnerabilities; cybersecurity considerations." Open Research Europe 2 (March 29, 2023): 125. http://dx.doi.org/10.12688/openreseurope.15219.2.

Full text
Abstract:
Abstract —The literature on 5G design and architecture numbers in the hundreds of thousands, which makes analyzing this vast corpus of technical knowledge impossible within the scope of a single article. A rigorous literature scan has revealed investigations of various specific 5G components, or specific aspects of 5G design, architecture, or security, but none that are comprehensive in scope, encompassing all of the aforementioned categories, or that take into account the associated vulnerabilities, threats and risks to the basic 5G infrastructure. In this sense the 5G framework advocated by
APA, Harvard, Vancouver, ISO, and other styles
6

Paskauskas, R. Andrew. "ENISA: 5G design and architecture of global mobile networks; threats, risks, vulnerabilities; cybersecurity considerations." Open Research Europe 2 (May 24, 2023): 125. http://dx.doi.org/10.12688/openreseurope.15219.3.

Full text
Abstract:
Abstract —The literature on 5G design and architecture numbers in the hundreds of thousands, which makes analyzing this vast corpus of technical knowledge impossible within the scope of a single article. A rigorous literature scan has revealed investigations of various specific 5G components, or specific aspects of 5G design, architecture, or security, but none that are comprehensive in scope, encompassing all of the aforementioned categories, or that take into account the associated vulnerabilities, threats and risks to the basic 5G infrastructure. In this sense the 5G framework advocated by
APA, Harvard, Vancouver, ISO, and other styles
7

Omeragic, Jasmin, Teufik Goletic, Adis Softic, et al. "First detection of Echinococcus multilocularis in Bosnia and Herzegovina." International Journal for Parasitology: Parasites and Wildlife 19 (December 31, 2022): 269–72. https://doi.org/10.1016/j.ijppaw.2022.11.005.

Full text
Abstract:
Omeragic, Jasmin, Goletic, Teufik, Softic, Adis, Sejla, Goletic, Kapo, Naida, Klaric, Darinka, Soldo, Supic, Jovana, Vedad, Skapur, Cerkez, Goran, Ademovic, Enisa, Semren, Orjana, Alic, Amer (2022): First detection of Echinococcus multilocularis in Bosnia and Herzegovina. International Journal for Parasitology: Parasites and Wildlife 19: 269-272, DOI: 10.1016/j.ijppaw.2022.11.005, URL: http://dx.doi.org/10.1016/j.ijppaw.2022.11.005
APA, Harvard, Vancouver, ISO, and other styles
8

García Garrido, Sebastián. "Diseño Grandes Éxitos: Los hits de venta del diseño." i+Diseño. Revista Científico-Académica Internacional de Innovación, Investigación y Desarrollo en Diseño 4 (January 9, 2011): 96–107. http://dx.doi.org/10.24310/idiseno.2011.v4i.12667.

Full text
Abstract:
Diseño Grandes Éxitos cierra el tercer ciclo de exposiciones sobre diseño e innovación, que se ha desarrollado desde 2007 de la mano de la Sociedad Estatal ddi, y el Círculo de Bellas Artes de Madrid. La titularidad de la organización es hora ENISA, desde que comprende la entidad citada, cuya exposición estará abierta al público hasta finales del presente mes de enero.
APA, Harvard, Vancouver, ISO, and other styles
9

Samonek, Aleksandra. "What Is the Future of European Cyber Security? Three Principles of European Cooperation and the Hybrid Joint Strategy of Cyber Defence." Studia Europejskie - Studies in European Affairs 24, no. 2 (2020): 43–60. http://dx.doi.org/10.33067/se.2.2020.3.

Full text
Abstract:
The author argues that EU member states should pursue a joint strategy of cyber security and cyber defence. This claim does not immediately imply support for current EU legislation, in particular for enforcing the NIS Directive or the operation of ENISA in its currently planned capacity. Instead, three principles of European cooperation are discussed and followed by a proposal to centre the joint strategic effort around promoting and explicating the practical and procedural consequences of these principles. A bottom-up approach to joining and uniformization of European cyber defence is present
APA, Harvard, Vancouver, ISO, and other styles
10

Peliukh, O. I., M. V. Yesina, and D. Yu Holubnychyi. "CERT-UA assessment based on the CSIRT ENISA Maturity Model." Radiotekhnika, no. 213 (June 16, 2023): 41–48. http://dx.doi.org/10.30837/rt.2023.2.213.04.

Full text
Abstract:
Cybersecurity threats are steadily increasing in today's world, which is characterised by increased openness and integration into the global network. The proliferation of cyber incidents, including hacker attacks, confidential data leaks and information theft, is becoming an extremely pressing issue in this context. Accordingly, the eradication of these threats requires the development of effective methods of responding to cyber incidents. The central theme of this article is to consider the critical importance of assessing and improving the effectiveness of cyber incident response teams. The
APA, Harvard, Vancouver, ISO, and other styles
11

Liu, Chiang Lung, Wei Hsiu Chen, and Der Kuo Tung. "Identification of Critical Security Issues for Cloud Computing." Applied Mechanics and Materials 145 (December 2011): 272–76. http://dx.doi.org/10.4028/www.scientific.net/amm.145.272.

