How we measure 'reads'
A 'read' is counted each time someone views a publication summary (such as the title, abstract, and list of authors), clicks on a figure, or views or downloads the full-text. Learn more
Citations since 2016
22 Research Items
Pierre-Luc Pomerleau holds a Ph.D. in Business Administration with a specialization in Homeland Security and Leadership Policy from Northcentral University. From 2020 to 2021, he was a post-doctoral researcher in the Evidence-Based Cybersecurity Group in the Criminal Justice and Criminology Department at Georgia State University.
Delves into modern era cyberattacks, which specifically target the financial sectors of the USA and Canada. Provides an understanding of the contemporary challenges faced by private security professionals in sharing timely cyber-related information in public-private partnerships. Presents policy recommendations on how to improve existing cybersecur...
Port security refers to security and law enforcement measures employed to safeguard port assets (vessels, harbors, facilities, cargos, employees, visitors) from natural and man-made threats, as well as from criminal activities.
Pomerleau, PL. (2019). Countering the cyber threats against financial institutions in Canada: A qualitative study of a private and public partnership approach to critical infrastructure protection (Order No. 27540959). Available from ProQuest Dissertations & Theses Global. (2320957957). Retrieved from https://www.proquest.com/products-services/pqdtglobal.html
Pomerleau PL., Auger-Perreault M. (2020) Fraud Risk Management: Using Fraud Analytics to Combat External and Insider Threats. In: Shapiro L., Maras MH. (eds) Encyclopedia of Security and Emergency Management. Springer, Cham. Retrieved from https://link.springer.com/referenceworkentry/10.1007/978-3-319-69891-5_296-1
This chapter seeks to explain money laundering activities through underground banking operations within the Canadian context while discussing the modus operandi of criminal organizations that employ casinos and real estate transactions to support these illegal activities.
The prevalence of cyber-dependent crimes and illegal activities that can only be performed using a computer, computer networks, or other forms of information communication technology has significantly increased during the last two decades in the USA and worldwide. As a result, cybersecurity scholars and practitioners have developed various tools an...
Collectively speaking, America’s financial institutions form the backbone of the global financial system—which is heavily reliant on information technology (IT) systems. These financial IT systems orchestrate virtually every aspect of financial operations—from executing billions of dollars in daily transactions to generating financial audit reports...
Drawing on key elements of the study findings, this chapter includes the implications that expand on the interpretations of the findings by providing thematic alignment and comparison with the previous literature on this topic. The analysis of the collected data rendered 12 major themes. The resulting data of this qualitative study included various...
This chapter contains the findings of the research conducted with Canadian security professionals working for financial institutions. The primary research focus was (a) to obtain information to understand better the challenges these private security professionals face in sharing information aimed at preventing cybersecurity incidents with the publi...
Throughout modern industrialized societies worldwide, we all find ourselves being surrounded by a wide array of internet-connected computing devices that are essentially “baked into” into any number of our everyday routines. These devices range from the glaring obvious—cell phones, computers/laptops/tablets, smart televisions, smart watches, and in...
This chapter provides an overview of the evolution of the threat landscape of financial institutions. Cyberattacks on financial institutions may have considerable economic, social, and environment impacts. Financial institutions security professionals and their teams are responsible for identifying and protecting their organization against cyberatt...
Throughout the existing literature on information sharing between public and private partnerships (PPPs), many contemporary authors define the basic premise of what specifically constitutes a public and private partnership. These partnerships exist as there is a common need among organizations to share information to prevent a wide variety of crimi...