Results 111 to 120 of about 196,474 (374)
ABSTRACT. This article explores the different standards for cybersecurity in payments, the possible future threats for payment cybersecurity, and the most pressing actions that need to be taken to address these risks. Theories, academic concepts, and other data are used to analyse the topic, and recommendations are made for businesses and regulatory ...
openaire +2 more sources
A Bibliometric Review of Digitalization in Tourism Supply Chains in the Context of Industry 4.0
ABSTRACT The tourism industry has experienced significant turbulence over the past two decades, characterized by dramatic advancements and formidable challenges. One notable development has been the application of Industry 4.0 technologies to various areas of the tourism supply chain. This review employs the bibliometric method to identify the research
Nghia Thi Minh Luu+4 more
wiley +1 more source
A Framework to Quantify the Quality of Source Code Obfuscation
Malicious reverse engineering of software has served as a valuable technique for attackers to infringe upon and steal intellectual property. We can employ obfuscation techniques to protect against such attackers as useful tools to safeguard software ...
Hongjoo Jin+4 more
doaj +1 more source
In the rapidly evolving landscape of business and technology, the intersection of accounting and cybersecurity has become a focal point for organizations striving to maintain integrity, security, and regulatory adherence. This paper presents a meticulous
Temitayo Oluwaseun Abrahams+5 more
semanticscholar +1 more source
ABSTRACT Although studies have explored user experience (UX) with artificial intelligence (AI)‐powered voice assistants (VAs), the cognitive, psychological, and emotional factors affecting user engagement and experience with VAs have yet to be investigated in depth. Drawing on cognitive absorption and broaden‐and‐build theories, this study investigates
Bibaswan Basu+2 more
wiley +1 more source
Teaching Security Defense Through Web-Based Hacking at the Undergraduate Level
The attack surface for hackers and attackers is growing every day. Future cybersecurity professionals must have the knowledge and the skills to defend against these cyber attacks.
Wilson, Brent
core
Industry 4.0 is fundamentally based on networked systems. Real-time communication between machines, sensors, devices, and people makes it easier to transmit the data needed to make decisions.
F. Al-Quayed, Z. Ahmad, M. Humayun
semanticscholar +1 more source
After‐Sales Services Coordination Contracts in Platforms With Integration Mode Operations
ABSTRACT In service operations, there is an emerging integration mode between platforms, such as Gaode‐Maps DiDi‐Chuxing. In this mode of operation, consumers order on an integrated platform (such as Gaode‐Maps), but accept services from a professional platform (such as DiDi‐Chuxing) or an offline integrator (such as a taxi company).
Weihua Liu+3 more
wiley +1 more source
Exploring the talent training mode of “cybersecurity doctor”
The competition for cyber security is ultimately the competition of talents. Countries around the world have placed cyber security talents at the national strategic level.
CHEN Xingshu, WANG Haizhou, RUAN Shuhua+2 more
doaj +1 more source
The future of Cybersecurity in Italy: Strategic focus area [PDF]
This volume has been created as a continuation of the previous one, with the aim of outlining a set of focus areas and actions that the Italian Nation research community considers essential.
Anglano, C.+130 more
core