Journal articles on the topic 'Human-Centric Security'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the top 50 journal articles for your research on the topic 'Human-Centric Security.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.
Tarai, Dr Sunita. "National security and migration: A human security centric analysis." International Journal of Applied Research 10, no. 4 (2024): 79–85. http://dx.doi.org/10.22271/allresearch.2024.v10.i4b.11655.
Full textSaqib, Muhammad, Muhammad Imran Ashraf, and Noor Fatima. "Smart Power Engagement for Sustainable Human Security in South Asia." Global Strategic & Securities Studies Review IV, no. I (2019): 1–10. http://dx.doi.org/10.31703/gsssr.2019(iv-i).01.
Full textDeibert, Ronald J. "Toward a Human-Centric Approach to Cybersecurity." Ethics & International Affairs 32, no. 4 (2018): 411–24. http://dx.doi.org/10.1017/s0892679418000618.
Full textLiaropoulos, Andrew N. "Reconceptualising Cyber Security." International Journal of Cyber Warfare and Terrorism 6, no. 2 (2016): 32–40. http://dx.doi.org/10.4018/ijcwt.2016040103.
Full textGuyo, Adi. "Violent Extremism in the Northern Frontier Counties of Kenya: Exploring Human Security as a Sustainable Countering Strategy." Strathmore Law Review 6, no. 1 (2021): 195–218. http://dx.doi.org/10.52907/slr.v6i1.167.
Full textTriwardani, Reny. "Is Human Security That Matters? An Analysis Of The Three-Year Report Of Jokowi's Administration On Human Security (HS) Perspective." POPULIKA 12, no. 2 (2024): 193–216. http://dx.doi.org/10.37631/populika.v12i2.1463.
Full textBaral, Bhimnath. "Security Challenges of Small States." Journal of Political Science 17 (February 6, 2017): 1–17. http://dx.doi.org/10.3126/jps.v17i0.20510.
Full textDikito, Anesu Robin, and M. Shamim Kaiser. "The Relationship between Human-centric Cybersecurity and Cybercrime." Journal of Information Technology 11 (July 31, 2023): 58–66. http://dx.doi.org/10.59185/cd2a2q06.
Full textArora, Anshu Saxena, Luisa Saboia, Amit Arora, and John R. McIntyre. "Human-Centric Versus State-Driven." International Journal of Intelligent Information Technologies 21, no. 1 (2025): 1–13. https://doi.org/10.4018/ijiit.367471.
Full textKioskli, Kitty, Eleni Seralidou, and Nineta Polemi. "A Practical Human-Centric Risk Management (HRM) Methodology." Electronics 14, no. 3 (2025): 486. https://doi.org/10.3390/electronics14030486.
Full textChhetri, Mohan Baruwal, Xiao Liu, Marthie Grobler, Thuong Hoang, Karen Renaud, and Jennifer McIntosh. "Report on the 2nd Workshop on Human Centric Software Engineering & Cyber Security (HCSE&CS 2021)." ACM SIGSOFT Software Engineering Notes 47, no. 2 (2022): 12–14. http://dx.doi.org/10.1145/3520273.3520278.
Full textHossain, Kamrul. "Securing the Rights: A Human Security Perspective in the Context of Arctic Indigenous Peoples." Yearbook of Polar Law Online 5, no. 1 (2013): 493–522. http://dx.doi.org/10.1163/22116427-91000134.
Full textNa, Onechul, and Hangbae Chang. "Human-Centric Security Capability Enhancement in ICT Convergence Environment." Journal of Digital Contents Society 20, no. 2 (2019): 431–42. http://dx.doi.org/10.9728/dcs.2019.20.2.431.
Full textGoonetillake, M. D. J. S., Rangana Jayashanka, and S. V. Rathnayaka. "Predicting Security-Vulnerable Developers Based on Their Techno-Behavioral Characteristics." International Journal of Information Security and Privacy 16, no. 1 (2022): 1–26. http://dx.doi.org/10.4018/ijisp.2022010103.
Full textKlein, Joëlle, and Kamrul Hossain. "Conceptualising Human-centric Cyber Security in the Arctic in Light of Digitalisation and Climate Change." Arctic Review on Law and Politics 11 (2020): 1. http://dx.doi.org/10.23865/arctic.v11.1936.
Full textDjurdjevic-Lukic, Svetlana. "Broadening security concept: From "national" to "human security"." Medjunarodni problemi 56, no. 4 (2004): 397–408. http://dx.doi.org/10.2298/medjp0404397d.
Full textAgboola, Taofeek, Job Adegede, and John Jacob. "Balancing Usability and Security in Secure System Design: A Comprehensive Study on Principles, Implementation, and Impact on Usability." International Journal of Computing Sciences Research 8 (January 1, 2024): 2995–3009. https://doi.org/10.25147/ijcsr.2017.001.1.199.
