Results 51 to 60 of about 137,873 (290)
Developing the cyber victimisation experiences and cyber bullying behaviours scales [PDF]
The reported prevalence rates of cyber victimisation experiences and cyber bullying behaviours vary. Part of this variation is likely due to the diverse definitions and operationalisations of the constructs adopted in previous research and the lack of ...
Betts, LR, Spenser, KA
core +1 more source
Corporate Decarbonization via Technology and Management
ABSTRACT This study provides a comprehensive overview of key findings on decarbonization, advanced technologies, and management strategies, highlighting emerging themes shaping the field. Advanced technologies enhance carbon reduction through efficiency, real‐time monitoring, and optimizing resource optimization.
Heidy Montero‐Teran +2 more
wiley +1 more source
Discerning reliable cyber threat indicators for timely Cyber Threat Intelligence
In today's dynamic cybersecurity landscape, timely and accurate threat intelligence is essential for proactive defense. This study explores the potential of social media platforms as a valuable resource for extracting actionable Indicators of Compromise (IoCs).
Arikkat, Dincy R +5 more
openaire +2 more sources
Proactive threat detection for connected cars using recursive Bayesian estimation [PDF]
Upcoming disruptive technologies around autonomous driving of connected cars have not yet been matched with appropriate security by design principles and lack approaches to incorporate proactive preventative measures in the wake of increased cyber ...
al-Khateeb, Haider +4 more
core +3 more sources
ESG Decoupling Phenomenon: A Systematic and Bibliometric Analysis
ABSTRACT ESG decoupling, defined as the gap between a firm's ESG disclosures and its actual practices, poses a critical challenge to corporate sustainability. Using the PRISMA protocol, 451 articles were selected for a comprehensive bibliometric and systematic literature review to map the intellectual structure and thematic evolution of the research on
Maryam Laeeq +2 more
wiley +1 more source
Securing electric transportation networks: A machine learning-driven cyber threat detection [PDF]
The study examines the cybersecurity environment of electric transportation networks using a machine learning-based methodology. It analyzes the behaviors of electric vehicles, charging patterns, cyber threat occurrences, and the performance of machine ...
Ivanovich Vatin Nikolai, Sundari Rama
doaj +1 more source
Cyber Threats Classifications and Countermeasures in Banking and Financial Sector
The banking and financial sector has always been a prime target for cyber threats due to the critical nature of the information they handle. With the increasing dependence on technology and digital transformation, the sector is facing more complex and ...
Abdulbasit A. Darem +5 more
doaj +1 more source
A Threat to Cyber Resilience : A Malware Rebirthing Botnet [PDF]
This paper presents a threat to cyber resilience in the form of a conceptual model of a malware rebirthing botnet which can be used in a variety of scenarios. It can be used to collect existing malware and rebirth it with new functionality and signatures
Brand, Murray +2 more
core +2 more sources
ABSTRACT With the rise of digital technology, adolescent cyberviolence has become a growing global concern in public health and criminal justice. This study used nationally representative data from South Korea (2017–2024) to examine the prevalence of eight types of cyberviolence (i.e., verbal abuse, defamation, stalking, sexual abuse, personal ...
Heng Choon (Oliver) Chan +2 more
wiley +1 more source
Cyber Threat Intelligence Platform [PDF]
Cieľom práce je vytvoriť webovú platformu, ktorá poskytne zjednodušený popis, spracovanie a výmenu bezpečnostných incidentov za pomoci dostupných štandardov STIX, TAXII, CybOX, IDEA.
Jacko, Jerguš
core

