To see the other types of publications on this topic, follow the link: Keywords: Cybersecurity.

Journal articles on the topic 'Keywords: Cybersecurity'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the top 50 journal articles for your research on the topic 'Keywords: Cybersecurity.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.

1

Yılmaz, Vedat. "A Bibliometric Analysis on Cybersecurity Using VOSviewer: An Evaluation for Public Security." Balkan Journal of Electrical and Computer Engineering 13, no. 2 (2025): 210–18. https://doi.org/10.17694/bajece.1608364.

Full text
Abstract:
This bibliometric study conducts a comprehensive analysis of the field of cybersecurity, particularly in the context of law enforcement and security strategies, to examine key trends, author influence, and interdisciplinary connections within the literature. In the WoS database, 6606 articles were reached by using the search expression in the title, abstract and keywords fields ("Cyber security" or "cyber-attacks" or "cyber protection" or "spam cyber security" or "data security" or "network security" or "anomaly detection" or "cyber countermeasures") and restricting the year of publication to
APA, Harvard, Vancouver, ISO, and other styles
2

Pasupuleti, Murali Krishna. "Graph-Theoretical Intelligence for Adaptive Cybersecurity: Multi-Modal Models, Dynamic Defense, and Federated Threat Detection." International Journal of Academic and Industrial Research Innovations(IJAIRI) 05, no. 04 (2025): 347–56. https://doi.org/10.62311/nesx/rp3125.

Full text
Abstract:
Abstract: The rise of sophisticated cyber threats demands adaptive, resilient, and intelligent cybersecurity mechanisms. Graph theory has emerged as a foundational tool for modeling, detecting, and responding to complex attack patterns. This paper critically interprets recent advancements across cybersecurity knowledge graphs, graph neural networks, attack graphs, and federated graph learning. A multi-modal, graph-theoretical intelligence framework is proposed to enhance dynamic defense and collaborative threat detection while maintaining privacy. Statistical analysis, visual models, and new s
APA, Harvard, Vancouver, ISO, and other styles
3

pavan G, Dr Swapna. "Social Media Cybersecurity: A Behavioural and Technological Perspective." INTERNATIONAL JOURNAL OF SCIENTIFIC RESEARCH IN ENGINEERING AND MANAGEMENT 09, no. 05 (2025): 1–9. https://doi.org/10.55041/ijsrem48730.

Full text
Abstract:
Abstract Social media platforms' rapid expansion has made cybersecurity a major issue that affects billions of users globally. This study examines cybersecurity's function, effects, and safeguards in relation to social media. Users of social media are more vulnerable to a variety of online dangers, such as dangerous software, phishing scams, cyberbullying, identity theft, and phony profiles. These risks impact users' emotional health and organizational security in addition to compromising personal data. Although the majority of platforms have built-in security protections, the study emphasizes
APA, Harvard, Vancouver, ISO, and other styles
4

LAGE SERRANO, OSCAR, and MARIA SAIZ SANTOS. "BLOCKCHAIN AND THE DECENTRALISATION OF THE CYBERSECURITY INDUSTRY." DYNA 96, no. 3 (2021): 239. http://dx.doi.org/10.6036/10188.

Full text
Abstract:
This paper aims to analyse the potential impact that blockchain technology will have on the cybersecurity industry. We will look at different applications of blockchain technology in the field of cybersecurity, as well as a new trend of decentralisation of cybersecurity services. Blockchain is precisely a cybersecurity architecture that enables the decentralisation of processes and business models, which could have a direct consequence on cybersecurity services, as well as on the industry itself. Cybersecurity companies will have to adapt to a new ecosystem in which the blockchain technology w
APA, Harvard, Vancouver, ISO, and other styles
5

Efimova, Anna, and Artem Ivashchenko. "STUDY OF THE IMPACT OF DIGITAL TRANSFORMATION ON THE ECONOMIC ASPECTS OF CYBERSECURITY IN THE BUSINESS ENVIRONMENT." Actual Problems of Economics 1, no. 274 (2024): 163–74. http://dx.doi.org/10.32752/1993-6788-2024-1-274-163-174.

Full text
Abstract:
The impact of digital transformation on the economic aspects of cybersecurity in the business environment has been investigated. The main challenges and opportunities arising from the implementation of new technologies have been considered. The economic consequences of cyber threats have been analyzed, and strategies for improving business' cybersecurity have been proposed. Keywords: digital transformation, cybersecurity, business environment, cyber threats, cybersecurity strategies.
APA, Harvard, Vancouver, ISO, and other styles
6

Khan, Mohammed Mustafa. "CYBERSECURITY AWARENESS." INTERANTIONAL JOURNAL OF SCIENTIFIC RESEARCH IN ENGINEERING AND MANAGEMENT 08, no. 10 (2024): 1–14. http://dx.doi.org/10.55041/ijsrem36233.

Full text
Abstract:
Technology is advancing at a very high speed, becoming more sophisticated and complex. Similarly, due to the vastness of the digital world, cyber threats have also increased in complexity and frequency. The rapid advancement of technology has brought unprecedented conveniences but also significant risks. Therefore, security awareness is essential for every individual and organization. Cyber threats such as phishing attacks, malware attacks, social engineering, Denial of service attacks, and insider threats have become sophisticated, proving to be a challenge to individuals and organizations. T
APA, Harvard, Vancouver, ISO, and other styles
7

P, Dr Rachana. "Strategic Approaches to Cybersecurity Audits for Control Evaluation." INTERANTIONAL JOURNAL OF SCIENTIFIC RESEARCH IN ENGINEERING AND MANAGEMENT 08, no. 12 (2024): 1–5. https://doi.org/10.55041/ijsrem40065.