Full textLahiry, Sujit. "The Changing Narrative of Security Discourse: From State Security to Human Security in South Asia?" World Affairs 183, no. 2 (2020): 183–205. http://dx.doi.org/10.1177/0043820020921153.
Full textKingsley David Onyewuchi Ofoegbu, Olajide Soji Osundare, Chidiebere Somadina Ike, Ololade Gilbert Fakeyede, and Adebimpe Bolatito Ige. "Proactive cyber threat mitigation: Integrating data-driven insights with user-centric security protocols." Computer Science & IT Research Journal 5, no. 8 (2024): 2083–106. http://dx.doi.org/10.51594/csitrj.v5i8.1493.
Full textZojer, Gerald. "The Interconnectedness of Digitalisation and Human Security in the European High North: Cybersecurity Conceptualised through the Human Security Lens." Yearbook of Polar Law Online 10, no. 1 (2019): 297–320. http://dx.doi.org/10.1163/22116427_010010014.
Full textPh. D, D. Litt, Prof Narottam Gaan,, Dr Sudhansubala Das, and Dr Banita Mahanandia. "Climate Change and Revisiting Security from Traditional State-Centric to Human Security and Beyond." Advances in Politics and Economics 5, no. 3 (2022): p59. http://dx.doi.org/10.22158/ape.v5n3p59.
Full textPasupuleti, Murali Krishna. "Human-Centric Cybersecurity: Evaluating Phishing Susceptibility Using Behavioral Metrics." International Journal of Academic and Industrial Research Innovations(IJAIRI) 05, no. 06 (2025): 412–24. https://doi.org/10.62311/nesx/rphcrcscrcp4.
Full textNEWMAN, EDWARD. "Critical human security studies." Review of International Studies 36, no. 1 (2010): 77–94. http://dx.doi.org/10.1017/s0260210509990519.
Full textDr., Muhammad Shafi, and Muhammad Ali Dinakhel Dr. "National Security Policy of Pakistan (2022-2026): Introduction and Impact on Political Landscape of Pakistan." Al-Azhar 08, no. 02 (2022): 31–41. https://doi.org/10.5281/zenodo.7509757.
Full textZachosova, Nataliia, Svitlana Bilous, and Yevheniy Lych. "PEOPLE-CENTRIC HR-MANAGEMENT: ENHANCING RECRUITMENT, MOTIVATION AND INTELLECTUAL-PERSONNEL SECURITY OF ENTERPRISES." Economics, Finance and Management Review, no. 2(22) (June 30, 2025): 109–19. https://doi.org/10.36690/2674-5208-2025-2-109-119.
Full textShih, Hung-Pin, Kee-hung Lai, Xitong Guo, and T. C. E. Cheng. "Believe It or Not." Journal of Global Information Management 29, no. 6 (2021): 1–18. http://dx.doi.org/10.4018/jgim.294329.
Full textGopireddy, Ravindar Reddy. "Human-Centric Cybersecurity: Addressing the Human Element in Cyber Defense and Ethical Considerations in Cybersecurity." Journal of Artificial Intelligence & Cloud Computing 1, no. 4 (2022): 1–5. http://dx.doi.org/10.47363/jaicc/2022(1)e118.
Full textAli, Firkhan Ali Bin Hamid, and Mohd Zalisham Jali. "Human-Technology Centric In Cyber Security Maintenance For Digital Transformation Era." Journal of Physics: Conference Series 1018 (May 2018): 012012. http://dx.doi.org/10.1088/1742-6596/1018/1/012012.
Full textChoi, Seoung Won, and Julak Lee. "Exploring Perception of Human-Centric Security Concept through Big Data Analysis." Korean Journal of Industry Security 13, no. 3 (2023): 73–90. http://dx.doi.org/10.33388/kais.2023.13.3.073.
Full textIşik, Öykü, Yanya Viskovich, and Si Pavitt. "Common pitfalls when mitigating cyber risk : Addressing socio-behavioural factors." Cyber Security: A Peer-Reviewed Journal 8, no. 1 (2024): 6. http://dx.doi.org/10.69554/ueev5385.
Full textJeong, Young-Sik, Jae Dong Lee, Jeong-Bae Lee, Jai-Jin Jung, and Jong Hyuk Park. "An Efficient and Securem-IPS Scheme of Mobile Devices for Human-Centric Computing." Journal of Applied Mathematics 2014 (2014): 1–8. http://dx.doi.org/10.1155/2014/198580.
Full textElliott, Lorraine. "Unsettling Human (In)Security: Challenging Neglect and Making the Unapparent Appear." Irish Studies in International Affairs 34, no. 1 (2023): 27–45. http://dx.doi.org/10.1353/isia.2023.a918354.
Full textBuayairugsa, Jidapa. "SECURITIZATION AGAINST SEX TRAFFICKING OF WOMEN AND CHILDREN: THE CASE OF MULTILATERAL COOPERATION IN THE MEKONG SUB-REGION." EUrASEANs: journal on global socio-economic dynamics, no. 4(17) (August 8, 2019): 30–36. http://dx.doi.org/10.35678/2539-5645.4(17).2019.30-36.
