Results 81 to 90 of about 196,474 (374)

Anonymizing cybersecurity data in critical infrastructures: the CIPSEC approach [PDF]

open access: yes, 2019
Cybersecurity logs are permanently generated by network devices to describe security incidents. With modern computing technology, such logs can be exploited to counter threats in real time or before they gain a foothold.
Estrada Jiménez, José Antonio   +5 more
core  

The gamification of cybersecurity training [PDF]

open access: yes, 2017
Due to the rapidly and continued evolving nature of technology, there is a constant need to update police officers’ training in cyber security to ensure that the UK continues to be a secure place to live and do business.
Coull, Natalie   +7 more
core   +1 more source

Cybersecurity in accounting research [PDF]

open access: yesManagerial Auditing Journal, 2019
Purpose This paper aims to update the cybersecurity-related accounting literature by synthesizing 39 recent theoretical and empirical studies on the topic. Furthermore, the paper provides a set of categories into which the studies fit. Design/methodology/approach This is a synthesis paper that summarizes the research literature on cybersecurity ...
Haapamäki, Elina, Sihvonen, Jukka
openaire   +6 more sources

DATA CONFIDENTIALITY AND INTEGRITY: A REVIEW OF ACCOUNTING AND CYBERSECURITY CONTROLS IN SUPERANNUATION ORGANIZATIONS

open access: yesComputer Science & IT Research Journal
In an era dominated by digital transformation, superannuation organizations face unprecedented challenges in safeguarding the confidentiality and integrity of sensitive financial data.
Anthony Anyanwu   +4 more
semanticscholar   +1 more source

A comprehensive study on cybersecurity challenges and opportunities in the IoT world

open access: yesSecurity and Privacy, 2023
It has become possible to link anything and everything to the Internet in recent decades due to the expanding Internet of Things (IoT). As a result, our usage of technology has changed a lot, causing digital disruption in the real world.
Aejaz Nazir Lone   +2 more
semanticscholar   +1 more source

Lean Service 5.0 in Dairy Production: An Empirical Evaluation From the Perspective of the Sociotechnical and Circular Economy Approach

open access: yesBusiness Strategy and the Environment, EarlyView.
ABSTRACT The Lean Service 5.0 concept improves service operations through sociotechnical innovation, while the Circular Economy enables sustainable processes. Thus, this research aims to empirically diagnose the key enablers of adopting LS5.0 in the dairy production system from the CE perspective. To achieve this objective, we conducted a multiple case
Andrei Bonamigo   +4 more
wiley   +1 more source

Snapshot Cherry-Picking Attack in CEX Proof of Reserves and its Mitigation

open access: yesIEEE Access
The rapid growth of the crypto asset industry has led to the adoption of proof of reserves (PoR) protocols for transparency in centralized exchanges (CEXs).
Beomjoong Kim   +3 more
doaj   +1 more source

ChatGPT: Exploring the Role of Cybersecurity in the Protection of Medical Information

open access: yesMesopotamian Journal of Cyber Security, 2023
ChatGPT is a large language model developed by OpenAI. It is trained on a dataset of conversational text and can be used to generate human-like responses to prompts in a variety of languages and formats.
Maad M. Mijwil   +2 more
semanticscholar   +1 more source

Artificial Intelligence Adoption for Sustainable Growth in SMEs: An Extended Dynamic Capability Framework

open access: yesCorporate Social Responsibility and Environmental Management, EarlyView.
ABSTRACT The adoption of Artificial Intelligence is transforming enterprises worldwide, influencing various aspects of business operations and affecting all dimensions of the triple bottom line. Companies ready to leverage the potential of this technology can significantly improve their performance.
Antonio Cimino   +4 more
wiley   +1 more source

Analysis of Artificial Intelligence regulations for trustworthiness

open access: yesProceedings of the International Florida Artificial Intelligence Research Society Conference, 2023
Artificial intelligence emerged as a powerful technology using data in the 4th Industrial Revolution. As a result, artificial intelligence is currently being considered for use in many fields due to its efficiency and function.
Hyesung Park, Hun-yeong Kwon
doaj   +1 more source

Home - About - Disclaimer - Privacy