Full text
Abstract:
Cloud computing is a new service style with many significant advantages and becoming a trend in the world nowadays. Although cloud computing can provide many significant advantages, it also brings us new security problems which present strong barriers for individuals/enterprises to adapt into cloud computing. Including European Network and Information Security Agency (ENISA), many international organizations have issued their reports on the issue of cloud computing security. However, the identification of risks the cloud computing faces also mix with traditional security problems. In this pape
APA, Harvard, Vancouver, ISO, and other styles
12

Wellerdt, Alexander. "Entwicklung eines europäischen Agentur(un)wesens im Energiebinnenmarkt? – Handeln der ACER auf Messers Schneide im Lichte der EuGH-Rechtsprechung." Europarecht 56, no. 3 (2021): 292–306. http://dx.doi.org/10.5771/0531-2485-2021-3-292.

Full text
Abstract:
Europäische Agenturen gewinnen an Bedeutung für den Verwaltungsvollzug in der EU. Ihre Befugnisse werden über Konsultationen und Empfehlungen hinaus ausgeweitet. Insbesondere die Ermächtigung der ACER zum Erlass von Leitlinien zur Festlegung von Methoden für nationale Regulierungsbehörden und Übertragungsnetzbetreiber hat Konsequenzen für den Verwaltungsvollzug im Energiebinnenmarkt. Das erscheint im Lichte der Rechtsprechung des EuGHs in den Rechtssachen von Meroni über ENISA bis zu ESMA und im Hinblick auf das institutionelle Gleichgewicht rechtlich grenzwertig.
APA, Harvard, Vancouver, ISO, and other styles
13

Popescu, Florin, George Bucăţa, and Sorin Pistol. "Quantum Internet and Security of Military Communications." Land Forces Academy Review 26, no. 4 (2021): 293–98. http://dx.doi.org/10.2478/raft-2021-0038.

Full text
Abstract:
Abstract In general, the Internet relies on complex codes to protect information, but hackers are becoming more adept at defeating such systems. These cyberattacks lead to privacy breaches of government officials, as well as large corporations, costing billions of euros per year in total and compromising customer data. According to ENISA reports, these numbers are set to rise. Quantum technology is seen by scientists as a revolutionary replacement for standard encryption techniques.
APA, Harvard, Vancouver, ISO, and other styles
14

ENNS-BRAY, William S., and Kim ROCHAT. "Medical Device Regulation and Cybersecurity: Achieving ‘Secure by Design’ for Regulatory Compliance." International Journal of Information Security and Cybercrime 9, no. 2 (2020): 12–17. http://dx.doi.org/10.19107/ijisc.2020.02.02.

Full text
Abstract:
The rapid evolution of information technology over the past 50 years is transforming our healthcare institutions from paper-based organizations into smart hospitals, a term now used by European Union Agency for Cybersecurity (ENISA). These changes are also associated with the systematic reliance on medical devices by both patients and healthcare providers. While these devices have the potential to advance personalized health solutions and improving the quality and efficacy of care, they nevertheless present significant security risks and challenges throughout the healthcare sector.
APA, Harvard, Vancouver, ISO, and other styles
15

Андрущак, І., В. Марценюк, I. Андрощук, В. Чудовець, and М. Потейчук. "CLOUD COMPUTING AND ANALYSIS FEATURES OF CLOUD INFORMATION SECURITY." КОМП’ЮТЕРНО-ІНТЕГРОВАНІ ТЕХНОЛОГІЇ: ОСВІТА, НАУКА, ВИРОБНИЦТВО, no. 37 (December 28, 2019): 5–9. http://dx.doi.org/10.36910/6775-2524-0560-2019-37-1.

Full text
Abstract:
The article discusses the current state of application and development of cloud computing, the main advantages and disadvantages of their use in the states, enterprises and in scientific activity. The standards, regulations and guidance documents in the field of cloud computing information security are developed and analyzed, developed by the Cloud Security Alliance (CSA), the European Network and Information Security Agency (ENISA) and the National Institute of Standards and Technology (NIST), and the results of a detailed analysis of the issues information security in the cloud.
APA, Harvard, Vancouver, ISO, and other styles
16

Pispa, Arttu, and Kimmo Halunen. "Comprehensive Artificial Intelligence Vulnerability Taxonomy." European Conference on Cyber Warfare and Security 23, no. 1 (2024): 379–87. http://dx.doi.org/10.34190/eccws.23.1.2157.

