FAYE, S.,ABDULRAHMAN, J.,TALB, R.A.,MARTIN, R.J., (2024). Cybersecurity in Aviation: A Case-Based Approach to Preparedness. International Journal of Information Security and Cybercrime, 13(2), 33-45. Retrieve from https://www.ijisc.comFAYE, S., ABDULRAHMAN, J., TALB, R.A., MARTIN, R.J., 2024. Cybersecurity in Aviation: A Case-Based Approach to Preparedness. International Journal of Information Security and Cybercrime 13(2), 33-45. Available from: https://www.ijisc.comS. FAYE, J. ABDULRAHMAN, R.A. TALB, R.J. MARTIN, "Cybersecurity in Aviation: A Case-Based Approach to Preparedness," International Journal of Information Security and Cybercrime, vol. 13, no. 2, pp. 33-45, 2024. Available: https://www.ijisc.comFAYE, S., ABDULRAHMAN, J., TALB, R.A., MARTIN, R.J., 'Cybersecurity in Aviation: A Case-Based Approach to Preparedness', International Journal of Information Security and Cybercrime, vol. 13, no. 2, 33-45, (2024).FAYE, S.,ABDULRAHMAN, J.,TALB, R.A.,MARTIN, R.J.,: Cybersecurity in Aviation: A Case-Based Approach to Preparedness. International Journal of Information Security and Cybercrime 13 (2024) 33-45. https://www.ijisc.comFAYE, S., ABDULRAHMAN, J., TALB, R.A., MARTIN, R.J., (2024), Cybersecurity in Aviation: A Case-Based Approach to Preparedness. International Journal of Information Security and Cybercrime, 13: 33-45. https://www.ijisc.com Citation Format :
MUPPA, K.R. (2024). Enhanced Identity and Access Management with Artificial Intelligence: A Strategic Overview. International Journal of Information Security and Cybercrime, 13(2), 9-17. Retrieve from https://www.ijisc.comMUPPA, K.R., 2024. Enhanced Identity and Access Management with Artificial Intelligence: A Strategic Overview. International Journal of Information Security and Cybercrime 13(2), 9-17. Available from: https://www.ijisc.comK.R. MUPPA, "Enhanced Identity and Access Management with Artificial Intelligence: A Strategic Overview," International Journal of Information Security and Cybercrime, vol. 13, no. 2, pp. 9-17, 2024. Available: https://www.ijisc.comMUPPA, K.R., 'Enhanced Identity and Access Management with Artificial Intelligence: A Strategic Overview', International Journal of Information Security and Cybercrime, vol. 13, no. 2, 9-17, (2024).MUPPA, K.R.: Enhanced Identity and Access Management with Artificial Intelligence: A Strategic Overview. International Journal of Information Security and Cybercrime 13 (2024) 9-17. https://www.ijisc.comMUPPA, K.R., (2024), Enhanced Identity and Access Management with Artificial Intelligence: A Strategic Overview. International Journal of Information Security and Cybercrime, 13: 9-17. https://www.ijisc.com Citation Format :
POPESCU, E.E. (2024). VoIP Security Threats. International Journal of Information Security and Cybercrime, 13(1), 66-70. Retrieve from https://www.ijisc.comPOPESCU, E.E., 2024. VoIP Security Threats. International Journal of Information Security and Cybercrime 13(1), 66-70. Available from: https://www.ijisc.comE.E. POPESCU, "VoIP Security Threats," International Journal of Information Security and Cybercrime, vol. 13, no. 1, pp. 66-70, 2024. Available: https://www.ijisc.comPOPESCU, E.E., 'VoIP Security Threats', International Journal of Information Security and Cybercrime, vol. 13, no. 1, 66-70, (2024).POPESCU, E.E.: VoIP Security Threats. International Journal of Information Security and Cybercrime 13 (2024) 66-70. https://www.ijisc.comPOPESCU, E.E., (2024), VoIP Security Threats. International Journal of Information Security and Cybercrime, 13: 66-70. https://www.ijisc.com Citation Format :
