Results 51 to 60 of about 137,873 (290)

Developing the cyber victimisation experiences and cyber bullying behaviours scales [PDF]

open access: yes, 2017
The reported prevalence rates of cyber victimisation experiences and cyber bullying behaviours vary. Part of this variation is likely due to the diverse definitions and operationalisations of the constructs adopted in previous research and the lack of ...
Betts, LR, Spenser, KA
core   +1 more source

Corporate Decarbonization via Technology and Management

open access: yesBusiness Strategy and the Environment, EarlyView.
ABSTRACT This study provides a comprehensive overview of key findings on decarbonization, advanced technologies, and management strategies, highlighting emerging themes shaping the field. Advanced technologies enhance carbon reduction through efficiency, real‐time monitoring, and optimizing resource optimization.
Heidy Montero‐Teran   +2 more
wiley   +1 more source

Discerning reliable cyber threat indicators for timely Cyber Threat Intelligence

open access: yesJournal of Computer Virology and Hacking Techniques
In today's dynamic cybersecurity landscape, timely and accurate threat intelligence is essential for proactive defense. This study explores the potential of social media platforms as a valuable resource for extracting actionable Indicators of Compromise (IoCs).
Arikkat, Dincy R   +5 more
openaire   +2 more sources

Proactive threat detection for connected cars using recursive Bayesian estimation [PDF]

open access: yes, 2017
Upcoming disruptive technologies around autonomous driving of connected cars have not yet been matched with appropriate security by design principles and lack approaches to incorporate proactive preventative measures in the wake of increased cyber ...
al-Khateeb, Haider   +4 more
core   +3 more sources

ESG Decoupling Phenomenon: A Systematic and Bibliometric Analysis

open access: yesBusiness Strategy and the Environment, EarlyView.
ABSTRACT ESG decoupling, defined as the gap between a firm's ESG disclosures and its actual practices, poses a critical challenge to corporate sustainability. Using the PRISMA protocol, 451 articles were selected for a comprehensive bibliometric and systematic literature review to map the intellectual structure and thematic evolution of the research on
Maryam Laeeq   +2 more
wiley   +1 more source

Securing electric transportation networks: A machine learning-driven cyber threat detection [PDF]

open access: yesMATEC Web of Conferences
The study examines the cybersecurity environment of electric transportation networks using a machine learning-based methodology. It analyzes the behaviors of electric vehicles, charging patterns, cyber threat occurrences, and the performance of machine ...
Ivanovich Vatin Nikolai, Sundari Rama
doaj   +1 more source

Cyber Threats Classifications and Countermeasures in Banking and Financial Sector

open access: yesIEEE Access, 2023
The banking and financial sector has always been a prime target for cyber threats due to the critical nature of the information they handle. With the increasing dependence on technology and digital transformation, the sector is facing more complex and ...
Abdulbasit A. Darem   +5 more
doaj   +1 more source

A Threat to Cyber Resilience : A Malware Rebirthing Botnet [PDF]

open access: yes, 2011
This paper presents a threat to cyber resilience in the form of a conceptual model of a malware rebirthing botnet which can be used in a variety of scenarios. It can be used to collect existing malware and rebirth it with new functionality and signatures
Brand, Murray   +2 more
core   +2 more sources

Adolescent Cyberviolence in South Korea: A Multi‐Year, National Population‐Based Study of Cyberviolence Prevalence (2017–2024)

open access: yesBehavioral Sciences &the Law, EarlyView.
ABSTRACT With the rise of digital technology, adolescent cyberviolence has become a growing global concern in public health and criminal justice. This study used nationally representative data from South Korea (2017–2024) to examine the prevalence of eight types of cyberviolence (i.e., verbal abuse, defamation, stalking, sexual abuse, personal ...
Heng Choon (Oliver) Chan   +2 more
wiley   +1 more source

Cyber Threat Intelligence Platform [PDF]

open access: yes, 2016
Cieľom práce je vytvoriť webovú platformu, ktorá poskytne zjednodušený popis, spracovanie a výmenu bezpečnostných incidentov za pomoci dostupných štandardov STIX, TAXII, CybOX, IDEA.
Jacko, Jerguš
core  

Home - About - Disclaimer - Privacy