Results 81 to 90 of about 196,474 (374)
Anonymizing cybersecurity data in critical infrastructures: the CIPSEC approach [PDF]
Cybersecurity logs are permanently generated by network devices to describe security incidents. With modern computing technology, such logs can be exploited to counter threats in real time or before they gain a foothold.
Estrada Jiménez, José Antonio+5 more
core
The gamification of cybersecurity training [PDF]
Due to the rapidly and continued evolving nature of technology, there is a constant need to update police officers’ training in cyber security to ensure that the UK continues to be a secure place to live and do business.
Coull, Natalie+7 more
core +1 more source
Cybersecurity in accounting research [PDF]
Purpose This paper aims to update the cybersecurity-related accounting literature by synthesizing 39 recent theoretical and empirical studies on the topic. Furthermore, the paper provides a set of categories into which the studies fit. Design/methodology/approach This is a synthesis paper that summarizes the research literature on cybersecurity ...
Haapamäki, Elina, Sihvonen, Jukka
openaire +6 more sources
In an era dominated by digital transformation, superannuation organizations face unprecedented challenges in safeguarding the confidentiality and integrity of sensitive financial data.
Anthony Anyanwu+4 more
semanticscholar +1 more source
A comprehensive study on cybersecurity challenges and opportunities in the IoT world
It has become possible to link anything and everything to the Internet in recent decades due to the expanding Internet of Things (IoT). As a result, our usage of technology has changed a lot, causing digital disruption in the real world.
Aejaz Nazir Lone+2 more
semanticscholar +1 more source
ABSTRACT The Lean Service 5.0 concept improves service operations through sociotechnical innovation, while the Circular Economy enables sustainable processes. Thus, this research aims to empirically diagnose the key enablers of adopting LS5.0 in the dairy production system from the CE perspective. To achieve this objective, we conducted a multiple case
Andrei Bonamigo+4 more
wiley +1 more source
Snapshot Cherry-Picking Attack in CEX Proof of Reserves and its Mitigation
The rapid growth of the crypto asset industry has led to the adoption of proof of reserves (PoR) protocols for transparency in centralized exchanges (CEXs).
Beomjoong Kim+3 more
doaj +1 more source
ChatGPT: Exploring the Role of Cybersecurity in the Protection of Medical Information
ChatGPT is a large language model developed by OpenAI. It is trained on a dataset of conversational text and can be used to generate human-like responses to prompts in a variety of languages and formats.
Maad M. Mijwil+2 more
semanticscholar +1 more source
ABSTRACT The adoption of Artificial Intelligence is transforming enterprises worldwide, influencing various aspects of business operations and affecting all dimensions of the triple bottom line. Companies ready to leverage the potential of this technology can significantly improve their performance.
Antonio Cimino+4 more
wiley +1 more source
Analysis of Artificial Intelligence regulations for trustworthiness
Artificial intelligence emerged as a powerful technology using data in the 4th Industrial Revolution. As a result, artificial intelligence is currently being considered for use in many fields due to its efficiency and function.
Hyesung Park, Hun-yeong Kwon
doaj +1 more source