Full text
Abstract:
With the rise of artificial intelligence (AI) systems and machine learning (ML), there is a need for a comprehensive vulnerability framework that takes into account the specifics of AI systems. A review of the currently available frameworks shows that even though there have been some efforts to create AI specific frameworks, the end results have been flawed. Previous work analysed for this paper include AVID, Mitre ATLAS, Google Secure AI Framework, Attacking Artificial Intelligence, OWASP AI security and privacy guide, and ENISA Multilayer framework for good cybersecurity practices in AI. Whi
APA, Harvard, Vancouver, ISO, and other styles
17

Serrano, Héctor, and Javier Esteban. "Sueños de un grifo. Diseño con alma de agua." i+Diseño. Revista Científico-Académica Internacional de Innovación, Investigación y Desarrollo en Diseño 7 (April 8, 2012): 101–4. http://dx.doi.org/10.24310/idiseno.2012.v7i.12631.

Full text
Abstract:
Roca Barcelona Gallery trae, por primera vez a Barcelona, Sueños de un grifo. Diseño con alma de agua, una exposición cedida por la Empresa Nacional de Innovación (ENISA), del Ministerio de Industria, Energía y Turismo, y el Círculo de Bellas Artes de Madrid, que explora el papel de los objetos como interlocutores entre nosotros y el agua, y muestra cómo el diseño se convierte en una herramienta indispensable para establecer un diálogo claro y humano. Sin este diálogo, no sólo no podríamos utilizarla, sino que tampoco podríamos transportarla o protegernos de ella.
APA, Harvard, Vancouver, ISO, and other styles
18

ZACHARIS, Alexandros, Eloise JABES, Ifigenia LELLA, and Evangelos REKLEITIS. "Cyber Awareness Exercises: Virtual vs On-site Participation & the Hybrid Approach." International Journal of Information Security and Cybercrime 10, no. 2 (2021): 31–36. http://dx.doi.org/10.19107/ijisc.2021.02.04.

Full text
Abstract:
This paper examines the advantages and disadvantages of executing cyber awareness exercises in two different formats: Virtual vs On-site participation. Two EU Agencies, EUSPA and ENISA have organized in the previous years Cyber Awareness exercises; a very important tool to enhance and test the organization's ability to put up resistance and respond to different cyber threats. The objective of this paper is to compare the outcomes of these awareness exercises, executed on-site through physical attendance prior to 2019 and virtually, in a remote setup in 2020, due to the restrictions posed by th
APA, Harvard, Vancouver, ISO, and other styles
19

Martí Pellón, José. "Asimetría informativa y financiación de pymes: el papel de los préstamos participativos." ICE, Revista de Economía, no. 904 (September 3, 2018): 71–83. http://dx.doi.org/10.32796/ice.2018.904.6665.

Full text
Abstract:
Ante las dificultades de las pymes para financiarse, por los problemas derivados de la existencia de información asimétrica, en este trabajo se describe el papel de los préstamos participativos como alternativa a otros planteamientos de apoyo promovidos desde el sector público. La combinación de características de los recursos propios y de la deuda, unida a una selección cuidadosa de los proyectos, determina un positivo efecto sobre las empresas beneficiarias, que se analiza en el caso de los préstamos participativos concedidos por ENISA. Las empresas beneficiarias crecen más que empresas simi
APA, Harvard, Vancouver, ISO, and other styles
20

Garcia, Bruno. "Information and security in cyberspace: The influence of globalization on the intensification of risks and threats in the last decade." Ciências e Políticas Públicas / Public Sciences & Policies 7, no. 1 (2021): 213–31. http://dx.doi.org/10.33167/2184-0644.cpp2021.vviin1/pp.213-231.

Full text
Abstract:
This article provides a brief history of information security, with emphasis on cybersecurity threats and how these are influenced by globalization. A comparative analysis of three different sources is conducted to capture some patterns about this relationship: 1) ENISA reports on cyberthreats, 2) The Global Risks Report, on global threats and the 3) DHLGlobal Connectedness report for globalization indicators. To avoid dispersion, the analysis is circumscribed roughly to the last decade. This report points to an intensification of cyber threats in the last few years, while the globalization in
APA, Harvard, Vancouver, ISO, and other styles
21

Garcia, Bruno. "Informação e Segurança no Ciberespaço: A influência da globalização na intensificação de riscos e ameaças na última década." Ciências e Políticas Públicas / Public Sciences & Policies 7, no. 1 (2021): 193–212. http://dx.doi.org/10.33167/2184-0644.cpp2021.vviin1/pp.193-212.

Full text
Abstract:
Este artigo fornece uma breve história da segurança de informação, com ênfase nas ameaças à segurança cibernética e como estas são influenciadas pela globalização. É realizada uma análise comparativa de três fontes diferentes para captar alguns padrões sobre esta relação: 1) relatórios da ENISA sobre ameaças cibernéticas, 2) relatório global de riscos, sobre ameaças globais e 3) relatório DHL – Global Connectedness para indicadores de globalização. Para evitar dispersão, a análise é circunscrita aproximadamente à última década. Este relatório aponta para uma intensificação das ameaças cibernét
APA, Harvard, Vancouver, ISO, and other styles
22

Wiewiórowski, Wojciech, and Juhan Lepassaar. "Pairing up Cybersecurity and Data Protection efforts: EDPS and ENISA sign Memorandum of Understanding." Datenschutz und Datensicherheit - DuD 47, no. 2 (2023): 68. http://dx.doi.org/10.1007/s11623-023-1718-8.

