{"id":"https://openalex.org/W4398198567","doi":"https://doi.org/10.1109/iccr61006.2024.10533019","title":"Robust Information Security for Strengthening HR in Organizations","display_name":"Robust Information Security for Strengthening HR in Organizations","publication_year":2024,"publication_date":"2024-02-26","ids":{"openalex":"https://openalex.org/W4398198567","doi":"https://doi.org/10.1109/iccr61006.2024.10533019"},"language":"en","primary_location":{"id":"doi:10.1109/iccr61006.2024.10533019","is_oa":false,"landing_page_url":"https://doi.org/10.1109/iccr61006.2024.10533019","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2024 2nd International Conference on Cyber Resilience (ICCR)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5050853715","display_name":"Saeed Hameed Aldulaimi","orcid":"https://orcid.org/0000-0003-1131-5633"},"institutions":[{"id":"https://openalex.org/I4210163116","display_name":"Applied Science University","ror":"https://ror.org/059zrbe49","country_code":"BH","type":"education","lineage":["https://openalex.org/I4210163116"]}],"countries":["BH"],"is_corresponding":true,"raw_author_name":"Saeed Hameed Aldulaimi","raw_affiliation_strings":["College of Administrative Sciences Applied Science University (ASU),East Al-Ekir,Bahrain","College of Administrative Sciences Applied Science University (ASU), East Al-Ekir, Bahrain"],"raw_orcid":"https://orcid.org/0000-0003-1131-5633","affiliations":[{"raw_affiliation_string":"College of Administrative Sciences Applied Science University (ASU),East Al-Ekir,Bahrain","institution_ids":["https://openalex.org/I4210163116"]},{"raw_affiliation_string":"College of Administrative Sciences Applied Science University (ASU), East Al-Ekir, Bahrain","institution_ids":["https://openalex.org/I4210163116"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5035466557","display_name":"Marwan M. Abdeldayem","orcid":"https://orcid.org/0000-0002-9103-9802"},"institutions":[{"id":"https://openalex.org/I4210163116","display_name":"Applied Science University","ror":"https://ror.org/059zrbe49","country_code":"BH","type":"education","lineage":["https://openalex.org/I4210163116"]}],"countries":["BH"],"is_corresponding":false,"raw_author_name":"Marwan Abdeldayem","raw_affiliation_strings":["College of Administrative Sciences Applied Science University (ASU),East Al-Ekir,Bahrain","College of Administrative Sciences Applied Science University (ASU), East Al-Ekir, Bahrain"],"raw_orcid":"https://orcid.org/0000-0002-9103-9802","affiliations":[{"raw_affiliation_string":"College of Administrative Sciences Applied Science University (ASU),East Al-Ekir,Bahrain","institution_ids":["https://openalex.org/I4210163116"]},{"raw_affiliation_string":"College of Administrative Sciences Applied Science University (ASU), East Al-Ekir, Bahrain","institution_ids":["https://openalex.org/I4210163116"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5038488165","display_name":"Ibrahim A. Abu-AlSondos","orcid":"https://orcid.org/0000-0003-2530-6009"},"institutions":[{"id":"https://openalex.org/I91600406","display_name":"American University in the Emirates","ror":"https://ror.org/056c6h780","country_code":"AE","type":"education","lineage":["https://openalex.org/I91600406"]}],"countries":["AE"],"is_corresponding":false,"raw_author_name":"Ibrahim A. Abu-AlSondos","raw_affiliation_strings":["American University in the Emirates,Department of IT Management,Dubai,UAE","Department of IT Management, American University in the Emirates, Dubai, UAE"],"raw_orcid":"https://orcid.org/0000-0003-2530-6009","affiliations":[{"raw_affiliation_string":"American University in the Emirates,Department of IT Management,Dubai,UAE","institution_ids":["https://openalex.org/I91600406"]},{"raw_affiliation_string":"Department of IT Management, American University in the Emirates, Dubai, UAE","institution_ids":["https://openalex.org/I91600406"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5066461201","display_name":"Laiali Almazaydeh","orcid":null},"institutions":[{"id":"https://openalex.org/I91600406","display_name":"American University in the