Guarding the Gates: Exploring a Theological–Philosophical Framework for Cybersecurity and Spiritual Discernment in the Digital Age
Abstract
1. Introduction
2. Statement of the Problem
3. Significance, Importance, and Novelty of the Inquiry
4. Materials and Methods
5. Discussion
5.1. The Intersection of Technology, Human Nature, and Ethics
5.1.1. Technology
5.1.2. Human Nature
5.1.3. Ethics
5.2. Cyberattacks on Faith-Based and NGO Institutions (2024–2025)
- Faith-based organizations and charitable entities remain high-risk targets for cybercrime, with threat levels officially classified as “elevated” since July 2025. National bodies overseeing this sector have advocated for increased vigilance in light of the persistent occurrence of ransomware, phishing, doxing, and similar threats (Office of Intelligence and Analysis, 2025). Global conflicts and domestic extremist activities have increased these risks.
- Faith-based organizations can present attractive targets for perpetrators (Cybersecurity and Infrastructure Security Agency, 2023; Office of Intelligence and Analysis, 2025) due to their limited security measures, high-trust cultures, the availability of the information they collect, and their reliance on volunteers. Recent reports indicate that social engineering, email intrusion, and ransomware are particularly prevalent, utilizing insider threats and digital fundraising platforms as entry points (Burton, 2025; Verizon, 2023).
5.3. Recent High-Profile Incidents Involving Faith-Based and Non-Governmental Organizations
- A prominent Catholic publisher, Relentless Church, and the Church of Jesus Christ of Latter-day Saints experienced cyberattacks resulting in the exposure of critical information about members and personnel (The Church of Jesus Christ of Latter-day Saints, 2022).
- A sophisticated cyberattack on the International Committee of the Red Cross (ICRC) in 2022 compromised the personal information of more than 500,000 individuals who depended on its humanitarian services, demonstrating that not even globally esteemed faith-based non-governmental organizations (NGOs) are impervious to such threats (International Committee of the Red Cross, 2022).
- Manifestos and explicit threats targeting individual churches, such as a July 2025 event in Boise, Idaho (Gryder, 2025), underscore a connection between physical and cyber threats, which are frequently driven by ideological motives, with pre-incident indicators prompting law enforcement apprehension.
5.4. Sector-Wide Observations
- Email compromise, the primary attack vector for faith-based and charitable groups, has intensified because of the increased use of digital fundraising tools and platforms (Cyber Command, n.d.).
- From 2024 to 2025, the global incidence of ransomware attacks increased by more than 120%, with churches, ministries, and Christian publications increasingly facing ransom demands, operational disruptions, and data loss (Firch, 2025).
- Nation-state and hacktivist activity is also a concern, for pro-Iranian and other state-affiliated forces, as well as ideologically driven domestic radicals have targeted Jewish, Christian, and Islamic organizations amid the ongoing geopolitical crises.
5.5. International Perspective
- Cybersecurity threats are increasingly globalized, with incidents recorded in North America, Europe, Asia, and the Middle East, particularly in the United States, Switzerland, the Vatican, and Israel, including attacks on humanitarian organizations.
- The NGO sector lags in preparedness; thus, 56% of NGOs lack a cybersecurity budget, and around 70% are unprepared to address substantial cyber incidents (CyberPeace Institute, 2024). The tendency for small Christian communities to use donated or outdated equipment and shared or insecure passwords increases their vulnerability.
5.6. Relevant Theories and Conceptual Frameworks
- Erving Goffman’s dramaturgical theory likens social life to a theatrical performance wherein individuals perform roles to influence the perceptions of others (Smith, 2016). The “frontstage” refers to public conduct that conforms to cultural expectations, whereas the “backstage” reveals concealed intentions and preparations. For Goffman, identity is malleable and adaptable to social settings (Smith, 2016). In cybersecurity, this concept refers to the techniques employed by hackers to create convincing digital communications, such as phishing emails or romance scams, to exploit victims. The precise identities of the perpetrators remain concealed while they conspire in clandestine forums, crafting narratives and utilizing psychological manipulation covertly. This behavior parallels that of biblical heroes such as Jacob, who plotted covertly before public action. Goffman’s paradigm underscores the performative nature of cyber deception, thereby augmenting the contrast between biblical and contemporary acts of dishonesty.
- Interpersonal deception theory (IDT) highlights the fluidity of deception in speech, paralleling biblical accounts that feature conversational trickery (e.g., the serpent and Eve). This amalgamation of interpersonal communication and deception theories provides a comprehensive awareness of deception in interactive contexts (Buller & Burgoon, 1996). In cybersecurity, IDT denotes subversive strategies employed by cyberattackers, such as phishing and social engineering. Establishing these links can enhance the sophistication and precision of cybersecurity analogies. Thomas and Biros (2020) showed that it is feasible to differentiate between truthful and dishonest conduct, with behavioral patterns emerging over time.
- Moral disengagement (Bandura, 1990) elucidates how individuals rationalize unethical conduct, making it especially pertinent to insider threats and ethical violations in cybersecurity. This concept aligns with biblical teachings on the justification of sin, thereby enhancing the theoretical complexity of the discourse on “guarding the gates.”Trust theories facilitate the systematic comprehension of the components of trust, namely ability, kindness, and integrity (Schoorman et al., 1996), which are crucial in religious and cybersecurity contexts. In theology, reliance on divine character signifies dependence on moral purity, whereas in cybersecurity, trust regulates access, authentication, and risk management. These characteristics reveal weaknesses in human and system interactions and underscore the need for reliable conduct and frameworks. Because trust theory facilitates the evaluation of the trustworthiness of entities, whether divine, human, or digital, it is a practical framework for addressing deceit, identity verification, and ethical congruence in spiritual and technological contexts.The following discussion delineates some parallels between biblical narratives and cybersecurity.
5.7. Limitations
- Christian Paradigm Exclusivity. The study is primarily anchored in Christian theology, which may limit its universal applicability. Limited engagement with non-Christian or secular ethical frameworks may not reveal unique and convergent dynamics in cyber-ethical stewardship that could address cross-cultural generalizability.
- Theological Diversity and Intra-Faith Disputes. Christian denominations and communities differ on many theological, ethical, and interpretive issues. The BFCy Model may not yet fully account for these internal distinctions or disagreements about scriptural application in digital contexts.
- Empirical, Quantitative Validation. The effectiveness of the Biblically Framed Cybersecurity (BFCy) Model in changing behaviors or reducing risk remains unquantified and thus open to further validation. Limitations exist regarding the operationalization of the model.