Full text
APA, Harvard, Vancouver, ISO, and other styles
23

Gonçalves, Emanuel. "Comprehensive Analysis for Cybersecurity and Interoperability in Portuguese Healthcare Systems Under NIS2." ARIS2 - Advanced Research on Information Systems Security 5, no. 1 (2025): 38–56. https://doi.org/10.56394/aris2.v5i1.59.

Full text
Abstract:
This article presents a comprehensive analysis of cybersecurity challenges and interoperability requirements in Portuguese healthcare systems within the context of the Network and Information Security 2 (NIS2) Directive. Drawing from data and recommendations from the European Union Agency for Cybersecurity (ENISA), the National Cybersecurity Center (CNCS), the National Data Protection Commission (CNPD), and the National Health Service (SNS), this research examines the current state of healthcare information systems in Portugal. It evaluates compliance with NIS2 requirements and proposes a fram
APA, Harvard, Vancouver, ISO, and other styles
24

Šepec, Miha, and Maša Kočivnik. "Combatting Cyberwarfare Crimes in the European Union." European Integration Studies 20, no. 2 (2024): 409–32. https://doi.org/10.46941/2024.2.16.

Full text
Abstract:
Cyberwarfare crimes constitute a major threat to the security of the European countries. The effects of such attacks could be devastating for the European economy, stability and national security. The question therefore remains, whether the European Union (EU) has effective security measures and strategies against cyberwarfare attacks, and whether it has appropriate legal definitions of such phenomena. Furthermore, does the EU have cooperation measures and institutions for combatting such crimes? In this article we will first present the practical and legal definition of cyberwarfare and its i
APA, Harvard, Vancouver, ISO, and other styles
25

Бедаев, А. И. "МЕЖДУНАРОДНАЯ ИНФОРМАЦИОННАЯ БЕЗОПАСНОСТЬ В РАБОЧЕЙ ПОВЕСТКЕ ЕВРОСОЮЗА: УГРОЗЫ, НАПРАВЛЕНИЯ РАБОТЫ И ПРОБЛЕМЫ". Caspium Securitatis Journal of Caspian Safety & Security 4, № 1 (2024): 11–22. https://doi.org/10.54398/2713-024x.2024.4.1.001.

Full text
Abstract:
Актуальность информационных угроз обусловлена наличием не менее трёх составляющих: нанесение материального ущерба международными акторами друг другу, кибершпионаж на государственном уровне и киберпреступления против государственных органов, частных и юридических лиц со стороны представителей уголовного мира. В странах Европейского союза долгое время проблема международной информационной безопасности не считалась актуальной проблемой. Несмотря на ряд шагов Евросоюза в направлении защиты от киберугроз (принятие Будапештской конвенции о борьбе с киберпреступлениями 2001 г., создание Европейского
APA, Harvard, Vancouver, ISO, and other styles
26

Szádeczky, Tamás. "Cybersecurity Authorities and Related Policies in the EU and Hungary." Central and Eastern European eDem and eGov Days 331 (July 12, 2018): 287–99. http://dx.doi.org/10.24989/ocg.v331.24.

Full text
Abstract:
Parallel with the evolving of cyber conflicts, the need for appropriate handling of the public administration tasks also appeared. Governmental tasks were necessary, which includes defense (military), diplomatic, law enforcement and public administrative factors also.
 This paper shows an analysis of the institutional background of cybersecurity administration in the European Union and Hungary in parallel. This includes the regulations about ENISA, the European Union Cybersecurity Agency, the Hungarian cybersecurity authorities, and the cybersecurity strategies for both entities, namely R
APA, Harvard, Vancouver, ISO, and other styles
27

Smith, Robert. "Reviewer Acknowledgements." Journal of Education and Training Studies 4, no. 3 (2016): 235. http://dx.doi.org/10.11114/jets.v4i3.1425.

Full text
Abstract:
Journal of Education and Training Studies (JETS) would like to acknowledge the following reviewers for their assistance with peer review of manuscripts for this issue. Many authors, regardless of whether JETS publishes their work, appreciate the helpful feedback provided by the reviewers. Their comments and suggestions were of great help to the authors in improving the quality of their papers. Each of the reviewers listed below returned at least one review for this issue. Reviewers for Volume 4, Number 3 Baraka M. Ngussa Betsy Diegel Cassandra Smith Charlotte Alverson Chris Prince Udochukwu Nj
APA, Harvard, Vancouver, ISO, and other styles
28

Thanvi, Irfan Ali. "Legal Challenges in Securing Critical Information Infrastructure Protection (CIIP): An American Empathy." Cyber Law Reporter 02, no. 01 (2023): 60–86. http://dx.doi.org/10.55662/cylr.2023.2101.

