Zobrazeno 1 - 10
of 15
pro vyhledávání: '"Regner Sabillon"'
Autor:
Regner Sabillon
Publikováno v:
Research Anthology on Advancements in Cybersecurity Education
This chapter presents the outcome of one empirical research study that assess the implementation and validation of the cybersecurity awareness training model (CATRAM), designed as a multiple-case study in a Canadian higher education institution. Info
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::7c1539190774d40d9e4525e63b1e3e80
https://doi.org/10.4018/978-1-6684-3554-0.ch025
https://doi.org/10.4018/978-1-6684-3554-0.ch025
Autor:
Regner Sabillon
This chapter presents the outcome of two empirical research studies that assess the implementation and validation of the cybersecurity audit model (CSAM), designed as a multiple-case study in two different Canadian higher education institution. CSAM
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::001316a6cba13e5bc595450429655670
https://doi.org/10.4018/978-1-6684-3698-1.ch005
https://doi.org/10.4018/978-1-6684-3698-1.ch005
Autor:
Regner Sabillon
Publikováno v:
Research Anthology on Business Aspects of Cybersecurity
This chapter studies the phases to unify our national cybersecurity strategy model (NCSSM) in any nation cyber strategy that is either under development or improvement stages. This methodology consists of developing international cybersecurity strate
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::542d22c501882abcc666e188fdafe3a9
https://doi.org/10.4018/978-1-6684-3698-1.ch023
https://doi.org/10.4018/978-1-6684-3698-1.ch023
Autor:
Regner Sabillon
The objective of this chapter is to provision a comprehensive literature review of the most relevant approaches for conducting cybersecurity audits. The study includes auditing perspectives for specific scopes and the best practices that many leading
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::e021e70089bebe4c622111548374bd78
https://doi.org/10.4018/978-1-6684-3698-1.ch001
https://doi.org/10.4018/978-1-6684-3698-1.ch001
Publikováno v:
O2, repositorio institucional de la UOC
Universitat Oberta de Catalunya (UOC)
Repositorio EdocUR-U. Rosario
Universidad del Rosario
instacron:Universidad del Rosario
Universitat Oberta de Catalunya (UOC)
Repositorio EdocUR-U. Rosario
Universidad del Rosario
instacron:Universidad del Rosario
Traditional cybersecurity, security or information security awareness programs have become ineffective to change people’s behavior in recognizing, failing to block or reporting cyberthreats within their organizational environment. As a result, huma
Autor:
Regner Sabillon, Jeimy J. Cano
Publikováno v:
RISTI-Revista Ibérica de Sistemas e Tecnologias de Informação, Issue: 32, Pages: 33-48, Published: JUN 2019
O2, repositorio institucional de la UOC
Universitat Oberta de Catalunya (UOC)
RISTI-Revista Ibérica de Sistemas e Tecnologias de Informação n.32 2019
Repositório Científico de Acesso Aberto de Portugal (Repositórios Cientìficos)
Agência para a Sociedade do Conhecimento (UMIC)-FCT-Sociedade da Informação
instacron:RCAAP
O2, repositorio institucional de la UOC
Universitat Oberta de Catalunya (UOC)
RISTI-Revista Ibérica de Sistemas e Tecnologias de Informação n.32 2019
Repositório Científico de Acesso Aberto de Portugal (Repositórios Cientìficos)
Agência para a Sociedade do Conhecimento (UMIC)-FCT-Sociedade da Informação
instacron:RCAAP
espanolEste articulo presenta los resultados de un estudio de implementacion y validacion del Modelo de Auditoria de Ciberseguridad (CSAM), en un estudio de casos multiples en una universidad canadiense. Se propone que el modelo se utilice para adela
Autor:
Regner Sabillon
Publikováno v:
Advances in Digital Crime, Forensics, and Cyber Terrorism ISBN: 9781799841623
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::21ed675403c1991c1eac9272fa840abe
https://doi.org/10.4018/978-1-7998-4162-3
https://doi.org/10.4018/978-1-7998-4162-3
Traditional cybersecurity, security or information security awareness programs have become ineffective to change people's behavior in recognizing, failing to block or reporting cyberthreats within their organizational environment. As a result, human
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::d45bf0a168a3e4f4ca04b735933330dc
https://doi.org/10.4018/978-1-7998-7705-9.ch008
https://doi.org/10.4018/978-1-7998-7705-9.ch008
Autor:
Regner Sabillon
Traditional security education, training, and awareness (SETA); cybersecurity awareness programs; and information security awareness programs are falling behind to deal with the current cyberthreat landscape in any organizational environment. Human b
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_dedup___::013dbfea62b1b2b4fa7cda134c68f50b
https://doi.org/10.4018/978-1-7998-1879-3.ch012
https://doi.org/10.4018/978-1-7998-1879-3.ch012
Publikováno v:
International Journal of Information Security and Privacy. 11:25-37
This paper reviews the existing methodologies and best practices for digital investigations phases like collecting, evaluating and preserving digital forensic evidence and chain of custody of cybercrimes. Cybercriminals are adopting new strategies to