Abstract: Despite the emergence of artificial intelligence-powered enterprise systems security solutions, it was found that at least 90% of malicious cyberattacks resulted from human behaviour or error. This and various other studies over the past 11 years confirmed that the human being remains the weakest link in the entire enterprise systems security chain. In addition, evidence seemed to suggest that many enterprises are still taking overly techno-centric approaches to cybersecurity risk and increase the chances of missing the bigger picture. With that, the study sought to understand how a bigger enterprise systems security picture could be realised. In particular, the aim of this study was to identify and address socio-technical securit...
This thesis was submitted for the degree of Doctor of Philosophy and awarded by Brunel University.Th...
The cybersecurity of organizations is a subject of perennial concern as they are subject to mounting...
Cybersecurity has gained prominence, with a number of widely publicised security incidents, hacking ...
The cyber threat to industrial control systems is an acknowledged security issue, but a qualified d...
Cybersecurity decisions are made across a range of social, technical, economic, regulatory and polit...
A notre ère de l'industrie des services, des systèmes d'information jouent une place prépondérante. ...
The Critical Infrastructures (CI) that provide essential services such as energy, water and transpor...
In the current digitalised society keeping assets secure is one of the most prominent challenges org...
peer reviewedInspired by the root cause analysis procedures common in safety, we propose a methodolo...
In our era of the service industry, information systems play a prominent role. They even hold a vita...
International audienceIn our era of the service industry, information systems play a major place, ev...
Today's missions rely on highly integrated and complex technology that must be protected from a wide...
This thesis seeks to establish a semi-automatic methodology for security analysis when users are con...
Security has been a growing concern for large organizations, especially financial and gov- ernmental...
This paper sets out an argument that cyber-security needs to be thought of as an inherently socio-te...
This thesis was submitted for the degree of Doctor of Philosophy and awarded by Brunel University.Th...
The cybersecurity of organizations is a subject of perennial concern as they are subject to mounting...
Cybersecurity has gained prominence, with a number of widely publicised security incidents, hacking ...
The cyber threat to industrial control systems is an acknowledged security issue, but a qualified d...
Cybersecurity decisions are made across a range of social, technical, economic, regulatory and polit...
A notre ère de l'industrie des services, des systèmes d'information jouent une place prépondérante. ...
The Critical Infrastructures (CI) that provide essential services such as energy, water and transpor...
In the current digitalised society keeping assets secure is one of the most prominent challenges org...
peer reviewedInspired by the root cause analysis procedures common in safety, we propose a methodolo...
In our era of the service industry, information systems play a prominent role. They even hold a vita...
International audienceIn our era of the service industry, information systems play a major place, ev...
Today's missions rely on highly integrated and complex technology that must be protected from a wide...
This thesis seeks to establish a semi-automatic methodology for security analysis when users are con...
Security has been a growing concern for large organizations, especially financial and gov- ernmental...
This paper sets out an argument that cyber-security needs to be thought of as an inherently socio-te...
This thesis was submitted for the degree of Doctor of Philosophy and awarded by Brunel University.Th...
The cybersecurity of organizations is a subject of perennial concern as they are subject to mounting...
Cybersecurity has gained prominence, with a number of widely publicised security incidents, hacking ...