Full text
Abstract:
This article presents an empirical study evaluating the effectiveness of the CyberSecurity Audit Model (CSAM 2.0) at a Canadian higher education institution. CSAM 2.0 is a comprehensive model used to assess cybersecurity assurance, maturity, and readiness in medium to large organizations and at the national level. It allows for the effective evaluation of security controls across various cybersecurity domains. The study highlights global best practices in cybersecurity audits, highlighting the lack of standardized guidelines and weaknesses in cybersecurity training programs. The paper details
APA, Harvard, Vancouver, ISO, and other styles
8

Jumanah, Hasan AlSanad. "Cybersecurity In Education." International Journal of Computer Science and Information Technology Research 12, no. 2 (2024): 51–61. https://doi.org/10.5281/zenodo.12566761.

Full text
Abstract:
<strong>Abstract</strong><strong>:</strong> In this research, we presented an explanation of the definition of cybersecurity, its importance, and its types. We also explained the difference between information security and cybersecurity, as well as the importance of both. we also mentioned how cyber security is important in the education sector and the Role of training and education in enhancing Cybersecurity. <strong>Keywords:</strong> cybersecurity, information security, education sector. <strong>Title:</strong> Cybersecurity In Education <strong>Author:</strong> Jumanah Hasan AlSanad <stron
APA, Harvard, Vancouver, ISO, and other styles
9

Daliya1, Mohit Singh. "The Role of Cybersecurity in Blockchain." INTERANTIONAL JOURNAL OF SCIENTIFIC RESEARCH IN ENGINEERING AND MANAGEMENT 08, no. 04 (2024): 1–5. http://dx.doi.org/10.55041/ijsrem30686.

Full text
Abstract:
As the maintenance of blockchain grows, so does the importance of cybersecurity in ensuring its integrity and purity. This paper explores the critical role of cybersecurity in the context of blockchain technology. The paper begins by providing an overview of blockchain technology and its key features, highlighting its potential benefits and challenges. It then delves into the cybersecurity considerations specific to blockchain, including cryptographic principles, consensus mechanisms, and smart contract vulnerabilities. The paper also evaluates current cybersecurity practices and solutions tai
APA, Harvard, Vancouver, ISO, and other styles
10

Folorunsho, O. S., A. Q. Ayinde, M. A. Olagoke, and O. E. Fatoye. "Implementation of Cybersecurity Risk Theory and Model in Healthcare." Advances in Multidisciplinary and scientific Research Journal Publication 13, no. 4 (2022): 65–72. http://dx.doi.org/10.22624/aims/cisdi/v13n4p4.

Full text
Abstract:
This review paper examines the implementation of cybersecurity risk theory and models in Healthcare, including their benefits and challenges. The paper begins with an overview of cybersecurity risk theory and models, including the STAMP theory and various types of models. It then compares different cybersecurity risk models and discusses their strengths and weaknesses. The paper also explores case studies of the successful implementation of cybersecurity risk models in Healthcare and the challenges these organizations face. The importance of risk assessment and management in healthcare cyberse
APA, Harvard, Vancouver, ISO, and other styles
11

Scholar Chinenye Obasi, Nko Okina Solomon, Olubunmi Adeolu Adenekan, and Peter Simpa. "Cybersecurity’s Role in Environmental Protection and Sustainable Development: Bridging Technology and Sustainability Goals." Computer Science & IT Research Journal 5, no. 5 (2024): 1145–77. http://dx.doi.org/10.51594/csitrj.v5i5.1140.

Full text
Abstract:
This study investigates the pivotal role of cybersecurity in bolstering environmental protection and sustainable development, a critical yet underexplored nexus in contemporary research. Employing a systematic literature review and content analysis, the research scrutinizes peer-reviewed articles, conference proceedings, and industry reports from 2015 to 2023, sourced from databases such as IEEE Xplore, ScienceDirect, and Google Scholar. The methodology is anchored in a rigorous search strategy, leveraging keywords related to cybersecurity, sustainability, and communication technologies, and a
APA, Harvard, Vancouver, ISO, and other styles
12

Goel, Rajni, Anupam Kumar, and James Haddow. "PRISM: a strategic decision framework for cybersecurity risk assessment." Information & Computer Security 28, no. 4 (2020): 591–625. http://dx.doi.org/10.1108/ics-11-2018-0131.

Full text
Abstract:
Purpose This study aims to develop a framework for cybersecurity risk assessment in an organization. Existing cybersecurity frameworks are complex and implementation oriented. The framework can be systematically used to assess the strategic orientation of a firm with respect to its cybersecurity posture. The goal is to assist top-management-team with tailoring their decision-making about security investments while managing cyber risk at their organization. Design/methodology/approach A thematic analysis of existing publications using content analysis techniques generates the initial set of key
APA, Harvard, Vancouver, ISO, and other styles
13

Sharma, Monu. "Cybersecurity Platforms: Tackling Challenges in a Digital Age." INTERANTIONAL JOURNAL OF SCIENTIFIC RESEARCH IN ENGINEERING AND MANAGEMENT 08, no. 11 (2024): 1–9. http://dx.doi.org/10.55041/ijsrem12257.

Full text
Abstract:
We will examine the dynamic cybersecurity landscape and offer practical strategies to assist businesses in managing the challenges of cybersecurity during this era of digital transformation. New technologies offer significant advantages for businesses and consumers, yet they also introduce new risks and challenges for cybersecurity. We examine how organizations can assess the impact of emerging technologies on their cybersecurity posture and strategy. By exploring key aspects such as risk evaluation, integration challenges, and potential vulnerabilities, we provide a framework for understandin
APA, Harvard, Vancouver, ISO, and other styles
14

Sahinoglu, Mehmet, Alberto Arteta, and Engin Maşazade. "Editorial for the Special Issue (2024): Network and Information Security in Cyber Systems." International Journal of Computer Theory and Engineering 17, no. 2 (2024): 102–3. https://doi.org/10.7763/ijcte.2025.v17.1372.

