UP - logo

Rezultati iskanja

Osnovno iskanje    Izbirno iskanje   
Iskalna
zahteva
Knjižnica

Trenutno NISTE avtorizirani za dostop do e-virov UPUK. Za polni dostop se PRIJAVITE.

1 2 3 4 5
zadetkov: 12.624
1.
  • Developing cybersecurity cu... Developing cybersecurity culture to influence employee behavior: A practice perspective
    Alshaikh, Moneer Computers & security, November 2020, 2020-11-00, 20201101, Letnik: 98
    Journal Article
    Recenzirano

    This paper identifies and explains five key initiatives that three Australian organizations have implemented to improve their respective cyber security cultures. The five key initiatives are: ...
Celotno besedilo
2.
  • Gender difference and emplo... Gender difference and employees' cybersecurity behaviors
    Anwar, Mohd; He, Wu; Ash, Ivan ... Computers in human behavior, April 2017, 2017-04-00, 20170401, Letnik: 69
    Journal Article
    Recenzirano
    Odprti dostop

    Security breaches are prevalent in organizations and many of the breaches are attributed to human errors. As a result, the organizations need to increase their employees' security awareness and their ...
Celotno besedilo

PDF
3.
  • Strategic cybersecurity Strategic cybersecurity
    AlDaajeh, Saleh; Alrabaee, Saed Computers & security, June 2024, Letnik: 141
    Journal Article
    Recenzirano

    In the contemporary ever-evolving digital landscape, the paramount importance of fortifying national cybersecurity for safeguarding national security is unequivocal. Cybersecurity stands as a ...
Celotno besedilo
4.
  • An exploratory analysis of ... An exploratory analysis of the cybersecurity threat landscape for Botswana
    Sarefo, Seth; Dawson, Maurice; Banyatsang, Mphago Procedia computer science, 2023, 2023-00-00, Letnik: 219
    Journal Article
    Recenzirano
    Odprti dostop

    Investigating the cybersecurity threat landscape is important as it increases situational awareness and defensive agility. Therefore, in this study the cybersecurity threat landscape for Botswana was ...
Celotno besedilo
5.
  • A Conceptual Model for Cybe... A Conceptual Model for Cybersecurity Governance
    Yusif, Salifu; Hafeez-Baig, Abdul Journal of applied security research, 10/2021, Letnik: 16, Številka: 4
    Journal Article
    Recenzirano

    Cybersecurity is a growing problem associated with everything an individual or an organization does that is facilitated by the Internet. It is a multi-facetted program that can be addressed by ...
Celotno besedilo
6.
  • Economic model for evaluati... Economic model for evaluating the value creation through information sharing within the cybersecurity information sharing ecosystem
    Rashid, Zahid; Noor, Umara; Altmann, Jörn Future generation computer systems, November 2021, 2021-11-00, Letnik: 124
    Journal Article
    Recenzirano
    Odprti dostop

    Based on a comprehensive literature survey, the constructs of the cybersecurity information sharing ecosystem have been defined in detail. Using this ecosystem, the interrelationships among the ...
Celotno besedilo

PDF
7.
Celotno besedilo
8.
  • Cybersecurity education: Ev... Cybersecurity education: Evolution of the discipline and analysis of master programs
    Cabaj, Krzysztof; Domingos, Dulce; Kotulski, Zbigniew ... Computers & security, 06/2018, Letnik: 75, Številka: C
    Journal Article
    Recenzirano
    Odprti dostop

    As the amount of information, critical services, and interconnected computers and “things” in the cyberspace is steadily increasing, the number, sophistication, and impact of cyberattacks are ...
Celotno besedilo
9.
  • Rational Cybersecurity for ... Rational Cybersecurity for Business
    Blum, Dan 2020, 2020-08-12T00:00:00, 2020-08-12, 2021.
    eBook
    Odprti dostop

    Use the guidance in this comprehensive field guide to gain the support of your top executives for aligning a rational cybersecurity plan with your business. You will learn how to improve working ...
Celotno besedilo
10.
  • Ambidextrous Cybersecurity:... Ambidextrous Cybersecurity: The Seven Pillars (7Ps) of Cyber Resilience
    Carayannis, Elias G.; Grigoroudis, Evangelos; Rehman, Scheherazade S. ... IEEE transactions on engineering management, 02/2021, Letnik: 68, Številka: 1
    Journal Article
    Recenzirano

    Organizational ambidexterity balances exploitative and exploratory behaviors so that organizations are able to exploit their existing competencies while simultaneously exploring new opportunities. ...
Celotno besedilo
1 2 3 4 5
zadetkov: 12.624

Nalaganje filtrov