Accessible and Inclusive Cyber Security: A Nuanced and Complex Challenge. [PDF]
Renaud K, Coles-Kemp L.
europepmc +1 more source
Cyber Security in the Nigerian Banking Sector: An Appraisal of Audit Committee Effectiveness [PDF]
This study appraises the relationship that exists between cyber security and audit committee effectiveness using audit committee independence, audit committee technological expertise and audit committee financialexpertise characteristics as independent ...
Ben-Caleb, Egbide +2 more
core
A Method for Assessing the Risks to Sustainability Posed by Process Operations
ABSTRACT We present a framework for assessing the risks to sustainability posed by any given set of processes. The objective is to improve sustainability by enabling better decision‐making in policy and business contexts. The framework can be applied to any system of processes where available information supports discovery and quantification of ...
Richard C. Darton, Colin J. Axon
wiley +1 more source
Efficient Cryptographic Solutions for Unbalanced Private Set Intersection in Mobile Communication
Private Set Intersection (PSI) is a cryptographic method in secure multi-party computation that allows entities to identify common elements in their datasets without revealing their private data.
Qian Feng +3 more
doaj +1 more source
ABSTRACT This study presents an analysis of the literature on artificial intelligence (AI), blockchain and internet of things (IoT) for the sustainable development of the service industry of freight transport and logistics service providers (LSPs).
Roberto Cerchione +2 more
wiley +1 more source
Beyond Compliance: Corporate Governance and the Paradox of Gender Equality: Evidence From EU Firms
ABSTRACT The UN Sustainable Development Goal (SDG) 5 on gender equality is central to the European Union's sustainability and corporate governance agenda. While recent EU regulations have intensified expectations around board gender diversity (BGD) and social disclosure, the organisational drivers through which governance quality translates into ...
Suzan Dsouza +2 more
wiley +1 more source
Ransomware Detection Using Machine Learning: A Review, Research Limitations and Future Directions
Ransomware attacks are on the rise in terms of both frequency and impact. The shift to remote work due to the COVID-19 pandemic has led more people to work online, prompting companies to adapt quickly.
Jamil Ispahany +3 more
doaj +1 more source
Open-source intelligence: a comprehensive review of the current state, applications and future perspectives in cyber security. [PDF]
Yadav A, Kumar A, Singh V.
europepmc +1 more source
ABSTRACT Food loss and waste (FLW) within agri‐food supply chains significantly impact the consumer economy, depleting natural resources and contributing to greenhouse gas emissions, thereby posing a critical challenge to sustainable development. Digital transformation is increasingly recognised as a key lever for reducing FLW in agri‐food supply ...
Stefano Abbate, Piera Centobelli
wiley +1 more source
A systematic literature review of cyber-security data repositories and performance assessment metrics for semi-supervised learning. [PDF]
Mvula PK +3 more
europepmc +1 more source

