Swinburne University ICT30005 Cyber Security Reflective Report
VerifiedAdded on  2023/06/04
|10
|3027
|330
Report
AI Summary
This report reflects on experiences and learning within the context of ICT30005 Professional Issues in IT at Swinburne University. It addresses compulsory items related to personal career aspirations in cyber security and navigating diversity within IT teams. The report further discusses memorable moments from the PIIT unit, key professional roles in modern ICT, and the impact of these on future work. Part B delves into group dynamics, communication, and cyber security issues, referencing real-world attacks and the need for robust security measures. The report emphasizes the importance of ethical sensitivity, interpersonal communication skills, and continuous learning in the ever-evolving field of IT.

Cyber Security
Report
Report
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser

Contents
Part A...............................................................................................................................................2
Compulsory Items: Answer both:................................................................................................2
Other Items..................................................................................................................................3
Part B:..............................................................................................................................................5
The first topic is Group Dynamics...............................................................................................5
The second topic is Communication............................................................................................5
The third topic is Cyber security.................................................................................................6
Final topic is ICT and Professionalism........................................................................................6
References........................................................................................................................................7
1 | P a g e
Part A...............................................................................................................................................2
Compulsory Items: Answer both:................................................................................................2
Other Items..................................................................................................................................3
Part B:..............................................................................................................................................5
The first topic is Group Dynamics...............................................................................................5
The second topic is Communication............................................................................................5
The third topic is Cyber security.................................................................................................6
Final topic is ICT and Professionalism........................................................................................6
References........................................................................................................................................7
1 | P a g e

Part A
Compulsory Items: Answer both:
QA: After spending some time in a new country Australia, I have been able to complete my
degree in statistics major. I have been working in a reputed company so that I can handle my
expenses in Australia. Based on the degree and the skills, I am have been able to find that my
achievements and the qualifications are insufficient to take me to the next higher level in my
career and achieve a better quality with the income perspectives. Hence, I need to focus on some
IT related qualifications and work on exploring career optionssetting my career. Thereby, I
decided to focus on cyber security. With this, I have been working on the previous degree of
statistics and expertise and figuring out how I can increase my income and qualifications through
cyber security. I, then decided, to work for my Bachelor degree for moving on to a higher level
of education and knowledge. To be honest, I have been able to analyze the units which are for
summer semester and analyze about how it is possible to be working on the issues that are
escalated in the recent times, in IT industry. The effective possibility and good news is that I
have been able to synchronize with the needs of IT industry and it gives me an opportunity to
work on cyber security. The learning and thinking of the issues gives me an opportunity to
explore about myself and think about the concerns. After studying about the unit, I have been
able to feel that I am on a right track to achieve a better qualification for which I left my
homeland for.
QB:
There is a major difference in the background of the people like the skills, gender, age and the
religion. I have seen that I am older than my other team members. My ethnicity and religion is
different from them. But what really matters for me is to act respectfully with everyone who are
different from us and behave then be in a good manner with behaving properly with them. With
IT perspectives, ICT professionals generally have to comply to the ethics of work that includes
the procedures which are slandered (Buczak & Guven, 2016). Hence, one need to leave their
personal aggression or enmity and work in a professional manner. From the first day, we were
asked to discuss on the topics so that it is enough to concentrate on certain ideas and prepare
them accordingly. The group work has helped me in encouraging towards developing critical
thinking skills, and the people also have a opportunity to learn from and then teach each other
2 | P a g e
Compulsory Items: Answer both:
QA: After spending some time in a new country Australia, I have been able to complete my
degree in statistics major. I have been working in a reputed company so that I can handle my
expenses in Australia. Based on the degree and the skills, I am have been able to find that my
achievements and the qualifications are insufficient to take me to the next higher level in my
career and achieve a better quality with the income perspectives. Hence, I need to focus on some
IT related qualifications and work on exploring career optionssetting my career. Thereby, I
decided to focus on cyber security. With this, I have been working on the previous degree of
statistics and expertise and figuring out how I can increase my income and qualifications through
cyber security. I, then decided, to work for my Bachelor degree for moving on to a higher level
of education and knowledge. To be honest, I have been able to analyze the units which are for
summer semester and analyze about how it is possible to be working on the issues that are
escalated in the recent times, in IT industry. The effective possibility and good news is that I
have been able to synchronize with the needs of IT industry and it gives me an opportunity to
work on cyber security. The learning and thinking of the issues gives me an opportunity to
explore about myself and think about the concerns. After studying about the unit, I have been
able to feel that I am on a right track to achieve a better qualification for which I left my
homeland for.
QB:
There is a major difference in the background of the people like the skills, gender, age and the
religion. I have seen that I am older than my other team members. My ethnicity and religion is
different from them. But what really matters for me is to act respectfully with everyone who are
different from us and behave then be in a good manner with behaving properly with them. With
IT perspectives, ICT professionals generally have to comply to the ethics of work that includes
the procedures which are slandered (Buczak & Guven, 2016). Hence, one need to leave their
personal aggression or enmity and work in a professional manner. From the first day, we were
asked to discuss on the topics so that it is enough to concentrate on certain ideas and prepare
them accordingly. The group work has helped me in encouraging towards developing critical
thinking skills, and the people also have a opportunity to learn from and then teach each other
2 | P a g e
⊘ This is a preview!⊘
Do you want full access?
Subscribe today to unlock all pages.

