Qualitative Analysis of the Behavioral Pattern of Information Security Experts in Facing Cyber Threats
Purpose: Simultaneously with the developments of the 20th century and the process of globalization in the present era, information and communication technology has facilitated the emergence of a networked society. The new world has evolved into a network whose primary structure is information and el...
| Published in: | علوم و فنون مدیریت اطلاعات |
|---|---|
| Main Authors: | Mohammad Bagher Raein Abromand, Sedigheh Mohammadesmaeil, Dariush Matlabi |
| Format: | Article |
| Language: | Persian |
| Published: |
University of Qom
2023-12-01
|
| Subjects: | |
| Online Access: | https://stim.qom.ac.ir/article_2515_6959de0e897540475af50b5f532252eb.pdf |
Similar Items
Various types of cyber threats
by: Luknar Ivana, et al.
Published: (2024-01-01)
by: Luknar Ivana, et al.
Published: (2024-01-01)
Developing cyber defense strategies against future enemy threats on the horizon of 1405
by: Mohammad Sepehri
Published: (2022-02-01)
by: Mohammad Sepehri
Published: (2022-02-01)
Problems of Russia's Cyber-Security in the Arctic
by: Yu. F. Lukin
Published: (2020-05-01)
by: Yu. F. Lukin
Published: (2020-05-01)
From cyber threat to hostile action in cyberspace
by: Adrian Victor VEVERA
Published: (2018-10-01)
by: Adrian Victor VEVERA
Published: (2018-10-01)
EUROPEAN UNION POLICIES ON CYBER SECURITY
by: Gheorghe BOARU
Published: (2018-12-01)
by: Gheorghe BOARU
Published: (2018-12-01)
The Implications of Transnational Cyber Threats in International Humanitarian Law: Analysing the Distinction Between Cybercrime, Cyber Attack, and Cyber Warfare in the 21st Century
by: Faga Hemen Philip
Published: (2017-06-01)
by: Faga Hemen Philip
Published: (2017-06-01)
CYBER ATTACKS, MAJOR THREATS AND VULNERABILITIES AGAINST STATES, ORGANIZATIONS AND CITIZENS
by: Constantin MINCU
Published: (2016-06-01)
by: Constantin MINCU
Published: (2016-06-01)
Denial-of-Service Attack on IEC 61850-Based Substation Automation System: A Crucial Cyber Threat towards Smart Substation Pathways
by: Suleman Ashraf, et al.
Published: (2021-09-01)
by: Suleman Ashraf, et al.
Published: (2021-09-01)
Cyber Threats Classifications and Countermeasures in Banking and Financial Sector
by: Abdulbasit A. Darem, et al.
Published: (2023-01-01)
by: Abdulbasit A. Darem, et al.
Published: (2023-01-01)
Incorporating Cyber Threat Intelligence into Complex Cyber-Physical Systems: A STIX Model for Active Buildings
by: Ricardo M. Czekster, et al.
Published: (2022-05-01)
by: Ricardo M. Czekster, et al.
Published: (2022-05-01)
Cyber Security of HVDC Systems: A Review of Cyber Threats, Defense, and Testbeds
by: Alfan Presekal, et al.
Published: (2024-01-01)
by: Alfan Presekal, et al.
Published: (2024-01-01)
On the issue of criminal law protection of cyber security of Ukraine in modern conditions
by: Chuvakov O.
Published: (2024-06-01)
by: Chuvakov O.
Published: (2024-06-01)
Analysing Cyber Attacks and Cyber Security Vulnerabilities in the University Sector
by: Harjinder Singh Lallie, et al.
Published: (2025-02-01)
by: Harjinder Singh Lallie, et al.
Published: (2025-02-01)
Reasons for the increase in cyber attacks: analysis of technical and non-technical factors
by: A. V. Vasilyev
Published: (2023-11-01)
by: A. V. Vasilyev
Published: (2023-11-01)
A GPT-Based Approach for Cyber Threat Assessment
by: Fahim Sufi
Published: (2025-05-01)
by: Fahim Sufi
Published: (2025-05-01)
Internet of Things Meet Internet of Threats: New Concern Cyber Security Issues of Critical Cyber Infrastructure
by: Amir Djenna, et al.
Published: (2021-05-01)
by: Amir Djenna, et al.
Published: (2021-05-01)
Cyber-Physical Systems Security Protecting Critical Infrastructure from Cyber Threats and Attacks
by: Chinthamu Narender, et al.
Published: (2025-01-01)
by: Chinthamu Narender, et al.
Published: (2025-01-01)
Criminological Aspects of Current Cyber Security
by: Andrejs Vilks, et al.
Published: (2022-10-01)
by: Andrejs Vilks, et al.
Published: (2022-10-01)
The Influence of South Africa’s Democratic Principles on its Cybersecurity Framework and Cyber Threat Response
by: Venencia Paidamoyo Nyambuya, et al.
Published: (2025-04-01)
by: Venencia Paidamoyo Nyambuya, et al.
Published: (2025-04-01)
An Integrated Approach to Cyber Risk Management with Cyber Threat Intelligence Framework to Secure Critical Infrastructure
by: Habib El Amin, et al.
Published: (2024-06-01)
by: Habib El Amin, et al.