Full text
Abstract:
This Special Issue 2 of the International Journal of Computer Theory and Engineering (IJCTE) aims to address this pressing global issue. It solicited original, unpublished research that not only investigated cyber- and information security threats and risks but also proposed practical, cost-effective mitigation strategies. Submissions of a political or strategic nature, particularly those with the potential to endanger the safety or digital sovereignty of individuals or nations, were excluded. The overarching objective of this issue is to inspire scientifically grounded, constructive solutions
APA, Harvard, Vancouver, ISO, and other styles
15

Panchamia, Virti, Archita Harchwani, and Tirath Momaya. "Cybersecurity Renaissance: Navigating Threats, Ethical Hacking, and Risk Mitigation in the Digital Era." INTERANTIONAL JOURNAL OF SCIENTIFIC RESEARCH IN ENGINEERING AND MANAGEMENT 08, no. 01 (2024): 1–10. http://dx.doi.org/10.55041/ijsrem28181.

Full text
Abstract:
Cybercrime has evolved into a $1.5 trillion industry, mirroring legitimate organizations. Despite its recent surge, cybercrime is not a novel threat, dating back centuries. The inaugural cyber attack occurred in 1834 in France, exposing the French telegraph system. The mid-20th century marked cybercrime's emergence, notably with Allen Scherr's 1962 attack on MIT. The '90s ushered in communication technology but also increased cyber threats. The 2000s witnessed more sophisticated attacks, with APTs sponsored by nation- states. The 2010s saw a surge in cybercrime, spawning a parallel growth in c
APA, Harvard, Vancouver, ISO, and other styles
16

Nnenna, Ugwu Jovita, Ugwuanyi Ifeoma Perpetua, Asuma Mariita Nchaga, Tushabe Hadijah, Eric Mabonga, and Tom Ongesa Nyamboga. "Cybersecurity Measures in East African EGovernment Systems." IAA JOURNAL OF SOCIAL SCIENCES 10, no. 2 (2024): 12–24. http://dx.doi.org/10.59298/iaajss/2024/102.122400000.

Full text
Abstract:
This paper provides a comprehensive examination of cybersecurity measures within e-government systems in East Africa. It begins with an overview of the importance of cybersecurity in e-government, emphasizing the need to protect sensitive data and ensure the integrity of digital services. The paper then explores key aspects of cybersecurity, including risk assessment and management, data encryption, firewalls, intrusion detection/prevention systems, access control, and security awareness training. Each section highlights the significance of these measures in enhancing the security and resilien
APA, Harvard, Vancouver, ISO, and other styles
17

Persadha, Pratama. "Hacktivism Sebagai Upaya Menyampaikan Suara Lewat Ruang Siber Di Indonesia." JURNAL SOSIAL : Jurnal Penelitian Ilmu-Ilmu Sosial 21, no. 2 (2020): 72–77. http://dx.doi.org/10.33319/sos.v21i2.65.

Full text
Abstract:
Abstract— Hacktivism is becoming a trend that is being loved globally. The hacktivism trend was born at the same time as the information technology revolution, especially when people became increasingly dependent on smartphones and the internet. This has more or less affected aspects of cybersecurity in various countries. Because generally hacktivism appears with socio-political motives. Many countries have made cybersecurity one thing to study before deciding to cooperate with other countries. Also for Indonesia, cybersecurity has become an important factor in seeing national security. Severa
APA, Harvard, Vancouver, ISO, and other styles
18

Olanrewaju Oluwaseun Ajayi, Chisom Elizabeth Alozie, and Olumese Anthony Abieba. "Innovative cybersecurity strategies for business intelligence: Transforming data protection and driving competitive superiority." Gulf Journal of Advance Business Research 3, no. 2 (2025): 527–36. https://doi.org/10.51594/gjabr.v3i2.95.

Full text
Abstract:
This research paper explores innovative cybersecurity strategies for business intelligence (BI), emphasizing their role in transforming data protection and driving competitive superiority. It examines advanced encryption techniques, AI and machine learning, and blockchain technology, highlighting how these strategies enhance data security, operational efficiency, and cost savings. The paper also discusses emerging trends in BI cybersecurity, including AI-driven threat detection, zero-trust architecture, and blockchain advancements, and identifies areas for further research. The findings unders
APA, Harvard, Vancouver, ISO, and other styles
19

Temitayo Oluwaseun Abrahams, Sarah Kuzankah Ewuga, Samuel Onimisi Dawodu, Abimbola Oluwatoyin Adegbite, and Azeez Olanipekun Hassan. "A REVIEW OF CYBERSECURITY STRATEGIES IN MODERN ORGANIZATIONS: EXAMINING THE EVOLUTION AND EFFECTIVENESS OF CYBERSECURITY MEASURES FOR DATA PROTECTION." Computer Science & IT Research Journal 5, no. 1 (2024): 1–25. http://dx.doi.org/10.51594/csitrj.v5i1.699.