STOICA, I.T. (2024). The Future Risk of Biometric Data Theft in Cybersecurity. International Journal of Information Security and Cybercrime, 13(1), 49-58. Retrieve from https://www.ijisc.comSTOICA, I.T., 2024. The Future Risk of Biometric Data Theft in Cybersecurity. International Journal of Information Security and Cybercrime 13(1), 49-58. Available from: https://www.ijisc.comI.T. STOICA, "The Future Risk of Biometric Data Theft in Cybersecurity," International Journal of Information Security and Cybercrime, vol. 13, no. 1, pp. 49-58, 2024. Available: https://www.ijisc.comSTOICA, I.T., 'The Future Risk of Biometric Data Theft in Cybersecurity', International Journal of Information Security and Cybercrime, vol. 13, no. 1, 49-58, (2024).STOICA, I.T.: The Future Risk of Biometric Data Theft in Cybersecurity. International Journal of Information Security and Cybercrime 13 (2024) 49-58. https://www.ijisc.comSTOICA, I.T., (2024), The Future Risk of Biometric Data Theft in Cybersecurity. International Journal of Information Security and Cybercrime, 13: 49-58. https://www.ijisc.com Citation Format :
AMIN, R. (2024). Causes and Consequences of Cyberbullying Against Women in Bangladesh: A Comprehensive Study. International Journal of Information Security and Cybercrime, 13(1), 33-48. Retrieve from https://www.ijisc.comAMIN, R., 2024. Causes and Consequences of Cyberbullying Against Women in Bangladesh: A Comprehensive Study. International Journal of Information Security and Cybercrime 13(1), 33-48. Available from: https://www.ijisc.comR. AMIN, "Causes and Consequences of Cyberbullying Against Women in Bangladesh: A Comprehensive Study," International Journal of Information Security and Cybercrime, vol. 13, no. 1, pp. 33-48, 2024. Available: https://www.ijisc.comAMIN, R., 'Causes and Consequences of Cyberbullying Against Women in Bangladesh: A Comprehensive Study', International Journal of Information Security and Cybercrime, vol. 13, no. 1, 33-48, (2024).AMIN, R.: Causes and Consequences of Cyberbullying Against Women in Bangladesh: A Comprehensive Study. International Journal of Information Security and Cybercrime 13 (2024) 33-48. https://www.ijisc.comAMIN, R., (2024), Causes and Consequences of Cyberbullying Against Women in Bangladesh: A Comprehensive Study. International Journal of Information Security and Cybercrime, 13: 33-48. https://www.ijisc.com Citation Format :
VASILOIU, R.E. (2024). Cyber Security – Current and Future Trends. International Journal of Information Security and Cybercrime, 13(1), 20-32. Retrieve from https://www.ijisc.comVASILOIU, R.E., 2024. Cyber Security – Current and Future Trends. International Journal of Information Security and Cybercrime 13(1), 20-32. Available from: https://www.ijisc.comR.E. VASILOIU, "Cyber Security – Current and Future Trends," International Journal of Information Security and Cybercrime, vol. 13, no. 1, pp. 20-32, 2024. Available: https://www.ijisc.comVASILOIU, R.E., 'Cyber Security – Current and Future Trends', International Journal of Information Security and Cybercrime, vol. 13, no. 1, 20-32, (2024).VASILOIU, R.E.: Cyber Security – Current and Future Trends. International Journal of Information Security and Cybercrime 13 (2024) 20-32. https://www.ijisc.comVASILOIU, R.E., (2024), Cyber Security – Current and Future Trends. International Journal of Information Security and Cybercrime, 13: 20-32. https://www.ijisc.com Citation Format :
