Results 81 to 90 of about 76,134 (287)

Major Cybersecurity Breaches: Shaping Corporate Cybersecurity Policies and Closing the Gaps

open access: yesJournal of Corporate Accounting &Finance, EarlyView.
ABSTRACT As digitalization accelerates, cybercrime has intensified in both scale and impact over the past two decades. This study aims to critically examine major cybersecurity events, assess them through the lens of routine activity theory, examine insight from three other established criminological and organizational theories, and address central ...
Laura K. Rickett, Deborah Smith
wiley   +1 more source

A Resilience Quantitative Assessment Framework for Cyber–Physical Systems: Mathematical Modeling and Simulation

open access: yesApplied Sciences
As cyber threats continue to grow in complexity and persistence, resilience has become a critical requirement for cyber–physical systems (CPSs). Resilience quantitative assessment is essential for supporting secure system design and ensuring reliable ...
Zhigang Cao   +5 more
doaj   +1 more source

Resilience in future cyber command and control [PDF]

open access: yesآینده‌پژوهی دفاعی
Objective: This research has been done with the aim of providing resilience features in future cyber command and control(C2). Methodology: The research method is descriptive with a qualitative and quantitative approach.
Mohammad Ghasemi Tadavani   +2 more
doaj   +1 more source

POINTER:a GDPR-compliant framework for human pentesting (for SMEs) [PDF]

open access: yes, 2018
Penetration tests have become a valuable tool in any organisation’s arsenal, in terms of detecting vulnerabilities in their technical defences. Many organisations now also “penetration test” their employees, assessing their resilience and ability to ...
Archibald, Jacqueline, Renaud, K.
core  

Young adult self‐harm: The role of victimisation and polygenic risk in a population‐based longitudinal study

open access: yesJCPP Advances, EarlyView.
Abstract Background Victimisation has been associated with self‐harm (with or without suicidal intent), but little is known about this association during young adulthood—a distinct developmental period. Further, not all individuals who experience victimisation will later engage in self‐harm, suggesting the influence of other factors.
Filip Marzecki   +8 more
wiley   +1 more source

Where Is the Take in Give and Take? A Review of Empathy Effects on Workplace Outcomes for Both Givers and Receivers

open access: yesJournal of Organizational Behavior, EarlyView.
ABSTRACT There is increasing interest in understanding and recognition of the importance of empathy effects at work. However, despite the two‐party nature of empathy, little research has distinguished between empathy‐giving versus empathy‐receiving, or between empathy‐giver versus receiver.
Xiaoxiao Jiang   +3 more
wiley   +1 more source

Analyzing the Resilience of Active Distribution Networks to Hazardous Weather Considering Cyber–Physical Interdependencies

open access: yesEngineering
This paper provides a systematic review on the resilience analysis of active distribution networks (ADNs) against hazardous weather events, considering the underlying cyber–physical interdependencies.
Zhiyi Li   +4 more
doaj   +1 more source

Cyber Resilience Analytics For Cyber-Physical Systems

open access: yes, 2022
Cyber-physical systems (CPSs) are complex systems that evolve from the integrations of components dealing with physical processes and real-time computations, along with networking. CPSs often incorporate approaches merging from different scientific fields such as embedded systems, control systems, operational technology, information technology systems (
openaire   +2 more sources

Cyber-Security in Smart Grid: Survey and Challenges

open access: yes, 2018
Smart grid uses the power of information technology to intelligently deliver energy to customers by using a two-way communication, and wisely meet the environmental requirements by facilitating the integration of green technologies.
Ghazi, Hamid El   +3 more
core   +1 more source

Strategies and Process of Trade Secret Misappropriation Mitigation: The Case of UK

open access: yesStrategic Change, EarlyView.
ABSTRACT Trade Secrets (TS) are vital for innovation‐driven companies, and their loss can inflict significant financial and reputational damage, particularly in the absence of established policies to mitigate misappropriation in the UK. The current academic literature lacks detailed strategies for firms to effectively address these threats.
Oleksandra Ozcan, David Pickernell
wiley   +1 more source

Home - About - Disclaimer - Privacy