Full text
Abstract:
In an era where digital threats are increasingly pervasive, understanding the evolution and efficacy of cybersecurity strategies in modern organizations is paramount. This study provides a comprehensive analysis of the dynamic landscape of cybersecurity, exploring its progression from traditional methods to innovative, technology-driven approaches. The digital age has ushered in complex cyber threats, necessitating robust cybersecurity measures. This study examines cybersecurity strategies' historical development, current trends, and future directions across different organizational contexts a
APA, Harvard, Vancouver, ISO, and other styles
20

Anwuli Nkemchor Obiki-Osafiele, Edith Ebele Agu, and Njideka Rita Chiekezie. "Protecting digital assets in Fintech: Essential cybersecurity measures and best practices." Computer Science & IT Research Journal 5, no. 8 (2024): 1884–96. http://dx.doi.org/10.51594/csitrj.v5i8.1449.

Full text
Abstract:
Cybersecurity is paramount for protecting digital assets and maintaining consumer trust in the rapidly evolving fintech sector. This review paper explores essential cybersecurity measures and best practices, focusing on encryption, multi-factor authentication, security audits, secure software development, and network security. The paper also examines the threat landscape, highlighting common cyber threats such as phishing, malware, insider threats, and data breaches and their impact on fintech operations. Future trends in fintech cybersecurity, including the role of emerging technologies like
APA, Harvard, Vancouver, ISO, and other styles
21

Gomathy, Dr C. K., Dr V. Geetha, S. R. Bathrinathan, and Shiva Koushik Sripada. "EXPLORING THE ETHICAL CONSIDERATIONS OF BIOMETRICS IN CYBERSECURITY." INTERANTIONAL JOURNAL OF SCIENTIFIC RESEARCH IN ENGINEERING AND MANAGEMENT 08, no. 09 (2024): 1–8. http://dx.doi.org/10.55041/ijsrem37507.

Full text
Abstract:
Abstract—This article offers a thorough investigation of the ethical concerns related to employing biometrics in cybersecurity. It investigates the importance of biometric technology, its effects on privacy and security, and the moral challenges it raises. By extensively examining literature, case studies, and ethical principles, this paper seeks to offer perspectives on how people, institutions, and policymakers can address the ethical complexities associated with using biometrics in cybersecurity while guaranteeing responsible and ethically sound practices. Keywords—Biometrics, Cybersecurity
APA, Harvard, Vancouver, ISO, and other styles
22

Sharma, Anush, Sujal Nangla, Anadya Kaushal, and Neha Soel. "Cybersecurity Types and Prevention Methods." INTERANTIONAL JOURNAL OF SCIENTIFIC RESEARCH IN ENGINEERING AND MANAGEMENT 08, no. 09 (2024): 1–4. http://dx.doi.org/10.55041/ijsrem37573.

Full text
Abstract:
As the technology is still developing, we have several of technologies which are helpful to humans but at the same time they contain many limitations. One of the such technology in the today’s modern world contains every information to be stored in databases of computers and there are several chances of attacks on their data which is known as cybercrime, to stop such digital crimes there is introduced a shield known as cyber security. In every field whether military, corporate organization, intellectual property, stock market, banks etc. “This abstract explores the fundamental concepts of cybe
APA, Harvard, Vancouver, ISO, and other styles
23

Oluwabunmi Layode, Henry Nwapali Ndidi Naiho, Gbenga Sheriff Adeleke, Ezekiel Onyekachukwu Udeh, and Talabi Temitope Labake. "The role of cybersecurity in facilitating sustainable healthcare solutions: Overcoming challenges to protect sensitive data." International Medical Science Research Journal 4, no. 6 (2024): 668–93. http://dx.doi.org/10.51594/imsrj.v4i6.1228.

Full text
Abstract:
This study systematically reviews the intersection of cybersecurity and healthcare, aiming to identify the evolving threats, technological advancements, and the efficacy of current cybersecurity measures. Employing a systematic literature review and content analysis methodology, the research scrutinizes peer-reviewed articles, conference proceedings, and white papers from 2014 to 2023, focusing on the integration of advanced cybersecurity technologies, the impact of standards and regulations, and stakeholder implications in healthcare cybersecurity. Key findings reveal a dynamic cybersecurity
APA, Harvard, Vancouver, ISO, and other styles
24

Ademola, ojo Emmanuel, and K. Somorin. "AI and Cybersecurity in Investigative Journalism: A Literature Review." Advances in Multidisciplinary & Scientific Research Journal Publications 10, no. 1 (2024): 9–16. http://dx.doi.org/10.22624/aims/sij/v10n1p3.

Full text
Abstract:
This literature review examines the intersection of artificial intelligence (AI) and cybersecurity in the context of investigative journalism. The use of AI technologies in investigative journalism has revolutionized the way journalists analyze data and uncover stories, while also posing new challenges in cybersecurity and the detection of deepfakes. The academic literature highlights the importance of training journalists in cybersecurity best practices, investing in AI technologies, and detecting and debunking deepfakes to safeguard the integrity of journalistic work. By integrating AI and c
APA, Harvard, Vancouver, ISO, and other styles
25

Ademola, Ojo Emmanuel, and K. Somorin. "AI and Cybersecurity in Investigative Journalism: A Literature Review." Advances in Multidisciplinary & Scientific Research Journal Publications 10, no. 1 (2024): 9–18. http://dx.doi.org/10.22624/aims/sij/v10n1p2.

Full text
Abstract:
This literature review examines the intersection of artificial intelligence (AI) and cybersecurity in the context of investigative journalism. The use of AI technologies in investigative journalism has revolutionized the way journalists analyze data and uncover stories, while also posing new challenges in cybersecurity and the detection of deepfakes. The academic literature highlights the importance of training journalists in cybersecurity best practices, investing in AI technologies, and detecting and debunking deepfakes to safeguard the integrity of journalistic work. By integrating AI and c
APA, Harvard, Vancouver, ISO, and other styles
26

AVCI, Halil Ersin. "Evaluation of Social Studies Teacher Candidates' Perspectives on Cybersecurity: The Case of Çanakkale Onsekiz Mart University." International Journal of Social Sciences 9, no. 37 (2025): 539–62. https://doi.org/10.52096/usbd.9.37.26.