- Scriptural Analogy. While drawing analogies between biblical narratives and modern cyber threats provides rich theological resonance, it may oversimplify the technical complexities of cybersecurity, necessitating a deeper critical-technical analysis in parallel.
- Organizational Scale and Context. There are limitations in rigorously addressing variations in organizational size, structure, or resources, which could significantly affect the adoption and impact of the current model.
- Consideration for Legal and Regulatory Divergence. Specific legal mandates (e.g., GDPR, HIPAA, or region-specific data privacy regulations) may pose practical challenges for faith-based organizations operating in varied jurisdictions.
- Evolving Threat Vectors and Technological Adaptability. Scriptural principles were not the specific focus in terms of agility in responding to new classes of attack (e.g., polymorphic malware, AI-enabled threats).
- Exploration of Human Factors Outside Theological Context. The study is limited in its consideration of the psychological, cognitive, or social factors that could significantly enhance understanding of cybersecurity behaviors beyond spiritual examination.
- Intersectionality of Diverse Religious Communities. The distinct hazards, resource limitations, and socio-political vulnerabilities encountered by marginalized, minority, or persecuted religious groups in cyberspace are limited in their scrutiny.
- Systematic Framework for Execution and Evaluation. Organizations would need to customize a formal, iterative procedure for assessing the progress, outcomes, and ongoing enhancement of the BFCy Model in organizational practice.
- Key takeaways of this section reveal that faith-based and NGO institutions face a highly intensified and evolving cyber threat landscape, mainly due to resource constraints, high-trust environments, and underdeveloped digital defenses. Theologically rooted models stress that cybersecurity is not merely a technical or professional duty but also a profound moral imperative governed by divine command and the cultivation of virtuous character traits. Psychological manipulation and social engineering tactics are used to exploit organizational structures and individual trust, echoing biblical narratives and sociological frameworks. However, current research is bound by notable limitations, including its exclusive focus on Christian paradigms, absence of broad empirical validation, and insufficient accommodation of organizational, legal, and cross-cultural complexities. This underscores the need for interdisciplinary inquiry and continuous adaptation of ethical and practical frameworks in the realm of digital security.
6. Results
6.1. Cybersecurity Threats and Controls Analogous to Biblical Themes
6.1.1. Biblical Narrative 1: The Temptation and the Fall
- Text: Genesis 3:13. “Then the Lord God said to the woman, ‘What is this you have done?’ The woman said, ‘The serpent deceived me, and I ate.”
- Event: Eve succumbs to the serpent’s attack and is led to defy God’s order
- Social Engineering and Deception:
- 𝚘
- Cyber Relevance. Eve’s succumbing to the serpent’s attack allows for a damaging compromise of humanity (the Fall). The Fall is analogous to social engineering: an attacker (the serpent) uses trust and curiosity to drive behavior.
- 𝚘
- Data-backed Insight. Social engineering attacks have been among the most common causes of non-insider data breaches, accounting for 53% of such incidents (Ponemon Institute, 2023).
- 𝚘
- Critical Synthesis. In Genesis, the serpent convinces Eve to eat from the forbidden tree by questioning her comprehension of God’s order and offering her hidden knowledge. Persuasion, false promises, and manipulation also entice Eve. The sin (failure), loss of innocence, and awareness of Eve’s and Adam’s vulnerability have momentous consequences (Genesis 3:13). This account is a timeless example of psychological manipulation, with the assailant exploiting curiosity, trust, and the need for empowerment. Today’s attackers employ many of the tactics used throughout the ages, so a coordinated response to malicious activity is still needed (Burton, 2024). Cyber attackers deceive victims by convincing them to violate established norms that help ensure safety, security, resilience, and strategic survivability. In like manner, Adam and Eve realize their mistake too late and attempt to conceal their wrongdoing once they become aware of their mistake. Employees are expected to operate according to established conventions communicated through managerial, administrative, and technical controls, and thus are required to report errors, when necessary, rather than hiding them (Jones, 2024). However, as the experience in the Garden of Eden shows, it is not inconceivable or even uncommon for human curiosity to prevail over expectations.
6.1.2. Biblical Narrative 2: Guard Your Heart
- Text: Proverbs 4:23. “Above all else, guard your heart, for everything you do flows from it.”
- Event: The exhortation to diligently guard one’s heart.
- Vigilance and Access:
- 𝚘
- Cyber Relevance. When protecting the body, protection of the heart is the most vital task because it is the foundation of everything that defines life. The heart is central to sustaining life. In cybersecurity, controlling access is crucial because organizations must persistently defend the core of their operations and valuable assets, as their status influences the overall integrity of the system.
- 𝚘
- Data-backed Insight. Eighty-four percent of organizations have experienced an identity-related breach, and 96% believe that these breaches could have been prevented with better identity-focused security measures (Identity Defined Security Alliance, 2023).
- 𝚘
- Critical Synthesis. Guarding the heart involves being mindful of what individuals allow into their minds and what influences their inner selves. Likewise, who or what is provided with access to a network directly influences its condition and assurance. Like a fundamental tenet of security design, Proverbs 4:23 emphasizes proactive protection. Those with authorized access who are entrusted with elevated privileges may make mistakes or abuse trust. In addition, workers often inadvertently provide credentials to attackers owing to a lack of awareness or verification (Hadlington, 2018; Nobles & Burrell, 2024; Triplett, 2022), thereby giving assailants access to parts or all of an organization’s network. Systems must be constructed with the defense-in-depth security strategy to safeguard the core from unauthorized access. A single data breach can lead to a 7.5% decline in customer trust and brand reputation (Harvard Business Review, 2023; IBM Security, 2023), with recovery taking years (Roering, 2014). Just as protecting the heart is important for an individual’s spirit and morals, protecting identity and access systems is key to strong cybersecurity. Breaches often happen because access controls are ignored, while being careful at the center stops large-scale digital problems. Activities such as following prescribed policies and guidance, seeking clarification, and maintaining cybersecurity awareness mimic the biblical call to spiritual vigilance.
6.1.3. Biblical Narrative 3: Jacob Imitating Esau
- Text: Genesis 27:1. “When Isaac was old and his eyes were so weak that he could no longer see, he called for Esau, his older son, and said to him, ‘My son.’ ‘Here I am,’ he answered.”