LINDROTH, M.,NORVANTO, E.,LATVANEN, S.,CULLEN, K.,SALMINEN, M.,MATILAINEN, T.,CANDELIN, N.,KORTESNIEMI, Y., (2024). Advancing Cybersecurity through Civic Skills. International Journal of Information Security and Cybercrime, 13(1), 15-19. Retrieve from https://www.ijisc.comLINDROTH, M., NORVANTO, E., LATVANEN, S., CULLEN, K., SALMINEN, M., MATILAINEN, T., CANDELIN, N., KORTESNIEMI, Y., 2024. Advancing Cybersecurity through Civic Skills. International Journal of Information Security and Cybercrime 13(1), 15-19. Available from: https://www.ijisc.comM. LINDROTH, E. NORVANTO, S. LATVANEN, K. CULLEN, M. SALMINEN, T. MATILAINEN, N. CANDELIN, Y. KORTESNIEMI, "Advancing Cybersecurity through Civic Skills," International Journal of Information Security and Cybercrime, vol. 13, no. 1, pp. 15-19, 2024. Available: https://www.ijisc.comLINDROTH, M., NORVANTO, E., LATVANEN, S., CULLEN, K., SALMINEN, M., MATILAINEN, T., CANDELIN, N., KORTESNIEMI, Y., 'Advancing Cybersecurity through Civic Skills', International Journal of Information Security and Cybercrime, vol. 13, no. 1, 15-19, (2024).LINDROTH, M.,NORVANTO, E.,LATVANEN, S.,CULLEN, K.,SALMINEN, M.,MATILAINEN, T.,CANDELIN, N.,KORTESNIEMI, Y.,: Advancing Cybersecurity through Civic Skills. International Journal of Information Security and Cybercrime 13 (2024) 15-19. https://www.ijisc.comLINDROTH, M., NORVANTO, E., LATVANEN, S., CULLEN, K., SALMINEN, M., MATILAINEN, T., CANDELIN, N., KORTESNIEMI, Y., (2024), Advancing Cybersecurity through Civic Skills. International Journal of Information Security and Cybercrime, 13: 15-19. https://www.ijisc.com Citation Format :
DESPA, A.R. (2023). Overcoming Obstacles: A Closer Look at the Most Pressing Challenges in Cybersecurity. International Journal of Information Security and Cybercrime, 12(2), 35-42. Retrieve from https://www.ijisc.comDESPA, A.R., 2023. Overcoming Obstacles: A Closer Look at the Most Pressing Challenges in Cybersecurity. International Journal of Information Security and Cybercrime 12(2), 35-42. Available from: https://www.ijisc.comA.R. DESPA, "Overcoming Obstacles: A Closer Look at the Most Pressing Challenges in Cybersecurity," International Journal of Information Security and Cybercrime, vol. 12, no. 2, pp. 35-42, 2023. Available: https://www.ijisc.comDESPA, A.R., 'Overcoming Obstacles: A Closer Look at the Most Pressing Challenges in Cybersecurity', International Journal of Information Security and Cybercrime, vol. 12, no. 2, 35-42, (2023).DESPA, A.R.: Overcoming Obstacles: A Closer Look at the Most Pressing Challenges in Cybersecurity. International Journal of Information Security and Cybercrime 12 (2023) 35-42. https://www.ijisc.comDESPA, A.R., (2023), Overcoming Obstacles: A Closer Look at the Most Pressing Challenges in Cybersecurity. International Journal of Information Security and Cybercrime, 12: 35-42. https://www.ijisc.com Citation Format :
MPHATHENI, M.R. (2023). Cybersecurity: An Appraisal of Policy Frameworks and Related Conventions. International Journal of Information Security and Cybercrime, 12(1), 45-60. Retrieve from https://www.ijisc.comMPHATHENI, M.R., 2023. Cybersecurity: An Appraisal of Policy Frameworks and Related Conventions. International Journal of Information Security and Cybercrime 12(1), 45-60. Available from: https://www.ijisc.comM.R. MPHATHENI, "Cybersecurity: An Appraisal of Policy Frameworks and Related Conventions," International Journal of Information Security and Cybercrime, vol. 12, no. 1, pp. 45-60, 2023. Available: https://www.ijisc.comMPHATHENI, M.R., 'Cybersecurity: An Appraisal of Policy Frameworks and Related Conventions', International Journal of Information Security and Cybercrime, vol. 12, no. 1, 45-60, (2023).MPHATHENI, M.R.: Cybersecurity: An Appraisal of Policy Frameworks and Related Conventions. International Journal of Information Security and Cybercrime 12 (2023) 45-60. https://www.ijisc.comMPHATHENI, M.R., (2023), Cybersecurity: An Appraisal of Policy Frameworks and Related Conventions. International Journal of Information Security and Cybercrime, 12: 45-60. https://www.ijisc.com Citation Format :
