Results 131 to 140 of about 150,359 (291)

Blockchain-Based Model for Incentivized Cyber Threat Intelligence Sharing

open access: yesApplied Sciences
Sharing cyber threat intelligence (CTI) can significantly improve the security of information technology (IT) in organizations. However, stakeholders and practitioners are not keen on sharing CTI data due to the risk of exposing their private data and ...
Algimantas Venčkauskas   +3 more
doaj   +1 more source

From products to smart solutions: A value‐creation approach

open access: yesEuropean Management Review, EarlyView.
Abstract Smart solutions comprise a synergy of products, services, software, connectivity, data, and intelligence. This study examines the evolution of a manufacturer into a smart solution provider, highlighting the role of value‐creation capabilities, activities, and practices. Through a longitudinal, in‐depth single‐case study of a leading technology
Tayyab Warraich   +4 more
wiley   +1 more source

Standards-based Cyber Threat Intelligence sharing using private Blockchains [PDF]

open access: yesAnnals of computer science and information systems, 2023
Kimon-Antonios Provatas   +2 more
doaj   +1 more source

Compassionate Digital Innovation: A Pluralistic Perspective and Research Agenda

open access: yesInformation Systems Journal, EarlyView.
ABSTRACT Digital innovation offers significant societal, economic and environmental benefits but is also a source of profound harms. Prior information systems (IS) research has often overlooked the ethical tensions involved, framing harms as ‘unintended consequences’ rather than symptoms of deeper systemic problems.
Raffaele F. Ciriello   +5 more
wiley   +1 more source

Analysis and Characterization of Cyber Threats Leveraging the MITRE ATT&CK Database

open access: yesIEEE Access
MITRE ATT&CK is a comprehensive knowledge-base of adversary tactics, techniques, and procedures (TTP) based on real-world attack scenarios. It has been used in different sectors, such as government, academia, and industry, as a foundation for ...
Bader Al-Sada   +2 more
doaj   +1 more source

National plan to combat cybercrime [PDF]

open access: yes
Australia is a highly connected country - technology and the internet are crucial to Australia\u27s way of life. However, while the potential of the internet and digital economy is clearly a massive opportunity for Australia, it is also quickly emerging

core  

Pan‐Europe Revisited: Inter‐War Debates and the EU's Pursuit of Geopolitical Power

open access: yesJCMS: Journal of Common Market Studies, EarlyView.
ABSTRACT The European Union's (EU) transformation from a peace project to an assertive geopolitical actor reflects enduring tensions in integration theory dating back to the inter‐war period. This paper develops a comparative framework distinguishing territorial integration logic, which emphasises bounded political communities and collective defence ...
Kamil Zwolski
wiley   +1 more source

A GPT-Based Approach for Cyber Threat Assessment

open access: yesAI
Background: The increasing prevalence of cyber threats in industrial cyber–physical systems (ICPSs) necessitates advanced solutions for threat detection and analysis.
Fahim Sufi
doaj   +1 more source

War as a Phenomenon of Inquiry in Management Studies

open access: yesJournal of Management Studies, EarlyView.
Abstract We argue that war as a phenomenon deserves more focused attention in management. First, we highlight why war is an important and relevant area of inquiry for management scholars. We then integrate scattered conversations on war in management studies into a framework structured around three building blocks – (a) the nature of war from an ...
Fabrice Lumineau, Arne Keller
wiley   +1 more source

When AI Becomes an Agent of the Firm: Examining the Evolution of AI in Organizations Through an Agency Theory Lens

open access: yesJournal of Management Studies, EarlyView.
Abstract Our work begins with the premise that the integration of artificial intelligence (AI) into firm decision making parallels the emergence of the professional manager, which prompted the birth of agency theory. We examine the evolution of AI through an agency theory lens, considering how the nature of firm control and decision rights change as AI
Beth K. Humberd, Scott F. Latham
wiley   +1 more source

Home - About - Disclaimer - Privacy