Published: (2024-06-01)
Cyber Security Threats to Iran and its Countermeasures: Defensive and Offensive Cyber Strategies
by: Syed Qandil Abbas, et al.
Published: (2024-07-01)
by: Syed Qandil Abbas, et al.
Published: (2024-07-01)
Cyber Threat Predictive Analytics for Improving Cyber Supply Chain Security
by: Abel Yeboah-Ofori, et al.
Published: (2021-01-01)
by: Abel Yeboah-Ofori, et al.
Published: (2021-01-01)
Cyber Threats for Organizations of Financial Market Infrastructures
by: Natalia Georgievna Miloslavskaya, et al.
Published: (2016-03-01)
by: Natalia Georgievna Miloslavskaya, et al.
Published: (2016-03-01)
An Overview of Cyber Threats, Attacks and Countermeasures on the Primary Domains of Smart Cities
by: Vasiliki Demertzi, et al.
Published: (2023-01-01)
by: Vasiliki Demertzi, et al.
Published: (2023-01-01)
Proactive Threat Hunting in Critical Infrastructure Protection through Hybrid Machine Learning Algorithm Application
by: Ali Shan, et al.
Published: (2024-07-01)
by: Ali Shan, et al.
Published: (2024-07-01)
Analysis and Characterization of Cyber Threats Leveraging the MITRE ATT&CK Database
by: Bader Al-Sada, et al.
Published: (2024-01-01)
by: Bader Al-Sada, et al.
Published: (2024-01-01)
A Methodology to Evaluate Standards and Platforms within Cyber Threat Intelligence
by: Alessandra de Melo e Silva, et al.
Published: (2020-06-01)
by: Alessandra de Melo e Silva, et al.
Published: (2020-06-01)
IPAttributor: Cyber Attacker Attribution with Threat Intelligence-Enriched Intrusion Data
by: Xiayu Xiang, et al.
Published: (2024-04-01)
by: Xiayu Xiang, et al.
Published: (2024-04-01)
Advanced Persistent Threat Kill Chain for Cyber-Physical Power Systems
by: Alfan Presekal, et al.
Published: (2024-01-01)
by: Alfan Presekal, et al.
Published: (2024-01-01)
Strategic Assessment of Cyber Security Contenders to the Brazilian Agribusiness in the Beef Sector
by: Virgínia de Melo Dantas Trinks, et al.
Published: (2022-09-01)
by: Virgínia de Melo Dantas Trinks, et al.
Published: (2022-09-01)
European security strategy and cyber threats: Importance for Serbia
by: Nedeljković Slobodan, et al.
Published: (2015-01-01)
by: Nedeljković Slobodan, et al.
Published: (2015-01-01)
Cyber Threat Actors for the Factory of the Future
by: Mirko Sailio, et al.
Published: (2020-06-01)
by: Mirko Sailio, et al.
Published: (2020-06-01)
Cyber threats in rail traffic in Poland
by: Alina Paklerska
Published: (2023-12-01)
by: Alina Paklerska
Published: (2023-12-01)
Editorial: The impacts of cyber threat in the maritime ecosystem
by: Adam Turner, et al.
Published: (2024-02-01)
by: Adam Turner, et al.
Published: (2024-02-01)
Cyber threat attribution using unstructured reports in cyber threat intelligence
by: Ehtsham Irshad, et al.
Published: (2023-03-01)
by: Ehtsham Irshad, et al.
Published: (2023-03-01)
Cyber security in the Gulf Cooperation Council states Froma Contenmporary geopolitical perspective
by: Ahmed.H. A, et al.
Published: (2020-09-01)
by: Ahmed.H. A, et al.
Published: (2020-09-01)
Automated Emerging Cyber Threat Identification and Profiling Based on Natural Language Processing
by: Renato Marinho, et al.
Published: (2023-01-01)
by: Renato Marinho, et al.
Published: (2023-01-01)
Development of the Country’s Sustainable Cyberspace Strategy to Ensure the Country’s National Security
by: Olena Dobrovolska, et al.
Published: (2024-07-01)
by: Olena Dobrovolska, et al.
Published: (2024-07-01)
NEW THREATS TO THE NATIONAL SECURITY OF STATES – CYBER THREAT
by: Daniel-Cornel ŞTEFĂNESCU, et al.
Published: (2020-06-01)
by: Daniel-Cornel ŞTEFĂNESCU, et al.
Published: (2020-06-01)
A Comprehensive and Systematic Survey on the Internet of Things: Security and Privacy Challenges, Security Frameworks, Enabling Technologies, Threats, Vulnerabilities and Countermeasures
by: Muath A. Obaidat, et al.
Published: (2020-05-01)
by: Muath A. Obaidat, et al.
Published: (2020-05-01)
Similar Items
-
Various types of cyber threats
by: Luknar Ivana, et al.
Published: (2024-01-01) -
Developing cyber defense strategies against future enemy threats on the horizon of 1405
by: Mohammad Sepehri
Published: (2022-02-01) -
Problems of Russia's Cyber-Security in the Arctic
by: Yu. F. Lukin
Published: (2020-05-01) -
From cyber threat to hostile action in cyberspace
by: Adrian Victor VEVERA
Published: (2018-10-01) -
EUROPEAN UNION POLICIES ON CYBER SECURITY
by: Gheorghe BOARU
Published: (2018-12-01)
