Results 81 to 90 of about 164,979 (324)
Sustainability‐Driven Legitimacy Through Industry 4.0: Insights From European Agri‐Food Giants
ABSTRACT Society is undergoing a profound transformation driven by recent social, environmental, and economic shifts. Among the most affected actors are business entities—particularly those in the agri‐food sector—due to the substantial sustainability impact of their production activities.
Angelo Corallo +3 more
wiley +1 more source
Determinants of Social Impact Through Safety Culture in Technical Organizations
ABSTRACT The aim of the article is to show the results of research on whether safety culture is the social impact of technical organizations. It is important to fix determinants of social impact through safety culture in technical organizations. Positive safety culture is the result of consistent management actions aimed at both the inner workings of ...
Christian Schachtner +2 more
wiley +1 more source
Analysis of Azure Zero Trust Architecture Implementation for Mid-Size Organizations
The Zero Trust Architecture (ZTA) security system follows the “never trust, always verify” principle. The process constantly verifies users and devices trying to access resources.
Vedran Dakić +3 more
doaj +1 more source
Enacting Expertise: Ritual and Risk in Cybersecurity
This article applies the concept of ritual to cybersecurity expertise, beginning with the cybersecurity “skills gap”: the perceived lack of suitably qualified professionals necessary to tackle contemporary cybersecurity challenges.
James Shires
doaj +1 more source
Law Firm Cybersecurity: The State of Preventative and Remedial Regulation Governing Data Breaches in the Legal Profession [PDF]
With the looming threat of the next hacking scandal, data protection efforts in law firms are becoming increasingly crucial in maintaining client confidentiality.
Tarr, Madelyn
core +1 more source
How artificial intelligence (AI) and digital twin (DT) technologies are revolutionizing tunnel surveillance, offering proactive maintenance strategies and enhanced safety protocols. It explores AI's analytical power and DT's virtual replicas of infrastructure, emphasizing their role in optimizing maintenance and safety in tunnel management.
Mohammad Afrazi +4 more
wiley +1 more source
Teaching Security Defense Through Web-Based Hacking at the Undergraduate Level
The attack surface for hackers and attackers is growing every day. Future cybersecurity professionals must have the knowledge and the skills to defend against these cyber attacks.
Wilson, Brent
core
The Data Breach Dilemma: Proactive Solutions for Protecting Consumers’ Personal Information [PDF]
Data breaches are an increasingly common part of consumers’ lives. No institution is immune to the possibility of an attack. Each breach inevitably risks the release of consumers’ personally identifiable information and the strong possibility of identity
Marcus, Daniel J.
core +1 more source
An Industry 4.0‐enabled system integrates smart sensors, augmented reality, and AI‐driven energy management to optimize heating and drying in wood furniture manufacturing. Tested in a Québec small and medium‐sized enterprise workshop, it maintains thermal comfort and material quality while reducing propane use by 86%.
Mohamed Haddouche +2 more
wiley +1 more source
The Social Psychology of Cybersecurity [PDF]
Cybersecurity incidents may seem very technological in nature, but ultimately the hackers and the organisations they target are people, with their own goals, influences and beliefs. There is a danger of relying on lazy stereotypes of those involved in cybersecurity, or taking the Hollywood portrayals of hackers and cybersecurity experts as fact.
McAlaney, John +2 more
openaire +1 more source

