Greenberg, M., Cox, A., Bier, V., Lambert, J., Lowrie, K., North, W., Siegrist, M., & Wu, F. (2020). Risk analysis: Celebrating the accomplishments and embracing ongoing challenges. Risk Analysis: An Official Publication of the Society for Risk Analysis, 40(S1), 2113–2127. https://doi.org/10.1111/risa.13487 As part of the celebration of the 40th anniversary of the Society for Risk Analysis and Risk Analysis: An International Journal, this essay reviews the 10 most important accomplishments of risk analysis from 1980 to 2010, outlines major accomplishments in three major categories from 2011 to 2019, discusses how editors circulate authors' accomplishments and propose 10 major risk-related challenges for 2020-2030. Authors conclude that the next decade will severely test the field of risk analysis.
Mogadem, M. M., Li, Y., & Meheretie, D. L. (2021). A survey on internet of energy security: Related fields, challenges, threats and emerging technologies. Cluster Computing: The Journal of Networks, Software Tools and Applications, 1–37. https://doi.org/10.1007/s10586-021-03423-z This paper represents a survey related to the surrounding concerns and comparisons for IoE before and after involvement in such services as no survey covers the broad aspect of this topic, discussing its future research opportunities and the raised concern. The authors identify security as a significant centric topic that can be addressed with innovative approaches and solutions to secure our system through various approaches.
Myriam Dunn Cavelty, & Andreas Wenger. (2022). Cyber security politics: Cocio-technological transformations and political fragmentation: vol. 1 edition. Routledge. This book examines new and challenging political aspects of cyber security and presents it as an issue defined by socio-technological uncertainty and political fragmentation. Structured using two broad themes and providing empirical examples for how socio-technical changes and political responses interact, the first part of the book looks at the current use of cyberspace in conflictual settings, while the second focuses on political responses by state and non-state actors in an environment defined by uncertainties.
Rawat, D. B., Doku, R., & Garuba, M. (2021). Cybersecurity in big data era: From securing big data to data-driven security. IEEE Transactions on Services Computing, Services Computing, IEEE Transactions on, IEEE Trans. Serv. Comput, 14(6), 2055–2072. https://doi.org/10.1109/TSC.2019.2907247 In this journal article, the authors discuss how systems data has become an important feature in cybersecurity where the goal is to protect assets. Furthermore, the growing value of data has made big data a high-value target. In this paper, the authors explore recent research works in cybersecurity about big data, how big data is protected, and how big data can also be used as a tool for cybersecurity.