Articles with "cybersecurity" as a keyword



Photo by markusspiske from unsplash

Mathematical Differential Models and Methods for Assessing the Cybersecurity of Intelligent Computer Networks for Control of Technological Processes of Railway Power Supply

Sign Up to like & get
recommendations!
Published in 2018 at "Cybernetics and Systems Analysis"

DOI: 10.1007/s10559-018-0068-2

Abstract: The problem of cybersecurity of computer networks for control of power supply at the level of railroads is analyzed and a graph of the topology of a computer network for control of power consumption is… read more here.

Keywords: computer; cybersecurity; computer networks; power supply ... See more keywords
Photo from wikipedia

The cybersecurity labour shortage in Europe: Moving to a new concept for education and training

Sign Up to like & get
recommendations!
Published in 2021 at "Technology in Society"

DOI: 10.1016/j.techsoc.2021.101769

Abstract: Abstract Recruiting, retaining and maintaining sufficient numbers of cybersecurity professionals in the workplace is a constant battle, not only for the technical side of cybersecurity, but also for the overlooked area of non-technical, managerial-related jobs… read more here.

Keywords: cybersecurity; education training; cybersecurity labour; labour shortage ... See more keywords
Photo from wikipedia

A National Survey of Hospital Cyber Attack Emergency Operation Preparedness

Sign Up to like & get
recommendations!
Published in 2023 at "Disaster Medicine and Public Health Preparedness"

DOI: 10.1017/dmp.2022.283

Abstract: Abstract Objective: Cyberattacks on healthcare systems are increasing in frequency and severity. Hospitals need to integrate cybersecurity preparedness into their emergency operations planning and response to mitigate adverse outcomes during increasingly likely cyber events. No… read more here.

Keywords: emergency; survey; cybersecurity; hospital ... See more keywords
Photo from academic.microsoft.com

Global cybersecurity governance: A constitutionalist analysis

Sign Up to like & get
recommendations!
Published in 2018 at "Global Constitutionalism"

DOI: 10.1017/s2045381718000023

Abstract: Abstract: With the progressive digitisation and use, in particular, of the internet of things and artificial intelligence by industries, commerce, financial services, science and education, the public administration, health services as well as individuals, our… read more here.

Keywords: cybersecurity; constitutionalist analysis; cybersecurity governance; global cybersecurity ... See more keywords
Photo from wikipedia

Cybersecurity hazards and financial system vulnerability: a synthesis of literature

Sign Up to like & get
recommendations!
Published in 2020 at "Risk Management"

DOI: 10.1057/s41283-020-00063-2

Abstract: In this paper, we provide a systematic review of the growing body of literature exploring the issues related to pervasive effects of cybersecurity risk on the financial system. As the cybersecurity risk has appeared as… read more here.

Keywords: cybersecurity risk; risk; cybersecurity; system vulnerability ... See more keywords
Photo from wikipedia

Toward a cybersecurity curriculum model for undergraduate business schools: A survey of AACSB-accredited institutions in the United States

Sign Up to like & get
recommendations!
Published in 2017 at "Journal of Education for Business"

DOI: 10.1080/08832323.2016.1261790

Abstract: ABSTRACT With the increasing demand for cybersecurity professionals, the authors examined how business schools are meeting that demand, specifically the core requirements of their cybersecurity curricula related to information systems programs. They examined 518 Association… read more here.

Keywords: business schools; business; cybersecurity; curriculum model ... See more keywords
Photo by element5digital from unsplash

Impact of Articulation Agreements on Student Transfer between Higher Education Institutions: A Case Study of a Cybersecurity Program

Sign Up to like & get
recommendations!
Published in 2021 at "Community College Journal of Research and Practice"

DOI: 10.1080/10668926.2021.1887007

Abstract: Cybersecurity education has grown exponentially over the past decade. This growth occurred at all levels of education – from high schools to community colleges to four-year universities. At the sam... read more here.

Keywords: cybersecurity; impact articulation; articulation agreements; student transfer ... See more keywords
Photo from academic.microsoft.com

Healthcare Challenges in the Era of Cybersecurity.

Sign Up to like & get
recommendations!
Published in 2020 at "Health security"

DOI: 10.1089/hs.2019.0123

Abstract: As a result of the extensive integration of technology into the healthcare system, cybersecurity incidents have become an increasing challenge for the healthcare industry. Recent examples include WannaCry, a nontargeted ransomware attack on more than… read more here.

Keywords: cybersecurity; healthcare challenges; era cybersecurity; healthcare ... See more keywords
Photo by john_cameron from unsplash

Perspectives on Cybersecurity and Plastic Surgery: A Survey of Plastic Surgeons and Scoping Review of the Literature.

Sign Up to like & get
recommendations!
Published in 2023 at "Aesthetic surgery journal"

DOI: 10.1093/asj/sjad122

Abstract: BACKGROUND Data breach costs in the U.S. are among the highest in the world, making robust cybersecurity an important bulwark of national defense. Healthcare is a popular target for cyber threats, and there is increasing… read more here.

Keywords: plastic surgery; plastic; scoping review; survey ... See more keywords
Photo from wikipedia

The relationship between cybersecurity ratings and the risk of hospital data breaches

Sign Up to like & get
recommendations!
Published in 2021 at "Journal of the American Medical Informatics Association : JAMIA"

DOI: 10.1093/jamia/ocab142

Abstract: OBJECTIVE We investigated the progression of healthcare cybersecurity over 2014-2019 as measured by external risk ratings. We further examined the relationship between hospital data breaches and cybersecurity ratings. MATERIALS AND METHODS Using Fortune 1000 firms… read more here.

Keywords: cybersecurity ratings; cybersecurity; data breaches; hospital data ... See more keywords
Photo by thinkmagically from unsplash

Cybersecurity effectiveness in UK construction firms: an extended McKinsey 7S model approach

Sign Up to like & get
recommendations!
Published in 2023 at "Engineering, Construction and Architectural Management"

DOI: 10.1108/ecam-12-2022-1131

Abstract: PurposeThis study aims to assess the essential elements of internal organisational capability that influence the cybersecurity effectiveness of a construction firm. An extended McKinsey 7S model is used to analyse the relationship between a construction… read more here.

Keywords: mckinsey model; cybersecurity effectiveness; cybersecurity; construction ... See more keywords