Modern information technology (IT) is well developed, and almost everyone uses the features of IT and services within the Internet. However, people are being affected due to cybersecurity threats. People can adhere to the recommended cybersecurity guidelines, rules, adopted standards, and cybercrime preventive measures to largely mitigate these threats. The ignorance of or lack of cybersecurity knowledge also causes a critical problem regarding confidentiality and privacy. It is not possible to fully avoid cybercrimes that often lead to sufficient business losses and spread forbidden themes (disgust, extremism, child porn, etc.). Therefore, to reduce the risk of cybercrimes, a web-based Blockchain-enabled cybersecurity awareness program (WB...
Cybersecurity is a field of Computer Science that focuses on protecting networks, devices, and data ...
Blockchain has been widely known thanks to Bitcoin and the cryptocurrencies. In this chapter, we ana...
Teaching information systems (IS) and cybersecurity topics can be consistent and uncomplicated when ...
Modern information technology (IT) is well developed, and almost everyone uses the features of IT an...
In today’s world, it is more important than ever to be aware of the dangers of cyber security threat...
The prerequisites for the study are the widespread use of blockchain technology in various sectors o...
Traditional cybersecurity, security or information security awareness programs have become ineffecti...
This book offers the latest research results on blockchain technology and its application for cybers...
Nowadays, cybersecurity plays a bigger role in the world of technology whereby each and each of the ...
Blockchain Technology is defined as a decentralized system of distributed registers that are used to...
Operating systems and programmes are more protected these days and attackers have shifted their atte...
Abstract: We are currently living in an age, where the use of the Internet has become second nature...
Abstract: A majority of African Internet users do not have access to the Internet. The lack of infra...
[[abstract]]Organizations that lack security awareness can miss detecting many obvious security risk...
Thousands of cyber-attacks (fraudulent online activities to acquire users’ sensitive information via...
Cybersecurity is a field of Computer Science that focuses on protecting networks, devices, and data ...
Blockchain has been widely known thanks to Bitcoin and the cryptocurrencies. In this chapter, we ana...
Teaching information systems (IS) and cybersecurity topics can be consistent and uncomplicated when ...
Modern information technology (IT) is well developed, and almost everyone uses the features of IT an...
In today’s world, it is more important than ever to be aware of the dangers of cyber security threat...
The prerequisites for the study are the widespread use of blockchain technology in various sectors o...
Traditional cybersecurity, security or information security awareness programs have become ineffecti...
This book offers the latest research results on blockchain technology and its application for cybers...
Nowadays, cybersecurity plays a bigger role in the world of technology whereby each and each of the ...
Blockchain Technology is defined as a decentralized system of distributed registers that are used to...
Operating systems and programmes are more protected these days and attackers have shifted their atte...
Abstract: We are currently living in an age, where the use of the Internet has become second nature...
Abstract: A majority of African Internet users do not have access to the Internet. The lack of infra...
[[abstract]]Organizations that lack security awareness can miss detecting many obvious security risk...
Thousands of cyber-attacks (fraudulent online activities to acquire users’ sensitive information via...
Cybersecurity is a field of Computer Science that focuses on protecting networks, devices, and data ...
Blockchain has been widely known thanks to Bitcoin and the cryptocurrencies. In this chapter, we ana...
Teaching information systems (IS) and cybersecurity topics can be consistent and uncomplicated when ...