Results 111 to 120 of about 697,637 (332)
Major Cybersecurity Breaches: Shaping Corporate Cybersecurity Policies and Closing the Gaps
ABSTRACT As digitalization accelerates, cybercrime has intensified in both scale and impact over the past two decades. This study aims to critically examine major cybersecurity events, assess them through the lens of routine activity theory, examine insight from three other established criminological and organizational theories, and address central ...
Laura K. Rickett, Deborah Smith
wiley +1 more source
Principles for management of risks of critical infrastructure [PDF]
On the basis of present knowledge, the critical infrastructure is a set of physical (technical and material), cyber and organizational subsystems of human system that are necessary for ensuring the protection of: human lives, health and security ...
Procházka J. +2 more
core
Abstract Background Victimisation has been associated with self‐harm (with or without suicidal intent), but little is known about this association during young adulthood—a distinct developmental period. Further, not all individuals who experience victimisation will later engage in self‐harm, suggesting the influence of other factors.
Filip Marzecki +8 more
wiley +1 more source
KPI-Based Evaluation Framework for Cyber Resilience of Ships
Advancements in information and communication technologies have improved operational efficiency in the maritime industry through the integration of operational technology and information technology systems.
Areum Ko, Ju Hyeon Lee, Jung Taek Seo
doaj +1 more source
Bridging the Gap: Enhancing Maritime Vessel Cyber Resilience through Security Operation Centers. [PDF]
Nganga A +4 more
europepmc +1 more source
Strategies and Process of Trade Secret Misappropriation Mitigation: The Case of UK
ABSTRACT Trade Secrets (TS) are vital for innovation‐driven companies, and their loss can inflict significant financial and reputational damage, particularly in the absence of established policies to mitigate misappropriation in the UK. The current academic literature lacks detailed strategies for firms to effectively address these threats.
Oleksandra Ozcan, David Pickernell
wiley +1 more source
A Hybrid Methodology to Assess Cyber Resilience of IoT in Energy Management and Connected Sites. [PDF]
Mehmood A +4 more
europepmc +1 more source
Identifying vulnerable children online and what strategies can help them [PDF]
This new report from UKCCIS’s Evidence Group, Identifying vulnerable children online and what strategies can help them, reveals the latest findings from researchers, clinicians and child protection experts on what makes some children vulnerable on the ...
Livingstone, Sonia +2 more
core
ABSTRACT This systematic literature review makes three key contributions to resilience research in SMEs. First, it advances theory by synthesizing the Resource‐Based View and Dynamic Capabilities perspective to develop a novel two‐dimensional framework of SME resilience (Adaptability × Resource availability), identifying four distinct resilience ...
Egena Ode +3 more
wiley +1 more source
Smart Grid Security: Threats, Challenges, and Solutions [PDF]
The cyber-physical nature of the smart grid has rendered it vulnerable to a multitude of attacks that can occur at its communication, networking, and physical entry points.
Biswas, Saroj +4 more
core +2 more sources

