Results 21 to 30 of about 2,468 (138)
Unlocking the Future of Insurance: The Power of Open Data, Digital Transformation, and Human Talent
ABSTRACT Despite rapid technological advancement in insurance, there remains a critical gap in understanding how open data initiatives affect employee digital competencies and organizational transformation. This research investigates this relationship through a systematic review of 51 scholarly articles published between 2018 and 2024, using structured
Narongsak Sukma, Siriporn Yamnill
wiley +1 more source
Ransomware attacks pose a serious threat to computer networks, causing widespread disruption to individual, corporate, governmental, and critical national infrastructures.
Sarah Alhuwayshil +2 more
doaj +1 more source
Major Cybersecurity Breaches: Shaping Corporate Cybersecurity Policies and Closing the Gaps
ABSTRACT As digitalization accelerates, cybercrime has intensified in both scale and impact over the past two decades. This study aims to critically examine major cybersecurity events, assess them through the lens of routine activity theory, examine insight from three other established criminological and organizational theories, and address central ...
Laura K. Rickett, Deborah Smith
wiley +1 more source
Exploring illicit personal information trading behind telecom fraud in China
Illicit personal information trading, a hallmark of internet dark and gray industries, has deeply infiltrated the global criminal economic system, serving as a critical driver and “raw material factory” for numerous offenses.
Guangxuan Chen +3 more
doaj +1 more source
Understanding Cybercrime in Developing Economies: Insights from Agona Swedru, Ghana [PDF]
The purpose of this study was to explore the prevalence and primary causes of cybercrime in Agona Swedru. Using a quantitative research survey and a simple random sampling technique, 397 individuals were surveyed.
Charles Obeng +3 more
doaj +1 more source
Exploring cybercrime – realities and challenges [PDF]
Cybercrime is a global, transnational serious problem that needs strong technical and legal responses. The information represents an important asset that must be secured and properly used as it provides the support for value creation and sustainable ...
Victoria Stanciu, Andrei Tinca
doaj +1 more source
Strategies and Process of Trade Secret Misappropriation Mitigation: The Case of UK
ABSTRACT Trade Secrets (TS) are vital for innovation‐driven companies, and their loss can inflict significant financial and reputational damage, particularly in the absence of established policies to mitigate misappropriation in the UK. The current academic literature lacks detailed strategies for firms to effectively address these threats.
Oleksandra Ozcan, David Pickernell
wiley +1 more source
Dynamic Evolution and Transformative Trends in the Consumer Market: A Technology Paradox Perspective
ABSTRACT The consumer market is defined by tensions arising from the clash between technological advancement and consumer psychology. Current research lacks a unifying framework to explain these contradictions. Addressing this gap, we introduce a conceptual model based on technology paradox theory, which maps the dynamic process from antecedents ...
Chanaka Jayawardhena +3 more
wiley +1 more source
Reflections on Comparative Teaching in Public Administration
ABSTRACT This article integrates our scholarly experience of teaching comparative public administration. In doing so, we offer a unique perspective as the co‐authors carry several diverse attributes, among them their countries of origin, current country in which they are teaching, and their academic experience.
Kim Moloney +6 more
wiley +1 more source
ABSTRACT Personal autonomous vehicles can sense their surrounding environment, plan their route, and drive with little or no involvement of human drivers. Despite the latest technological advancements and the hopeful announcements made by leading entrepreneurs, to date no personal vehicle is approved for road circulation in a “fully” or “semi ...
Xingshuai Dong +13 more
wiley +1 more source

