Results 131 to 140 of about 150,359 (291)
Blockchain-Based Model for Incentivized Cyber Threat Intelligence Sharing
Sharing cyber threat intelligence (CTI) can significantly improve the security of information technology (IT) in organizations. However, stakeholders and practitioners are not keen on sharing CTI data due to the risk of exposing their private data and ...
Algimantas Venčkauskas +3 more
doaj +1 more source
From products to smart solutions: A value‐creation approach
Abstract Smart solutions comprise a synergy of products, services, software, connectivity, data, and intelligence. This study examines the evolution of a manufacturer into a smart solution provider, highlighting the role of value‐creation capabilities, activities, and practices. Through a longitudinal, in‐depth single‐case study of a leading technology
Tayyab Warraich +4 more
wiley +1 more source
Standards-based Cyber Threat Intelligence sharing using private Blockchains [PDF]
Kimon-Antonios Provatas +2 more
doaj +1 more source
Compassionate Digital Innovation: A Pluralistic Perspective and Research Agenda
ABSTRACT Digital innovation offers significant societal, economic and environmental benefits but is also a source of profound harms. Prior information systems (IS) research has often overlooked the ethical tensions involved, framing harms as ‘unintended consequences’ rather than symptoms of deeper systemic problems.
Raffaele F. Ciriello +5 more
wiley +1 more source
Analysis and Characterization of Cyber Threats Leveraging the MITRE ATT&CK Database
MITRE ATT&CK is a comprehensive knowledge-base of adversary tactics, techniques, and procedures (TTP) based on real-world attack scenarios. It has been used in different sectors, such as government, academia, and industry, as a foundation for ...
Bader Al-Sada +2 more
doaj +1 more source
National plan to combat cybercrime [PDF]
Australia is a highly connected country - technology and the internet are crucial to Australia\u27s way of life. However, while the potential of the internet and digital economy is clearly a massive opportunity for Australia, it is also quickly emerging
core
Pan‐Europe Revisited: Inter‐War Debates and the EU's Pursuit of Geopolitical Power
ABSTRACT The European Union's (EU) transformation from a peace project to an assertive geopolitical actor reflects enduring tensions in integration theory dating back to the inter‐war period. This paper develops a comparative framework distinguishing territorial integration logic, which emphasises bounded political communities and collective defence ...
Kamil Zwolski
wiley +1 more source
A GPT-Based Approach for Cyber Threat Assessment
Background: The increasing prevalence of cyber threats in industrial cyber–physical systems (ICPSs) necessitates advanced solutions for threat detection and analysis.
Fahim Sufi
doaj +1 more source
War as a Phenomenon of Inquiry in Management Studies
Abstract We argue that war as a phenomenon deserves more focused attention in management. First, we highlight why war is an important and relevant area of inquiry for management scholars. We then integrate scattered conversations on war in management studies into a framework structured around three building blocks – (a) the nature of war from an ...
Fabrice Lumineau, Arne Keller
wiley +1 more source
Abstract Our work begins with the premise that the integration of artificial intelligence (AI) into firm decision making parallels the emergence of the professional manager, which prompted the birth of agency theory. We examine the evolution of AI through an agency theory lens, considering how the nature of firm control and decision rights change as AI
Beth K. Humberd, Scott F. Latham
wiley +1 more source