SMAJIC, N. (2023). Human Element in Cybersecurity. Strategies for Building a Stronger and More Secure Workforce. International Journal of Information Security and Cybercrime, 12(1), 30-36. Retrieve from https://www.ijisc.comSMAJIC, N., 2023. Human Element in Cybersecurity. Strategies for Building a Stronger and More Secure Workforce. International Journal of Information Security and Cybercrime 12(1), 30-36. Available from: https://www.ijisc.comN. SMAJIC, "Human Element in Cybersecurity. Strategies for Building a Stronger and More Secure Workforce," International Journal of Information Security and Cybercrime, vol. 12, no. 1, pp. 30-36, 2023. Available: https://www.ijisc.comSMAJIC, N., 'Human Element in Cybersecurity. Strategies for Building a Stronger and More Secure Workforce', International Journal of Information Security and Cybercrime, vol. 12, no. 1, 30-36, (2023).SMAJIC, N.: Human Element in Cybersecurity. Strategies for Building a Stronger and More Secure Workforce. International Journal of Information Security and Cybercrime 12 (2023) 30-36. https://www.ijisc.comSMAJIC, N., (2023), Human Element in Cybersecurity. Strategies for Building a Stronger and More Secure Workforce. International Journal of Information Security and Cybercrime, 12: 30-36. https://www.ijisc.com Citation Format :
AMEEL, H.,DECAVELE, T.,EECKHOUT, C.,van der HEIDE, J.,LOHNER, D.,van der PLOEG, B.,RIETBERG, W.,STEINER-CARDELL, A.,TJOA, S.,KOCHBERGER, P.,KÄVRESTAD, J.,LUH, R., (2023). Experiences From a Multi-National Course in Cybersecurity Awareness Raising. International Journal of Information Security and Cybercrime, 12(1), 18-22. Retrieve from https://www.ijisc.comAMEEL, H., DECAVELE, T., EECKHOUT, C., van der HEIDE, J., LOHNER, D., van der PLOEG, B., RIETBERG, W., STEINER-CARDELL, A., TJOA, S., KOCHBERGER, P., KÄVRESTAD, J., LUH, R., 2023. Experiences From a Multi-National Course in Cybersecurity Awareness Raising. International Journal of Information Security and Cybercrime 12(1), 18-22. Available from: https://www.ijisc.comH. AMEEL, T. DECAVELE, C. EECKHOUT, J. van der HEIDE, D. LOHNER, B. van der PLOEG, W. RIETBERG, A. STEINER-CARDELL, S. TJOA, P. KOCHBERGER, J. KÄVRESTAD, R. LUH, "Experiences From a Multi-National Course in Cybersecurity Awareness Raising," International Journal of Information Security and Cybercrime, vol. 12, no. 1, pp. 18-22, 2023. Available: https://www.ijisc.comAMEEL, H., DECAVELE, T., EECKHOUT, C., van der HEIDE, J., LOHNER, D., van der PLOEG, B., RIETBERG, W., STEINER-CARDELL, A., TJOA, S., KOCHBERGER, P., KÄVRESTAD, J., LUH, R., 'Experiences From a Multi-National Course in Cybersecurity Awareness Raising', International Journal of Information Security and Cybercrime, vol. 12, no. 1, 18-22, (2023).AMEEL, H.,DECAVELE, T.,EECKHOUT, C.,van der HEIDE, J.,LOHNER, D.,van der PLOEG, B.,RIETBERG, W.,STEINER-CARDELL, A.,TJOA, S.,KOCHBERGER, P.,KÄVRESTAD, J.,LUH, R.,: Experiences From a Multi-National Course in Cybersecurity Awareness Raising. International Journal of Information Security and Cybercrime 12 (2023) 18-22. https://www.ijisc.comAMEEL, H., DECAVELE, T., EECKHOUT, C., van der HEIDE, J., LOHNER, D., van der PLOEG, B., RIETBERG, W., STEINER-CARDELL, A., TJOA, S., KOCHBERGER, P., KÄVRESTAD, J., LUH, R., (2023), Experiences From a Multi-National Course in Cybersecurity Awareness Raising. International Journal of Information Security and Cybercrime, 12: 18-22. https://www.ijisc.com Citation Format :