- Event: Jacob uses disguise (imposter risk) and manipulation (trickery) to receive his father’s blessing, which is intended for his brother, Esau.
- Identity Theft, Impersonation and Scams:
- 𝚘
- Cyber Relevance. Today’s cyber landscape is replete with methods for impersonating identities, including fake social media profiles, phishing attacks, business email compromise, deepfakes, spoofing, and synthetic (combining real and fake information) identity fraud. This kind of identity theft occurs when someone pretends to be someone else to scam individuals for their benefit.
- 𝚘
- Data-backed Insight. Ninety-five percent of breaches have been attributed to human error (Mimecast, 2025).
- 𝚘
- Critical Synthesis. This incident highlights the dangers and magnitude of loss associated with inadequately verifying an identity. Jacob is able to scam his father, Isaac, because Isaac’s eyesight (awareness) fails him. While Isaac touches Jacob’s hands and neck to ensure that he is blessing Esau (the rightful son, who is authorized to receive the blessing and whose skin is hairy), Isaac’s authentication process is thwarted by Jacob’s scam. In this situation, Jacob presents a false positive by covering himself with goat hair. The multi-factor authentication process fails as the first control (something known provides recognition on sight, a human factor), and the second control (a physical attribute, i.e., fake hairy skin) is not authentically validated but assumed so. Isaac is completely duped, and Jacob maliciously steals Esau’s blessing.
- 𝚘
- The application of this learning to cybersecurity illustrates the critical need for genuine authentication measures to avoid identity theft, impersonation, and scams. In the cybersecurity realm, credential theft incidents have averaged $679,621 per incident (Ponemon Institute, 2023). The goal of credential thieves is to steal users’ credentials, which provide access to critical data and information. Further, adverse insiders have accounted for an average of 6.2 incidents experienced between early 2022 and early to mid-2023, and the median cost for such incidents was calculated to be $701,500 (Ponemon Institute, 2023). The people, processes, and technologies of organizational systems can be exploited if confidence is gained without the use of proper controls.
6.1.4. Biblical Narrative 4: Judas as the Moneybag Keeper
- Text: John 12:6. “God made mankind upright, but they have gone in search of many schemes.”
- Event: Judas uses his role and access to help himself to funds in the communal bag.
- Insider Threat:
- 𝚘
- Cyber Relevance. As keeper of the money bag (also referred to as the money box), Judas is an insider threat. He operates inside the system deliberately, using his role-based access for personal gain.
- 𝚘
- Data-backed Insight. Sixty percent of security breaches involve insiders (IBM Security, 2023).
- 𝚘
- Critical Synthesis. Betrayal is conceivable even in close circles, and the legal dimensions of insider threats are vast and multidimensional (Jones & Burrell, 2025). Hence, zero-trust models are especially important. There is growing empirical evidence connecting the psychological profiles of internal and external threat actors to the so-called “dark triad” of personality traits, namely Machiavellianism, narcissism, and psychopathy (Ohu & Jones, 2025b). Just as Judas was the keeper of the money box, individuals entrusted with managing organizational assets can willfully misuse possessions and hide evidence of doing so. Insider threats involve people who work for an organization and have a propensity to engage in actions that expose or misuse information; thus, they pose serious challenges to contemporary businesses (Jones, 2024). Insiders are assigned credentials that allow access to assets, so their responsibilities can carry financial, operational, reputational, and other risks. Organizations must implement controls, checkpoints, and audit procedures to identify and prevent the adverse actions of insider threats.
- 𝚘
- The challenges posed by insider threats require responses that go beyond conventional, reactive cybersecurity measures (Jones, 2024). Integrating multidisciplinary insights from psychology, criminology, organization, and cybersecurity is a promising strategy for effectively identifying and mitigating these complex threats. As the keeper of the bag, Judas Iscariot can collect money, misinform about the status of that money, and help himself as desired. He can commit collusion and take advantage of the situation. In cybersecurity, these factors are significant for establishing a strong control environment (e.g., segregation of duties). No single individual should have excessive privileges or the ability to access various accounts, creating situations in which they can commit fraud, waste, and abuse, and then hide the evidence by exploiting the accounts. A notable recent insider threat to a religious organization involving financial malfeasance is the case of Joseph Meisch, the former business manager of St. Patrick’s Church in New Orleans. In September 2020, Meisch was charged with wire fraud after he embezzled more than $329,000 from church accounts. He used church credit cards for personal expenses and transferred church money to his personal bank accounts, abusing the trust the congregation had placed in him. This incident is reminiscent of the betrayal of Judas, in which a trusted member, Meisch, abuses his authority to gain personal advantage at the expense of the church. This incident underscores the fact that insider threats in religious organizations can cause moral and financial damages, paralleling those in secular organizations. Having well-documented processes and following efficient audit procedures can reduce the risk of collusion.
- 𝚘
- In some cases, malicious behaviors are reportable offenses that carry fines, penalties, and a reputational impact that can be financially incalculable. Insider threats make zero-trust architectures a necessity. Disinformation exemplifies how deceit works against governance. Limited privilege is essential to limit the negative consequences, in like manner as Eden’s walls safeguard purity. Accountability can involve audit logs and digital forensics that provide traceability and ethical stewardship in cyberspace.
6.1.5. Biblical Narrative 5: Misrepresented Truth
- Text: Proverbs 14:15. “God made mankind upright, but they have gone in search of many schemes.”
- Event: Disguising their appearance to seem harmless, the Gibeonites use misinformation and deception to exploit the trust of the Israelites.
- Data Integrity and Misinformation:
- 𝚘
- Cyber Relevance. Misinformation involves false information, and disinformation efforts, including data integrity issues, seem credible but are harmful. These activities use convincing deceptions to induce individuals to comply with threat actors’ desires.
- 𝚘
- Data-backed Insight. More than 70% of organizations report having been targeted by misinformation campaigns (World Economic Forum, 2022).