Trusted by 1+ million students worldwide

(Gupta, Agrawal,. and Yamaguchi, 2016) . The facilitation is about the greater transfer of the
previous knowledge and enhancement of certain social skills with interactions. One can work as
an individual where the people from diversified backgrounds are able to share experiences and
skills to participate in unique ways . The enhancement of the achievements to work as an
individual where the people are from the diversified backgrounds. The industry is able to focus
on the different group work skill sets where I have seen that people are engaged in group
dynamics and knowledge, which is mainly is to familiarize oneself for a better skill set.
The next step has been to find an interviewee who could handle the arrangements with
the other co-workers. In this time, I have been able to come up with the interviewsinterview but
there were certain different problems and procedures for the same. My group members have
been able to work effectively and interview on different practices for a better flow of practices
other than the team performance which is completely satisfactory. Being in a group, I realized
that one becomes more organized as we are able to put up our points and discuss about the
different topics at a broader level. It not only helps in better development, but a coordination is
also maintained which is important for the good management practice. The explanatory power is
about understanding and allowing to manage and manipulate the processes with teamwork that
helps in managing the group dynamics to the practical benefits (Liu et al., 2015). There are
distinctive roles and behaviors which helps in understanding about how to improve on the team
output and work on cognitively abilities with dependency on technical competency. The
globalization has been increasing in scale and complexity with organizational behavior focusing
on combination of skill sets that are important for the growth of strategies and working
experiences. I believe that the management of the group dynamics is important for the
management, because I could easily understand that even a wrong information can lead to
disruption of organizational output.
Other Items
Q1. What are your most memorable moments of PIIT, and why?
Being a person who has the first positive memory and who has been able to discover that there is
no exam for this unit, gives me an immense happiness. The fear of examination has always given
me a setback (Gordon et al., 2015). The second is about the arrangement of sliding a night before
the presentation and I have been able to improvise the topics without any sort of practices done
3 | P a g e
previous knowledge and enhancement of certain social skills with interactions. One can work as
an individual where the people from diversified backgrounds are able to share experiences and
skills to participate in unique ways . The enhancement of the achievements to work as an
individual where the people are from the diversified backgrounds. The industry is able to focus
on the different group work skill sets where I have seen that people are engaged in group
dynamics and knowledge, which is mainly is to familiarize oneself for a better skill set.
The next step has been to find an interviewee who could handle the arrangements with
the other co-workers. In this time, I have been able to come up with the interviewsinterview but
there were certain different problems and procedures for the same. My group members have
been able to work effectively and interview on different practices for a better flow of practices
other than the team performance which is completely satisfactory. Being in a group, I realized
that one becomes more organized as we are able to put up our points and discuss about the
different topics at a broader level. It not only helps in better development, but a coordination is
also maintained which is important for the good management practice. The explanatory power is
about understanding and allowing to manage and manipulate the processes with teamwork that
helps in managing the group dynamics to the practical benefits (Liu et al., 2015). There are
distinctive roles and behaviors which helps in understanding about how to improve on the team
output and work on cognitively abilities with dependency on technical competency. The
globalization has been increasing in scale and complexity with organizational behavior focusing
on combination of skill sets that are important for the growth of strategies and working
experiences. I believe that the management of the group dynamics is important for the
management, because I could easily understand that even a wrong information can lead to
disruption of organizational output.
Other Items
Q1. What are your most memorable moments of PIIT, and why?
Being a person who has the first positive memory and who has been able to discover that there is
no exam for this unit, gives me an immense happiness. The fear of examination has always given
me a setback (Gordon et al., 2015). The second is about the arrangement of sliding a night before
the presentation and I have been able to improvise the topics without any sort of practices done
3 | P a g e
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser

