Login
Login
切换导航
Home
Articles
Journals
Books
News
About
Services
Submit
Home
Journal
Articles
Journals A-Z
Browse Subjects
Biomedical & Life Sci.
Business & Economics
Chemistry & Materials Sci.
Computer Sci. & Commun.
Earth & Environmental Sci.
Engineering
Medicine & Healthcare
Physics & Mathematics
Social Sci. & Humanities
Browse Subjects
Biomedical & Life Sciences
Business & Economics
Chemistry & Materials Science
Computer Science & Communications
Earth & Environmental Sciences
Engineering
Medicine & Healthcare
Physics & Mathematics
Social Sciences & Humanities
Publish with us
Paper Submission
Information for Authors
Peer-Review Resources
Open Special Issues
Open Access Statement
Frequently Asked Questions
Publish with us
Paper Submission
Information for Authors
Peer-Review Resources
Open Special Issues
Open Access Statement
Frequently Asked Questions
Follow SCIRP
Contact us
customer@scirp.org
+86 18163351462(WhatsApp)
1655362766
Paper Publishing WeChat
Complete Matching
Editorial Board
Show/Hide Options
Show/Hide Options
All
Title
Abstract
Keywords
DOI
Author
Journal
Affiliation
ISSN
Subject
Factors Influencing Employees on Compliance with Cybersecurity Policies and Their Implications for Protection of Information and Technology Assets in Saudi Arabia
(Articles)
Sami Saad Alsemairi
Intelligent Information Management
Vol.15 No.4
,July 20, 2023
DOI:
10.4236/iim.2023.154013
213
Downloads
1,124
Views
Citations
Challenges of Technology in African Countries: A Case Study of Zambia
(Articles)
Emile S. Mbungu Kala
Open Journal of Safety Science and Technology
Vol.13 No.4
,December 25, 2023
DOI:
10.4236/ojsst.2023.134011
644
Downloads
8,989
Views
Citations
Closing the Gap: Boosting Women’s Representation in Cybersecurity Leadership
(Articles)
Yasser Asiry
Journal of Information Security
Vol.15 No.1
,January 10, 2024
DOI:
10.4236/jis.2024.151002
178
Downloads
806
Views
Citations
Artificial Intelligence Adoption for Cybersecurity in Africa
(Articles)
Nadine Nibigira
,
Vincent Havyarimana
,
Zhu Xiao
Journal of Information Security
Vol.15 No.2
,March 21, 2024
DOI:
10.4236/jis.2024.152009
438
Downloads
2,011
Views
Citations
The Risks of the U.S. Cyber Crisis
(Articles)
Theo Lim
Journal of Information Security
Vol.16 No.1
,December 10, 2024
DOI:
10.4236/jis.2025.161003
64
Downloads
391
Views
Citations
Kali Pi—A Miniature Ultra-Portable Penetration Testing Device
(Articles)
Ahmed Bin Ali
Journal of Information Security
Vol.16 No.1
,December 30, 2024
DOI:
10.4236/jis.2025.161005
252
Downloads
776
Views
Citations
Cybersecurity Challenges and Technological Integration in Military Supply Chain 4.0
(Articles)
Nathalie Essi Afefa Takpah
,
Victor Nosakhare Oriakhi
Journal of Information Security
Vol.16 No.1
,December 31, 2024
DOI:
10.4236/jis.2025.161007
147
Downloads
827
Views
Citations
Integrating AI in Cybersecurity Higher Education: A Path to Workforce Readiness
(Articles)
Maryam Roshanaei
,
Mark Gregory Jachura
Journal of Intelligent Learning Systems and Applications
Vol.17 No.2
,March 31, 2025
DOI:
10.4236/jilsa.2025.172005
111
Downloads
411
Views
Citations
Cybercrime in Developing Countries: Negative Effects and Panacea
(Articles)
John Otozi Ugah
,
Onu Sunday
,
Alozie Obidinma
,
Ori Silas Ene
Open Access Library Journal
Vol.12 No.4
,April 10, 2025
DOI:
10.4236/oalib.1113218
20
Downloads
169
Views
Citations
Climate Change, Environmental Threats and Cyber-Threats to Critical Infrastructures in Multi-Regulatory Sustainable Global Approach with Sweden as an Example
(Articles)
Sandra Cassotta
,
Maria Pettersson
