Results 71 to 80 of about 139,452 (290)

Cyber security and cyber threats

open access: yes, 2023
The article examines the impact of cybersecurity in the digital space on the international economy. The classification today, yesterday, and in the future and analysis of cyber threats are carried out. The practical significance of the research results is obvious, since the active spread of IT technologies and their application in many areas of human ...
Gnediuc, I.O., Ohrimenco, S.A.
openaire   +1 more source

Technostress and Technophobia: Unmasking the Impact of Coerced AI Adoption in Higher Education Institutions

open access: yesGlobal Business and Organizational Excellence, EarlyView.
ABSTRACT This article investigates the impact of coerced AI adoption on the psychological well‐being of academic staff within higher education institutions. Data were collected from a sample of 470 faculty members randomly selected from higher education institutions in Pakistan.
Muhammad Imran Qureshi   +3 more
wiley   +1 more source

Strategies and Process of Trade Secret Misappropriation Mitigation: The Case of UK

open access: yesStrategic Change, EarlyView.
ABSTRACT Trade Secrets (TS) are vital for innovation‐driven companies, and their loss can inflict significant financial and reputational damage, particularly in the absence of established policies to mitigate misappropriation in the UK. The current academic literature lacks detailed strategies for firms to effectively address these threats.
Oleksandra Ozcan, David Pickernell
wiley   +1 more source

A FRAMEWORK FOR CYBERSECURITY STRATEGY FOR DEVELOPING COUNTRIES: CASE STUDY OF AFGHANISTAN

open access: yesAsia-Pacific Journal of Information Technology and Multimedia, 2015
Given the importance of cyber space for country development, different countries have conducted a lot of investment in cyber space application. Since, based on official documents, Afghanistan is in the process of integrating ICT into its critical ...
Khosraw Salamzada   +2 more
doaj   +1 more source

Exploring the motivation behind cybersecurity insider threat and proposed research agenda [PDF]

open access: yes, 2016
Cyber exploitation and malicious activities have become more sophisticated. Insider threat is one of the most significant cyber security threat vector, while posing a great concern to corporations and governments.
Clarke, Karla   +2 more
core  

Archetypes of SME Resilience: A Systematic Literature Review of Antecedents, Types and Outcomes of Resilience in SMEs

open access: yesStrategic Change, EarlyView.
ABSTRACT This systematic literature review makes three key contributions to resilience research in SMEs. First, it advances theory by synthesizing the Resource‐Based View and Dynamic Capabilities perspective to develop a novel two‐dimensional framework of SME resilience (Adaptability × Resource availability), identifying four distinct resilience ...
Egena Ode   +3 more
wiley   +1 more source

An intelligent cyber threat detection: A swarm-optimized machine learning approach

open access: yesAlexandria Engineering Journal
Cyber threats are an ongoing problem that is hard to prevent completely. This can occur for various reasons, but the main causes are the evolving techniques of hackers and the neglect of security measures when developing software or hardware. As a result,
Issa Qiqieh   +4 more
doaj   +1 more source

Cyber terrorism and war, the looming threat to the industrialised state [PDF]

open access: yes, 2011
Earlier this month the EastWest Institute held its second worldwide summit on cyber security. Hundreds of government and industry leaders, from over 43 countries, attended to discuss the looming threat of increasing war and criminality within the cyber ...
Brown, AD
core  

Science Hackathons for Cyberphysical System Security Research: Putting CPS testbed platforms to good use

open access: yes, 2018
A challenge is to develop cyber-physical system scenarios that reflect the diversity and complexity of real-life cyber-physical systems in the research questions that they address.
Autrel, Fabien   +9 more
core   +1 more source

Seven Years of Supply Chain 4.0 and Supply Chain 5.0: Mapping Themes and Knowledge Toward More Developed and Contemporary Supply Chains

open access: yesKnowledge and Process Management, EarlyView.
ABSTRACT Technological advancements aligned with sustainability and resilience requirements, as well as, a greater focus on human‐centric perspectives, are creating significant transformations in supply chains in this decade, bringing them to a more developed stage.
Guilherme F. Frederico
wiley   +1 more source

Home - About - Disclaimer - Privacy