Results 61 to 70 of about 164,979 (324)
Crossing the third‐level digital divide through digital literacy programs
Abstract Digital literacy programs (DLPs) implemented by community‐anchored organizations have become a key focus toward achieving digital equity. However, there is a notable lack of quantitative empirical research that measures DLPs' effectiveness in supporting the achievement of tangible benefits of digital literacy (DL), beyond simply acquiring it ...
Yeweon Kim +2 more
wiley +1 more source
In today’s world of complex cybersecurity threats, it is crucial for organizations to follow strong security frameworks. This research introduces a new way to combine the National Cybersecurity Authority’s Essential Cybersecurity Controls ...
Rayan Mosli
doaj +1 more source
Encouraging Employee Engagement With Cybersecurity: How to Tackle Cyber Fatigue
Cybersecurity fatigue is a form of work disengagement specific to cybersecurity. It manifests as a weariness or aversion to cybersecurity-related workplace behaviors or advice and occurs as a result of prior overexposure to cybersecurity-related work ...
A. Reeves, P. Delfabbro, D. Calic
doaj +1 more source
Cybersecurity in accounting research [PDF]
Purpose This paper aims to update the cybersecurity-related accounting literature by synthesizing 39 recent theoretical and empirical studies on the topic. Furthermore, the paper provides a set of categories into which the studies fit. Design/methodology/approach This is a synthesis paper that summarizes the research literature on cybersecurity ...
Haapamäki, Elina, Sihvonen, Jukka
openaire +6 more sources
ABSTRACT The Lean Service 5.0 concept improves service operations through sociotechnical innovation, while the Circular Economy enables sustainable processes. Thus, this research aims to empirically diagnose the key enablers of adopting LS5.0 in the dairy production system from the CE perspective. To achieve this objective, we conducted a multiple case
Andrei Bonamigo +4 more
wiley +1 more source
Cybersecurity in the Classroom: Bridging the Gap Between Computer Access and Online Safety [PDF]
According to ISACA, there will be a global shortage of 2 million cybersecurity professionals worldwide by 2019. Additionally, according to Experian Data Breach Resolution, as much as 80% of all network breaches can be traced to employee negligence. These
Malecki, Andrew
core +1 more source
ABSTRACT This paper investigates the impact of Fintech and green finance on enhancing sustainability performance through information technology governance. We collected questionnaires from 611 banking institutions in Nigeria, Ghana, and Cameroon from May to October 2024 and analyzed them with Partial Least Squares‐Structural Equation Modeling and ...
Mandella Osei‐Assibey Bonsu +3 more
wiley +1 more source
Digital interaction: where are we going? [PDF]
In the framework of the AVI 2018 Conference, the interuniversity center ECONA has organized a thematic workshop on "Digital Interaction: where are we going?".
Amendola, Massimo +17 more
core +1 more source
ABSTRACT The advent of technologies has reshaped the world of business as we know it, and prompted companies of all sizes to innovate in an effort to keep up with the ever‐increasing demands and expectations of stakeholders. Several articles have explored the impact of innovation on the performance of businesses, yet little is known about the effects ...
Edoardo Crocco +3 more
wiley +1 more source
Snapshot Cherry-Picking Attack in CEX Proof of Reserves and its Mitigation
The rapid growth of the crypto asset industry has led to the adoption of proof of reserves (PoR) protocols for transparency in centralized exchanges (CEXs).
Beomjoong Kim +3 more
doaj +1 more source