before. The best factor is that the feedback from the tutor that the presentation was given right on
time gives me confidence and eagerness to work more. There were certain ups and downs in the
project, but the members of the team could easily handle and deal with the issues which came on
their way. The presentation was done in an effective manner, as we had coordination, even
though we had no rehearsals for the same. This was such a big mistake but a big achievement as
well for us.
Q2: What are some of the key professional roles and responsibilities for a modern ICT
Professional? How might these affect you in your future work?
The primary factors for IT security includes global acknowledgement where the needs are for
increased IT security. The focus is on how one can work on controlling the threats that occurs in
the field of technology. The IT security strategies are based on protecting the networks and the
infrastructure which includes the network security officers. There is a need to protect against the
different cyber threats which are evolving (Fielder et al., 2016). The responsibilities that are
important are based on the necessity and identity where the eligibility is for the access and
setting the rules and regulations. There is a need to develop and design the security devices
which ensures about client safety or the internal products. The management of information and
security measures are done in the networked system, where the operations are done at a regular
inspection of system for proper updates on security. The conducts are for the auditing process
where the security and safety measures needs to be customized as per the rules and necessity.
According to me, it will help in maintaining standard information security procedures and
policies. In order to find a secured way for implementing the technology, there is a need to
reduce the risks which are relevant to information systems. They are mainly to ensure about
network protection, infrastructure and computer systems (Cherdantseva et al., 2016). In our
work, the IT security need to have a proper management and the skills to ensure effective
coordination within the teams. For this, one needs to communication about the security issues
properly.
It will directly affect my work as we have to be technically competent enough for improving our
skills by learning new and advanced technologies every now and then.
4 | P a g e
time gives me confidence and eagerness to work more. There were certain ups and downs in the
project, but the members of the team could easily handle and deal with the issues which came on
their way. The presentation was done in an effective manner, as we had coordination, even
though we had no rehearsals for the same. This was such a big mistake but a big achievement as
well for us.
Q2: What are some of the key professional roles and responsibilities for a modern ICT
Professional? How might these affect you in your future work?
The primary factors for IT security includes global acknowledgement where the needs are for
increased IT security. The focus is on how one can work on controlling the threats that occurs in
the field of technology. The IT security strategies are based on protecting the networks and the
infrastructure which includes the network security officers. There is a need to protect against the
different cyber threats which are evolving (Fielder et al., 2016). The responsibilities that are
important are based on the necessity and identity where the eligibility is for the access and
setting the rules and regulations. There is a need to develop and design the security devices
which ensures about client safety or the internal products. The management of information and
security measures are done in the networked system, where the operations are done at a regular
inspection of system for proper updates on security. The conducts are for the auditing process
where the security and safety measures needs to be customized as per the rules and necessity.
According to me, it will help in maintaining standard information security procedures and
policies. In order to find a secured way for implementing the technology, there is a need to
reduce the risks which are relevant to information systems. They are mainly to ensure about
network protection, infrastructure and computer systems (Cherdantseva et al., 2016). In our
work, the IT security need to have a proper management and the skills to ensure effective
coordination within the teams. For this, one needs to communication about the security issues
properly.
It will directly affect my work as we have to be technically competent enough for improving our
skills by learning new and advanced technologies every now and then.
4 | P a g e

5 | P a g e
⊘ This is a preview!⊘
Do you want full access?
Subscribe today to unlock all pages.

