Results 51 to 60 of about 36,499 (202)

The Impact of Self‐Checkout Technology on Shopping Behavior in B2B Retail: Evidence From Point‐Of‐Sale Transaction Data

open access: yesJournal of Consumer Behaviour, EarlyView.
ABSTRACT This study examines the impact of self‐checkout technology implementation on B2B customer shopping behavior using a novel methodological approach that combines propensity score matching with difference‐in‐differences analysis on actual point‐of‐sale transaction data.
Jindřich Špička   +1 more
wiley   +1 more source

Initial Experiences of Building Secure Access to Patient Confidential Data via the Internet [PDF]

open access: yes, 2000
A project to enable health care professionals (GPs, practice nurses and diabetes nurse specialists) to access, via the Internet, confidential patient data held on a secondary care (hospital) diabetes information system, has been implemented.
Chadwick, David W.   +3 more
core  

Outsmarting Network Security with SDN Teleportation

open access: yes, 2017
Software-defined networking is considered a promising new paradigm, enabling more reliable and formally verifiable communication networks. However, this paper shows that the separation of the control plane from the data plane, which lies at the heart of ...
Schiff, Liron   +2 more
core   +1 more source

Web Application Firewalls (WAFs) in Protecting Software [PDF]

open access: yes
Web Application Firewalls (WAFs) are vital in safeguarding web applications by inspecting and managing HTTP traffic between the application and the Internet, adhering to the principles of the CIA (Confidentiality, Integrity, Availability) triangle. This paper explores the function of WAFs in enhancing security through strict traffic filtering based on ...
Ivana Bilic   +3 more
openaire   +1 more source

Digital Rights Activism in Multilevel Governance

open access: yesEuropean Policy Analysis, EarlyView.
ABSTRACT Multilevel governance (MLG) without a clear hierarchical structure can create power imbalances among various actors, particularly in settings with overlapping jurisdictions and policy areas. This dynamic is especially pronounced in Internet governance, which faces a complex interplay of domestic laws, state interdependence, and heightened ...
Alison Harcourt
wiley   +1 more source

Implementasi Web Application Firewall (WAF) pada Aplikasi Fishku Berbasis Google Cloud Armor

open access: yesJournal of Internet and Software Engineering
Keamanan Aplikasi Website menjadi isu mendesak dalam era digital yang semakin kompleks. Penelitian ini bertujuan untuk menerapkan layanan keamanan Google Cloud Armor pada Google Cloud Platform dalam melindungi Aplikasi Website Fishku, khususnya terhadap ...
Nabila Apriliana Widiyono   +1 more
doaj   +1 more source

Major Cybersecurity Breaches: Shaping Corporate Cybersecurity Policies and Closing the Gaps

open access: yesJournal of Corporate Accounting &Finance, EarlyView.
ABSTRACT As digitalization accelerates, cybercrime has intensified in both scale and impact over the past two decades. This study aims to critically examine major cybersecurity events, assess them through the lens of routine activity theory, examine insight from three other established criminological and organizational theories, and address central ...
Laura K. Rickett, Deborah Smith
wiley   +1 more source

De-perimeterisation as a cycle: tearing down and rebuilding security perimeters [PDF]

open access: yes, 2008
If an organisation wants to secure its IT assets, where should the security mechanisms be placed? The traditional view is the hard-shell model, where an organisation secures all its assets using a fixed security border: What is inside the security ...
Cleeff, André van, Wieringa, Roel
core   +2 more sources

Critical Success Factors and a Modus Operandi Framework for Managing Multi‐Actor Research Partnerships for Sustainable Food Systems

open access: yesSustainable Development, EarlyView.
ABSTRACT This paper investigates critical success factors for managing multi‐actor research partnerships for sustainable food systems along their lifecycle. Such partnerships coordinate both internal activities and manage externally funded projects. Drawing on evidence from case studies and workshops with diverse experts, the study identifies critical ...
Mechthild Donner   +5 more
wiley   +1 more source

Artificial Intelligence Web Application Firewall for advanced detection of web injection attacks

open access: yesExpert Systems, 2023
AbstractCurrently, web services‐based applications have an important presence in public and private organizations. The vulnerabilities that these types of applications may have pose an inherent potential risk to the business model of these organizations.
Jesús‐Ángel Román‐Gallego   +3 more
openaire   +1 more source

Home - About - Disclaimer - Privacy