Full text
Abstract:
Among the main achievements of the CIIP policy are establishment of the European Forum for Member States and of the European Public-Private Partnership for Resilience; carrying out of pan-European exercises (Cyber Europe 2010 and 2012); adoption, by ENISA, of a minimum set of baseline capabilities and services and related policy recommendations for National/Governmental Computer Emergency Response Teams (CERTs) to function effectively. In some cases, the Cybersecurity strategy is taking forward such actions (for example, in carrying out pan-European exercises). In other cases, the voluntary ap
APA, Harvard, Vancouver, ISO, and other styles
29

DI FRANCO, Fabio, Konstantinos PAPADATOS, and Konstantinos RANTOS. "Re-Visiting Cyber Security Training in the COVID-19 Era." International Journal of Information Security and Cybercrime 10, no. 2 (2021): 16–20. http://dx.doi.org/10.19107/ijisc.2021.02.02.

Full text
Abstract:
Cyber security training, as many other aspects in our lives, has been adapted to address concerns related to travel restrictions and group gatherings resulting from the COVID-19 pandemic. In this context, ENISA, the European Union Agency for Cybersecurity, had to re-visit and significantly modify its already established course on Information Security Management and ICT security, which is provided under the auspices of the European Security and Defence College (ESDC). The program provides public employees the opportunity to gain the necessary knowledge and skills to assume an Information Securit
APA, Harvard, Vancouver, ISO, and other styles
30

Singh, Jitendra, and Kamlesh Kumar Raghuvanshi. "Regulations and Standards in Public Cloud." Journal of Information Technology Research 13, no. 3 (2020): 21–36. http://dx.doi.org/10.4018/jitr.2020070102.

Full text
Abstract:
Security is a critical issue particularly in public cloud as it rests with the cloud providers. During security implementation, prevailing security threats and regulatory standards are borne in mind. Regulatory compliance varies from one cloud provider to another according to their maturity and location of the data center. Thus, subscribers need to verify the security requirement meeting their objective and the one implemented by the public cloud provider. To this end, subscribers need to visit each cloud provider's site to view the compliance. This is a time-consuming activity at the same tim
APA, Harvard, Vancouver, ISO, and other styles
31

Smith, Robert. "Reviewer Acknowledgements." Journal of Education and Training Studies 4, no. 5 (2016): 262. http://dx.doi.org/10.11114/jets.v4i5.1582.

Full text
Abstract:
Journal of Education and Training Studies (JETS) would like to acknowledge the following reviewers for their assistance with peer review of manuscripts for this issue. Many authors, regardless of whether JETS publishes their work, appreciate the helpful feedback provided by the reviewers. Their comments and suggestions were of great help to the authors in improving the quality of their papers. Each of the reviewers listed below returned at least one review for this issue. Reviewers for Volume 4, Number 5 Ardi Marwan Begoña Montero-Fleta Cynthia M. Compton Dodzi Amemado Elena Jerves Enisa Mede
APA, Harvard, Vancouver, ISO, and other styles
32

Smith, Robert. "Reviewer Acknowledgements." Journal of Education and Training Studies 4, no. 6 (2016): 241. http://dx.doi.org/10.11114/jets.v4i6.1645.

Full text
Abstract:
Journal of Education and Training Studies (JETS) would like to acknowledge the following reviewers for their assistance with peer review of manuscripts for this issue. Many authors, regardless of whether JETS publishes their work, appreciate the helpful feedback provided by the reviewers. Their comments and suggestions were of great help to the authors in improving the quality of their papers. Each of the reviewers listed below returned at least one review for this issue. Reviewers for Volume 4, Number 6 Cynthia M. Compton David A. Compton Donna Smith Elena Jerves Enisa Mede Hoi-yung Leung Int
APA, Harvard, Vancouver, ISO, and other styles
33

Rohith, Vallabhaneni, and Veeramachaneni Vinod. "Threat Modeling for Enhanced Security in the Healthcare Industry with a Focus on Mobile Health and IoT." Engineering and Technology Journal 9, no. 10 (2024): 5329–31. https://doi.org/10.5281/zenodo.13923134.

Full text
Abstract:
The advancement of mobile health and the Internet of Things (IoT) promises to enhance healthcare quality while reducing costs, particularly with the transition from inpatient to home and ambulatory care. This shift, driven by an aging population, financial pressures, and a shortage of skilled healthcare professionals, presents significant opportunities and challenges. While mobile health improves access and encourages self-management, it also raises serious concerns regarding security and interoperability, especially with wearable devices equipped with sensors in a patient's Body Area Network
APA, Harvard, Vancouver, ISO, and other styles
34

Bamigbade, Oluwatobi. "Assessment of Cost-Benefit Dynamics of Cybersecurity Compliance Investments: A Multi-Sectoral Analysis Across Financial, Energy and Intelligence Industries." Journal of Energy Research and Reviews 17, no. 7 (2025): 86–105. https://doi.org/10.9734/jenrr/2025/v17i7435.

