*sublabel_EDS*

*custom_text_above_search_result**custom_text_above_search_result_EDS*

*Showing* 1 - 20 *of* 84*number_thousands_separator*444

1

RADAR: A FRAMEWORK FOR DEVELOPING ADVERSARIALLY ROBUST CYBER DEFENSE AI AGENTS WITH DEEP REINFORCEMENT LEARNING.
Ebrahimi, Reza ; Chai, Yidong ; Li, Weifeng ; et al.
MIS Quarterly. Dec2025, Vol. 49 Issue 4, p1385-1416. 32p. 11 Color Photographs, 2 Diagrams, 10 Charts.

INTELLIGENT agents COMPUTER crimes INTERNET security REINFORCEMENT learning ROBUST optimization
*Academic Journal*
2

THE FOG OF WARNINGS: HOW NON-SECURITY-RELATED NOTIFICATIONS DIMINISH THE EFFICACY OF SECURITY WARNINGS.
Vance, Anthony ; Eargle, Dave ; Kirwan, C. Brock ; et al.
MIS Quarterly. Dec2025, Vol. 49 Issue 4, p1357-1384. 28p. 20 Color Photographs, 1 Diagram, 6 Charts.

WARNINGS INTERNET security HABITUATION (Neuropsycho... FUNCTIONAL magnetic reso... STIMULUS generalization
*Academic Journal*
3

Cybersecurity in the Arab World: Technological and Socio-Political Dimensions.
Abdennadher, Slim ; Ali, Raian ; Dacier, Marc ; et al.
Communications of the ACM. Oct2025, Vol. 68 Issue 10, p72-77. 6p.

TRANSPORTATION managemen... DATA integrity CYBERTERRORISM INTERNET security INTERCONNECTED power sys... RISK perception
*Periodical*
4

Grand Challenges in Trustworthy Computing at 20: A Retrospective Look at the Second CRA Grand Challenges Conference.
DeMillo, Richard A. ; Spafford, Eugene H.
Communications of the ACM. Sep2025, Vol. 68 Issue 9, p54-61. 8p.

CONFERENCES & convention... COMPUTER viruses COMPUTER crimes INTERNET security LINK spam (Internet) DENIAL of service attack...
*Periodical*
5

Ransomware: Extortion Is My Business.
Marion, Jean-Yves
Communications of the ACM. May2025, Vol. 68 Issue 5, p36-47. 12p.

RANSOMWARE DATA encryption CYBERCRIMINALS CYBERTERRORISM BLACK market INTERNET security
*Periodical*
6

Cybersecurity Risk and Bank Loan Contracting.
Sheneman, Amy G.
Accounting Review. Jan2026, Vol. 101 Issue 1, p475-502. 28p.

BANK loans RISK CAPITAL costs RISK management in busin... LOAN agreements INFORMATION sharing
*Academic Journal*
7

"COMPLEXITY IS THE WORST ENEMY OF SECURITY": STUDYING CYBERSECURITY THROUGH THE LENS OF ORGANIZATIONAL COMPLEXITY.
Schneier, Bruce ; Vance, Anthony
MIS Quarterly. Mar2025, Vol. 49 Issue 1, p205-210. 6p.

MERGERS & acquisitions INTERNET security MULTIHOSPITAL systems
*Academic Journal*
8

TAMING COMPLEXITY IN THE CYBERSECURITY OF MULTIHOSPITAL SYSTEMS: THE ROLE OF ENTERPRISE-WIDE DATA ANALYTICS PLATFORMS.
Tanriverdi, Hüseyin ; Juhee Kwon ; Ghiyoung Im
MIS Quarterly. Mar2025, Vol. 49 Issue 1, p243-273. 31p. 17 Charts.

DATA analytics ENTERPRISE software INFORMATION technology INTERNET security MULTIHOSPITAL systems HOSPITAL security measur...
*Academic Journal*
9

Cybersecurity in Digital-Only Banks; How Entrepreneurs Are Shaping India's Digital Finance Ecosystem.
Agal, Kamal ; Mordhara, Pareshkumar Ukabhai ; Patel, Dharak ; et al.
Advances in Consumer Research. Dec2025, Vol. 2 Issue 6, p2555-2568. 14p.

