Results 111 to 120 of about 697,637 (332)

Major Cybersecurity Breaches: Shaping Corporate Cybersecurity Policies and Closing the Gaps

open access: yesJournal of Corporate Accounting &Finance, EarlyView.
ABSTRACT As digitalization accelerates, cybercrime has intensified in both scale and impact over the past two decades. This study aims to critically examine major cybersecurity events, assess them through the lens of routine activity theory, examine insight from three other established criminological and organizational theories, and address central ...
Laura K. Rickett, Deborah Smith
wiley   +1 more source

Principles for management of risks of critical infrastructure [PDF]

open access: yes, 2018
On the basis of present knowledge, the critical infrastructure is a set of physical (technical and material), cyber and organizational subsystems of human system that are necessary for ensuring the protection of: human lives, health and security ...
Procházka J.   +2 more
core  

Young adult self‐harm: The role of victimisation and polygenic risk in a population‐based longitudinal study

open access: yesJCPP Advances, EarlyView.
Abstract Background Victimisation has been associated with self‐harm (with or without suicidal intent), but little is known about this association during young adulthood—a distinct developmental period. Further, not all individuals who experience victimisation will later engage in self‐harm, suggesting the influence of other factors.
Filip Marzecki   +8 more
wiley   +1 more source

KPI-Based Evaluation Framework for Cyber Resilience of Ships

open access: yesIEEE Access
Advancements in information and communication technologies have improved operational efficiency in the maritime industry through the integration of operational technology and information technology systems.
Areum Ko, Ju Hyeon Lee, Jung Taek Seo
doaj   +1 more source

Strategies and Process of Trade Secret Misappropriation Mitigation: The Case of UK

open access: yesStrategic Change, EarlyView.
ABSTRACT Trade Secrets (TS) are vital for innovation‐driven companies, and their loss can inflict significant financial and reputational damage, particularly in the absence of established policies to mitigate misappropriation in the UK. The current academic literature lacks detailed strategies for firms to effectively address these threats.
Oleksandra Ozcan, David Pickernell
wiley   +1 more source

Identifying vulnerable children online and what strategies can help them [PDF]

open access: yes, 2012
This new report from UKCCIS’s Evidence Group, Identifying vulnerable children online and what strategies can help them, reveals the latest findings from researchers, clinicians and child protection experts on what makes some children vulnerable on the ...
Livingstone, Sonia   +2 more
core  

Archetypes of SME Resilience: A Systematic Literature Review of Antecedents, Types and Outcomes of Resilience in SMEs

open access: yesStrategic Change, EarlyView.
ABSTRACT This systematic literature review makes three key contributions to resilience research in SMEs. First, it advances theory by synthesizing the Resource‐Based View and Dynamic Capabilities perspective to develop a novel two‐dimensional framework of SME resilience (Adaptability × Resource availability), identifying four distinct resilience ...
Egena Ode   +3 more
wiley   +1 more source

Smart Grid Security: Threats, Challenges, and Solutions [PDF]

open access: yes, 2016
The cyber-physical nature of the smart grid has rendered it vulnerable to a multitude of attacks that can occur at its communication, networking, and physical entry points.
Biswas, Saroj   +4 more
core   +2 more sources

Home - About - Disclaimer - Privacy