Trusted by 1+ million students worldwide

Part B:
The first topic is Group Dynamics
The discussion is on the professionalism concept which is referred as important for handling the
transferable skills or the enterprise skills. The thinking is about the ethical sensitivity and
interpersonal communication skills that helps in working over the career development with team
work and collaboration. It is important for my team to focus on bringing the changes in the
project for the program that will lead to capturing achievements. It will then lead to encouraging
the development of critical thinking skills (Beaumont, 2018). The industry places a major value
on the group work, where one can perform at a diversified level and participate in the unique
manner. The group dynamics for me helps in defining interaction, goals and interdependence,
with structure and cohesion. According to Kurt Lewin, group dynamics is about how the
individual is able to work on the social contexts. The research that we are focusing on explains a
good theory and focus on understanding the phenomenon of issues related to cybercrime. The
major significance is about the individual behavior which can be explained in the terms of group
impact.
The individual behavior, for me, is explained in terms of group impact where the organizational
behavior is about understanding the group cohesion and work on handling the conflicts as well.
The group will require to work on structured factors before checking out the outputs. The group
development is important for the improvement and developing over the time (Batest, Tian,
Butler & Moyer, 2015). It includes the distinct stages in development with explaining about the
practical benefits.
The second topic is Communication
My project team members have been really communicative, and they are trying to work on cyber
security and work effectively with others. Over the time, I have learnt that each person is
intelligent in his aspect and are able to grasp the new technology very fast. They have been able
to efficient work with a broader range of people and I have also been experienced from my
previous working firms (Yip, 2015). The communication skills have been effective for me to
focus on active listening skills with the ability to ask relevant questions. The leadership-based
communication has been effectively able to help us in handling negotiations and higher conflict
6 | P a g e
The first topic is Group Dynamics
The discussion is on the professionalism concept which is referred as important for handling the
transferable skills or the enterprise skills. The thinking is about the ethical sensitivity and
interpersonal communication skills that helps in working over the career development with team
work and collaboration. It is important for my team to focus on bringing the changes in the
project for the program that will lead to capturing achievements. It will then lead to encouraging
the development of critical thinking skills (Beaumont, 2018). The industry places a major value
on the group work, where one can perform at a diversified level and participate in the unique
manner. The group dynamics for me helps in defining interaction, goals and interdependence,
with structure and cohesion. According to Kurt Lewin, group dynamics is about how the
individual is able to work on the social contexts. The research that we are focusing on explains a
good theory and focus on understanding the phenomenon of issues related to cybercrime. The
major significance is about the individual behavior which can be explained in the terms of group
impact.
The individual behavior, for me, is explained in terms of group impact where the organizational
behavior is about understanding the group cohesion and work on handling the conflicts as well.
The group will require to work on structured factors before checking out the outputs. The group
development is important for the improvement and developing over the time (Batest, Tian,
Butler & Moyer, 2015). It includes the distinct stages in development with explaining about the
practical benefits.
The second topic is Communication
My project team members have been really communicative, and they are trying to work on cyber
security and work effectively with others. Over the time, I have learnt that each person is
intelligent in his aspect and are able to grasp the new technology very fast. They have been able
to efficient work with a broader range of people and I have also been experienced from my
previous working firms (Yip, 2015). The communication skills have been effective for me to
focus on active listening skills with the ability to ask relevant questions. The leadership-based
communication has been effectively able to help us in handling negotiations and higher conflict
6 | P a g e
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser

level management. It is seen that there are discrepancies in thoughts, but being an elder in the
team, I am able to handle the conflicts with critical analysis and persuasive skills as everyone
respect my thoughts and opinions. The communication becomes more important if it is
interactive and I have seen that my group members always come up and clarify their doubts with
each other so that they are able to work with clarity. The language is about providing the
potential for meaning with effectively communicating through co-actions (Knowles et al., 2015).
The third topic is Cyber security
The cybersecurity is important for understanding about the different incident response policies
and law enforcement that helps in improving the stability of the goal information structure. The
information security is concerned about protecting the forms of data which are coming from
accessing the unauthorized standards with maximized confidentiality and integrity of business
data. The cyber security comprises of the technologies, processes and the controls for protecting
the system from attacks where the target is about the unsecured devices that works on the
vulnerable technology (Tsikrika et al., 2017). Some of the major issues in the cyber security were
2018 Attacks, where Aadhaar of 12-digit unique identifier was assigned to Indian people and the
records were breached on January 3rd. Here, the data included the name, address, photo and the
phone number. The payment of 300 Rs to the sellers also yielded the access to the software
through which anyone had the access for printing the ID card for the Aadhar number.
The threats and the attacks are mainly seen in the financial, education and the transport sector. A
major problem arises in the interpersonal relations as well. For resolving the problems of
cybercrime, there is a need to focus on reducing the crimes with advancement of technologies
with purpose of security the systems. The government needs to take an initiative to ensure about
whether the crimes are reduced or not.
Final topic is ICT and Professionalism
The final topic is about the ICT and professionalism which is done by our senior lecture. She has
been a presenter who was full of energy and have been interactive as well. She has taught us the
actual meaning of ethics and ICT sustainability in the organization. Although she has been very
7 | P a g e
team, I am able to handle the conflicts with critical analysis and persuasive skills as everyone
respect my thoughts and opinions. The communication becomes more important if it is
interactive and I have seen that my group members always come up and clarify their doubts with
each other so that they are able to work with clarity. The language is about providing the
potential for meaning with effectively communicating through co-actions (Knowles et al., 2015).
The third topic is Cyber security
The cybersecurity is important for understanding about the different incident response policies
and law enforcement that helps in improving the stability of the goal information structure. The
information security is concerned about protecting the forms of data which are coming from
accessing the unauthorized standards with maximized confidentiality and integrity of business
data. The cyber security comprises of the technologies, processes and the controls for protecting
the system from attacks where the target is about the unsecured devices that works on the
vulnerable technology (Tsikrika et al., 2017). Some of the major issues in the cyber security were
2018 Attacks, where Aadhaar of 12-digit unique identifier was assigned to Indian people and the
records were breached on January 3rd. Here, the data included the name, address, photo and the
phone number. The payment of 300 Rs to the sellers also yielded the access to the software
through which anyone had the access for printing the ID card for the Aadhar number.
The threats and the attacks are mainly seen in the financial, education and the transport sector. A
major problem arises in the interpersonal relations as well. For resolving the problems of
cybercrime, there is a need to focus on reducing the crimes with advancement of technologies
with purpose of security the systems. The government needs to take an initiative to ensure about
whether the crimes are reduced or not.
Final topic is ICT and Professionalism
The final topic is about the ICT and professionalism which is done by our senior lecture. She has
been a presenter who was full of energy and have been interactive as well. She has taught us the
actual meaning of ethics and ICT sustainability in the organization. Although she has been very
7 | P a g e

