Results 71 to 80 of about 162,443 (304)

Is the well‐known phrase ‘small is beautiful’ true of small transnational education institutions?

open access: yesBritish Educational Research Journal, EarlyView.
Abstract The purpose of this research is to consider the potential attractiveness of operating a small international branch campus (IBC). Drawing upon resource‐based and legitimacy theories, we examine the strengths, weaknesses, opportunities and threats associated with the business model that is based on having a small institution size.
Stephen Wilkins, Joe Hazzam
wiley   +1 more source

On the use of watermark-based schemes to detect cyber-physical attacks

open access: yesEURASIP Journal on Information Security, 2017
We address security issues in cyber-physical systems (CPSs). We focus on the detection of attacks against cyber-physical systems. Attacks against these systems shall be handled both in terms of safety and security.
Jose Rubio-Hernan   +2 more
doaj   +1 more source

Digital Steganography and Watermarking for Digital Images: A Review of Current Research Directions

open access: yesIEEE Access, 2020
The development of information technology has led to a significant increase in the share of multimedia traffic in data networks. This has necessitated to solve the following information security tasks in relation to multimedia data: protection against ...
Oleg Evsutin   +2 more
doaj   +1 more source

Advancing Sustainable Development in Manufacturing: A Strategic Framework for Overcoming Green–Lean Implementation Barriers

open access: yesBusiness Strategy and the Environment, EarlyView.
ABSTRACT Manufacturing's transition to sustainable development depends on integrating green with lean under credible environmental policy and stakeholder engagement. Although benefits are well established, the literature underspecifies implementation barriers and their prioritisation. This study identifies, structures, and prioritises barriers to green–
Jose Arturo Garza‐Reyes   +4 more
wiley   +1 more source

Algorithm of Information Embedding into Digital Images Based on the Chinese Remainder Theorem for Data Security

open access: yesCryptography, 2020
With the huge transfers of data involved in the modern world, it is both crucial and challenging to maintain the security of data. This paper proposes a novel algorithm of information embedding into digital images that could be used to protect ...
Oleg Evsutin, Kristina Dzhanashia
doaj   +1 more source

Cyber-Physical Smart Grid Security Tool for Education and Training Purposes [PDF]

open access: yes, 2017
Cyber security education is now an essential piece of information to understand the current challenges in utilizing the technology in a secure manner. In this paper, we highlight the need of improving the human factors role and cyber security awareness ...
Katos, Vasilis, Kumar, N., Saxena, N.
core  

A Natural Resource‐Based View of Circular Economy Practices in the Pharmaceutical Industry

open access: yesBusiness Strategy and the Environment, EarlyView.
ABSTRACT Pharmaceutical industry is facing escalating environmental sustainability issues including gaseous emissions, waste generation, and excessive consumption of energy and non‐renewable materials. Nevertheless, the adoption of sustainable business models such as the circular economy (CE) is still in its infancy in this sector due to complex ...
Amna Farrukh, Muhammad Sohaib Sajjad
wiley   +1 more source

SSH-DAuth: secret sharing based decentralized OAuth using decentralized identifier

open access: yesScientific Reports, 2023
OAuth2.0 is a Single Sign-On approach that helps to authorize users to log into multiple applications without re-entering the credentials. Here, the OAuth service provider controls the central repository where data is stored, which may lead to third ...
Danda Prudhvi Krishna   +6 more
doaj   +1 more source

Cybervandalism or Digital Act of War? America\u27s Muddled Approach to Cyber Incidents Will Not Deter More Crises [PDF]

open access: yes, 2017
If experts say a malicious [cyber] code \u27 has similar effects to a physical bomb, \u27 and that code actually causes a stunning breach of global internet stability, is it really accurate to call that event merely an instance of a cyber attack ?
Dunlap, Charles J., Jr.
core   +1 more source

Medical Cyber-Physical Systems Development: A Forensics-Driven Approach

open access: yes, 2017
The synthesis of technology and the medical industry has partly contributed to the increasing interest in Medical Cyber-Physical Systems (MCPS). While these systems provide benefits to patients and professionals, they also introduce new attack vectors ...
Choo, Kim-Kwang Raymond   +2 more
core   +1 more source

Home - About - Disclaimer - Privacy