Boutros, 2023 - Google Patents
Bridging the Gap Between Public Organizaions and CybersecurityBoutros, 2023
View PDF- Document ID
- 7891043403300270682
- Author
- Boutros C
- Publication year
External Links
Snippet
Cyberattacks are a major problem for public organizations across the nation, and unfortunately for them, the frequency of these attacks is constantly growing. This project used a case study approach to explore the types of cybersecurity public organization …
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Akhgar et al. | Cyber crime and cyber terrorism investigator's handbook | |
Shaw | The role of behavioral research and profiling in malicious cyber insider investigations | |
Hatcher et al. | The cybersecurity of municipalities in the United States: An exploratory survey of policies and practices | |
Shaw et al. | Ten tales of betrayal: The threat to corporate infrastructure by information technology insiders analysis and observations | |
Steinmetz et al. | Developing and implementing social engineering-prevention policies: A qualitative study | |
Black et al. | Insider Threat and White Collar Crime in Non-Government Organisations and Industries | |
Saber | Determining small business cybersecurity strategies to prevent data breaches | |
Griffin | The effectiveness of cybersecurity awareness training in reducing employee negligence within department of defense (dod) affiliated organizations-qualitative exploratory case study | |
Shaaban | Enhancing the governance of information security in developing countries: the case of Zanzibar | |
Kont | Cybersecurity behaviours of the employees and students at the Estonian Academy of Security Sciences | |
Pierce | Exploring the cybersecurity hiring gap | |
Boutros | Bridging the Gap Between Public Organizaions and Cybersecurity | |
Jackson | Considering the creation of a domestic intelligence agency in the United States: Lessons from the experiences of Australia, Canada, France, Germany, and the United Kingdom | |
Eugene | A Delphi Study: A Model to Help IT Management within Financial Firms Reduce Regulatory Compliance Costs for Data Privacy and Cybersecurity | |
Omoyiola et al. | Strategies For Implementing Cybersecurity Policies in Organizations (A Case Study of West African Organizations) | |
Bush | Examining the Relationship Between Cybersecurity-Employee Vulnerabilities and Reduction of Security Breaches in Information Technology Organization | |
Folds | How Hackers and Malicious Actors Are Using Artificial Intelligence to Commit Cybercrimes in the Banking Industry | |
Liggett | The Effects of Information Security on Business Continuity: Case Study | |
Larkey | Exploring the strategies cybersecurity specialist need to minimize security risks in non-profit organizations | |
Ngungoh | Insider Threat in Government Organizations | |
Masilela et al. | Data and Information Security Governance: A Prerequisite for Improved Protection of Public Sector Data and Information Practices | |
Craven et al. | Compromised trust: DHS fusion centers’ policing of the Occupy Wall Street movement | |
Sithole | Assessing cyber resilience of public sector information systems: A South African perspective | |
Kim et al. | Analysis of the competencies of information security consultants: Comparison between required level and retention level | |
Vaughans | A case study: Factors that influence well-meaning insiders’ perception, judgment, and actions related to information security |