Full text
Abstract:
This study examines the cost-benefit dynamics of cybersecurity compliance across the financial, energy, and military intelligence sectors, utilising open-access datasets from the BLS, Statista, Verizon DBIR, ENISA, and IBM. A one-way ANOVA, chi-square test, cost-benefit analysis, and logistic regression were employed to analyse sectoral differences in compliance costs, breach reductions, return on compliance investment (ROCI), and institutional success factors. Results show that financial institutions incur the highest average compliance costs ($30.94 million), while military intelligence yiel
APA, Harvard, Vancouver, ISO, and other styles
35

Aditya Putra, Fandi, and Farouq Aferudin. "Pengembangan Financial Service Information Sharing and Analysis Center (FS-ISAC) di Indonesia dengan Pendekatan ENISA ISAC in a Box." Info Kripto 16, no. 2 (2022): 79–86. http://dx.doi.org/10.56706/ik.v16i2.49.

Full text
Abstract:
Pembentukan grup Information Sharing and Anlysis Center (ISAC) menjadi salah satu best practice yang dapat dijalankan dalam menghadapi ancaman siber yang semakin masif pada berbagai sektor infrastruktur informasi vital (IIV) termasuk pada sektor perbankan dan keuangan di Indonesia. Melalui ISAC setiap organisasi dapat berbagi kapabilitas yang dimiliki untuk secara bersama-sama menciptakan cybersecurity situational awarenesss. Pada tahun 2019, Bank Indonesia telah menginisiasi pembentukan Cyber Security Sharing Platform - Sistem Pembayaran (CSSP-SP) untuk berbagi informasi keamanan siber khusus
APA, Harvard, Vancouver, ISO, and other styles
36

Cruz, Cayetano, and Jesús Ángel Prieto. "Diseñando con las manos: proyecto y proceso en la artesanía del s. XXI." i+Diseño. Revista Científico-Académica Internacional de Innovación, Investigación y Desarrollo en Diseño 5 (April 7, 2011): 138–40. http://dx.doi.org/10.24310/idiseno.2011.v5i.12652.

Full text
Abstract:
Libro editado por FUNDESARTE con la colaboración de ENISA, que se presentará en Madrid el jueves 19 de mayo como el primer manual de descarga gratuita online dirigido al ámbito académico y profesional en el que se proponen puentes metodológicos y creativos entre la artesanía y el diseño. El acto lo presidirá Doña Estela Gallego, Directora General de Política de la PYME y tendrá lugar a las 19,30 horas en la Central de Diseño, Matadero Madrid. Su descarga se podrá realizar desde la web: www.fundesarte.orgEl libro, que consta de 185 páginas, estará disponible gratuitamente para su descarga en la
APA, Harvard, Vancouver, ISO, and other styles
37

Ananda, Safrida, Ika Putranti, and Andi Dir. "ANALYSIS OF THE EU CYBERSECURITY ACT UNDER THE THEORY OF NEOLIBERAL INSTITUTIONALISM." Arena Hukum 15, no. 1 (2022): 176–99. http://dx.doi.org/10.21776/ub.arenahukum.2022.01501.9.

Full text
Abstract:
Wannacry Ransomware epidemics have attacked several high-profile companies in European Union creating an EU-wide cybersecurity crisis in the digital economy and social order. In response, European Union established an appropriate regulation in cybercrime namely The Cybersecurity Act. The Act as an international regime does not only gives a permanent mandate that strengthens European Union Agency for Network and Information Security (ENISA) but also establishes The EU Cybersecurity Certification Scheme in order to increase cybersecurity and build cyber resilience in the European Union Digital S
APA, Harvard, Vancouver, ISO, and other styles
38

Meily, Meily. "XYZ Web App Information Security Management Risk Assessment." ACMIT Proceedings 1, no. 1 (2014): 59–89. http://dx.doi.org/10.33555/acmit.v1i1.19.

Full text
Abstract:
Cloud computing is one of the strategic technology trends. It’s pay as you go characteristic and the fact that the service is provided via a broad network, such as a web browser is what makes cloud providers incentivised by profits by providing cloud services, and cloud customers are interested in the chance of eliminating costs that come with in-house service provision. Due to its infrastructure where cloud providers maintain everything cloud customers are wary and concerned about their data and system security. Hence this paper was tries to address and answer cloud customers’ concern on secu
APA, Harvard, Vancouver, ISO, and other styles
39

Smith, Robert. "Reviewer Acknowledgements." Journal of Education and Training Studies 4, no. 4 (2016): 295. http://dx.doi.org/10.11114/jets.v4i4.1484.

