Alauthman et al., 2025 - Google Patents
Human-Centric Cybersecurity: Addressing Insider Threats and Organizational CultureAlauthman et al., 2025
- Document ID
- 17088347790304630780
- Author
- Alauthman M
- Al-Qerem A
- Alateef S
- Almomani A
- Aldweesh A
- Publication year
- Publication venue
- Complexities and Challenges for Securing Digital Assets and Infrastructure
External Links
Snippet
Abstract This chapter delves into the human-centric dimension of cybersecurity, with particular emphasis on insider threats and the influence of organizational culture. The modern day security protection strategies are important, but inadequate for measuring …
Similar Documents
| Publication | Publication Date | Title |
|---|---|---|
| Lee | Cybersecurity: Risk management framework and investment cost analysis | |
| Bozkus Kahyaoglu et al. | Cyber security assurance process from the internal audit perspective | |
| Nobles | Botching human factors in cybersecurity in business organizations | |
| Al-Matari et al. | Integrated framework for cybersecurity auditing | |
| Nyanchama | Enterprise Vulnerability Management and Its Role in Information Security Management. | |
| Tsakalidis et al. | A cybercrime incident architecture with adaptive response policy | |
| Kohnke et al. | Implementing cybersecurity: A guide to the national institute of standards and technology risk management framework | |
| Okika et al. | Mitigating insider threats and social engineering tactics in advanced persistent threat operations through behavioral analytics and cybersecurity training | |
| Neoaz | Human Factors in Information Assurance: A Review of Behavioral and Cultural Aspects | |
| Shadbad et al. | Does technostress trigger insider threat? A conceptual model and mitigation solutions | |
| Raza et al. | Evaluating the human factor in bank cybersecurity: Strategies for improving employee awareness and reducing insider threats | |
| Alauthman et al. | Human-Centric Cybersecurity: Addressing Insider Threats and Organizational Culture | |
| Harmening | Information Security Essentials for IT Managers: Protecting Mission-Critical Systems | |
| Kalevrosoglou | Study and analysis of cyber security attacks in Greece | |
| Pemmasani | Behavioral Analytics for Detecting Insider Threats in Governmental Organizations: A Human-Centric Approach | |
| Maftei | The Cyber Competences Act-a Vital EU Regulation Concerning Mandatory Certification of Critical Network and Information Systems' Operators across the European Union | |
| Narra | Human-AI Collaboration in Identity Security: When Should AI Decide? | |
| Sissodia et al. | Artificial Intelligence (AI) in Cybersecurity | |
| Price | Data Security in Higher Education: Protecting Confidential Financial Aid Data | |
| Martin | Integrating Criminological Theories in Cybersecurity Risk Assessment: A Study of the TRACI Framework's Application to Critical Infrastructure | |
| Chebrolu et al. | Cybersecurity in enterprise information systems: preventing data breaches in the USA | |
| Roosman | Information Systems Security Countermeasures: An Assessment of Older Workers in Indonesian Small and Medium-Sized Businesses | |
| Akinsulire et al. | Enhancing Cybersecurity Governance in Financial Institutions: A Quantitative Study on Control Deficiencies and Regulatory Compliance (2024) | |
| Malomo et al. | Managing Human Factors Vulnerabilities in the Risk Assessment Process | |
| Hossain | Evaluating the Human Factor in Bank Cybersecurity: Strategies for Improving Employee Awareness and Reducing Insider Threats |