Results 111 to 120 of about 196,474 (374)

CYBERSECURITY IN PAYMENTS

open access: yes, 2023
ABSTRACT. This article explores the different standards for cybersecurity in payments, the possible future threats for payment cybersecurity, and the most pressing actions that need to be taken to address these risks. Theories, academic concepts, and other data are used to analyse the topic, and recommendations are made for businesses and regulatory ...
openaire   +2 more sources

A Bibliometric Review of Digitalization in Tourism Supply Chains in the Context of Industry 4.0

open access: yesStrategic Change, EarlyView.
ABSTRACT The tourism industry has experienced significant turbulence over the past two decades, characterized by dramatic advancements and formidable challenges. One notable development has been the application of Industry 4.0 technologies to various areas of the tourism supply chain. This review employs the bibliometric method to identify the research
Nghia Thi Minh Luu   +4 more
wiley   +1 more source

A Framework to Quantify the Quality of Source Code Obfuscation

open access: yesApplied Sciences
Malicious reverse engineering of software has served as a valuable technique for attackers to infringe upon and steal intellectual property. We can employ obfuscation techniques to protect against such attackers as useful tools to safeguard software ...
Hongjoo Jin   +4 more
doaj   +1 more source

MASTERING COMPLIANCE: A COMPREHENSIVE REVIEW OF REGULATORY FRAMEWORKS IN ACCOUNTING AND CYBERSECURITY

open access: yesComputer Science & IT Research Journal
In the rapidly evolving landscape of business and technology, the intersection of accounting and cybersecurity has become a focal point for organizations striving to maintain integrity, security, and regulatory adherence. This paper presents a meticulous
Temitayo Oluwaseun Abrahams   +5 more
semanticscholar   +1 more source

Unveiling the Charisma of Artificial Intelligence: How Voice Assistants Captivate Users and Emotionally Influence User Experience

open access: yesPsychology &Marketing, EarlyView.
ABSTRACT Although studies have explored user experience (UX) with artificial intelligence (AI)‐powered voice assistants (VAs), the cognitive, psychological, and emotional factors affecting user engagement and experience with VAs have yet to be investigated in depth. Drawing on cognitive absorption and broaden‐and‐build theories, this study investigates
Bibaswan Basu   +2 more
wiley   +1 more source

Teaching Security Defense Through Web-Based Hacking at the Undergraduate Level

open access: yes, 2017
The attack surface for hackers and attackers is growing every day. Future cybersecurity professionals must have the knowledge and the skills to defend against these cyber attacks.
Wilson, Brent
core  

A Situation Based Predictive Approach for Cybersecurity Intrusion Detection and Prevention Using Machine Learning and Deep Learning Algorithms in Wireless Sensor Networks of Industry 4.0

open access: yesIEEE Access
Industry 4.0 is fundamentally based on networked systems. Real-time communication between machines, sensors, devices, and people makes it easier to transmit the data needed to make decisions.
F. Al-Quayed, Z. Ahmad, M. Humayun
semanticscholar   +1 more source

After‐Sales Services Coordination Contracts in Platforms With Integration Mode Operations

open access: yesNaval Research Logistics (NRL), EarlyView.
ABSTRACT In service operations, there is an emerging integration mode between platforms, such as Gaode‐Maps DiDi‐Chuxing. In this mode of operation, consumers order on an integrated platform (such as Gaode‐Maps), but accept services from a professional platform (such as DiDi‐Chuxing) or an offline integrator (such as a taxi company).
Weihua Liu   +3 more
wiley   +1 more source

Exploring the talent training mode of “cybersecurity doctor”

open access: yes网络与信息安全学报, 2019
The competition for cyber security is ultimately the competition of talents. Countries around the world have placed cyber security talents at the national strategic level.
CHEN Xingshu, WANG Haizhou, RUAN Shuhua   +2 more
doaj   +1 more source

The future of Cybersecurity in Italy: Strategic focus area [PDF]

open access: yes, 2018
This volume has been created as a continuation of the previous one, with the aim of outlining a set of focus areas and actions that the Italian Nation research community considers essential.
Anglano, C.   +130 more
core  

Home - About - Disclaimer - Privacy