Results 61 to 70 of about 111,415 (271)
Individual Differences in Cyber Security [PDF]
A survey of IT professionals suggested that despite technological advancement and organizational procedures to prevent cyber-attacks, users are still the weakest link in cyber security (Crossler, 2013).
Conetta, Christopher
core +1 more source
Ensuring Cyber-Security in Smart Railway Surveillance with SHIELD [PDF]
Modern railways feature increasingly complex embedded computing systems for surveillance, that are moving towards fully wireless smart-sensors. Those systems are aimed at monitoring system status from a physical-security viewpoint, in order to detect ...
DELLI PRISCOLI, Francesco +6 more
core +1 more source
ABSTRACT This study examines the role of corporate zero‐deforestation commitments (ZDCs) and Industry 4.0 (I4.0) enabling technologies in mitigating deforestation. Drawing on data from 110 companies included in the Forest 500 dataset, the research explores whether sustainability commitments and digital innovation influence firms' deforestation ...
Valentina Beretta +2 more
wiley +1 more source
Cloud EMRs auditing with decentralized (t, n)-threshold ownership transfer
In certain cloud Electronic Medical Records (EMRs) applications, the data ownership may need to be transferred. In practice, not only the data but also the auditing ability should be transferred securely and efficiently.
Yamei Wang +4 more
doaj +1 more source
The journal retracts the article, “A Publicly Verifiable E-Voting System Based on Biometrics” [...]
Jinhui Liu +5 more
doaj +1 more source
Can maturity models support cyber security? [PDF]
© 2016 IEEE. We are living in a cyber space with an unprecedented rapid expansion of the space and its elements. All interactive information is processed and exchanged via this space. Clearly a well-built cyber security is vital to ensure the security of
Hoang, DB, Le, NT
core +1 more source
Corporate Decarbonization via Technology and Management
ABSTRACT This study provides a comprehensive overview of key findings on decarbonization, advanced technologies, and management strategies, highlighting emerging themes shaping the field. Advanced technologies enhance carbon reduction through efficiency, real‐time monitoring, and optimizing resource optimization.
Heidy Montero‐Teran +2 more
wiley +1 more source
Cyber Security’s Influence on Modern Society [PDF]
The world of cyber security is evolving every day, and cyber-criminals are trying to take advantage of it to gain as much money and power as possible. As the Internet continues to grow, more people around the world join the Internet.
Vallarelli, Nicholas
core +1 more source
ABSTRACT Implementing digital technologies is touted as the next big step for the firms aiming to improve sustainability in their supply chains. These technologies are often credited with the potential to improve transparency and achieve sustainability.
Amna Farrukh, Aqeel Ahmed, Sadaat Yawar
wiley +1 more source
Cyber‐physical systems (CPS) seamlessly integrate computers, networks and physical devices, enabling machines to communicate, process data and respond to real‐world conditions in real time.
Kai Hung Tang +4 more
doaj +1 more source

