Results 61 to 70 of about 111,415 (271)

Individual Differences in Cyber Security [PDF]

open access: yes, 2019
A survey of IT professionals suggested that despite technological advancement and organizational procedures to prevent cyber-attacks, users are still the weakest link in cyber security (Crossler, 2013).
Conetta, Christopher
core   +1 more source

Ensuring Cyber-Security in Smart Railway Surveillance with SHIELD [PDF]

open access: yes, 2017
Modern railways feature increasingly complex embedded computing systems for surveillance, that are moving towards fully wireless smart-sensors. Those systems are aimed at monitoring system status from a physical-security viewpoint, in order to detect ...
DELLI PRISCOLI, Francesco   +6 more
core   +1 more source

Zero Deforestation Commitments and Industry 4.0 Enabling Technologies: An Analysis of Their Role in Mitigating Deforestation

open access: yesBusiness Strategy and the Environment, EarlyView.
ABSTRACT This study examines the role of corporate zero‐deforestation commitments (ZDCs) and Industry 4.0 (I4.0) enabling technologies in mitigating deforestation. Drawing on data from 110 companies included in the Forest 500 dataset, the research explores whether sustainability commitments and digital innovation influence firms' deforestation ...
Valentina Beretta   +2 more
wiley   +1 more source

Cloud EMRs auditing with decentralized (t, n)-threshold ownership transfer

open access: yesCybersecurity
In certain cloud Electronic Medical Records (EMRs) applications, the data ownership may need to be transferred. In practice, not only the data but also the auditing ability should be transferred securely and efficiently.
Yamei Wang   +4 more
doaj   +1 more source

RETRACTED: Liu et al. A Publicly Verifiable E-Voting System Based on Biometrics. Cryptography 2023, 7, 62

open access: yesCryptography
The journal retracts the article, “A Publicly Verifiable E-Voting System Based on Biometrics” [...]
Jinhui Liu   +5 more
doaj   +1 more source

Can maturity models support cyber security? [PDF]

open access: yes, 2017
© 2016 IEEE. We are living in a cyber space with an unprecedented rapid expansion of the space and its elements. All interactive information is processed and exchanged via this space. Clearly a well-built cyber security is vital to ensure the security of
Hoang, DB, Le, NT
core   +1 more source

Corporate Decarbonization via Technology and Management

open access: yesBusiness Strategy and the Environment, EarlyView.
ABSTRACT This study provides a comprehensive overview of key findings on decarbonization, advanced technologies, and management strategies, highlighting emerging themes shaping the field. Advanced technologies enhance carbon reduction through efficiency, real‐time monitoring, and optimizing resource optimization.
Heidy Montero‐Teran   +2 more
wiley   +1 more source

Cyber Security’s Influence on Modern Society [PDF]

open access: yes, 2020
The world of cyber security is evolving every day, and cyber-criminals are trying to take advantage of it to gain as much money and power as possible. As the Internet continues to grow, more people around the world join the Internet.
Vallarelli, Nicholas
core   +1 more source

Digital Technologies for Transparent and Sustainable Supply Chain Management: A Resource Orchestration‐Based View in the Textile Industry

open access: yesBusiness Strategy and the Environment, EarlyView.
ABSTRACT Implementing digital technologies is touted as the next big step for the firms aiming to improve sustainability in their supply chains. These technologies are often credited with the potential to improve transparency and achieve sustainability.
Amna Farrukh, Aqeel Ahmed, Sadaat Yawar
wiley   +1 more source

Synchronisation, Optimisation and Adaptation of Machine Learning Techniques for Computer Vision in Cyber‐Physical Systems: A Comprehensive Analysis

open access: yesIET Cyber-Physical Systems
Cyber‐physical systems (CPS) seamlessly integrate computers, networks and physical devices, enabling machines to communicate, process data and respond to real‐world conditions in real time.
Kai Hung Tang   +4 more
doaj   +1 more source

Home - About - Disclaimer - Privacy