Emirates","ror":"https://ror.org/056c6h780","country_code":"AE","type":"education","lineage":["https://openalex.org/I91600406"]}],"countries":["AE"],"is_corresponding":false,"raw_author_name":"Laiali Almazaydeh","raw_affiliation_strings":["College of Computer IT American University in the Emirates,Dubai,UAE","College of Computer IT American University in the Emirates, Dubai, UAE"],"raw_orcid":"https://orcid.org/0000-0003-4266-1758","affiliations":[{"raw_affiliation_string":"College of Computer IT American University in the Emirates,Dubai,UAE","institution_ids":["https://openalex.org/I91600406"]},{"raw_affiliation_string":"College of Computer IT American University in the Emirates, Dubai, UAE","institution_ids":["https://openalex.org/I91600406"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5098751899","display_name":"Ibrahim Ali Alnajjar","orcid":"https://orcid.org/0000-0002-2242-407X"},"institutions":[{"id":"https://openalex.org/I91600406","display_name":"American University in the Emirates","ror":"https://ror.org/056c6h780","country_code":"AE","type":"education","lineage":["https://openalex.org/I91600406"]}],"countries":["AE"],"is_corresponding":false,"raw_author_name":"Ibrahim Ali Alnajjar","raw_affiliation_strings":["American University in the Emirates,Department of Computer Science,Dubai,UAE","Department of Computer Science, American University in the Emirates, Dubai, UAE"],"raw_orcid":"https://orcid.org/0000-0002-2242-407X","affiliations":[{"raw_affiliation_string":"American University in the Emirates,Department of Computer Science,Dubai,UAE","institution_ids":["https://openalex.org/I91600406"]},{"raw_affiliation_string":"Department of Computer Science, American University in the Emirates, Dubai, UAE","institution_ids":["https://openalex.org/I91600406"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5014063002","display_name":"Alaa S. Mushtaha","orcid":"https://orcid.org/0000-0003-1073-7666"},"institutions":[{"id":"https://openalex.org/I91600406","display_name":"American University in the Emirates","ror":"https://ror.org/056c6h780","country_code":"AE","type":"education","lineage":["https://openalex.org/I91600406"]}],"countries":["AE"],"is_corresponding":false,"raw_author_name":"Alaa S. Mushtaha","raw_affiliation_strings":["American University in the Emirates,Healthcare Management,Dubai,UAE","Healthcare Management, American University in the Emirates, Dubai, UAE"],"raw_orcid":"https://orcid.org/0000-0003-1073-7666","affiliations":[{"raw_affiliation_string":"American University in the Emirates,Healthcare Management,Dubai,UAE","institution_ids":["https://openalex.org/I91600406"]},{"raw_affiliation_string":"Healthcare Management, American University in the Emirates, Dubai, UAE","institution_ids":["https://openalex.org/I91600406"]}]}],"institutions":[],"countries_distinct_count":2,"institutions_distinct_count":6,"corresponding_author_ids":["https://openalex.org/A5050853715"],"corresponding_institution_ids":["https://openalex.org/I4210163116"],"apc_list":null,"apc_paid":null,"fwci":11.6112,"has_fulltext":false,"cited_by_count":16,"citation_normalized_percentile":{"value":0.98367399,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":98,"max":99},"biblio":{"volume":null,"issue":null,"first_page":"1","last_page":"5"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10734","display_name":"Information and Cyber Security","score":0.9937999844551086,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10734","display_name":"Information and Cyber Security","score":0.9937999844551086,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11891","display_name":"Big Data and Business Intelligence","score":0.9496999979019165,"subfield":{"id":"https://openalex.org/subfields/1404","display_name":"Management Information Systems"},"field":{"id":"https://openalex.org/fields/14","display_name":"Business, Management and Accounting"},"domain":{"id":"https://openalex.org/domains/2","display_name":"Social Sciences"}},{"id":"https://openalex.org/T10430","display_name":"Software Engineering Techniques and