Results 181 to 190 of about 196,474 (374)
Reference Ontology for Cybersecurity Operational Information [PDF]
Takeshi Takahashi, Youki Kadobayashi
openalex +1 more source
Cybersecurity for "Open Science"
Presentation to the APLU Council on Research, September 9th ...
openaire +1 more source
The purpose of the study is to examine how cybersecurity knowledge, password security, and self-perception of skill affect cybersecurity awareness issues via the mediating lens of cybersecurity attitude among university students in Bangladesh.
Bulbul Ahamed+6 more
semanticscholar +1 more source
ABSTRACT This empirically grounded commentary explores the impacts of the COVID‐19 pandemic on the strategic direction of Canada's accounting profession and highlights opportunities and challenges that lie ahead in the post‐pandemic era. We undertake a systematic literature review using deductive and inductive approaches within both the academic ...
Merridee Bujaki+4 more
wiley +1 more source
Organizational altercasting: Developing impression management and cyber‐risk disclosures
Abstract The study develops theorizing of external organizational communications that entail impression management. This includes developing linkages to Goffman's work and a Goffmanian research tradition. Our approach innovatively articulates dimensions of impression management entailing the presentation of others and nuanced practices of what we term ...
Monika Łada+4 more
wiley +1 more source
Analysis of Azure Zero Trust Architecture Implementation for Mid-Size Organizations
The Zero Trust Architecture (ZTA) security system follows the “never trust, always verify” principle. The process constantly verifies users and devices trying to access resources.
Vedran Dakić+3 more
doaj +1 more source
Some Fundamental Cybersecurity Concepts [PDF]
Kelce S. Wilson, Muge Ayse Kiy
openalex +1 more source
The race for NCP cybersecurity
The Next computing Paradigm (NCP), with its massively interconnected components, faces compounded cybersecurity and privacy issues, at all levels of its continuum. These must be addressed for the concept to succeed.
Zendra, Olivier, Coppens, Bart
openaire +2 more sources
Governance gambits and business judgment in in/out‐sourcing tactics
Abstract This article investigates the burgeoning trend of proceduralization within corporate law, with a spotlight on the board of directors. It delves into the tension between nurturing skill diversity within the board and outsourcing specific functions, and the related paradoxical challenge: while external consultants and specialized directors ...
Maria Lucia Passador
wiley +1 more source
HOW IMPORTANT IS CYBERSECURITY DISCLOSURE FOR FIRM VALUE?
Abstrak – Seberapa Penting Pengungkapan Cybersecurity bagi Nilai Perusahaan? Tujuan Utama – Penelitian ini bertujuan untuk membuktikan peran mediasi pengungkapan cybersecurity pada pengaruh antara investasi teknologi informasi dan nilai perusahaan ...
Tri Wahyu Oktavendi, Masiyah Kholmi
doaj +1 more source