Full textHakimi, Musawer, Mohammad Mustafa Quchi, and Abdul Wajid Fazil. "Human factors in cybersecurity: an in depth analysis of user centric studies." Jurnal Ilmiah Multidisiplin Indonesia (JIM-ID) 3, no. 01 (2024): 20–33. http://dx.doi.org/10.58471/esaprom.v3i01.3832.
Full textKim, Hyun-Woo, Jun-Ho Kim, Jong Hyuk Park, and Young-Sik Jeong. "Time Pattern Locking Scheme for Secure Multimedia Contents in Human-Centric Device." Scientific World Journal 2014 (2014): 1–9. http://dx.doi.org/10.1155/2014/796515.
Full textKim, Yanghoon, and Hangbae Chang. "Human centric security policy and management design for small and medium business." Security and Communication Networks 7, no. 10 (2013): 1622–32. http://dx.doi.org/10.1002/sec.814.
Full textMakeri, Yakubu Ajiji. "The role of Cyber Security and Human-Technology Centric for Digital Transformation." International Journal of Scientific Research in Computer Science and Engineering 6, no. 6 (2018): 53–59. http://dx.doi.org/10.26438/ijsrcse/v6i6.5359.
Full textBramhe, Ulhas Vijay. "Strengthening - Security Component for Ladies." International Journal of Advance and Applied Research 4, no. 36 (2023): 130–32. https://doi.org/10.5281/zenodo.10336970.
Full textSingh, Arun Kumar. "Human Security in Nepali Perspective." Journal of APF Command and Staff College 2, no. 1 (2019): 60–66. http://dx.doi.org/10.3126/japfcsc.v2i1.26732.
Full textBudhathoki, Ishwor. "Re-conceptualizing Nepal’s Security Policies: A Comprehensive Framework for Addressing Non-Traditional Security Threats." Shivapuri Journal 26, no. 1 (2025): 79–93. https://doi.org/10.3126/shivapuri.v26i1.75835.
Full textWibisono, Rizky Bangun. "Migration, Security, and Human Rights." Sunan Ampel Review of Political and Social Sciences 4, no. 1 (2024): 61–82. https://doi.org/10.15642/sarpass.2024.4.1.61-82.
Full textPiwowarski, Juliusz, and Łukasz Trzciński. "Anthropological Aspects of Security Culture Analyses within the Context of Selected Elements of Threat and Security Typology." Security Dimensions 32, no. 32 (2019): 108–26. http://dx.doi.org/10.5604/01.3001.0014.1149.
Full textArchana, Todupunuri. "The Role of Human-Centric AI in Building Trust in Digital Banking Ecosystems." International Journal of Innovative Science and Research Technology (IJISRT) 10, no. 1 (2025): 1281–86. https://doi.org/10.5281/zenodo.14769362.
Full textAdhikari, Naresh Bhakta. "Human Security in South Asia: Lesson for Nepal." BMC Research Journal 4, no. 1 (2025): 100–111. https://doi.org/10.3126/bmcrj.v4i1.80086.
Full textIndraswari, Firstyarinda. "Rethinking Border Management: A Human Security Approach to Combating Human Trafficking in the Mekong Subregion." JAS (Journal of ASEAN Studies) 12, no. 2 (2025): 353–82. https://doi.org/10.21512/jas.v12i2.11591.
Full textKim, Yuhyun, Heejin Ahn, Taeseop Kim, Byungtae Ahn, and Dong-Geol Choi. "Human-Centric Depth Estimation: A Hybrid Approach with Minimal Data." Electronics 14, no. 11 (2025): 2283. https://doi.org/10.3390/electronics14112283.
Full textUNTALAN, Carmina Yu. "Okinawa Beyond the Hub-and-spoke Alliance System: A Reappraisal." East Asian Policy 12, no. 04 (2020): 19–33. http://dx.doi.org/10.1142/s1793930520000288.
Full textSudheer Kotilingala. "The non-human identity crisis: Managing machine identities in the modern enterprise." World Journal of Advanced Research and Reviews 26, no. 1 (2025): 944–54. https://doi.org/10.30574/wjarr.2025.26.1.1118.
Full textSpitka, Timea. "The Myth of Protection: Gendering Protection under the Responsibility to Protect in Gaza." Global Responsibility to Protect 11, no. 1 (2019): 77–103. http://dx.doi.org/10.1163/1875984x-01101005.
Full textKONYSHEV, Valery N., and Maria L. LAGUTINA. "Human Security in Arctic: Threats through the Prism of the “Northern Mentality”." Arctic and North, no. 45 (December 22, 2021): 85–112. http://dx.doi.org/10.37482/issn2221-2698.2021.45.85.
Full text