SHARMA, R. (2022). Cyber Security to Safeguard Cyber Attacks. International Journal of Information Security and Cybercrime, 11(2), 50-63. Retrieve from https://www.ijisc.comSHARMA, R., 2022. Cyber Security to Safeguard Cyber Attacks. International Journal of Information Security and Cybercrime 11(2), 50-63. Available from: https://www.ijisc.comR. SHARMA, "Cyber Security to Safeguard Cyber Attacks," International Journal of Information Security and Cybercrime, vol. 11, no. 2, pp. 50-63, 2022. Available: https://www.ijisc.comSHARMA, R., 'Cyber Security to Safeguard Cyber Attacks', International Journal of Information Security and Cybercrime, vol. 11, no. 2, 50-63, (2022).SHARMA, R.: Cyber Security to Safeguard Cyber Attacks. International Journal of Information Security and Cybercrime 11 (2022) 50-63. https://www.ijisc.comSHARMA, R., (2022), Cyber Security to Safeguard Cyber Attacks. International Journal of Information Security and Cybercrime, 11: 50-63. https://www.ijisc.com Citation Format :
HUMIED, I.A. (2022). Cybersecurity as Emerging Challenge to Yemen Security. International Journal of Information Security and Cybercrime, 11(2), 35-44. Retrieve from https://www.ijisc.comHUMIED, I.A., 2022. Cybersecurity as Emerging Challenge to Yemen Security. International Journal of Information Security and Cybercrime 11(2), 35-44. Available from: https://www.ijisc.comI.A. HUMIED, "Cybersecurity as Emerging Challenge to Yemen Security," International Journal of Information Security and Cybercrime, vol. 11, no. 2, pp. 35-44, 2022. Available: https://www.ijisc.comHUMIED, I.A., 'Cybersecurity as Emerging Challenge to Yemen Security', International Journal of Information Security and Cybercrime, vol. 11, no. 2, 35-44, (2022).HUMIED, I.A.: Cybersecurity as Emerging Challenge to Yemen Security. International Journal of Information Security and Cybercrime 11 (2022) 35-44. https://www.ijisc.comHUMIED, I.A., (2022), Cybersecurity as Emerging Challenge to Yemen Security. International Journal of Information Security and Cybercrime, 11: 35-44. https://www.ijisc.com Citation Format :
LÓPEZ-AGUILAR, P.,SOLANAS, A., (2021). The Role of Phishing Victims’ Neuroticism: Reasons Behind the Lack of Consensus. International Journal of Information Security and Cybercrime, 10(2), 75-80. Retrieve from https://www.ijisc.comLÓPEZ-AGUILAR, P., SOLANAS, A., 2021. The Role of Phishing Victims’ Neuroticism: Reasons Behind the Lack of Consensus. International Journal of Information Security and Cybercrime 10(2), 75-80. Available from: https://www.ijisc.comP. LÓPEZ-AGUILAR, A. SOLANAS, "The Role of Phishing Victims’ Neuroticism: Reasons Behind the Lack of Consensus," International Journal of Information Security and Cybercrime, vol. 10, no. 2, pp. 75-80, 2021. Available: https://www.ijisc.comLÓPEZ-AGUILAR, P., SOLANAS, A., 'The Role of Phishing Victims’ Neuroticism: Reasons Behind the Lack of Consensus', International Journal of Information Security and Cybercrime, vol. 10, no. 2, 75-80, (2021).LÓPEZ-AGUILAR, P.,SOLANAS, A.,: The Role of Phishing Victims’ Neuroticism: Reasons Behind the Lack of Consensus. International Journal of Information Security and Cybercrime 10 (2021) 75-80. https://www.ijisc.comLÓPEZ-AGUILAR, P., SOLANAS, A., (2021), The Role of Phishing Victims’ Neuroticism: Reasons Behind the Lack of Consensus. International Journal of Information Security and Cybercrime, 10: 75-80. https://www.ijisc.com Citation Format :
