Results 181 to 190 of about 196,474 (374)

Cybersecurity for "Open Science"

open access: yes, 2017
Presentation to the APLU Council on Research, September 9th ...
openaire   +1 more source

Empowering Students for Cybersecurity Awareness Management in the Emerging Digital Era: The Role of Cybersecurity Attitude in the 4.0 Industrial Revolution Era

open access: yesSAGE Open
The purpose of the study is to examine how cybersecurity knowledge, password security, and self-perception of skill affect cybersecurity awareness issues via the mediating lens of cybersecurity attitude among university students in Bangladesh.
Bulbul Ahamed   +6 more
semanticscholar   +1 more source

A Commentary on Post‐Pandemic Challenges and Opportunities for the Accounting Profession: Insights from a Systematic Literature Review*

open access: yesAccounting Perspectives, Volume 24, Issue 1, Page 157-188, March 2025.
ABSTRACT This empirically grounded commentary explores the impacts of the COVID‐19 pandemic on the strategic direction of Canada's accounting profession and highlights opportunities and challenges that lie ahead in the post‐pandemic era. We undertake a systematic literature review using deductive and inductive approaches within both the academic ...
Merridee Bujaki   +4 more
wiley   +1 more source

Organizational altercasting: Developing impression management and cyber‐risk disclosures

open access: yesContemporary Accounting Research, EarlyView.
Abstract The study develops theorizing of external organizational communications that entail impression management. This includes developing linkages to Goffman's work and a Goffmanian research tradition. Our approach innovatively articulates dimensions of impression management entailing the presentation of others and nuanced practices of what we term ...
Monika Łada   +4 more
wiley   +1 more source

Analysis of Azure Zero Trust Architecture Implementation for Mid-Size Organizations

open access: yesJournal of Cybersecurity and Privacy
The Zero Trust Architecture (ZTA) security system follows the “never trust, always verify” principle. The process constantly verifies users and devices trying to access resources.
Vedran Dakić   +3 more
doaj   +1 more source

Some Fundamental Cybersecurity Concepts [PDF]

open access: gold, 2014
Kelce S. Wilson, Muge Ayse Kiy
openalex   +1 more source

The race for NCP cybersecurity

open access: yes
The Next computing Paradigm (NCP), with its massively interconnected components, faces compounded cybersecurity and privacy issues, at all levels of its continuum. These must be addressed for the concept to succeed.
Zendra, Olivier, Coppens, Bart
openaire   +2 more sources

Governance gambits and business judgment in in/out‐sourcing tactics

open access: yesAmerican Business Law Journal, EarlyView.
Abstract This article investigates the burgeoning trend of proceduralization within corporate law, with a spotlight on the board of directors. It delves into the tension between nurturing skill diversity within the board and outsourcing specific functions, and the related paradoxical challenge: while external consultants and specialized directors ...
Maria Lucia Passador
wiley   +1 more source

HOW IMPORTANT IS CYBERSECURITY DISCLOSURE FOR FIRM VALUE?

open access: yesJurnal Akuntansi Multiparadigma
Abstrak – Seberapa Penting Pengungkapan Cybersecurity bagi Nilai Perusahaan? Tujuan Utama – Penelitian ini bertujuan untuk membuktikan peran mediasi pengungkapan cybersecurity pada pengaruh antara investasi teknologi informasi dan nilai perusahaan ...
Tri Wahyu Oktavendi, Masiyah Kholmi
doaj   +1 more source

Home - About - Disclaimer - Privacy