[go: up one dir, main page]

Alauthman et al., 2025 - Google Patents

Human-Centric Cybersecurity: Addressing Insider Threats and Organizational Culture

Alauthman et al., 2025

Document ID
17088347790304630780
Author
Alauthman M
Al-Qerem A
Alateef S
Almomani A
Aldweesh A
Publication year
Publication venue
Complexities and Challenges for Securing Digital Assets and Infrastructure

External Links

Snippet

Abstract This chapter delves into the human-centric dimension of cybersecurity, with particular emphasis on insider threats and the influence of organizational culture. The modern day security protection strategies are important, but inadequate for measuring …
Continue reading at www.igi-global.com (other versions)

Similar Documents

Publication Publication Date Title
Lee Cybersecurity: Risk management framework and investment cost analysis
Bozkus Kahyaoglu et al. Cyber security assurance process from the internal audit perspective
Nobles Botching human factors in cybersecurity in business organizations
Al-Matari et al. Integrated framework for cybersecurity auditing
Nyanchama Enterprise Vulnerability Management and Its Role in Information Security Management.
Tsakalidis et al. A cybercrime incident architecture with adaptive response policy
Kohnke et al. Implementing cybersecurity: A guide to the national institute of standards and technology risk management framework
Okika et al. Mitigating insider threats and social engineering tactics in advanced persistent threat operations through behavioral analytics and cybersecurity training
Neoaz Human Factors in Information Assurance: A Review of Behavioral and Cultural Aspects
Shadbad et al. Does technostress trigger insider threat? A conceptual model and mitigation solutions
Raza et al. Evaluating the human factor in bank cybersecurity: Strategies for improving employee awareness and reducing insider threats
Alauthman et al. Human-Centric Cybersecurity: Addressing Insider Threats and Organizational Culture
Harmening Information Security Essentials for IT Managers: Protecting Mission-Critical Systems
Kalevrosoglou Study and analysis of cyber security attacks in Greece
Pemmasani Behavioral Analytics for Detecting Insider Threats in Governmental Organizations: A Human-Centric Approach
Maftei The Cyber Competences Act-a Vital EU Regulation Concerning Mandatory Certification of Critical Network and Information Systems' Operators across the European Union
Narra Human-AI Collaboration in Identity Security: When Should AI Decide?
Sissodia et al. Artificial Intelligence (AI) in Cybersecurity
Price Data Security in Higher Education: Protecting Confidential Financial Aid Data
Martin Integrating Criminological Theories in Cybersecurity Risk Assessment: A Study of the TRACI Framework's Application to Critical Infrastructure
Chebrolu et al. Cybersecurity in enterprise information systems: preventing data breaches in the USA
Roosman Information Systems Security Countermeasures: An Assessment of Older Workers in Indonesian Small and Medium-Sized Businesses
Akinsulire et al. Enhancing Cybersecurity Governance in Financial Institutions: A Quantitative Study on Control Deficiencies and Regulatory Compliance (2024)
Malomo et al. Managing Human Factors Vulnerabilities in the Risk Assessment Process
Hossain Evaluating the Human Factor in Bank Cybersecurity: Strategies for Improving Employee Awareness and Reducing Insider Threats