Full text
Abstract:
This study examines the cybersecurity perspectives of Social Studies teacher candidates at Çanakkale Onsekiz Mart University during the 2024–2025 academic year, focusing on their knowledge, awareness, and security practices. Using a survey design, data were collected from 140 participants via the Cybersecurity Scale (CS-S). Results reveal cautious data-sharing behaviors and strong risk awareness, but inconsistent antivirus software use indicates gaps in practical application. Grounded in the Technology Acceptance Model (TAM) and Protection Motivation Theory (PMT), the findings align with inter
APA, Harvard, Vancouver, ISO, and other styles
27

Darlington Eze Ekechukwu and Peter Simpa. "The future of Cybersecurity in renewable energy systems: A review, identifying challenges and proposing strategic solutions." Computer Science & IT Research Journal 5, no. 6 (2024): 1265–99. http://dx.doi.org/10.51594/csitrj.v5i6.1197.

Full text
Abstract:
This study provides a comprehensive examination of cybersecurity within renewable energy systems, highlighting the critical role of cybersecurity measures in ensuring the sustainability and reliability of these systems. With the increasing reliance on renewable energy sources, the need for robust cybersecurity frameworks to protect against evolving cyber threats has never been more pressing. Through a systematic literature review and content analysis, this research identifies the prevalent cyber threats and vulnerabilities specific to renewable energy infrastructures, evaluates the effectivene
APA, Harvard, Vancouver, ISO, and other styles
28

Enyinaya Stefano Okafor, Olatunji Akinrinola, Favour Oluwadamilare Usman, Olukunle Oladipupo Amoo, and Nneka Adaobi Ochuba. "CYBERSECURITY ANALYTICS IN PROTECTING SATELLITE TELECOMMUNICATIONS NETWORKS: A CONCEPTUAL DEVELOPMENT OF CURRENT TRENDS, CHALLENGES, AND STRATEGIC RESPONSES." International Journal of Applied Research in Social Sciences 6, no. 3 (2024): 254–66. http://dx.doi.org/10.51594/ijarss.v6i3.854.

Full text
Abstract:
Cybersecurity is a critical concern in satellite telecommunications networks, given their vulnerability to cyber threats. This abstract presents a conceptual development of current trends, challenges, and strategic responses in using cybersecurity analytics to protect these networks. The paper discusses the increasing reliance on satellite telecommunications, making them attractive targets for cyber attacks. It explores the role of cybersecurity analytics in detecting and mitigating these threats, highlighting the importance of proactive monitoring and threat intelligence. Challenges in cybers
APA, Harvard, Vancouver, ISO, and other styles
29

Darlington Eze Ekechukwu and Peter Simpa. "The importance of cybersecurity in protecting renewable energy investment: A strategic analysis of threats and solutions." Engineering Science & Technology Journal 5, no. 6 (2024): 1845–83. http://dx.doi.org/10.51594/estj.v5i6.1186.

Full text
Abstract:
This study explores the critical nexus between cybersecurity and the viability of renewable energy systems, emphasizing the importance of robust cybersecurity measures for the sustainability and success of renewable energy initiatives. Employing a systematic literature review and content analysis, the research scrutinizes peer-reviewed journals, conference proceedings, industry reports, and policy documents from 2014 to 2024. The methodology focuses on identifying gaps, opportunities, and strategic recommendations for enhancing cybersecurity resilience within the renewable energy sector. Key f
APA, Harvard, Vancouver, ISO, and other styles
30

Henry Nwapali Ndidi Naiho, Oluwabunmi Layode, Gbenga Sheriff Adeleke, Ezekiel Onyekachukwu Udeh, and Talabi Temitope Labake. "Addressing cybersecurity challenges in smart grid technologies: Implications for sustainable energy infrastructure." Engineering Science & Technology Journal 5, no. 6 (2024): 1995–2015. http://dx.doi.org/10.51594/estj.v5i6.1218.

Full text
Abstract:
This study systematically reviews the cybersecurity challenges in smart grid technologies and their implications for sustainable energy infrastructure. The primary objective is to analyze the vulnerabilities inherent in smart grids, evaluate existing cybersecurity measures, and propose strategic recommendations for enhancing security. Employing a systematic literature review and content analysis, this research scrutinizes peer-reviewed articles, technical reports, and standards documents published between 2014 and 2024. The methodology focuses on identifying cybersecurity threats, vulnerabilit
APA, Harvard, Vancouver, ISO, and other styles
31

Pasunuru, Sreekanth. "Cybersecurity in Autonomous Systems: Protecting AI-Driven Applications." INTERANTIONAL JOURNAL OF SCIENTIFIC RESEARCH IN ENGINEERING AND MANAGEMENT 09, no. 01 (2025): 1–7. https://doi.org/10.55041/ijsrem20376.

Full text
Abstract:
Autonomous systems, driven by advancements in AI, are transforming industries like transportation, healthcare, and manufacturing. These systems operate without constant human intervention, making them susceptible to various cyber threats. This paper addresses cybersecurity challenges specific to AI-driven autonomous systems and provides guidance on protecting these applications by focusing on secure communication, data privacy, and algorithm integrity. Effective approaches for implementing cybersecurity protocols in autonomous systems are also discussed to ensure data protection, system reliab
APA, Harvard, Vancouver, ISO, and other styles
32

Fatai Adeshina Adelani, Enyinaya Stefano Okafor, Boma Sonimiteim Jacks, and Olakunle Abayomi Ajala. "THEORETICAL FRAMEWORKS FOR THE ROLE OF AI AND MACHINE LEARNING IN WATER CYBERSECURITY: INSIGHTS FROM AFRICAN AND U.S. APPLICATIONS." Computer Science & IT Research Journal 5, no. 3 (2024): 681–92. http://dx.doi.org/10.51594/csitrj.v5i3.928.

