Results 91 to 100 of about 79,039 (285)

A Bibliometric Review of the INCOSE's Model‐Based Systems Engineering Roadmap

open access: yesSystems Engineering, EarlyView.
ABSTRACT Over the past decade, model‐based systems engineering (MBSE) has gained attention as an approach for managing system complexity, offering a shift from a document‐based to a model‐based approach. The International Council on Systems Engineering (INCOSE) sparked increasing interest when it introduced MBSE and its roadmap as part of its systems ...
Marjolein Antoinette Jannyne Velthuizen   +2 more
wiley   +1 more source

An Adaptive Network Model to Analyse Cyber Security: Understanding Cyber Threats in Financial Institutions

open access: yes
This study investigates cybersecurity threats in financial organizations by developing an adaptive network model to mitigate attacks. Using the cyber kill chain framework, the performed simulations reveal the adaptive dynamics between attackers and defenders over time. In the first scenario, the attacker’s rapid learning leads to successful attacks and
Mestour, Wissal   +3 more
openaire   +2 more sources

Assessing Capability Complexity Using Enterprise Architecture Framework

open access: yesSystems Engineering, EarlyView.
ABSTRACT This study proposes a structured and quantitative methodology to evaluate the holistic complexity of system‐of‐systems (SoSs), employing the Zachman Architecture Framework (ZAF) as its foundational analytical tool. A five‐phase analytical procedure is developed and empirically validated, encompassing: (1) refinement of complexity measures, (2)
Javad Bakhshi, Mahmoud Efatmaneshnik
wiley   +1 more source

Cybercrime and cyber-security issues associated with China: some economic and institutional considerations [PDF]

open access: yesElectronic Commerce Research, 2013
China is linked to cybercrimes of diverse types, scales, motivations and objectives. The Chinese cyberspace thus provides an interesting setting for the study of cybercrimes. In this paper, we first develop typology, classification and characterization of cybercrimes associated with China, which would help us understand modus operandi, structures ...
openaire   +1 more source

Maximizing the Economic, Environmental, and Social Impact of the Metaverse

open access: yesThunderbird International Business Review, EarlyView.
ABSTRACT The metaverse is a transformative digital ecosystem with the potential to redefine economic, environmental, and social systems. This qualitative study examines how the metaverse and its enabling technologies—such as AR/VR, blockchain, and AI—might evolve to influence sustainability. Drawing on semi‐structured interviews with global experts and
Alessandro Lanteri   +2 more
wiley   +1 more source

Reinvestment intentions in cryptocurrency: Examining the dynamics of risks and investor risk tolerance

open access: yesDigital Business
Digital currencies, including Bitcoins, Ethereum, and others, are an established alternative asset class opted by individual and institutional investors worldwide. However, this digital asset class carries several inherent risks.
Ishtiaq Ahmad Bajwa
doaj   +1 more source

Empirical Study of Cyber Security Threats in Moldovan Higher Education Institutions

open access: yes, 2021
Higher Education Institutions HEIs have always been the target of cyber attacks due to the information assets they hold. The move to online study as a result of restrictions imposed in the spring of 2020 has led to increased cyber security threats to academia due to the vulnerabilities of online learning platforms and video conferencing applications ...
Alexei Lachi, A.   +3 more
openaire   +2 more sources

ASEAN and the non-traditional regional security agenda [PDF]

open access: yes, 2010
Without a doubt, the whole area of non-traditional security – whether it be threats, issues or challenges (the three are more or less used interchangeably in ASEAN statements and documents on the subject) – has come to occupy a prominent place on the ...
Rolls, Mark G.
core   +1 more source

Data privacy model using blockchain reinforcement federated learning approach for scalable internet of medical things

open access: yesCAAI Transactions on Intelligence Technology, EarlyView.
Abstract Internet of Medical Things (IoMT) has typical advancements in the healthcare sector with rapid potential proof for decentralised communication systems that have been applied for collecting and monitoring COVID‐19 patient data. Machine Learning algorithms typically use the risk score of each patient based on risk factors, which could help ...
Chandramohan Dhasaratha   +9 more
wiley   +1 more source

Navigating the nexus: geopolitical, international relations and technical dimensions of US-China cyber strategic competition

open access: yesCogent Social Sciences
The strategic competition between the US and China in cyberspace carries significant consequences for global security, governance and economic stability. This study utilises realist theories such as offensive realism and techno-nationalism to explore how
Nistha Kumari Singh   +2 more
doaj   +1 more source

Home - About - Disclaimer - Privacy