Full text
Abstract:
Journal of Education and Training Studies (JETS) would like to acknowledge the following reviewers for their assistance with peer review of manuscripts for this issue. Many authors, regardless of whether JETS publishes their work, appreciate the helpful feedback provided by the reviewers. Their comments and suggestions were of great help to the authors in improving the quality of their papers. Each of the reviewers listed below returned at least one review for this issue. Reviewers for Volume 4, Number 4 Ardi Marwan Chris Prince Udochukwu Njoku Damodar Khanal David A. Compton Enisa Mede Erickz
APA, Harvard, Vancouver, ISO, and other styles
40

Савчук, Сергій Олександрович. "Виклики та можливості інтеграції України в систему кібербезпеки ЄС". Економіка, управління та адміністрування, № 2(108) (1 серпня 2024): 198–203. https://doi.org/10.26642/ema-2024-2(108)-198-203.

Full text
Abstract:
У статті висвітлено ключові аспекти розвитку системи кіберзахисту в Європейському Союзі та його значення для стійкості електронної комерції та комунальних структур. Розглянуто директиви NIS і NIS2, які встановлюють стандарти щодо норм кібербезпеки, а також Закон про кібербезпеку, який визначає процеси сертифікації ІТ-товарів і послуг. Визначено функції спеціалізованих європейських органів, таких як ENISA, CERT-EU та EU-CyCLONE, щодо організації реагування на протидію кіберзагрозам, методам посилення міжнародної співпраці та обміну розвідданими. В статті представлено скориговану структуру механ
APA, Harvard, Vancouver, ISO, and other styles
41

De Barros, Martina. "Cybersecurity in Mozambique: Status and Challenges." European Conference on Cyber Warfare and Security 22, no. 1 (2023): 553–58. http://dx.doi.org/10.34190/eccws.22.1.1194.

Full text
Abstract:
Digital technologies became one of the most important components of societies day to day life. In Africa, they brought several benefits as well as challenges. For instance, the number of cyber-crimes and cyber-attacks are increasing. Yet, not all 54 African countries have implemented proper cybersecurity measures such as the adoption of national cybersecurity strategy, technical and organizational measures, development of cyber capacity and fostering national and engaging in regional and international cooperation. However, the adoption of these measures are vital and imperative. Mozambique is
APA, Harvard, Vancouver, ISO, and other styles
42

GRAMMATOPOULOS, Athanasios Vasileios, and Fabio DI FRANCO. "Building a Career Path Through Training Programmes Using ECSF." International Journal of Information Security and Cybercrime 12, no. 1 (2023): 11–17. http://dx.doi.org/10.19107/ijisc.2023.01.01.

Full text
Abstract:
Although more and more services are moving into the digital space, there are not enough professionals to cover all the cybersecurity-related positions needed to ensure the security and resilience of organisations. The problem, known as the “cybersecurity skills gap and workforce shortage”, was highlighted even more during the COVID-19 pandemic and is affecting organisations worldwide. The European Union Agency for Cybersecurity (ENISA) recently released the European Cybersecurity Skills Framework (ECSF), a cybersecurity framework defining 12 cybersecurity role profiles, along with the main tas
APA, Harvard, Vancouver, ISO, and other styles
43

Martinez, Cristina, Iñaki Etxaniz, Alberto Molinuevo, and Juncal Alonso. "MEDINA Catalogue of Cloud Security controls and metrics: Towards Continuous Cloud Security compliance." Open Research Europe 4 (April 24, 2024): 90. http://dx.doi.org/10.12688/openreseurope.16669.1.

Full text
Abstract:
In order to address current challenges on security certification of European ICT products, processes and services, the European Comission, through ENISA (European Union Agency for Cybersecurity), has developed the European Cybersecurity Certification Scheme for Cloud Services (EUCS). This paper presents the overview of the H2020 MEDINA project approach and tools to support the adoption of EUCS and offers a detailed description of one of the core components of the framework, the MEDINA Catalogue of Controls and Metrics. The main objective of the MEDINA Catalogue is to provide automated function
APA, Harvard, Vancouver, ISO, and other styles
44

Иманбаев, Азамат, Сахыбай Тынымбаев, Роман Одарченко та Ерсултан Валихан. "АНАЛИЗ МЕХАНИЗМОВ БЕЗОПАСНОСТИ СЕТЕЙ СОТОВОЙ СВЯЗИ 5G". Вестник Алматинского университета энергетики и связи 1, № 64 (2024): 69–85. http://dx.doi.org/10.51775/2790-0886_2024_64_1_69.