ONLINE banking CYBERTERRORISM BUSINESSPEOPLE INTERNET security TRUST INDIA
*Conference*
10

Blockchain And Cybersecurity Securechain.
Arivarasan, S. ; Prabakaran, S. ; S., Ponabinanth ; et al.
Advances in Consumer Research. Dec2025, Vol. 2 Issue 6, p2356-2361. 6p.

BLOCKCHAINS REAL-time computing INTERNET security INTERNET of things DIGITAL asset management QUANTUM cryptography
*Conference*
11

MarketLine Company Profile: Firstwave Cloud Technology Ltd.
Firstwave Cloud Technology Ltd. MarketLine Company Profile. 11/30/2025, p1-16. 16p.

COMPUTER security INTERNET security SOUTH Wales FIRSTWAVE Cloud Technolo...
**
12

THE CYBER CONUNDRUM. (cover story)
IYENGAR, RISHI
Foreign Policy. Winter2026, Issue 259, p50-53. 4p. 1 Cartoon or Caricature.

RANSOMWARE CYBERTERRORISM INTERNET security BUDGET cuts UNITED States CHINA
*Periodical*
13

Research: Conventional Cybersecurity Won't Protect Your AI.
Huang, Hugo
Harvard Business Review Digital Articles. 1/9/2026, p1-9. 9p.

ARTIFICIAL intelligence DATA integrity COMPUTER hacking INTERNET security MICROSOFT Copilot
*Periodical*
14

Is that a legit link you're about to click? Here's how to check.
YEE, ALAINA
PCWorld. Jan2026, Vol. 44 Issue 1, p89-93. 5p. 6 Color Photographs.

PHISHING SECURITY management ELECTRONIC authenticatio... INTERNET security PASSWORD software
*Periodical*
15

4 changes I made immediately after 1.3 billion passwords stolen.
YEE, ALAINA
PCWorld. Jan2026, Vol. 44 Issue 1, p12-16. 5p. 5 Color Photographs, 1 Diagram.

COMPUTER passwords COMPUTER user identifica... COMPUTER hacking DATA security failures INTERNET security EMAIL management
*Periodical*
16

Exploiting Cross-Layer Vulnerabilities: Off-Path Attacks on the TCP/IP Protocol Suite.
Feng, Xuewei ; Li, Qi ; Sun, Kun ; et al.
Communications of the ACM. Mar2025, Vol. 68 Issue 3, p48-59. 12p.

TCP/IP COMPUTER security vulner... COMPUTER network protoco... INTERNET security ERROR messages (Computer...
*Periodical*
17

CALENDAR: OCTOBER 2025.
Kiplinger Personal Finance. Oct2025, Vol. 79 Issue 10, p14-15. 2p. 1 Color Photograph.

FINANCIAL security SELF-employment COMPUTER crimes INDIVIDUAL retirement ac... INTERNET security MULTI-factor authenticat...
*Periodical*
18

UNITED WE STAND, DIVIDED WE FALL: AN AUTOGENIC PERSPECTIVE ON EMPOWERING CYBERSECURITY IN ORGANIZATIONS.
Durcikova, Alexandra ; Miranda, Shaila M. ; Jensen, Matthew L. ; et al.
MIS Quarterly. Dec2024, Vol. 48 Issue 4, p1503-1536. 34p. 18 Color Photographs.

ASSOCIATIONS, institutio... INFORMATION systems depa... INTERNET security SELF-efficacy
*Academic Journal*
19

Cybersecurity Threats and Defensive Strategies for Small and Medium Firms: A Systematic Mapping Study.
Awan, Mujtaba ; Alam, Abu
Administrative Sciences (2076-3387). Dec2025, Vol. 151 Issue 12, p481. 37p.

SMALL business CYBERTERRORISM SYSTEMS design ORGANIZATIONAL resilienc... COMPUTER security vulner... INTERNET security
*Academic Journal*
20

Digital governance and economic development in Africa.
Yuan, Chuantai ; Gu, Ren
Applied Economics Letters. Nov2025, p1-5. 5p.

ECONOMIC development INTERNET content regulat... FILTERING software BEST practices INTERNET security INTERNET in public admin...
*Academic Journal*

*Filter*