[go: up one dir, main page]

Boutros, 2023 - Google Patents

Bridging the Gap Between Public Organizaions and Cybersecurity

Boutros, 2023

View PDF
Document ID
7891043403300270682
Author
Boutros C
Publication year

External Links

Snippet

Cyberattacks are a major problem for public organizations across the nation, and unfortunately for them, the frequency of these attacks is constantly growing. This project used a case study approach to explore the types of cybersecurity public organization …
Continue reading at scholarworks.lib.csusb.edu (PDF) (other versions)

Similar Documents

Publication Publication Date Title
Akhgar et al. Cyber crime and cyber terrorism investigator's handbook
Shaw The role of behavioral research and profiling in malicious cyber insider investigations
Hatcher et al. The cybersecurity of municipalities in the United States: An exploratory survey of policies and practices
Shaw et al. Ten tales of betrayal: The threat to corporate infrastructure by information technology insiders analysis and observations
Steinmetz et al. Developing and implementing social engineering-prevention policies: A qualitative study
Black et al. Insider Threat and White Collar Crime in Non-Government Organisations and Industries
Saber Determining small business cybersecurity strategies to prevent data breaches
Griffin The effectiveness of cybersecurity awareness training in reducing employee negligence within department of defense (dod) affiliated organizations-qualitative exploratory case study
Shaaban Enhancing the governance of information security in developing countries: the case of Zanzibar
Kont Cybersecurity behaviours of the employees and students at the Estonian Academy of Security Sciences
Pierce Exploring the cybersecurity hiring gap
Boutros Bridging the Gap Between Public Organizaions and Cybersecurity
Jackson Considering the creation of a domestic intelligence agency in the United States: Lessons from the experiences of Australia, Canada, France, Germany, and the United Kingdom
Eugene A Delphi Study: A Model to Help IT Management within Financial Firms Reduce Regulatory Compliance Costs for Data Privacy and Cybersecurity
Omoyiola et al. Strategies For Implementing Cybersecurity Policies in Organizations (A Case Study of West African Organizations)
Bush Examining the Relationship Between Cybersecurity-Employee Vulnerabilities and Reduction of Security Breaches in Information Technology Organization
Folds How Hackers and Malicious Actors Are Using Artificial Intelligence to Commit Cybercrimes in the Banking Industry
Liggett The Effects of Information Security on Business Continuity: Case Study
Larkey Exploring the strategies cybersecurity specialist need to minimize security risks in non-profit organizations
Ngungoh Insider Threat in Government Organizations
Masilela et al. Data and Information Security Governance: A Prerequisite for Improved Protection of Public Sector Data and Information Practices
Craven et al. Compromised trust: DHS fusion centers’ policing of the Occupy Wall Street movement
Sithole Assessing cyber resilience of public sector information systems: A South African perspective
Kim et al. Analysis of the competencies of information security consultants: Comparison between required level and retention level
Vaughans A case study: Factors that influence well-meaning insiders’ perception, judgment, and actions related to information security