Full text
Abstract:
This review paper explores the theoretical frameworks underpinning the application of Artificial Intelligence (AI) and Machine Learning (ML) in enhancing cybersecurity within the water sector, with a focus on both African and U.S. contexts. It delves into the unique cybersecurity challenges faced by the water sector, emphasizing the critical role of AI and ML in identifying, predicting, and mitigating cyber threats. The paper discusses the ethical considerations and regulatory frameworks influencing the deployment of these technologies alongside the technical, socioeconomic, and data privacy c
APA, Harvard, Vancouver, ISO, and other styles
33

Albalas, Talal, Amir Modjtahedi, and Reza Abdi. "Cybersecurity governance: A scoping review." International Journal of Professional Business Review 7, no. 4 (2022): e0629. http://dx.doi.org/10.26668/businessreview/2022.v7i4.e629.

Full text
Abstract:
Purpose: Security measures have become increasingly important due to the expansion of the cyber environments. National and international entities are exposing themselves to cybersecurity risks, and they are growing in number every day.&#x0D; Theoretical Framework: With a comprehensive cybersecurity plan, threats can be eliminated. Implementing this plan is possible by involving all stakeholders in the management processes because the idea of management is insufficient. To ensure cybersecurity, this study highlights the significance of cybersecurity and cybergovernance in the digital world.&#x0
APA, Harvard, Vancouver, ISO, and other styles
34

El-Toby, Bushra Hassan Mohamed, Waad Hadi Abd, and Akeel Dakheel Kareem. "Activating the role of judicial oversight in Iraq to reduce the phenomenon of tax evasion Field research in the Federal Office of Financial Supervision." International Journal of Professional Business Review 7, no. 5 (2022): e0765. http://dx.doi.org/10.26668/businessreview/2022.v7i5.e765.

Full text
Abstract:
Purpose: Security measures have become increasingly important due to the expansion of the cyber environments. National and international entities are exposing themselves to cybersecurity risks, and they are growing in number every day. Theoretical Framework: With a comprehensive cybersecurity plan, threats can be eliminated. Implementing this plan is possible by involving all stakeholders in the management processes because the idea of management is insufficient. To ensure cybersecurity, this study highlights the significance of cybersecurity and cybergovernance in the digital world. Design: T
APA, Harvard, Vancouver, ISO, and other styles
35

Jelcy, M., K. Karthick, and S. Logeshwaran. "CYBER SECURITY." International Scientific Journal of Engineering and Management 04, no. 03 (2025): 1–7. https://doi.org/10.55041/isjem02350.

Full text
Abstract:
Cybersecurity is a critical and rapidly evolving field within the IT industry, focused on protecting organizations from data breaches, hacking, and unauthorized access. As technology advances, so do the complexities and frequency of cyber threats, resulting in an increasing need for skilled cybersecurity professionals. Research from the Enterprise Strategy Group highlights a growing skills gap, with 46% of organizations reporting a "problematic shortage" of cybersecurity talent in 2016, up from 28% in 2015. Cybersecurity is no longer a concern limited to government agencies; it is a critical i
APA, Harvard, Vancouver, ISO, and other styles
36

Muthukrishnan, Muthusubramanian, Ahamed Mohamed Ikram, and Pakalapati Naveen. "Machine Learning for Cybersecurity Threat Detection and Prevention." International Journal of Innovative Science and Research Technology (IJISRT) 9, no. 2 (2024): 7. https://doi.org/10.5281/zenodo.10776751.

Full text
Abstract:
Machine learning has emerged as a powerful tool in the realm of cybersecurity, specifically in the domain of threat detection and prevention. This abstract delves into the pivotal role of machine learning algorithms in fortifying cybersecurity measures to combat evolving cyber threats. The integration of machine learning techniques such as deep learning, support vector machines, Bayesian classification, reinforcement learning, anomaly detection, static file analysis, and behavioral analysis has revolutionized the landscape of cybersecurity. These algorithms enable organizations to automate thr
APA, Harvard, Vancouver, ISO, and other styles
37

Henry Nwapali Ndidi Naiho, Oluwabunmi Layode, Gbenga Sheriff Adeleke, Ezekiel Onyekachukwu Udeh, and Talabi Temitope Labake. "Cybersecurity considerations in the implementation of innovative waste management technologies: "A critical review"." Computer Science & IT Research Journal 5, no. 6 (2024): 1408–33. http://dx.doi.org/10.51594/csitrj.v5i6.1225.

Full text
Abstract:
This study systematically reviews the intersection of cybersecurity and waste management technologies, aiming to identify current practices, challenges, and future directions for enhancing cybersecurity within this essential sector. Employing a systematic literature review methodology, the research analyzed peer-reviewed articles, conference proceedings, and industry reports published between 2014 to 2024. The methodology involved a structured search strategy, rigorous inclusion and exclusion criteria, and thematic synthesis of findings. Key insights reveal the growing importance of cybersecur
APA, Harvard, Vancouver, ISO, and other styles
38

Sungwook Ryu, Sungwook Ryu, Jinsu Kim Sungwook Ryu, and Namje Park Jinsu Kim. "Study on Trends and Predictions of Convergence in Cybersecurity Technology Using Machine Learning." 網際網路技術學刊 24, no. 3 (2023): 709–25. http://dx.doi.org/10.53106/160792642023052403016.

