|
|
|
Adam James Fenton
This paper examines hybrid threats to maritime transportation systems and their governance responses; focusing on the congested Straits of Malacca and Singapore (SOMS) as an illustrative case study. The methodology combines secondary sources with primary...
ver más
|
|
|
|
|
|
|
Mario Aragonés Lozano, Israel Pérez Llopis and Manuel Esteve Domingo
The number and the diversity in nature of daily cyber-attacks have increased in the last few years, and trends show that both will grow exponentially in the near future. Critical Infrastructures (CI) operators are not excluded from these issues; therefor...
ver más
|
|
|
|
|
|
|
Noor Suhani Sulaiman, Muhammad Ashraf Fauzi, Suhaidah Hussain and Walton Wider
This study examines the factors influencing government employees? cybersecurity behavior in Malaysia. The country is considered the most vulnerable in Southeast Asia. Applying the protection motivation theory, this study addresses the gap by investigatin...
ver más
|
|
|
|
|
|
|
Justice Kofi Debrah, Godfred Kwesi Teye and Maria Alzira Pimenta Dinis
More and more, waste generated in most parts of the Western world has been recycled and transformed into new circularity products. However, managing waste within Sub-Saharan Africa (SSA), such as in Ghana, has become a challenge due to the continued prac...
ver más
|
|
|
|
|
|
|
Molly Dewis and Thiago Viana
Using technology to prevent cyber-attacks has allowed organisations to somewhat automate cyber security. Despite solutions to aid organisations, many are susceptible to phishing and spam emails which can make an unwanted impact if not mitigated. Traits t...
ver más
|
|
|
|
|
|
|
Aneta Wysokinska-Senkus, Justyna Górna, Magdalena Kazmierczak, Pawel Mielcarek and Piotr Senkus
Context: Food safety is essential for every human. It determines public health, nutrition, elimination of hunger, and the promotion of sustainable agriculture. It is crucial for sustainable production, consumption, and international food trade. Ensuring ...
ver más
|
|
|
|
|
|
|
Majid H. Alsulami, Fawaz D. Alharbi, Hamdan M. Almutairi, Bandar S. Almutairi, Mohammed M. Alotaibi, Majdi E. Alanzi, Khaled G. Alotaibi and Sultan S. Alharthi
Social engineering is one of the most inventive methods of gaining unauthorized access to information systems and obtaining sensitive information. This type of cybersecurity threat requires minimal technical knowledge because it relies on the organizatio...
ver más
|
|
|
|
|
|
|
Andrei Butnaru, Alexios Mylonas and Nikolaos Pitropakis
Nowadays, the majority of everyday computing devices, irrespective of their size and operating system, allow access to information and online services through web browsers. However, the pervasiveness of web browsing in our daily life does not come withou...
ver más
|
|
|
|
|
|
|
Iosif Progoulakis, Paul Rohmeyer and Nikitas Nikitakos
The integration of IT, OT, and human factor elements in maritime assets is critical for their efficient and safe operation and performance. This integration defines cyber physical systems and involves a number of IT and OT components, systems, and functi...
ver más
|
|
|
|
|
|
|
Rana Alabdan
Phishing attacks, which have existed for several decades and continue to be a major problem today, constitute a severe threat in the cyber world. Attackers are adopting multiple new and creative methods through which to conduct phishing attacks, which ar...
ver más
|
|
|
|