Understanding cybersecurity frameworks and information security standards—a review and comprehensive overview

H Taherdoost - Electronics, 2022 - mdpi.com
Businesses are reliant on data to survive in the competitive market, and data is constantly in
danger of loss or theft. Loss of valuable data leads to negative consequences for both …

[PDF][PDF] Analysis of the implementation of urban computing in smart cities: A framework for the transformation of Saudi cities

HM Alshuwaikhat, YA Aina, L Binsaedan - Heliyon, 2022 - cell.com
Smart city development is gaining widespread acceptance as a means of mitigating urban
development problems. However, the implementation of smart cities faces challenges …

Analyzing the adoption challenges of the Internet of things (Iot) and artificial intelligence (ai) for smart cities in china

K Wang, Y Zhao, RK Gangadhari, Z Li - Sustainability, 2021 - mdpi.com
Smart cities play a vital role in the growth of a nation. In recent years, several countries have
made huge investments in developing smart cities to offer sustainable living. However, there …

Fostering awareness on environmentally sustainable technological solutions for the post-harvest food supply chain

CM Fernandez, J Alves, PD Gaspar, TM Lima - Processes, 2021 - mdpi.com
This study presents a current status and future trends of innovative and environmentally
sustainable technological solutions for the post-harvest food supply chain and the food …

[HTML][HTML] Towards an interdisciplinary development of IoT-enhanced business processes

P Valderas, V Torres, E Serral - Business & Information Systems …, 2023 - Springer
Abstract IoT-enhanced Business Processes make use of sensors and actuators to carry out
the process tasks and achieve a specific goal. One of the most important difficulties in the …

Data replication techniques in the Internet of Things: a systematic literature review

X Sun, G Wang, L Xu, H Yuan - Library Hi Tech, 2021 - emerald.com
Purpose In data grids, replication has been regarded as a crucial optimization strategy.
Computing tasks are performed on IoT gateways at the cloud edges to obtain a prompt …

Computational intelligence, machine learning techniques, and IOT

K Vijayakumar - Concurrent Engineering, 2021 - journals.sagepub.com
In the current scenario, automated approaches are widely adopted in various domains to
implement the computerized monitoring and regulation. The massive advancement in the …

The cybersecurity focus area maturity (CYSFAM) model

B Yigit Ozkan, S van Lingen, M Spruit - Journal of Cybersecurity and …, 2021 - mdpi.com
The cost of recovery after a cybersecurity attack is likely to be high and may result in the loss
of business at the extremes. Evaluating the acquired cybersecurity capabilities and evolving …

[PDF][PDF] JOURNAL OF NORTHEASTERN UNIVERSITY

A Tiwari - Journal of Northeastern University, 2022 - dbdxxb.cn
The rapid rise of the economy can be attributed in large part to the emergence of business
conducted online. E-commerce means electronic commerce. E-commerce, also known as" …

How do organizations seek cyber assurance? Investigations on the adoption of the common criteria and beyond

N Sun, CT Li, H Chan, MZ Islam, MR Islam… - IEEE …, 2022 - ieeexplore.ieee.org
Cyber assurance, which is the ability to operate under the onslaught of cyber attacks and
other unexpected events, is essential for organizations facing inundating security threats on …