• 文献检索
  • 文档翻译
  • 深度研究
  • 学术资讯
  • Suppr Zotero 插件Zotero 插件
  • 邀请有礼
  • 套餐&价格
  • 历史记录
应用&插件
Suppr Zotero 插件Zotero 插件浏览器插件Mac 客户端Windows 客户端微信小程序
定价
高级版会员购买积分包购买API积分包
服务
文献检索文档翻译深度研究API 文档MCP 服务
关于我们
关于 Suppr公司介绍联系我们用户协议隐私条款
关注我们

Suppr 超能文献

核心技术专利:CN118964589B侵权必究
粤ICP备2023148730 号-1Suppr @ 2026

文献检索

告别复杂PubMed语法,用中文像聊天一样搜索,搜遍4000万医学文献。AI智能推荐,让科研检索更轻松。

立即免费搜索

文件翻译

保留排版,准确专业,支持PDF/Word/PPT等文件格式,支持 12+语言互译。

免费翻译文档

深度研究

AI帮你快速写综述,25分钟生成高质量综述,智能提取关键信息,辅助科研写作。

立即免费体验

相似文献

1
Cyber governance studies in ensuring cybersecurity: an overview of cybersecurity governance.网络治理在确保网络安全方面的研究:网络安全治理概述
Int Cybersecur Law Rev. 2022;3(1):7-34. doi: 10.1365/s43439-021-00045-4. Epub 2022 Jan 11.
2
Influence of Human Factors on Cyber Security within Healthcare Organisations: A Systematic Review.人为因素对医疗机构网络安全的影响:系统综述。
Sensors (Basel). 2021 Jul 28;21(15):5119. doi: 10.3390/s21155119.
3
Cyber Hygiene Methodology for Raising Cybersecurity and Data Privacy Awareness in Health Care Organizations: Concept Study.网络卫生方法在提高医疗机构网络安全和数据隐私意识中的应用:概念研究。
J Med Internet Res. 2023 Jul 27;25:e41294. doi: 10.2196/41294.
4
We need to aim at the top: Factors associated with cybersecurity awareness of cyber and information security decision-makers.我们需要瞄准高端:与网络和信息安全决策者的网络安全意识相关的因素。
PLoS One. 2024 Oct 18;19(10):e0312266. doi: 10.1371/journal.pone.0312266. eCollection 2024.
5
Characterizing and Measuring Maliciousness for Cybersecurity Risk Assessment.用于网络安全风险评估的恶意性特征描述与度量
Front Psychol. 2018 Feb 5;9:39. doi: 10.3389/fpsyg.2018.00039. eCollection 2018.
6
Digital Transformation and Cybersecurity Challenges for Businesses Resilience: Issues and Recommendations.企业韧性的数字转型与网络安全挑战:问题与建议
Sensors (Basel). 2023 Jul 25;23(15):6666. doi: 10.3390/s23156666.
7
A Systematic Literature Review on Cyber Threat Intelligence for Organizational Cybersecurity Resilience.关于组织网络安全弹性的网络威胁情报的系统文献综述。
Sensors (Basel). 2023 Aug 19;23(16):7273. doi: 10.3390/s23167273.
8
Maybe If We Turn It Off and Then Turn It Back On Again? Exploring Health Care Reform as a Means to Curb Cyber Attacks.也许我们可以关闭它,然后再重新打开它?探索医疗改革以遏制网络攻击。
J Law Med Ethics. 2019 Dec;47(4_suppl):91-102. doi: 10.1177/1073110519898046.
9
Reconceptualizing cybersecurity awareness capability in the data-driven digital economy.在数据驱动的数字经济中重新认识网络安全意识能力。
Ann Oper Res. 2022 Aug 2:1-26. doi: 10.1007/s10479-022-04844-8.
10
Emerging Trends in Cybersecurity: A Holistic View on Current Threats, Assessing Solutions, and Pioneering New Frontiers.网络安全的新兴趋势:对当前威胁的全面审视、评估解决方案以及开拓新领域。
Blockchain Healthc Today. 2024 Apr 30;7. doi: 10.30953/bhty.v7.302. eCollection 2024.

引用本文的文献

1
A prospective approach to detect advanced persistent threats: Utilizing hybrid optimization technique.一种检测高级持续性威胁的前瞻性方法:利用混合优化技术。
Heliyon. 2023 Oct 30;9(11):e21377. doi: 10.1016/j.heliyon.2023.e21377. eCollection 2023 Nov.

网络治理在确保网络安全方面的研究:网络安全治理概述

Cyber governance studies in ensuring cybersecurity: an overview of cybersecurity governance.

作者信息

Savaş Serkan, Karataş Süleyman

机构信息

Faculty of Engineering, Department of Computer Engineering, Çankırı Karatekin University, 18100 Çankırı, Turkey.

İstanbul Başakşehir Special Education Practice School 3rd Stage, 34480 İstanbul, Turkey.

出版信息

Int Cybersecur Law Rev. 2022;3(1):7-34. doi: 10.1365/s43439-021-00045-4. Epub 2022 Jan 11.

DOI:10.1365/s43439-021-00045-4
PMID:37521508
原文链接:https://pmc.ncbi.nlm.nih.gov/articles/PMC8750646/
Abstract

With the exponential increase of digital data in cyber environments, security measures have gained more importance. Cybersecurity threats are revealed by national and international units, and the number of these threats is increasing daily. The elimination of cybersecurity risks is possible with an effective cybersecurity strategy. Since the concept of management is not sufficient, the implementation of this strategy is possible with cyber governance, which includes all stakeholders in the management processes. This study emphasizes the importance and necessity of cyber governance in ensuring cybersecurity. The research and results for cybersecurity governance have been examined. A descriptive research model was used to this end. In terms of research philosophy, a basic research model and a documentary research model have been created with regard to the application method. The universe of the research consists of studies obtained from Web of Science, EBSCO, Scopus, Google Scholar, and TR Index. Studies from the last 5 years have been downloaded with the determined keywords. The result showed that although there are studies that produce local solutions for cybersecurity governance in different countries, a general governance framework has not been established as yet. On the contrary, there is a latent struggle to retain the management of this area, not its governance.

摘要

随着网络环境中数字数据呈指数级增长,安全措施变得愈发重要。网络安全威胁由国家和国际单位披露,且此类威胁的数量与日俱增。通过有效的网络安全策略可以消除网络安全风险。由于管理概念并不充分,因此该策略的实施可借助网络治理来实现,网络治理涵盖管理过程中的所有利益相关者。本研究强调了网络治理在确保网络安全方面的重要性和必要性。对网络安全治理的研究及成果进行了审视。为此采用了描述性研究模型。在研究理念方面,就应用方法创建了基础研究模型和文献研究模型。研究范围包括从科学网、EBSCO、Scopus、谷歌学术和TR索引获取的研究。使用确定的关键词下载了过去5年的研究。结果表明,尽管不同国家有针对网络安全治理提出局部解决方案的研究,但尚未建立通用的治理框架。相反,在该领域存在着保留管理而非治理的潜在斗争。