charming, but her words were clear enough to make us understand about how the students could
consult with her for the future working contracts and other related concerns (Cavelty, 2014). She
has been one of them to answer about the subscribing of students and then comparing with
audience number. Hence, to sum up, the content of the lecture included the presentation related
to ICT professionalism to understand about the relevant body of language. The concepts are
related to competent practices which helps in delivering the values for the stakeholders. The
professional development, for me, helps in focusing on improving the competency with personal
performance and career progression opportunities. It helps in encompassing the technical and
non-technical aspects. Hence, it was easy for me to work on different concepts of product quality
and services with my group members. My teachers have been able to help me in competence
mapping benefits which are recognized through working on different perspectives which are
defined in terms of competences and proficiencies. The Code of Ethics and Conduct helps in
building my team individuals reputation within the profession.
References
Bates, A.M., Tian, D., Butler, K.R. and Moyer, T., 2015, August. Trustworthy Whole-System
Provenance for the Linux Kernel. In USENIX Security Symposium (pp. 319-334).
Beaumont, P., 2018. Cybersecurity Risks and Automated Maritime Container Terminals in the
Age of 4IR. In Handbook of Research on Information and Cyber Security in the Fourth
Industrial Revolution (pp. 497-516). IGI Global.
Buczak, A.L. and Guven, E., 2016. A survey of data mining and machine learning methods for
cyber security intrusion detection. IEEE Communications Surveys & Tutorials, 18(2), pp.1153-
1176.
Cavelty, M.D., 2014. Breaking the cyber-security dilemma: Aligning security needs and
removing vulnerabilities. Science and engineering ethics, 20(3), pp.701-715.
Cherdantseva, Y., Burnap, P., Blyth, A., Eden, P., Jones, K., Soulsby, H. and Stoddart, K., 2016.
A review of cyber security risk assessment methods for SCADA systems. Computers &
security, 56, pp.1-27.
Fielder, A., Panaousis, E., Malacaria, P., Hankin, C. and Smeraldi, F., 2016. Decision support
approaches for cyber security investment. Decision Support Systems, 86, pp.13-23.
8 | P a g e
consult with her for the future working contracts and other related concerns (Cavelty, 2014). She
has been one of them to answer about the subscribing of students and then comparing with
audience number. Hence, to sum up, the content of the lecture included the presentation related
to ICT professionalism to understand about the relevant body of language. The concepts are
related to competent practices which helps in delivering the values for the stakeholders. The
professional development, for me, helps in focusing on improving the competency with personal
performance and career progression opportunities. It helps in encompassing the technical and
non-technical aspects. Hence, it was easy for me to work on different concepts of product quality
and services with my group members. My teachers have been able to help me in competence
mapping benefits which are recognized through working on different perspectives which are
defined in terms of competences and proficiencies. The Code of Ethics and Conduct helps in
building my team individuals reputation within the profession.
References
Bates, A.M., Tian, D., Butler, K.R. and Moyer, T., 2015, August. Trustworthy Whole-System
Provenance for the Linux Kernel. In USENIX Security Symposium (pp. 319-334).
Beaumont, P., 2018. Cybersecurity Risks and Automated Maritime Container Terminals in the
Age of 4IR. In Handbook of Research on Information and Cyber Security in the Fourth
Industrial Revolution (pp. 497-516). IGI Global.
Buczak, A.L. and Guven, E., 2016. A survey of data mining and machine learning methods for
cyber security intrusion detection. IEEE Communications Surveys & Tutorials, 18(2), pp.1153-
1176.
Cavelty, M.D., 2014. Breaking the cyber-security dilemma: Aligning security needs and
removing vulnerabilities. Science and engineering ethics, 20(3), pp.701-715.
Cherdantseva, Y., Burnap, P., Blyth, A., Eden, P., Jones, K., Soulsby, H. and Stoddart, K., 2016.
A review of cyber security risk assessment methods for SCADA systems. Computers &
security, 56, pp.1-27.
Fielder, A., Panaousis, E., Malacaria, P., Hankin, C. and Smeraldi, F., 2016. Decision support
approaches for cyber security investment. Decision Support Systems, 86, pp.13-23.
8 | P a g e
⊘ This is a preview!⊘
Do you want full access?
Subscribe today to unlock all pages.