Beijing Law Review
Vol.10 No.3
,June 27, 2019
DOI:
10.4236/blr.2019.103035
1,293
Downloads
4,970
Views
Citations
Investigating How Parental Perceptions of Cybersecurity Influence Children’s Safety in the Cyber World: A Case Study of Saudi Arabia
(Articles)
Tariq Saeed Mian
,
Eman M. Alatawi
Intelligent Information Management
Vol.15 No.5
,September 11, 2023
DOI:
10.4236/iim.2023.155017
275
Downloads
1,633
Views
Citations
Developing an Abstraction Framework for Managing and Controlling Saudi Banks’ Cybersecurity Threats Based on the NIST Cybersecurity Framework and ISO/IEC 27001
(Articles)
Abdulaziz Saleh Alraddadi
Journal of Software Engineering and Applications
Vol.16 No.12
,December 29, 2023
DOI:
10.4236/jsea.2023.1612036
359
Downloads
1,477
Views
Citations
A Review of Human Vulnerabilities in Cyber Security: Challenges and Solutions for Microfinance Institutions
(Articles)
Evaline Waweru
,
Simon Maina Karume
,
Alex Kibet
Journal of Information Security
Vol.16 No.1
,December 31, 2024
DOI:
10.4236/jis.2025.161006
97
Downloads
574
Views
Citations
The Case for an M2 Growth Rate of 10%
(Articles)
William Carlson
,
Conway Lackman
Modern Economy
Vol.4 No.3
,March 27, 2013
DOI:
10.4236/me.2013.43021
4,385
Downloads
6,421
Views
Citations
Discretionary Fiscal Policy and the European Monetary Union
(Articles)
Jason Jones
Modern Economy
Vol.3 No.6
,October 31, 2012
DOI:
10.4236/me.2012.36095
5,899
Downloads
8,715
Views
Citations
Hybrid Authentication Cybersystem Based on Discrete Logarithm, Factorization and Array Entanglements
(Articles)
Boris S. Verkhovsky
Int'l J. of Communications, Network and System Sciences
Vol.3 No.7
,July 27, 2010
DOI:
10.4236/ijcns.2010.37077
5,004
Downloads
8,614
Views
Citations
The Guidelines to Adopt an Applicable SIEM Solution
(Articles)
Hassan Mokalled
,
Rosario Catelli
,
Valentina Casola
,
Daniele Debertol
,
Ermete Meda
,
Rodolfo Zunino
Journal of Information Security
Vol.11 No.1
,December 13, 2019
DOI:
10.4236/jis.2020.111003
2,084
Downloads
5,334
Views
Citations
An Analysis of Cybersecurity Attacks against Internet of Things and Security Solutions
(Articles)
Mohammad Rafsun Islam
,
K. M. Aktheruzzaman
Journal of Computer and Communications
Vol.8 No.4
,April 2, 2020
DOI:
10.4236/jcc.2020.84002
2,415
Downloads
9,812
Views
Citations
Case Study of a Cyber-Physical Attack Affecting Port and Ship Operational Safety
(Articles)
Kimberly Tam
,
Rory Hopcraft
,
Kemedi Moara-Nkwe
,
Juan Palbar Misas
,
Wesley Andrews
,
Avanthika Vineetha Harish
,
Pablo Giménez
,
Tom Crichton
,
Kevin Jones
Journal of Transportation Technologies
Vol.12 No.1
,December 6, 2021
DOI:
10.4236/jtts.2022.121001
691
Downloads
5,601
Views
Citations
Towards the Advancement of Cashless Transaction: A Security Analysis of Electronic Payment Systems
(Articles)
Iffath Tanjim Moon
,
Muhammad Shamsuzzaman
,
Muhammad Musfiqur Rahman Mridha
,
Abu Sayed Md. Mostafizur Rahaman
Journal of Computer and Communications
Vol.10 No.7
,July 29, 2022
DOI:
10.4236/jcc.2022.107007
868
Downloads
7,087
Views
Citations
<
1
2
3
...
>
Follow SCIRP
Contact us
customer@scirp.org
+86 18163351462(WhatsApp)
1655362766
Paper Publishing WeChat
Free SCIRP Newsletters
Home
Journals A-Z
Subject
Books
Sitemap
Contact Us
About SCIRP
Publication Fees
For Authors
Peer-Review Issues
Special Issues
News
Service
Manuscript Tracking System
Subscription
Translation & Proofreading
FAQ
Volume & Issue
Policies
Open Access
Publication Ethics
Preservation
Retraction
Privacy Policy
Copyright © 2006-2025 Scientific Research Publishing Inc. All Rights Reserved.
Top