The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
To assess cybersecurity capabilities in developing countries, governments need to develop a social influence strategy. The main aim is to explore the social influence in the cyberworld and its ability to improve the cybersecurity capabilities in cyberspace' users. Developing countries are from the most source and target of cybercrime in the world, however, their poor infrastructures make them as an...
To assess cybersecurity capabilities in developing countries, governments need to develop a social influence strategy. The main aim is to explore the social influence in the cyberworld and its ability to improve the cybersecurity capabilities in cyberspace' users. Developing countries are from the most source and target of cybercrime in the world, however, their poor infrastructures make them as an...
Cybersecurity is an ever-changing ecosystem with a vast and highly complicated field of study, involving specific confidential information which is the most important element for each organization, regardless its industry segment; accordingly, this matter requires continuous attention. The cybersecurity is crucial due to its strong presence in national security. In this respect, States, enterprises...
An effective national cybersecurity strategy conforms to international standards serves to preserve organization's information assets. The principle is to support a cybersecurity consistent approach including legal, technological and organizational dimensions. The promise of this research program is to identify the key areas for an effective cybersecurity strategy addressed to organizations (administration...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.