ZACHARIS, A.,JABES, E.,LELLA, I.,REKLEITIS, E., (2021). Cyber Awareness Exercises: Virtual vs On-site Participation & the Hybrid Approach. International Journal of Information Security and Cybercrime, 10(2), 31-36. Retrieve from https://www.ijisc.comZACHARIS, A., JABES, E., LELLA, I., REKLEITIS, E., 2021. Cyber Awareness Exercises: Virtual vs On-site Participation & the Hybrid Approach. International Journal of Information Security and Cybercrime 10(2), 31-36. Available from: https://www.ijisc.comA. ZACHARIS, E. JABES, I. LELLA, E. REKLEITIS, "Cyber Awareness Exercises: Virtual vs On-site Participation & the Hybrid Approach," International Journal of Information Security and Cybercrime, vol. 10, no. 2, pp. 31-36, 2021. Available: https://www.ijisc.comZACHARIS, A., JABES, E., LELLA, I., REKLEITIS, E., 'Cyber Awareness Exercises: Virtual vs On-site Participation & the Hybrid Approach', International Journal of Information Security and Cybercrime, vol. 10, no. 2, 31-36, (2021).ZACHARIS, A.,JABES, E.,LELLA, I.,REKLEITIS, E.,: Cyber Awareness Exercises: Virtual vs On-site Participation & the Hybrid Approach. International Journal of Information Security and Cybercrime 10 (2021) 31-36. https://www.ijisc.comZACHARIS, A., JABES, E., LELLA, I., REKLEITIS, E., (2021), Cyber Awareness Exercises: Virtual vs On-site Participation & the Hybrid Approach. International Journal of Information Security and Cybercrime, 10: 31-36. https://www.ijisc.com Citation Format :
DI FRANCO, F.,PAPADATOS, K.,RANTOS, K., (2021). Re-Visiting Cyber Security Training in the COVID-19 Era. International Journal of Information Security and Cybercrime, 10(2), 16-20. Retrieve from https://www.ijisc.comDI FRANCO, F., PAPADATOS, K., RANTOS, K., 2021. Re-Visiting Cyber Security Training in the COVID-19 Era. International Journal of Information Security and Cybercrime 10(2), 16-20. Available from: https://www.ijisc.comF. DI FRANCO, K. PAPADATOS, K. RANTOS, "Re-Visiting Cyber Security Training in the COVID-19 Era," International Journal of Information Security and Cybercrime, vol. 10, no. 2, pp. 16-20, 2021. Available: https://www.ijisc.comDI FRANCO, F., PAPADATOS, K., RANTOS, K., 'Re-Visiting Cyber Security Training in the COVID-19 Era', International Journal of Information Security and Cybercrime, vol. 10, no. 2, 16-20, (2021).DI FRANCO, F.,PAPADATOS, K.,RANTOS, K.,: Re-Visiting Cyber Security Training in the COVID-19 Era. International Journal of Information Security and Cybercrime 10 (2021) 16-20. https://www.ijisc.comDI FRANCO, F., PAPADATOS, K., RANTOS, K., (2021), Re-Visiting Cyber Security Training in the COVID-19 Era. International Journal of Information Security and Cybercrime, 10: 16-20. https://www.ijisc.com Citation Format :
FRĂȚILĂ, A.I. (2020). Analysis of Computer Malware and Common Attacks. International Journal of Information Security and Cybercrime, 9(2), 38-45. Retrieve from https://www.ijisc.comFRĂȚILĂ, A.I., 2020. Analysis of Computer Malware and Common Attacks. International Journal of Information Security and Cybercrime 9(2), 38-45. Available from: https://www.ijisc.comA.I. FRĂȚILĂ, "Analysis of Computer Malware and Common Attacks," International Journal of Information Security and Cybercrime, vol. 9, no. 2, pp. 38-45, 2020. Available: https://www.ijisc.comFRĂȚILĂ, A.I., 'Analysis of Computer Malware and Common Attacks', International Journal of Information Security and Cybercrime, vol. 9, no. 2, 38-45, (2020).FRĂȚILĂ, A.I.: Analysis of Computer Malware and Common Attacks. International Journal of Information Security and Cybercrime 9 (2020) 38-45. https://www.ijisc.comFRĂȚILĂ, A.I., (2020), Analysis of Computer Malware and Common Attacks. International Journal of Information Security and Cybercrime, 9: 38-45. https://www.ijisc.com Citation Format :
