Modern human existence is intertwined with many technological infrastructures and such digital transformation has enabled organizations to be more competitive and efficient. However, data privacy and cybersecurity has emerged as a key challenge for organizations in their pursuit of digital transformation. The development of tools, approaches, and algorithms to safeguard technology infrastructures has received a lot of attention. Furthermore, several cyber-attack investigations have revealed that the human component is the most important factor, to ensure data privacy and cybersecurity of digital transformation ecosystem.
The aim of this Research Topic is to publish high quality original research contributions on theoretical foundations and empirical studies of data privacy and cybersecurity implications of digital transformations. The collection will be interesting for technology professionals, businesses, policy makers and governments to secure their digital transformation initiatives.
Topics of interest include but are not limited to:
• Human Security Factors • User-centric approach in Digital Transformation • Personal Data Privacy and Security • User Experience, Usability, and Cybersecurity Implications • Social Theories of Privacy • Psychology of Social Engineering • Risk Perception and Communication During Cyberattack • Cybersecurity Challenges in Quantum Computing Era • Zero Trust Architecture and Organizational Implications • Application of Machine Learning and AI for Organizational Cybersecurity • Cyber Threat Knowledge Sharing • Cybersecurity Policy Issues • Organizational Readiness for Cybersecurity Challenges • Case studies relating to Cybersecurity implications in digital transformation. • Social, Ethical and Legal Issues related to Cybersecurity in Digital transformation. • Cybersecurity and Citizen engagement • Cybersecurity and Cultural Implications
This Research Topic is related to "Digital Transformation and Cybersecurity Challenges," curated by the same Topic Editors:
This Research Topic accepts the following article types, unless otherwise specified in the Research Topic description:
Brief Research Report
Conceptual Analysis
Curriculum, Instruction, and Pedagogy
Data Report
Editorial
FAIR² Data
FAIR² DATA Direct Submission
General Commentary
Hypothesis and Theory
Articles that are accepted for publication by our external editors following rigorous peer review incur a publishing fee charged to Authors, institutions, or funders.
Article types
This Research Topic accepts the following article types, unless otherwise specified in the Research Topic description:
Brief Research Report
Conceptual Analysis
Curriculum, Instruction, and Pedagogy
Data Report
Editorial
FAIR² Data
FAIR² DATA Direct Submission
General Commentary
Hypothesis and Theory
Methods
Mini Review
Opinion
Original Research
Perspective
Policy and Practice Reviews
Review
Systematic Review
Technology and Code
Keywords: Digital transformation, Cybersecurity, Zero Trust Architecture, Cyber Attacks, Vulnerabilities, Organizational Resilience, Data Privacy, Data Protection
Important note: All contributions to this Research Topic must be within the scope of the section and journal to which they are submitted, as defined in their mission statements. Frontiers reserves the right to guide an out-of-scope manuscript to a more suitable section or journal at any stage of peer review.