Practices","score":0.9369999766349792,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/exploit","display_name":"Exploit","score":0.8992596864700317},{"id":"https://openalex.org/keywords/sophistication","display_name":"Sophistication","score":0.8195421099662781},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.689379096031189},{"id":"https://openalex.org/keywords/security-information-and-event-management","display_name":"Security information and event management","score":0.6036913394927979},{"id":"https://openalex.org/keywords/information-security","display_name":"Information security","score":0.5866403579711914},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.5724919438362122},{"id":"https://openalex.org/keywords/security-awareness","display_name":"Security awareness","score":0.5316736102104187},{"id":"https://openalex.org/keywords/information-security-management","display_name":"Information security management","score":0.4508048892021179},{"id":"https://openalex.org/keywords/security-management","display_name":"Security management","score":0.44527560472488403},{"id":"https://openalex.org/keywords/certified-information-security-manager","display_name":"Certified Information Security Manager","score":0.41205528378486633},{"id":"https://openalex.org/keywords/knowledge-management","display_name":"Knowledge management","score":0.3910316228866577},{"id":"https://openalex.org/keywords/cloud-computing-security","display_name":"Cloud computing security","score":0.3543444871902466},{"id":"https://openalex.org/keywords/security-service","display_name":"Security service","score":0.3352373540401459},{"id":"https://openalex.org/keywords/network-security-policy","display_name":"Network security policy","score":0.13827508687973022},{"id":"https://openalex.org/keywords/cloud-computing","display_name":"Cloud computing","score":0.08262795209884644}],"concepts":[{"id":"https://openalex.org/C165696696","wikidata":"https://www.wikidata.org/wiki/Q11287","display_name":"Exploit","level":2,"score":0.8992596864700317},{"id":"https://openalex.org/C168725872","wikidata":"https://www.wikidata.org/wiki/Q991663","display_name":"Sophistication","level":2,"score":0.8195421099662781},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.689379096031189},{"id":"https://openalex.org/C103377522","wikidata":"https://www.wikidata.org/wiki/Q3493999","display_name":"Security information and event management","level":4,"score":0.6036913394927979},{"id":"https://openalex.org/C527648132","wikidata":"https://www.wikidata.org/wiki/Q189900","display_name":"Information security","level":2,"score":0.5866403579711914},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.5724919438362122},{"id":"https://openalex.org/C2778652015","wikidata":"https://www.wikidata.org/wiki/Q7445019","display_name":"Security awareness","level":3,"score":0.5316736102104187},{"id":"https://openalex.org/C148976360","wikidata":"https://www.wikidata.org/wiki/Q1662500","display_name":"Information security management","level":5,"score":0.4508048892021179},{"id":"https://openalex.org/C83163435","wikidata":"https://www.wikidata.org/wiki/Q3954104","display_name":"Security management","level":2,"score":0.44527560472488403},{"id":"https://openalex.org/C180823521","wikidata":"https://www.wikidata.org/wiki/Q1662502","display_name":"Certified Information Security Manager","level":5,"score":0.41205528378486633},{"id":"https://openalex.org/C56739046","wikidata":"https://www.wikidata.org/wiki/Q192060","display_name":"Knowledge management","level":1,"score":0.3910316228866577},{"id":"https://openalex.org/C184842701","wikidata":"https://www.wikidata.org/wiki/Q370563","display_name":"Cloud computing security","level":3,"score":0.3543444871902466},{"id":"https://openalex.org/C29983905","wikidata":"https://www.wikidata.org/wiki/Q7445066","display_name":"Security service","level":3,"score":0.3352373540401459},{"id":"https://openalex.org/C117110713","wikidata":"https://www.wikidata.org/wiki/Q3394676","display_name":"Network security policy","level":4,"score":0.13827508687973022},{"id":"https://openalex.org/C79974875","wikidata":"https://www.wikidata.org/wiki/Q483639","display_name":"Cloud