SHEPHERD, L.A.,DE PAOLI, S.,CONACHER, J., (2020). Human-Computer Interaction Considerations When Developing Cyber Ranges. International Journal of Information Security and Cybercrime, 9(2), 28-32. Retrieve from https://www.ijisc.comSHEPHERD, L.A., DE PAOLI, S., CONACHER, J., 2020. Human-Computer Interaction Considerations When Developing Cyber Ranges. International Journal of Information Security and Cybercrime 9(2), 28-32. Available from: https://www.ijisc.comL.A. SHEPHERD, S. DE PAOLI, J. CONACHER, "Human-Computer Interaction Considerations When Developing Cyber Ranges," International Journal of Information Security and Cybercrime, vol. 9, no. 2, pp. 28-32, 2020. Available: https://www.ijisc.comSHEPHERD, L.A., DE PAOLI, S., CONACHER, J., 'Human-Computer Interaction Considerations When Developing Cyber Ranges', International Journal of Information Security and Cybercrime, vol. 9, no. 2, 28-32, (2020).SHEPHERD, L.A.,DE PAOLI, S.,CONACHER, J.,: Human-Computer Interaction Considerations When Developing Cyber Ranges. International Journal of Information Security and Cybercrime 9 (2020) 28-32. https://www.ijisc.comSHEPHERD, L.A., DE PAOLI, S., CONACHER, J., (2020), Human-Computer Interaction Considerations When Developing Cyber Ranges. International Journal of Information Security and Cybercrime, 9: 28-32. https://www.ijisc.com Citation Format :
NAGYFEJEO, E.,SOLMS, B.V., (2020). Why Do National Cybersecurity Awareness Programmes Often Fail?. International Journal of Information Security and Cybercrime, 9(2), 18-27. Retrieve from https://www.ijisc.comNAGYFEJEO, E., SOLMS, B.V., 2020. Why Do National Cybersecurity Awareness Programmes Often Fail?. International Journal of Information Security and Cybercrime 9(2), 18-27. Available from: https://www.ijisc.comE. NAGYFEJEO, B.V. SOLMS, "Why Do National Cybersecurity Awareness Programmes Often Fail?," International Journal of Information Security and Cybercrime, vol. 9, no. 2, pp. 18-27, 2020. Available: https://www.ijisc.comNAGYFEJEO, E., SOLMS, B.V., 'Why Do National Cybersecurity Awareness Programmes Often Fail?', International Journal of Information Security and Cybercrime, vol. 9, no. 2, 18-27, (2020).NAGYFEJEO, E.,SOLMS, B.V.,: Why Do National Cybersecurity Awareness Programmes Often Fail?. International Journal of Information Security and Cybercrime 9 (2020) 18-27. https://www.ijisc.comNAGYFEJEO, E., SOLMS, B.V., (2020), Why Do National Cybersecurity Awareness Programmes Often Fail?. International Journal of Information Security and Cybercrime, 9: 18-27. https://www.ijisc.com Citation Format :
ENNS-BRAY, W.S.,ROCHAT, K., (2020). Medical Device Regulation and Cybersecurity: Achieving ‘Secure by Design’ for Regulatory Compliance. International Journal of Information Security and Cybercrime, 9(2), 12-17. Retrieve from https://www.ijisc.comENNS-BRAY, W.S., ROCHAT, K., 2020. Medical Device Regulation and Cybersecurity: Achieving ‘Secure by Design’ for Regulatory Compliance. International Journal of Information Security and Cybercrime 9(2), 12-17. Available from: https://www.ijisc.comW.S. ENNS-BRAY, K. ROCHAT, "Medical Device Regulation and Cybersecurity: Achieving ‘Secure by Design’ for Regulatory Compliance," International Journal of Information Security and Cybercrime, vol. 9, no. 2, pp. 12-17, 2020. Available: https://www.ijisc.comENNS-BRAY, W.S., ROCHAT, K., 'Medical Device Regulation and Cybersecurity: Achieving ‘Secure by Design’ for Regulatory Compliance', International Journal of Information Security and Cybercrime, vol. 9, no. 2, 12-17, (2020).ENNS-BRAY, W.S.,ROCHAT, K.,: Medical Device Regulation and Cybersecurity: Achieving ‘Secure by Design’ for Regulatory Compliance. International Journal of Information Security and Cybercrime 9 (2020) 12-17. https://www.ijisc.comENNS-BRAY, W.S., ROCHAT, K., (2020), Medical Device Regulation and Cybersecurity: Achieving ‘Secure by Design’ for Regulatory Compliance. International Journal of Information Security and Cybercrime, 9: 12-17. https://www.ijisc.com Citation Format :