- 𝚘
- Critical Synthesis. The Israelites have a decree to eliminate the inhabitants from the land. Thus, the Gibeonites, who are their neighbors, wear old clothes and carry moldy bread to disguise themselves as travelers rather than inhabitants. The Israelites “believed every word” provided to them by the Gibeonites without scrutiny or divine consultation. Thus, the Gibeonites can trick (or spoof) the Israelites. The Gibeonites’ claims represent a layer of their breach strategy. Their deception mirrors the tactics of false prophets, manipulating appearances and words to bypass scrutiny and exploit trust. Just as the Israelites’ signs mislead the Israelites, modern cyber threats depend on social engineering and disinformation. The Bible warns against naivety and emphasizes discernment (Proverbs 14:15), a virtue reiterated in cybersecurity procedures such as validation, verification, and threat intelligence. False prophets, threat actors, and attackers in the cyber domain construct narratives of persuasion to exploit vulnerabilities. Matthew 7:15 warns, “Beware of false prophets, which come to you in sheep’s clothing, but inwardly they are ravening wolves.” Spiritual and digital discernment are thus equally vital to protecting the integrity of communities, whether sacred or virtual. The Bible warns against gullibility and emphasizes discernment and the capacity to evaluate life forces and establish the truth. Likewise, cybersecurity stresses threat intelligence, reputation checks, and validation to guard against misinformation, which can be detrimental depending on the vulnerability being exploited. From insider threats to state-sponsored attackers, misinformation can be used to deceive and act on malicious intent. False appearances and words lead to misguided promises, so exercising sound judgment is essential.
6.1.6. Biblical Narrative 6: The Tree of Knowledge
- Text: Genesis 2:16–17. “And the Lord God commanded the man, ‘You are free to eat from any tree in the garden, but you must not eat from the tree of the knowledge of good and evil, for when you eat from it you will certainly die.”
- Event: Adam and Eve are deceived into eating from the Tree of Knowledge and receive calamitous consequences.
- Principle of Least Privilege (PoLP):
- 𝚘
- Cyber Relevance. Overreach leads to systemic failure. Operating based on the PoLP is a safeguarding practice. In Genesis, the injunction against eating from the Tree of Knowledge establishes a boundary for maintaining things in balance. In cybersecurity, the PoLP is an echo of this establishment of a boundary: providing too much access increases threats, permits insider attacks, privilege misuse, and severe security violations.
- 𝚘
- Data-backed Insight. Eighty percent of breaches can be prevented by proper application of the PoLP (CyberArk, 2023).
- 𝚘
- Critical Synthesis. The PoLP is an important principle of security according to which users, programs, or systems should only be allowed to access the bare minimum of resources necessary for their purposes. The principle involves minimizing the risk of serious consequences from a security issue by making attacks difficult to achieve and preventing the spread of malware. By granting users and systems the minimum access that they need, organizations can minimize the risk of security intrusions resulting from breached accounts with extensive privileges. In a biblical context, this principle mirrors the restricted access granted in the Garden of Eden. For their own protection, Adam and Eve are instructed not to eat from the Tree of Knowledge (Genesis 2:16–17). They do not have “a need to know” specific information. However, because they are prime targets, they are deceived and give in to the opposition. The breach in the Garden of Eden changes the course of humanity’s earthly sustainability and its lifecycle. Limiting access serves as a safeguard against potential transgressions. The PoLP also applies to knowledge-sharing since information can be used maliciously. Judges 16:4–21 describes how Delilah uses social engineering tactics (trust and questioning) to discover the secret of Samson’s strength (i.e., his hair), ultimately gaining access to critical information and using it to compromise him. Ignoring such boundaries as the PoLP can lead to dire consequences. This story illustrates the importance of adhering to defined limits to maintain integrity and security. By connecting modern cybersecurity measures with timeless biblical principles, organizations can cultivate a culture of awareness and moral obligation.
6.1.7. Biblical Narrative 7: Review of Decisions and Actions
- Text: Revelation 20:12. “…and books were opened. Another book was opened, which is the Book of Life…. The dead were judged according to what they had done as recorded in the books.”
- Event: The final review of choices and actions in alignment with divine standards.
- Audit and Accountability:
- 𝚘
- Cyber Relevance. Revelation 20:12 reflects the cybersecurity principle of auditability and traceability, as systems log and examine activities for justice and accountability. Since no act is invisible to divine judgment, no privileged act in secure systems needs to be unrecorded or non-auditable. Record-keeping must be maintained through audit logs backed by immutable records.
- 𝚘
- Data-backed Insight. 279 companies (8%) revealed material deficiencies in their 2023/2024 annual reports out of 3502 total. Lack of documentation, rules, and processes; accounting resources or knowledge; IT/software/access concerns; segregation of duties/design controls; and insufficient disclosure controls were the top five problems causing major weaknesses.This indicates that one of the main underlying causes of material weaknesses, which are significant accountability issues, is insufficient documentation (i.e., poor record-keeping/audit trails) (The Corporate Counsel, 2025).
- 𝚘
- Critical Synthesis. Divine inquiry models ethical accountability in that all actions are traceable before God. Accordingly, there will come a time when acts performed are assessed for their integrity. Revelation 20:12 speaks of a final judgment according to a perfect record called the Book of Life. Modern cybersecurity controls utilize secure and immutable audit trails so that all actions are accounted for and traceable. This theme recurs in blockchain technology, zero-trust networks, and forensic logging in cybersecurity, where systems that do not forget maintaining accountability and trust. Transparency and accurate records are essential in domains to ensure that intent and action align and that repercussions follow from substantiated behavior, not just the appearance of implications. The Book of Life illustrates perfect traceability, being analogous to the need for tamper-proof logs that hold users and systems accountable for actions taken under their identities. In the domains of religion and the internet alike, genuine justice hinges on what is recorded rather than what is stated. The Book of Life exhibits impeccable tracking, as evidenced by the use of irreversible records that hold individuals and systems accountable for actions carried out in their name.
6.2. The Biblically Framed Cybersecurity (BFCy) Model
- Stewardship is reflected in the responsible management and safeguarding of digital assets and data.
- Vigilance is mirrored in proactive monitoring and defending against threats, echoing biblical admonitions to “watch and pray.”
- Integrity shapes policies around confidentiality and honest reporting of vulnerabilities, parallel to scriptural mandates for truthfulness and transparency.
6.3. Beyond Moral Exhortation
6.4. Cross-Mapping the BFCy Model
- The CIS Controls v8 comprises 18 distinct, actionable domains, including Secure Configuration, Access Control, Data Protection, and Security Awareness Training. Each domain corresponds to the practical requirements addressed in technological frameworks and faith-based ethics.
- The BFCy Model interprets activities such as least privilege, perimeter defense, and quick response as contemporary manifestations of the biblical imperatives to safeguard, discern, and restore.
- The BFCy Model and CIS framework highlight the importance of not only technical controls but also the transformation of corporate culture, training, and leadership.