Full text
Abstract:
Научная статья рассматривает внедрение технологических услуг пятого поколения (5G), начавшееся в 2019 году, с особым акцентом на их структурных изменениях в мобильных сетях, направленных на удовлетворение потребностей Интернета вещей. В статье подчеркивается важность внедрения новейших ИКТ-технологий, таких как программно-определяемые сети/виртуализированные сетевые функции, пограничные вычисления и нарезка сети. Однако совместно с технологическим прогрессом возникают новые проблемы безопасности, связанные с созданием новых путей доступа и с ограничением видимости безопасности. Цель исследован
APA, Harvard, Vancouver, ISO, and other styles
45

Gherghin, Claudia-Anamaria. "Public Policies in Data Security in the European Union: A Literature Review." TechHub Journal 3 (December 10, 2024): 74–80. https://doi.org/10.47577/techhub.v3i.128.

Full text
Abstract:
This literature review explores the multifaceted development of public policies in data security within the European Union. It synthesizes findings from fourteen key academic studies and policy analyses, identifying challenges such as regulatory fragmentation, ethical governance, technological uncertainties with blockchain, and the pursuit of digital sovereignty. The analysis reveals that harmonized regulations are needed to bridge gaps across diverse sectors like finance, aviation, and critical infrastructure. Ethical considerations surrounding AI, algorithmic decision-making, and data sharin
APA, Harvard, Vancouver, ISO, and other styles
46

Mackita, Masky, Soo-Young Shin, and Tae-Young Choe. "ERMOCTAVE: A Risk Management Framework for IT Systems Which Adopt Cloud Computing." Future Internet 11, no. 9 (2019): 195. http://dx.doi.org/10.3390/fi11090195.

Full text
Abstract:
Many companies are adapting cloud computing technology because moving to the cloud has an array of benefits. During decision-making, having processed for adopting cloud computing, the importance of risk management is progressively recognized. However, traditional risk management methods cannot be applied directly to cloud computing when data are transmitted and processed by external providers. When they are directly applied, risk management processes can fail by ignoring the distributed nature of cloud computing and leaving numerous risks unidentified. In order to fix this backdrop, this paper
APA, Harvard, Vancouver, ISO, and other styles
47

Čelik, Petar. "Institutional Measures for Increasing the Cyber Security for Business in the European Union." Economic Themes 57, no. 3 (2019): 351–64. http://dx.doi.org/10.2478/ethemes-2019-0020.

Full text
Abstract:
AbstractNumerous research and analytical studies envisage a new wave of disruptive innovations that will completely change the economic landscape, organization and business models in the short term, as well as ways of managing companies. This wave of innovation, followed by the use of new digital technologies, such as Big Data, mobile applications, social networking, robotics, 3D printing, nanotechnology, quantum informatics, cloud computing, etc., through various forms and modes of cyber vulnerability, contribute to reducing the ability to achieve effective protection, not only for companies
APA, Harvard, Vancouver, ISO, and other styles
48

Smith, Robert. "Reviewer Acknowledgements." Journal of Education and Training Studies 3, no. 6 (2015): 298. http://dx.doi.org/10.11114/jets.v3i6.1178.

Full text
Abstract:
Journal of Education and Training Studies (JETS) would like to thank the following reviewers for reviewing manuscripts from July 1, 2015, to October 31, 2015. Their comments and suggestions were of great help to the authors in improving the quality of their papers. Many authors, regardless of whether JETS publishes their work, appreciate the helpful feedback provided by the reviewers. Redfame Publishing appreciates the following reviewers’ rigorous and conscientious efforts for this journal. Each of the reviewers listed below returned at least one review during this period. Ardi MarwanBaraka M
APA, Harvard, Vancouver, ISO, and other styles
49

Smith, Robert. "Reviewer Acknowledgements." Journal of Education and Training Studies 4, no. 1 (2015): 238. http://dx.doi.org/10.11114/jets.v4i1.1238.

Full text
Abstract:
Journal of Education and Training Studies (JETS) would like to acknowledge the following reviewers for their assistance with peer review of manuscripts for this issue. Many authors, regardless of whether JETS publishes their work, appreciate the helpful feedback provided by the reviewers. Their comments and suggestions were of great help to the authors in improving the quality of their papers. Each of the reviewers listed below returned at least one review for this issue. Reviewers for Volume 4, Number 1 Ardi Marwan Betsy Diegel Cassandra Smith Charlotte Alverson Davy Seligin Ebrahim Mohammadp
APA, Harvard, Vancouver, ISO, and other styles
50

Smith, Robert. "Reviewer Acknowledgements." Journal of Education and Training Studies 4, no. 2 (2016): 198. http://dx.doi.org/10.11114/jets.v4i2.1291.

Full text
Abstract:
Journal of Education and Training Studies (JETS) would like to acknowledge the following reviewers for their assistance with peer review of manuscripts for this issue. Many authors, regardless of whether JETS publishes their work, appreciate the helpful feedback provided by the reviewers. Their comments and suggestions were of great help to the authors in improving the quality of their papers. Each of the reviewers listed below returned at least one review for this issue. Reviewers for Volume 4, Number 2 Ardi Marwan Arlene Kent-Wilkinson Betsy Diegel Cassandra Smith Charlotte Alverson Davy Sel
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!