Results 51 to 60 of about 36,499 (202)
ABSTRACT This study examines the impact of self‐checkout technology implementation on B2B customer shopping behavior using a novel methodological approach that combines propensity score matching with difference‐in‐differences analysis on actual point‐of‐sale transaction data.
Jindřich Špička +1 more
wiley +1 more source
Initial Experiences of Building Secure Access to Patient Confidential Data via the Internet [PDF]
A project to enable health care professionals (GPs, practice nurses and diabetes nurse specialists) to access, via the Internet, confidential patient data held on a secondary care (hospital) diabetes information system, has been implemented.
Chadwick, David W. +3 more
core
Outsmarting Network Security with SDN Teleportation
Software-defined networking is considered a promising new paradigm, enabling more reliable and formally verifiable communication networks. However, this paper shows that the separation of the control plane from the data plane, which lies at the heart of ...
Schiff, Liron +2 more
core +1 more source
Web Application Firewalls (WAFs) in Protecting Software [PDF]
Web Application Firewalls (WAFs) are vital in safeguarding web applications by inspecting and managing HTTP traffic between the application and the Internet, adhering to the principles of the CIA (Confidentiality, Integrity, Availability) triangle. This paper explores the function of WAFs in enhancing security through strict traffic filtering based on ...
Ivana Bilic +3 more
openaire +1 more source
Digital Rights Activism in Multilevel Governance
ABSTRACT Multilevel governance (MLG) without a clear hierarchical structure can create power imbalances among various actors, particularly in settings with overlapping jurisdictions and policy areas. This dynamic is especially pronounced in Internet governance, which faces a complex interplay of domestic laws, state interdependence, and heightened ...
Alison Harcourt
wiley +1 more source
Implementasi Web Application Firewall (WAF) pada Aplikasi Fishku Berbasis Google Cloud Armor
Keamanan Aplikasi Website menjadi isu mendesak dalam era digital yang semakin kompleks. Penelitian ini bertujuan untuk menerapkan layanan keamanan Google Cloud Armor pada Google Cloud Platform dalam melindungi Aplikasi Website Fishku, khususnya terhadap ...
Nabila Apriliana Widiyono +1 more
doaj +1 more source
Major Cybersecurity Breaches: Shaping Corporate Cybersecurity Policies and Closing the Gaps
ABSTRACT As digitalization accelerates, cybercrime has intensified in both scale and impact over the past two decades. This study aims to critically examine major cybersecurity events, assess them through the lens of routine activity theory, examine insight from three other established criminological and organizational theories, and address central ...
Laura K. Rickett, Deborah Smith
wiley +1 more source
De-perimeterisation as a cycle: tearing down and rebuilding security perimeters [PDF]
If an organisation wants to secure its IT assets, where should the security mechanisms be placed? The traditional view is the hard-shell model, where an organisation secures all its assets using a fixed security border: What is inside the security ...
Cleeff, André van, Wieringa, Roel
core +2 more sources
ABSTRACT This paper investigates critical success factors for managing multi‐actor research partnerships for sustainable food systems along their lifecycle. Such partnerships coordinate both internal activities and manage externally funded projects. Drawing on evidence from case studies and workshops with diverse experts, the study identifies critical ...
Mechthild Donner +5 more
wiley +1 more source
Artificial Intelligence Web Application Firewall for advanced detection of web injection attacks
AbstractCurrently, web services‐based applications have an important presence in public and private organizations. The vulnerabilities that these types of applications may have pose an inherent potential risk to the business model of these organizations.
Jesús‐Ángel Román‐Gallego +3 more
openaire +1 more source