- Other cybersecurity-related standards, such as the NIST’s CSF and the International Organization for Standardization’s ISO 27001:2022—Information Security, Cybersecurity, and Privacy Protection–Information Security Management Systems–Requirements, align well with the BFCy Model.
6.5. Actionable Insights
- explicitly define cybersecurity as a moral and spiritual obligation,
- incorporate biblical principles into daily technological policies, training, and operations,
- encourage a culture of vigilance, openness, and mutual support,
- enhance resilience against cyber threats, safeguarding digital assets and community confidence (Nobles, 2022),
- facilitate prompt and knowledgeable responses to incidents, incorporating mechanisms for reconciliation and learning after failures.
6.5.1. Establishing an Ethical and Spiritual Culture
6.5.2. Policy Development and Continuous Improvement
6.5.3. Secure Technical Controls
6.5.4. Cybersecurity Awareness Training
6.5.5. Incident Response Plan Evaluation
6.5.6. Collaborative Threat Intelligence Sharing
6.5.7. The BFCY Model and Emerging Threats
6.5.8. AI-Driven Assaults
6.5.9. Zero-Day Vulnerabilities
6.5.10. Quantum Computing
7. Conclusions
Funding
Data Availability Statement
Acknowledgments
Conflicts of Interest
References
- Adewole, S. A. (2024). Security and salvation: Exploring the unexpected parallels between cybersecurity and Christianity. Digital Security Insights. Available online: https://www.linkedin.com/pulse/security-salvation-exploring-unexpected-parallels-between-adewole-jrpzf/ (accessed on 24 April 2025).
- Alkhouri, K. I. (2024). Exploring the interplay of cybersecurity practices and religious psychological beliefs in the digital age. Theophany, 6, 25–52. [Google Scholar] [CrossRef]
- Aridi, A. S., Burrell, D. N., Finch, A., Burton, S. L., Quisenberry, W. L., Jones, L. A., Daryousef, M., Graf, D. G., Espinoza, M. D., & Mondala-Duncan, M. (2024). Coaching cybersecurity project managers and cybersecurity engineers. In Evolution of cross-sector cyber intelligent markets (pp. 356–377). IGI Global Scientific Publishing. [Google Scholar] [CrossRef]
- Bandura, A. (1990). Selective activation and disengagement of moral control. Journal of Social Issues, 46(1), 27–46. [Google Scholar] [CrossRef]
- Brehm, J. W. (1966). A theory of psychological reactance. Academic Press. [Google Scholar]
- Buller, D. B., & Burgoon, J. K. (1996). Interpersonal deception theory. Communication Theory, 6(3), 203–242. [Google Scholar] [CrossRef]
- Burrell, D. N. (2018). An exploration of the critical need for formal training in leadership for cybersecurity and technology management professionals. International Journal of Hyperconnectivity and the Internet of Things, 2(1), 52–67. [Google Scholar] [CrossRef]
- Burton, S. L. (2024). Cross-sector collaboration and information sharing: Intelligent cybersecurity markets. In Leadership action and intervention in health, business, education, and technology (pp. 197–221). IGI Global. [Google Scholar] [CrossRef]
- Burton, S. L. (2025). Digital saboteurs: Unmasking insider cybersecurity threats in aviation and aerospace. Law, Economics and Society, 1(2), 1. [Google Scholar] [CrossRef]
- Burton, S. L., Burrell, D. N., & Nobles, C. (2023). Adapting to the cyber-driven workforce: A battle for the discouraged worker. In Real-world solutions for diversity, strategic change, and organizational development: Perspectives in healthcare, education, business, and technology (pp. 130–152). IGI Global. [Google Scholar] [CrossRef]
- Burton, S. L., & Moore, P. D. (2024). Pig butchering in cybersecurity: A modern social engineering threat. SocioEconomic Challenges, 8(3), 46. [Google Scholar] [CrossRef]
- Buzguța, C. B. (2024). The morality of Christian love: A theological and ethical perspective. Scientia Moralitas: International Journal of Multidisciplinary Research, 9(2), 53–64. Available online: https://www.scientiamoralitas.com/index.php/sm/article/view/289 (accessed on 16 July 2025).
- Center for Internet Security. (2021). CIS critical security controls version 8. Available online: https://www.cisecurity.org/controls/cis-controls-list (accessed on 17 July 2025).
- CyberArk. (2023). CyberArk 2023 identity security threat landscape report. Available online: https://www.cyberark.com/resources/ebooks/cyberark-2023-identity-security-threat-landscape-report (accessed on 28 May 2025).
- Cyber Command. (n.d.). Understanding cybersecurity risks for nonprofits: The ultimate guide. Available online: https://cybercommand.com/cybersecurity-risk-for-nonprofit (accessed on 28 May 2025).
- CyberPeace Institute. (2023, December 7). NGOs serving humanity at risk: Cyber threats affecting “International Geneva”. CyberPeace Analytical Report. Available online: https://cyberpeaceinstitute.org/publications/cyberpeace-analytical-reportngos-serving-humanity-at-risk-cyber-threats-affecting-international-geneva/ (accessed on 7 July 2025).
- CyberPeace Institute. (2024, March 25). Cyber poor, target rich: The crucial role of cybersecurity in nonprofit organizations. Available online: https://cyberpeaceinstitute.org/news/cyber-poor-target-rich-the-crucial-role-of-cybersecurity-in-nonprofit-organizations (accessed on 7 July 2025).
- Cybersecurity and Infrastructure Security Agency. (2023). Mitigating attacks on houses of worship security guide. U.S. Department of Homeland Security. Available online: https://www.cisa.gov/resources-tools/resources/mitigating-attacks-houses-worship-security-guide (accessed on 17 June 2025).
- D’Arcy, J., Herath, T., & Shoss, M. K. (2014). Understanding employee responses to stressful information security requirements: A coping perspective. Journal of Management Information Systems, 31(2), 285–318. [Google Scholar] [CrossRef]
- D’Cruz, P., Du, S., Noronha, E., Praveen Parboteeah, K., Trittin-Ulbrich, H., & Whelan, G. (2022). Technology, megatrends and work: Thoughts on the future of business ethics. Journal of Business Ethics, 180, 879–902. [Google Scholar] [CrossRef]
- Department for Science, Innovation and Technology. (2025). Cyber security breaches survey 2025. U.K. Government. Available online: https://www.gov.uk/government/statistics/cyber-security-breaches-survey-2025/cyber-security-breaches-survey-2025 (accessed on 19 June 2025).