Full text
Abstract:
&lt;p&gt;The indiscriminate convergence of technologies makes prediction difficult and can cause many difficulties in technology investment. This makes it difficult to choose capital investment and can induce excessive investment in inefficient technologies. Therefore, analyzing the trend of convergence technology and predicting a highly influential convergence area in the future can induce effective investment, and lead the highly influential technology to achieve great technological development. The purpose of this paper is to analyze technologies that are expected to have high influence in
APA, Harvard, Vancouver, ISO, and other styles
39

Oladapo Adeboye Popoola, Michael Oladipo Akinsanya, Godwin Nzeako, Excel G Chukwurah, and Chukwuekem David Okeke. "Exploring theoretical constructs of cybersecurity awareness and training programs: comparative analysis of African and U.S. Initiatives." International Journal of Applied Research in Social Sciences 6, no. 5 (2024): 819–27. http://dx.doi.org/10.51594/ijarss.v6i5.1104.

Full text
Abstract:
This review paper presents a comparative analysis of theoretical constructs underpinning cybersecurity awareness and training programs in Africa and the U.S. By examining these initiatives' design, delivery, and outcomes. The paper highlights how different educational theories—behaviourist, cognitive, and constructivist—are adapted to suit thetwo regions' diverse cultural and economic contexts. The analysis reveals significant variations in program effectiveness, driven by factors such as digital literacy levels, technological infrastructure, and localized cyber threats. Recommendations for po
APA, Harvard, Vancouver, ISO, and other styles
40

Susanto, Susanto, and Gatot Soepriyanto. "Cybersecurity disclosure and audit fees: An empirical study of listed companies on the Indonesia stock exchange." Edelweiss Applied Science and Technology 8, no. 6 (2024): 6090–104. http://dx.doi.org/10.55214/25768484.v8i6.3328.

Full text
Abstract:
Cyber attacks on companies cause substantial financial and non-financial losses for all countries, including Indonesia. This empirical study was conducted to identify how cybersecurity risk disclosure (CRD) affects audit fees. This initial study analyzes cybersecurity risk disclosure across all company sectors on the Indonesia Stock Exchange (IDX) list. The current research continues the study of Calderon &amp; Gao (2021) by combining keywords with the research of Li et al. (2018), which were collected manually to extract cybersecurity risk disclosure. During 2019-2023, our sample consisted of
APA, Harvard, Vancouver, ISO, and other styles
41

Sontan Adewale Daniel and Samuel Segun Victor. "EMERGING TRENDS IN CYBERSECURITY FOR CRITICAL INFRASTRUCTURE PROTECTION: A COMPREHENSIVE REVIEW." Computer Science & IT Research Journal 5, no. 3 (2024): 576–93. http://dx.doi.org/10.51594/csitrj.v5i3.872.

Full text
Abstract:
As critical infrastructure becomes increasingly interconnected and digitized, the need for robust cybersecurity measures to safeguard essential systems is more pressing than ever. This review article explores the dynamic landscape of cybersecurity for critical infrastructure, focusing on emerging trends, current challenges, and future prospects. The historical overview delves into the evolution of cyber threats, emphasizing the need for adaptive security measures. Key components of critical infrastructure are examined, elucidating the specific challenges each sector faces. The current state of
APA, Harvard, Vancouver, ISO, and other styles
42

Nwankwo Charles Uzondu and Dominic Dummene Lele. "Challenges and strategies in securing smart environmental applications: A comprehensive review of cybersecurity measures." Computer Science & IT Research Journal 5, no. 7 (2024): 1695–720. http://dx.doi.org/10.51594/csitrj.v5i7.1353.

Full text
Abstract:
This study provides a comprehensive analysis of the cybersecurity challenges and strategies within smart environmental applications, emphasizing the critical importance of robust cybersecurity measures to protect these increasingly interconnected systems. Employing a systematic literature review and content analysis, the research scrutinizes peer-reviewed articles, conference proceedings, and industry reports from 2006 onwards, focusing on cybersecurity vulnerabilities, strategic approaches to security, and case studies of both successful and failed cybersecurity implementations. The methodolo
APA, Harvard, Vancouver, ISO, and other styles
43

Ashish, S. S. "Model Context Protocol: A Context-Aware Framework for Enhancing Cybersecurity in Dynamic Environments." INTERNATIONAL JOURNAL OF SCIENTIFIC RESEARCH IN ENGINEERING AND MANAGEMENT 09, no. 05 (2025): 1–9. https://doi.org/10.55041/ijsrem49289.

Full text
Abstract:
Abstract— The rapid evolution of cyber threats and growing complexity of digital environments require adaptive, intelligent, and context-aware cybersecurity solutions. The Model Context Protocol (MCP) has emerged as an open standard that facilitates seamless, secure, and dynamic integration between AI-driven security agents and a wide range of data sources, tools, and systems. This paper examines the architecture, security principles, and transformative impact of MCP in strengthening cybersecurity within dynamic environments, with a focus on its context-aware capabilities, interoperability, an
APA, Harvard, Vancouver, ISO, and other styles
44

Johara, Abdulrahman Al Jarri. "The Future of Cybersecurity Training." International Journal of Novel Research in Computer Science and Software Engineering 9, no. 2 (2022): 27. https://doi.org/10.5281/zenodo.6638368.

