Results 71 to 80 of about 162,443 (304)
Is the well‐known phrase ‘small is beautiful’ true of small transnational education institutions?
Abstract The purpose of this research is to consider the potential attractiveness of operating a small international branch campus (IBC). Drawing upon resource‐based and legitimacy theories, we examine the strengths, weaknesses, opportunities and threats associated with the business model that is based on having a small institution size.
Stephen Wilkins, Joe Hazzam
wiley +1 more source
On the use of watermark-based schemes to detect cyber-physical attacks
We address security issues in cyber-physical systems (CPSs). We focus on the detection of attacks against cyber-physical systems. Attacks against these systems shall be handled both in terms of safety and security.
Jose Rubio-Hernan +2 more
doaj +1 more source
Digital Steganography and Watermarking for Digital Images: A Review of Current Research Directions
The development of information technology has led to a significant increase in the share of multimedia traffic in data networks. This has necessitated to solve the following information security tasks in relation to multimedia data: protection against ...
Oleg Evsutin +2 more
doaj +1 more source
ABSTRACT Manufacturing's transition to sustainable development depends on integrating green with lean under credible environmental policy and stakeholder engagement. Although benefits are well established, the literature underspecifies implementation barriers and their prioritisation. This study identifies, structures, and prioritises barriers to green–
Jose Arturo Garza‐Reyes +4 more
wiley +1 more source
With the huge transfers of data involved in the modern world, it is both crucial and challenging to maintain the security of data. This paper proposes a novel algorithm of information embedding into digital images that could be used to protect ...
Oleg Evsutin, Kristina Dzhanashia
doaj +1 more source
Cyber-Physical Smart Grid Security Tool for Education and Training Purposes [PDF]
Cyber security education is now an essential piece of information to understand the current challenges in utilizing the technology in a secure manner. In this paper, we highlight the need of improving the human factors role and cyber security awareness ...
Katos, Vasilis, Kumar, N., Saxena, N.
core
A Natural Resource‐Based View of Circular Economy Practices in the Pharmaceutical Industry
ABSTRACT Pharmaceutical industry is facing escalating environmental sustainability issues including gaseous emissions, waste generation, and excessive consumption of energy and non‐renewable materials. Nevertheless, the adoption of sustainable business models such as the circular economy (CE) is still in its infancy in this sector due to complex ...
Amna Farrukh, Muhammad Sohaib Sajjad
wiley +1 more source
SSH-DAuth: secret sharing based decentralized OAuth using decentralized identifier
OAuth2.0 is a Single Sign-On approach that helps to authorize users to log into multiple applications without re-entering the credentials. Here, the OAuth service provider controls the central repository where data is stored, which may lead to third ...
Danda Prudhvi Krishna +6 more
doaj +1 more source
Cybervandalism or Digital Act of War? America\u27s Muddled Approach to Cyber Incidents Will Not Deter More Crises [PDF]
If experts say a malicious [cyber] code \u27 has similar effects to a physical bomb, \u27 and that code actually causes a stunning breach of global internet stability, is it really accurate to call that event merely an instance of a cyber attack ?
Dunlap, Charles J., Jr.
core +1 more source
Medical Cyber-Physical Systems Development: A Forensics-Driven Approach
The synthesis of technology and the medical industry has partly contributed to the increasing interest in Medical Cyber-Physical Systems (MCPS). While these systems provide benefits to patients and professionals, they also introduce new attack vectors ...
Choo, Kim-Kwang Raymond +2 more
core +1 more source