- Drucker, P. F. (1981). What is business ethics? The Public Interest, 63, 18–36. [Google Scholar]
- Firch, J. (2025, May 24). The average cost of ransomware attacks (Updated 2025). Purplesec. Available online: https://purplesec.us/learn/average-cost-of-ransomware-attacks/ (accessed on 28 May 2025).
- Gryder, M. (2025, July 9). FB-ISAO threat level statement update, 09 July 2025—Threat levels remain at elevated. FB-ISAO. Available online: https://faithbased-isao.org/faith-based-daily-awareness-post-10-july-2025/ (accessed on 21 July 2025).
- Hadlington, L. (2018). The “human factor” in cybersecurity: Exploring the accidental insider. In J. McAlaney, L. A. Frumkin, & V. Benson (Eds.), Psychological and behavioral examinations in cyber security (pp. 46–63). IGI Global. [Google Scholar] [CrossRef]
- Harvard Business Review. (2023, May 4). The devastating business impacts of a cyber breach. Available online: https://hbr.org/2023/05/the-devastating-business-impacts-of-a-cyber-breach (accessed on 19 June 2025).
- Hauerwas, S., & Pinches, C. (2022). Christians among the virtues: Theological conversations with ancient and modern ethics. University of Notre Dame Press. [Google Scholar]
- Hoffman, W. M., & Moore, J. M. (1982). What is business ethics? A reply to Peter Drucker. Journal of Business Ethics, 1(4), 293–300. [Google Scholar] [CrossRef]
- IBM Security. (2023, July 24). Cost of a data breach report 2023. Available online: https://newsroom.ibm.com/2023-07-24-IBM-Report-Half-of-Breached-Organizations-Unwilling-to-Increase-Security-Spend-Despite-Soaring-Breach-Costs (accessed on 19 June 2025).
- Identity Defined Security Alliance. (2023). 2023 trends in securing digital identities. Available online: https://www.idsalliance.org/research/ (accessed on 7 June 2025).
- International Committee of the Red Cross. (2022, January 19). Cyber-attack on ICRC: What we know. Available online: https://www.icrc.org/en/document/sophisticated-cyber-attack-targets-red-cross-red-crescent-data-500000-people (accessed on 12 May 2025).
- International Organization for Standardization. (2022). Information security, cybersecurity and privacy protection—Information security management systems—Requirements (ISO/IEC 27001:2022). ISO. Available online: https://www.iso.org/standard/82875.html (accessed on 4 May 2023).
- Jones, L. A. (2021). A content analysis review of literature to create a useable framework for reputation risk management. In Handbook of research on multidisciplinary perspectives on managerial and leadership psychology (pp. 91–133). IGI Global. [Google Scholar] [CrossRef]
- Jones, L. A. (2024). Unveiling human factors: Aligning facets of cybersecurity leadership, insider threats, and arsonist attributes to reduce cyber risk. SocioEconomic Challenges, 8(2), 44–63. [Google Scholar] [CrossRef]
- Jones, L. A., & Burrell, D. N. (2025). Illegal cybersecurity threats created by organizational arsonists in healthcare organizations. Law, Economics and Society, 1(1), 93. [Google Scholar] [CrossRef]
- Kure, H. I., Islam, S., & Mouratidis, H. (2022). An integrated cyber security risk management framework and risk prediction for the critical infrastructure protection. Neural Computing and Applications, 34(18), 15241–15271. [Google Scholar] [CrossRef]
- Kusuma, S. D., Saputra, S., Sugianto, E., & Parinussa, S. (2022, July). Using the Internet of Things to improve Christian ministry in the present era. In International conference on theology, humanities, and christian education (ICONTHCE 2021) (pp. 218–220). Atlantis Press. [Google Scholar] [CrossRef]
- Maurer, T., & Nelson, A. (2021). The global cyber threat. International Monetary Fund. Available online: https://www.imf.org/external/pubs/ft/fandd/2021/03/global-cyber-threat-to-financial-systems-maurer.htm (accessed on 9 May 2025).
- Máhrik, T., & Králik, R. (2024). Divine command theory–Potentiality and limits. Journal of Education, Culture and Society, 15(1), 19–28. [Google Scholar] [CrossRef]
- Mimecast. (2025). State of human risk 2025. Mimecast Limited. Available online: https://www.mimecast.com/resources/ebooks/state-of-human-risk-2025/ (accessed on 14 June 2025).
- Montero Orphanopoulos, C. (2025). Fundamental theological ethics “in exit”: New categories and interdisciplinary approaches to human social flourishing. Religions, 16(4), 448. [Google Scholar] [CrossRef]
- Moore, A. P., Cappelli, D. M., & Trzeciak, R. F. (2008). The “big picture” of insider IT sabotage across US critical infrastructures. In S. J. Stolfo, S. M. Bellovin, A. D. Keromytis, S. Hershkop, S. W. Smith, & S. Sinclair (Eds.), Insider attack and cyber security. Advances in information security (Vol. 39, pp. 17–52). Springer. [Google Scholar] [CrossRef]
- National Institute of Standards and Technology. (2024). The NIST cybersecurity framework (CSF) 2.0 (NIST Cybersecurity White Paper No. NIST.CSWP.29). U.S. Department of Commerce. [CrossRef]
- New International Version. (2011). The holy bible. Zondervan. Available online: www.biblegateway.com/versions/New-International-Version-NIV-Bible/ (accessed on 11 April 2025).
- New Jersey Cybersecurity and Communications Integration Cell. (n.d.). IoT device security and privacy. Available online: https://www.cyber.nj.gov/guidance-and-best-practices/device-security/iot-device-security-and-privacy (accessed on 30 May 2025).
- Nobles, C. (2022). Stress, burnout, and security fatigue in cybersecurity: A human factors problem. Holistica Journal of Business and Public Administration, 13(1), 49–72. [Google Scholar] [CrossRef]
- Nobles, C., & Burrell, D. (2024). Exploring the variability of human factors definitions in cybersecurity literature. MWAIS 2024 Proceedings, 28. Available online: https://aisel.aisnet.org/mwais2024/28 (accessed on 22 June 2025).
- Noonan, C. F. (2018). Spy the lie: Detecting malicious insiders. U.S. Department of Energy. Available online: https://irp.fas.org/eprint/noonan.pdf (accessed on 11 May 2025).
