Results 31 to 40 of about 104,418 (235)
ABSTRACT Implementing digital technologies is touted as the next big step for the firms aiming to improve sustainability in their supply chains. These technologies are often credited with the potential to improve transparency and achieve sustainability.
Amna Farrukh, Aqeel Ahmed, Sadaat Yawar
wiley +1 more source
Can maturity models support cyber security? [PDF]
© 2016 IEEE. We are living in a cyber space with an unprecedented rapid expansion of the space and its elements. All interactive information is processed and exchanged via this space. Clearly a well-built cyber security is vital to ensure the security of
Hoang, DB, Le, NT
core +1 more source
ESG Decoupling Phenomenon: A Systematic and Bibliometric Analysis
ABSTRACT ESG decoupling, defined as the gap between a firm's ESG disclosures and its actual practices, poses a critical challenge to corporate sustainability. Using the PRISMA protocol, 451 articles were selected for a comprehensive bibliometric and systematic literature review to map the intellectual structure and thematic evolution of the research on
Maryam Laeeq +2 more
wiley +1 more source
The Australian Cyber Security Centre threat report 2015 [PDF]
Introduction: The number, type and sophistication of cyber security threats to Australia and Australians are increasing. Due to the varied nature of motivations for cyber adversaries targeting Australian organisations, organisations could be a target for
Australian Cyber Security Centre
core
ABSTRACT Industry 5.0 has emerged to address the limitations of Industry 4.0 by emphasizing inclusive sustainability through environmentalism, human‐centricity, and resilience. However, its development faces barriers across technological, organizational, and social dimensions.
Mohammad Ali Beheshtinia +4 more
wiley +1 more source
Abstract This research focuses on addressing the privacy issues in healthcare advancement monitoring with the rapid establishment of the decentralised communication system in the Internet of Medical Things (IoMT). An integrated blockchain homomorphic encryption standard with an in‐build supervised learning‐based smart contract is designed to improvise ...
Chandramohan Dhasarathan +7 more
wiley +1 more source
Malicious email mitigation strategies [PDF]
Introduction Socially-engineered emails containing malicious attachments and embedded links have been observed by the Australian Signals Directorate (ASD) being used in targeted cyber intrusions against organisations.
Australian Cyber Security Centre
core
Individual Differences in Cyber Security [PDF]
A survey of IT professionals suggested that despite technological advancement and organizational procedures to prevent cyber-attacks, users are still the weakest link in cyber security (Crossler, 2013).
Conetta, Christopher
core +1 more source
ABSTRACT The emerging concept of Hubs for Circularity (H4Cs) presents an opportunity to create collaborative, self‐sustaining regional industrial ecosystems that drive circular economy transitions at scale. However, the operationalisation of H4Cs faces financial, organisational and data‐driven challenges.
Aditya Tripathi +3 more
wiley +1 more source
Personal HealthCare of Things: A novel paradigm and futuristic approach
Abstract This study provides an investigative approach and offers a complete review of research on Internet of Medical Things (IoMT), describing the progress in general and highlighting the research issues, trends, and future aspects of IoMT. Exploring a research strategy for IoMT systems is vital as the need for IoT in healthcare grows. By aggregating
Surbhi Gupta +5 more
wiley +1 more source