computing","level":2,"score":0.08262795209884644},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.0},{"id":"https://openalex.org/C36289849","wikidata":"https://www.wikidata.org/wiki/Q34749","display_name":"Social science","level":1,"score":0.0},{"id":"https://openalex.org/C144024400","wikidata":"https://www.wikidata.org/wiki/Q21201","display_name":"Sociology","level":0,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/iccr61006.2024.10533019","is_oa":false,"landing_page_url":"https://doi.org/10.1109/iccr61006.2024.10533019","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2024 2nd International Conference on Cyber Resilience (ICCR)","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":20,"referenced_works":["https://openalex.org/W1592063330","https://openalex.org/W1974589221","https://openalex.org/W2002356434","https://openalex.org/W2007996913","https://openalex.org/W2096873487","https://openalex.org/W3130705826","https://openalex.org/W3189575599","https://openalex.org/W4200290088","https://openalex.org/W4200345185","https://openalex.org/W4221013725","https://openalex.org/W4280631684","https://openalex.org/W4309791483","https://openalex.org/W4376605986","https://openalex.org/W4377942743","https://openalex.org/W4385401161","https://openalex.org/W4385973888","https://openalex.org/W4386015095","https://openalex.org/W4386033194","https://openalex.org/W4387732878","https://openalex.org/W7019968700"],"related_works":["https://openalex.org/W4256374004","https://openalex.org/W4310892428","https://openalex.org/W2056794087","https://openalex.org/W2777401565","https://openalex.org/W2362334938","https://openalex.org/W2120971814","https://openalex.org/W1557523735","https://openalex.org/W2384723023","https://openalex.org/W3048948897","https://openalex.org/W330653092"],"abstract_inverted_index":{"Enhancing":[0],"information":[1,35,57,158],"security":[2,58,64,79,117,144,159],"has":[3],"become":[4,19],"a":[5,30,109,132,138],"necessary":[6,169],"and":[7,16,40,91,125,167],"comprehensive":[8,151],"cybersecurity":[9,104],"mission.":[10],"In":[11],"today's":[12],"landscape,":[13],"operating":[14],"systems":[15],"software":[17],"have":[18],"more":[20],"secure,":[21],"leading":[22],"attackers":[23],"to":[24,32,48,77,99,115,170],"exploit":[25,73],"the":[26,38,50,53,85,165],"human":[27,54,74,97],"element":[28],"as":[29],"means":[31],"breach":[33],"organizational":[34],"systems.":[36],"As":[37],"frequency":[39],"sophistication":[41],"of":[42,52,87,103,134],"cyber-attacks":[43],"targeting":[44],"unsuspecting":[45],"personnel":[46],"continue":[47],"rise,":[49],"significance":[51],"factor":[55],"in":[56,68,142],"management":[59],"cannot":[60],"be":[61],"understated.":[62],"Effective":[63],"awareness":[65,145],"is":[66],"crucial":[67],"countering":[69],"these":[70],"attacks":[71],"that":[72,131],"vulnerabilities,":[75],"aiming":[76],"mitigate":[78],"risks.":[80],"This":[81],"study":[82],"focuses":[83],"on":[84],"development":[86],"an":[88],"interdisciplinary":[89],"training":[90,121,152],"educational":[92],"model":[93],"specifically":[94],"designed":[95],"for":[96],"resources":[98],"elevate":[100],"their":[101,157],"understanding":[102],"protocols.":[105],"The":[106,128],"research":[107],"proposes":[108],"professional":[110],"framework":[111],"encompassing":[112],"various":[113],"methodologies":[114],"heighten":[116],"awareness,":[118],"including":[119],"online":[120],"materials,":[122],"contextual":[123],"training,":[124],"embedded":[126],"training.":[127],"findings":[129],"reveal":[130],"combination":[133],"delivery":[135],"methods":[136],"outperforms":[137],"singular":[139],"approach,":[140],"resulting":[141],"heightened":[143],"among":[146],"individuals.":[147],"Through":[148],"implementing":[149],"this":[150],"model,":[153],"organizations":[154],"can":[155],"bolster":[156],"posture":[160],"by":[161],"empowering":[162],"employees":[163],"with":[164],"knowledge":[166],"skills":[168],"effectively":[171],"combat":[172],"evolving":[173],"cyber":[174],"threats.":[175]},"counts_by_year":[{"year":2025,"cited_by_count":7},{"year":2024,"cited_by_count":9}],"updated_date":"2026-05-10T08:33:47.465468","created_date":"2025-10-10T00:00:00"}