- Office of Intelligence and Analysis. (2025). Homeland threat assessment. U.S. Department of Homeland Security. Available online: https://www.dhs.gov/sites/default/files/2024-10/24_0930_ia_24-320-ia-publication-2025-hta-final-30sep24-508.pdf (accessed on 17 June 2025).
- Ohu, F. C., & Jones, L. A. (2025a). An examination of digital validation-seeking behaviors in adolescents as precursors to romance scamming. Scientia Moralitas, 10. Available online: https://scientiamoralitas.education/wp-content/uploads/2025/04/Scientia-Moralitas-Conference-Proceedings5.pdf (accessed on 11 July 2025).
- Ohu, F. C., & Jones, L. A. (2025b). Validation syndrome: The root of deception and developmental predictors of dark triad traits in adolescents for forensic and developmental psychology. International Educational Research, 8(2), 67. [Google Scholar] [CrossRef]
- Pattison-Gordon, J. (2022, November 15). “Data-rich, resources-poor”: CIS report targets gaps in K-12 cyber. Government Technology. Available online: https://www.govtech.com/security/data-rich-resources-poor-cis-report-targets-gaps-in-k-12-cyber (accessed on 6 May 2025).
- Paul, E., Callistus, O., Somtobe, O., Esther, T., Somto, K., Clement, O., & Ejimofor, I. (2023). Cybersecurity strategies for safeguarding customer’s data and preventing financial fraud in the United States financial sectors. International Journal on Soft Computing, 14(3), 1–16. [Google Scholar] [CrossRef]
- Petrosyan, A. (2022). Annual cybersecurity and cyber insurance spending worldwide from 2015 to 2020. Statista. Available online: https://www.statista.com/statistics/387868/it-cyber-securiy-budget/ (accessed on 6 June 2025).
- Petrosyan, A. (2023). Annual cost of cybercrime worldwide 2017–2028. Statista. Available online: https://www.statista.com/forecasts/1280009/cost-cybercrime-worldwide (accessed on 8 July 2025).
- Ponemon Institute. (2023). Cost of insider risks global report-2023. Available online: https://ponemonsullivanreport.com/2023/10/cost-of-insider-risks-global-report-2023 (accessed on 6 May 2025).
- Putri, F. F., & Hovav, A. (2014, June 9–11). Employees’ compliance with BYOD security policy: Insights from reactance, organizational justice, and protection motivation theory. European Conference on Information Systems (ECIS) 2014, Tel Aviv, Israel. Available online: http://aisel.aisnet.org/ecis2014/proceedings/track16/2 (accessed on 15 June 2025).
- Renaud, K., & Dupuis, M. (2023). Cybersecurity insights gleaned from world religions. Computers & Security, 132, 103326. [Google Scholar] [CrossRef]
- Reuters. (2025). FBI says cybercrime costs rose to at least $16 billion in 2024. Available online: https://www.reuters.com/world/us/fbi-says-cybercrime-costs-rose-least-16-billion-2024-2025-04-23/? (accessed on 30 June 2025).
- Roberts, R. (2023). Cybercrime and religious institutions: A wake-up call for the faithful. Carr, Riggs, & Ingram. Available online: https://www.criadv.com/insight/cybercrime-and-religious-institutions-a-wake-up-call-for-the-faithful/? (accessed on 15 June 2025).
- Roering, R. (2014, September 18). Keeping your customers and recovering your reputation after a data breach. Forbes. Available online: https://www.forbes.com/sites/symantec/2014/09/18/keeping-your-customers-and-recovering-your-reputation-after-a-data-breach/ (accessed on 15 June 2025).
- Russell, C. (2023). Virtue ethics. In A. Farazmand (Ed.), Global encyclopedia of public administration, public policy, and governance (pp. 13255–13260). Springer International Publishing. [Google Scholar] [CrossRef]
- Saeed, S., Jhanjhi, N. Z., Khan, M. A., & Yadav, D. K. (2025). Digital transformation and cybersecurity challenges. Frontiers in Computer Science, 7, 1631362. [Google Scholar] [CrossRef]
- Schoorman, F. D., Mayer, R. C., & Davis, J. H. (1996). Organizational trust: Philosophical perspectives and conceptual definitions. Academy of Management Review, 21(2), 337–340. [Google Scholar] [CrossRef]
- SC Media. (2024, October 7). Cyberattacks hit religious organizations. Available online: https://www.scworld.com/brief/cyberattacks-hit-religious-organizations (accessed on 12 May 2025).
- Shadbad, F. N. (2021). Understanding employee non-malicious intentional and unintentional information security misbehaviors [Unpublished doctoral dissertation]. Oklahoma State University.
- Smith, G. (2016). The dramaturgical legacy of Erving Goffman. In The drama of social life (pp. 57–72). Routledge. [Google Scholar]
- The Church of Jesus Christ of Latter-day Saints. (2022). Statement and FAQ on church account data incident. Newsroom. Available online: https://www.churchofjesuschrist.org/?lang=eng (accessed on 12 May 2025).
- The Corporate Counsel. (2025). Internal controls: Takeaways from 5 years of data on material weaknesses. The CorporateCounsel.net. Available online: https://www.thecorporatecounsel.net/blog/2025/04/internal-controls-takeaways-from-5-years-of-data-on-material-weaknesses.html (accessed on 30 July 2025).
- Thomas, B. Y., & Biros, D. P. (2020). An empirical evaluation of interpersonal deception theory in a real-world, high-stakes environment. Journal of Criminal Psychology, 10(3), 185–199. [Google Scholar] [CrossRef]
- Triplett, W. J. (2022). Addressing human factors in cybersecurity leadership. Journal of Cybersecurity and Privacy, 2(3), 573–586. [Google Scholar] [CrossRef]
- Troilo, G., De Luca, L. M., & Guenzi, P. (2017). Linking data–rich environments with service innovation in incumbent firms: A conceptual framework and research propositions. Journal of Product Innovation Management, 34(5), 617–639. [Google Scholar] [CrossRef]
- Verizon. (2023). 2023 data breach investigations report. Verizon Communications Inc. Available online: https://www.verizon.com/business/resources/reports/dbir/ (accessed on 12 May 2025).
- Wicklund, R. A. (2024). Freedom and reactance. Routledge. [Google Scholar]
- Wightman, S. C., & Shakhsheer, B. A. (2021). Informed decision-making: Knowing is not the same as doing. Journal of the American College of Surgeons, 233(4), 578–579. [Google Scholar] [CrossRef]
- World Economic Forum. (2022). Global cybersecurity outlook 2022. Available online: https://www.weforum.org/reports/global-cybersecurity-outlook-2022 (accessed on 12 May 2025).