Trusted by 1+ million students worldwide

Gordon, L.A., Loeb, M.P., Lucyshyn, W. and Zhou, L., 2015. Externalities and the magnitude of
cyber security underinvestment by private sector firms: a modification of the Gordon-Loeb
model. Journal of Information Security, 6(1), p.24.
Gupta, B., Agrawal, D.P. and Yamaguchi, S. eds., 2016. Handbook of research on modern
cryptographic solutions for computer and cyber security. IGI Global.
Knowles, W., Prince, D., Hutchison, D., Disso, J.F.P. and Jones, K., 2015. A survey of cyber
security management in industrial control systems. International journal of critical
infrastructure protection, 9, pp.52-80.
Liu, Y., Sarabi, A., Zhang, J., Naghizadeh, P., Karir, M., Bailey, M. and Liu, M., 2015, August.
Cloudy with a Chance of Breach: Forecasting Cyber Security Incidents. In USENIX Security
Symposium (pp. 1009-1024).
Tsikrika, T., Akhgar, B., Katos, V., Vrochidis, S., Burnap, P. and Williams, M.L., 2017,
February. 1st international workshop on search and mining terrorist online content & advances in
data science for cyber security and risk on the web. In Proceedings of the Tenth ACM
International Conference on Web Search and Data Mining (pp. 823-824). ACM.
Yip, N.S.M.S., 2015. The Effect of Cyber Supply Chain Security Towards Lean and Agile Supply
Chain Performance in Healthcare Industry: The Mediating Effect of Organizational
Capabilities (Doctoral dissertation, Universiti Sains Malaysia).
9 | P a g e
cyber security underinvestment by private sector firms: a modification of the Gordon-Loeb
model. Journal of Information Security, 6(1), p.24.
Gupta, B., Agrawal, D.P. and Yamaguchi, S. eds., 2016. Handbook of research on modern
cryptographic solutions for computer and cyber security. IGI Global.
Knowles, W., Prince, D., Hutchison, D., Disso, J.F.P. and Jones, K., 2015. A survey of cyber
security management in industrial control systems. International journal of critical
infrastructure protection, 9, pp.52-80.
Liu, Y., Sarabi, A., Zhang, J., Naghizadeh, P., Karir, M., Bailey, M. and Liu, M., 2015, August.
Cloudy with a Chance of Breach: Forecasting Cyber Security Incidents. In USENIX Security
Symposium (pp. 1009-1024).
Tsikrika, T., Akhgar, B., Katos, V., Vrochidis, S., Burnap, P. and Williams, M.L., 2017,
February. 1st international workshop on search and mining terrorist online content & advances in
data science for cyber security and risk on the web. In Proceedings of the Tenth ACM
International Conference on Web Search and Data Mining (pp. 823-824). ACM.
Yip, N.S.M.S., 2015. The Effect of Cyber Supply Chain Security Towards Lean and Agile Supply
Chain Performance in Healthcare Industry: The Mediating Effect of Organizational
Capabilities (Doctoral dissertation, Universiti Sains Malaysia).
9 | P a g e
1 out of 10
Related Documents

Your All-in-One AI-Powered Toolkit for Academic Success.
 +13062052269
info@desklib.com
Available 24*7 on WhatsApp / Email
Unlock your academic potential
Copyright © 2020–2025 A2Z Services. All Rights Reserved. Developed and managed by ZUCOL.