Full text
Abstract:
<strong>Abstract:</strong> The field of cybersecurity is evolving with emerging threats. It&#39;s crucial to keep up with new attack strategies through intensive training. For numerous professionals, taking courses or going through books is no longer enough, because most people will not pay full attention. Gamification is the way to improve cybersecurity skillsets in the future. Taking a creative and resourceful approach to training can make a significant difference in an organization&#39;s cybersecurity. <strong>Keywords:</strong> gamification, cybersecurity training, upskilling. <strong>Titl
APA, Harvard, Vancouver, ISO, and other styles
45

Samuel Olaoluwa Folorunsho, Olubunmi Adeolu Adenekan, Chinedu Ezeigweneme, Ike Chidiebere Somadina, and Patrick Azuka Okeleke. "Ensuring Cybersecurity in telecommunications: Strategies to protect digital infrastructure and sensitive data." Computer Science & IT Research Journal 5, no. 8 (2024): 1855–83. http://dx.doi.org/10.51594/csitrj.v5i8.1448.

Full text
Abstract:
This review paper aims to address the critical issue of cybersecurity in the telecommunications sector, focusing on strategies to protect digital infrastructure and sensitive data. The objectives of the study are to identify current cybersecurity threats, evaluate existing protective measures, and propose comprehensive strategies to enhance the security of telecommunications networks. The methodology involves a thorough review of industry reports, regulatory frameworks, scholarly articles, and case studies to provide an in-depth understanding of the current cybersecurity landscape. Key finding
APA, Harvard, Vancouver, ISO, and other styles
46

Pawlik, Marek. "Cybersecurity Guidelines for the Employees of the Railway Entities." Problemy Kolejnictwa - Railway Reports 65, no. 191 (2021): 95–102. http://dx.doi.org/10.36137/1915e.

Full text
Abstract:
European Commission has published a nearly 50-page-long document on cybersecurity in transport called the Transport cybersecurity toolkit. As part of the work of ISAC-Kolej (the Information Sharing and Analysis Center for the railway trans-port sub-sector), guidelines in terms of cybersecurity for the employees of the railway entities have been developed and adopted. This article briefly discusses the European and Polish activities taken in order to protect railway transport against cyberthreats and shares the guidelines for employees adopted by ISAC-Kolej. Considering the increasingly widespr
APA, Harvard, Vancouver, ISO, and other styles
47

Tari Yvonne Elete. "Impact of ransomware on industrial control systems in the oil and gas sector: Security challenges and strategic mitigations." Computer Science & IT Research Journal 5, no. 12 (2024): 2664–81. https://doi.org/10.51594/csitrj.v5i12.1759.

Full text
Abstract:
Ransomware attacks significantly threaten Industrial Control Systems (ICS) within the oil and gas industry, endangering operational continuity and cybersecurity. This research investigates the vulnerabilities that allow ransomware to infiltrate ICS, focusing on common attack vectors, delivery mechanisms, and the subsequent impacts on operations and financial stability. The analysis draws from notable case studies, including the Colonial Pipeline and TRITON malware incidents, highlighting how interconnected IT and Operational Technology (OT) systems exacerbate risks. The findings underscore the
APA, Harvard, Vancouver, ISO, and other styles
48

Elwaaey, Hossameldin Ali, and Ahmed Ibrahim Yousef. "Cybersecurity Aspects in Gamification: A Comprehensive Overview." International Journal Of Modern Engineering Research (IJMER) 14, no. 5 (2024): 79–87. https://doi.org/10.5281/zenodo.14048861.

Full text
Abstract:
ABSTRACT: Gamification, the incorporation of game-design elements into non-game contexts, hasemerged as a powerful strategy to enhance user engagement, motivation, and productivity across variousindustries. As gamified systems become increasingly sophisticated and pervasive, particularly within theframework of Industry 4.0, the associated cybersecurity challenges grow in complexity and severity. Thispaper provides a comprehensive analysis of the cybersecurity vulnerabilities inherent in gamified systems,including data privacy concerns, user manipulation risks, and threats to system integrity.
APA, Harvard, Vancouver, ISO, and other styles
49

Lawrence Damilare Oyeniyi, Chinonye Esther Ugochukwu, and Noluthando Zamanjomane Mhlongo. "DEVELOPING CYBERSECURITY FRAMEWORKS FOR FINANCIAL INSTITUTIONS: A COMPREHENSIVE REVIEW AND BEST PRACTICES." Computer Science & IT Research Journal 5, no. 4 (2024): 903–25. http://dx.doi.org/10.51594/csitrj.v5i4.1049.

Full text
Abstract:
In the digital epoch, where the financial sector stands as the cornerstone of global economic stability, the escalating sophistication of cyber threats poses an unprecedented challenge. This scholarly pursuit aimed to dissect the intricate web of cybersecurity within the financial domain, elucidating the evolving threat landscape, scrutinizing the efficacy of existing cybersecurity frameworks, and delineating strategic pathways for fortification against digital adversaries. Anchored in a qualitative methodology, the study embarked on a systematic literature review, meticulously sifting through
APA, Harvard, Vancouver, ISO, and other styles
50

Babajide Tolulope Familoni and Philip Olaseni Shoetan. "CYBERSECURITY IN THE FINANCIAL SECTOR: A COMPARATIVE ANALYSIS OF THE USA AND NIGERIA." Computer Science & IT Research Journal 5, no. 4 (2024): 850–77. http://dx.doi.org/10.51594/csitrj.v5i4.1046.

Full text
Abstract:
This paper provides a comprehensive review and comparative analysis of cybersecurity challenges and strategies within the financial sectors of the United States of America (USA) and Nigeria. It aims to elucidate the complexities and variances in cybersecurity practices, focusing on the different approaches taken by these nations to safeguard their financial data against increasing cyber threats. Through a detailed examination of existing literature, including academic journals, industry reports, and cybersecurity incident databases, this study identifies the unique and common cybersecurity vul
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!