Showing 1 - 20 results of 2,276 for search '"cybersecurity"', query time: 0.46s Refine Results
  1. 1
    by Michael Veale, Ian Brown
    Published 2020-12-01
    ...Cybersecurity covers the broad range of technical and social issues that must be considered...
    Get full text
    Article
  2. 2
    by Olena Tsvilii
    Published 2021-02-01
    Subjects: ...cybersecurity system...
    Get full text
    Article
  3. 3
    by Ondřej Filipec, David Plášil
    Published 2021-06-01
    Subjects: ...cybersecurity...
    Article
  4. 4
  5. 5
    by Bay Morten
    Published 2016-06-01
    ... un résultat à multiples facettes, mais sera significative.The word ‘cybersecurity’ is widely used...
    Get full text
    Article
  6. 6
    Published 2020
    Get fulltext
    eBook
  7. 7
    Published 2020
    Subjects: ...cybersecurity ethics...
    Get fulltext
    eBook
  8. 8
    by Lee Hadlington
    Published 2017-07-01
    ...The present study explored the relationship between risky cybersecurity behaviours, attitudes...
    Get full text
    Article
  9. 9
    by Howard, David J.
    Published 2018
    ... workers’ cybersecurity attitudes. An iterative process resulted in a scale with good psychometric...
    Get full text
    Get full text
    Others
  10. 10
    ...This research paper concerns the interactions between privacy and cybersecurity as business risks...
    Get full text
    Article
  11. 11
    by Petr Chrapavy
    Published 2016-05-01
    Subjects: ...cybersecurity...
    Get full text
    Article
  12. 12
    by Darius Štitilis
    Published 2013-08-01
    Subjects: ...cybersecurity...
    Get full text
    Article
  13. 13
  14. 14
  15. 15
  16. 16
  17. 17
    by Pierce, Adam O.
    Published 2016
    Subjects: ...Cybersecurity...
    Get full text
    Get full text
    Others
  18. 18
  19. 19
    by Marek Górka
    Published 2021-03-01
    Subjects: ...cybersecurity policy...
    Get full text
    Article
  20. 20
    by Yu. Yu. Shitova, Yu. A. Shitov
    Published 2019-12-01
    Subjects: ...cybersecurity...
    Get full text
    Article