| Statistic/Trend | Region | Year | Key Points |
|---|---|---|---|
| NGO: 70% of NGOs lack an established incident response program for cyberattacks program to address cyberattacks (CyberPeace Institute, 2024). | Switzerland/ Europe | 2023 | 73% of NGOs surveyed had insufficient recovery processes and limited dedicated budgets (CyberPeace Institute, 2024). |
| Nonprofit: Sixty-eight percent of nonprofits participating in the research have experienced a data breach in the past three years (CyberPeace Institute, 2024). | Global | 2024 | Nonprofits are exploited through cyberattacks and account for a significant portion of breaches (CyberPeace Institute, 2024). |
| Religious Institution: Cyberattacks on religious organizations have been “sharply rising” since 2020 (SC Media, 2024). | Global | 2023–2024 | High-profile breaches include those targeting the Vatican, churches in the United States, and Jewish educational sites (SC Media, 2024). |
| Faith-based Institution: Ransomware and hacking attacks directly targeting faith-based institutions, operations disrupted, donor/member data stolen (Gryder, 2025). | North America/ Europe | 2024–2025 | Churches, ministries, and humanitarian NGOs affected by incidents with data exposure and costly recovery (Gryder, 2025). |
| Biblical Narrative | Cybersecurity Threat and Control Analogy | |
|---|---|---|
| 1 | The Temptation and the Fall | Social Engineering and Deception |
| 2 | Guard Your Heart | Vigilance and Access |
| 3 | Jacob Imitating Esau | Identity Theft, Impersonation, and Scams |
| 4 | Judas as the Moneybag Keeper | Insider Threat |
| 5 | Misrepresented Truth | Data Integrity and Misinformation |
| 6 | The Tree of Knowledge | Principle of Least Privilege (PoLP) |
| 7 | Review of Decisions and Actions | Audit and Accountability |
| Scriptural Principle (BFCy) | Biblical Reference | Key CIS Control | Cybersecurity Practice/Intent | Alignment/Explanation |
|---|---|---|---|---|
| Stewardship & Accountability | Genesis 1:28; Luke 12:48 | Secure Configuration, Audit Log Management | Enforce responsible management of resources | Stewardship requires responsible oversight–configuring, auditing, and securing assets. |
| Watchfulness & Vigilance | Proverbs 4:23; Matthew 26:41 | Security Awareness Training, Monitoring, Continuous Vulnerability Management | Ongoing surveillance, training, and improvement | Scripture calls for watchfulness–mirrored by continual monitoring and vigilance against new threats. |
| Integrity & Honesty | Proverbs 10:9; Ephesians 4:25 | Access Control Management, Data Protection | Accurate authentication, honesty in reporting | The call for truthful action supports practices such as maintaining user integrity and sound authentication. |
| Justice & Equitable Protection | Micah 6:8; Exodus 23:6 | Data Protection, Incident Response | Fairness in incident response and recovery | Justice is the concept that systems and processes should offer fair protection and address harms promptly and transparently. |
| Redemption & Recovery | Psalm 51; Luke 15:11–32 | Data Recovery, Incident Response Management | Restoring lost data/operations after attacks | Redemption parallels cyber recovery in emphasizing restoration and improvement after a breach. |
| Trust but Verify | Proverbs 3:5; 1 John 4:1 | Account Management, Audit Log Management | Implement least privilege, verify activity | The Bible cautions against placing trust and wisely underpins “trust but verify” controls. |
| Community & Shared Responsibility | Acts 2:44–47; Romans 12:4–5 | Service Provider Management, User Education | Promote shared cyber hygiene, team accountability | Encourages collective vigilance and mutual accountability for the digital environment. |
| Task/Recommendation | Frequency | Responsible Party | Scriptural/Ethical Foundation |
|---|---|---|---|
| Establish an ethical and spiritual culture of digital stewardship (including regular affirmations and prayers for discernment and protection) | Quarterly, as scheduled | Pastor/Lead Team | 1 Corinthians 4:2; James 1:5; Matthew 6:13 (Spiritual Discipline) |
| Regularly review and update cybersecurity policies to reflect evolving threats and operational needs | Twice yearly | Leadership, IT, Trustees | Proverbs 10:9 (Integrity) |
| Maintain secure technical controls (strong passwords, multifactor authentication, access audits, timely patching and updates) | Ongoing | IT, System Administrator | Matt 24:43; Luke 16:10; Prov 27:12 (Vigilance, Alerting, Proactiveness) |
| Conduct routine cybersecurity awareness training for all staff and volunteers | Twice yearly | IT/Internal or External Partner | Proverbs 4:23 (Vigilance) |
| Test and evaluate incident response plans through simulated exercises | Annually | Leadership, IT | Galatians 6:1 (Restoration) |
| Actively share and receive relevant cyber threat intelligence within both internal teams and trusted external partners/networks | As needed/ appropriate | Pastor/IT/ Communications | Ecclesiastes 4:9–10 (Community) |
Disclaimer/Publisher’s Note: The statements, opinions and data contained in all publications are solely those of the individual author(s) and contributor(s) and not of MDPI and/or the editor(s). MDPI and/or the editor(s) disclaim responsibility for any injury to people or property resulting from any ideas, methods, instructions or products referred to in the content. |
© 2025 by the author. Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (https://creativecommons.org/licenses/by/4.0/).
Share and Cite
Jones, L.A. Guarding the Gates: Exploring a Theological–Philosophical Framework for Cybersecurity and Spiritual Discernment in the Digital Age. Businesses 2025, 5, 60. https://doi.org/10.3390/businesses5040060
Jones LA. Guarding the Gates: Exploring a Theological–Philosophical Framework for Cybersecurity and Spiritual Discernment in the Digital Age. Businesses. 2025; 5(4):60. https://doi.org/10.3390/businesses5040060
Chicago/Turabian StyleJones, Laura A. 2025. "Guarding the Gates: Exploring a Theological–Philosophical Framework for Cybersecurity and Spiritual Discernment in the Digital Age" Businesses 5, no. 4: 60. https://doi.org/10.3390/businesses5040060
APA StyleJones, L. A. (2025). Guarding the Gates: Exploring a Theological–Philosophical Framework for Cybersecurity and Spiritual Discernment in the Digital Age. Businesses, 5(4), 60. https://doi.org/10.3390/businesses5040060
