Results 71 to 80 of about 142,803 (291)
ABSTRACT This article investigates the impact of coerced AI adoption on the psychological well‐being of academic staff within higher education institutions. Data were collected from a sample of 470 faculty members randomly selected from higher education institutions in Pakistan.
Muhammad Imran Qureshi +3 more
wiley +1 more source
Conceptual Model of the Company's Cyber Resilience Elements [PDF]
This study is a continuation of the paper from last year's conference "Cyber Risks: Systematic Literature Analysis". The work considered the process and risks of digitalization.
Alona Bahmanova, Natalja Lace
doaj
Optimization of cyber security through the implementation of AI technologies
Identification of cyber threats is crucial and significant for determining substantial security techniques and approaches. This research illustrates a brief discussion of cyberspace challenges and threats in a disruptive era alongside comprehensive ...
Nawaf Liqaa, Bentotahewa Vibhushinie
doaj +1 more source
CYBER SECURITY IN A DIGITAL LEARNING ENVIRONMENT
The article discusses the problems of cyber-security of participants of the educational process, emphasizes the fact that these problems are not limited to the technical aspects of the protection of information resources, they must include in their ...
Valeriy Yu. Bykov +2 more
doaj +1 more source
Machine-assisted Cyber Threat Analysis using Conceptual Knowledge Discovery [PDF]
Over the last years, computer networks have evolved into highly dynamic and interconnected environments, involving multiple heterogeneous devices and providing a myriad of services on top of them.
ALIQUINTUY, M +12 more
core
Cyber security and cyber threats
The article examines the impact of cybersecurity in the digital space on the international economy. The classification today, yesterday, and in the future and analysis of cyber threats are carried out. The practical significance of the research results is obvious, since the active spread of IT technologies and their application in many areas of human ...
Gnediuc, I.O., Ohrimenco, S.A.
openaire +1 more source
Strategies and Process of Trade Secret Misappropriation Mitigation: The Case of UK
ABSTRACT Trade Secrets (TS) are vital for innovation‐driven companies, and their loss can inflict significant financial and reputational damage, particularly in the absence of established policies to mitigate misappropriation in the UK. The current academic literature lacks detailed strategies for firms to effectively address these threats.
Oleksandra Ozcan, David Pickernell
wiley +1 more source
With the advent of the digital information age, the dynamics of cyberspace are rapidly evolving, resulting in a significant increase in cyber threats. In this paper, we propose to integrate the Zero Trust (ZT) security model and the MITRE ATT&CK ...
Gwanghyun Ahn +3 more
doaj +1 more source
ABSTRACT This systematic literature review makes three key contributions to resilience research in SMEs. First, it advances theory by synthesizing the Resource‐Based View and Dynamic Capabilities perspective to develop a novel two‐dimensional framework of SME resilience (Adaptability × Resource availability), identifying four distinct resilience ...
Egena Ode +3 more
wiley +1 more source
The maritime industry’s increasing integration of IT/OT systems into vessel operations has significantly elevated its exposure to cyber–physical threats, making the development of effective cyber risk management strategies a necessity.
Iosif Progoulakis +5 more
doaj +1 more source

