Reviewing third-party risk management: best practices in accounting and cybersecurity for superannuation organizations

TO Abrahams, OA Farayola, S Kaggwa… - Finance & Accounting …, 2024 - fepbl.com
This paper conducts a comprehensive review of third-party risk management practices
tailored to the unique context of superannuation organizations, with a specific focus on …

Modeling digital business ecosystems: a systematic literature review

CH Tsai, J Zdravkovic, J Stirna - Complex Systems Informatics …, 2022 - csimq-journals.rtu.lv
The changing business landscapes urge organizations to collaborate and combine their
expertise to stay competitive. Organizations establish partnerships and collaborate via the …

[HTML][HTML] Systematically understanding cybersecurity economics: A survey

M Kianpour, SJ Kowalski, H Øverby - Sustainability, 2021 - mdpi.com
Insights in the field of cybersecurity economics empower decision makers to make informed
decisions that improve their evaluation and management of situations that may lead to …

Enhancing privacy‐preserving mechanisms in Cloud storage: A novel conceptual framework

A Mishra, TS Jabar, YI Alzoubi… - … Practice and Experience, 2023 - Wiley Online Library
Data privacy is critical for users who want to use Cloud storage services. There is a
significant focus on Cloud service providers to address this need. However, in the evolving …

[HTML][HTML] The influence mechanism of strategic partnership on Enterprise performance: exploring the chain mediating role of information sharing and supply chain …

Y Yang, Y Zheng, G Xie, Y Tian - Sustainability, 2022 - mdpi.com
In the context of the digital economy, establishing close strategic partnerships to cope with
market uncertainties is an important strategic choice for firms seeking to achieve sustainable …

Maximizing the benefits from sharing cyber threat intelligence by government agencies and departments

J Dykstra, LA Gordon, MP Loeb… - Journal of …, 2023 - academic.oup.com
The primary objective of the current study is to analytically examine the economic benefits
an organization can obtain by receiving and processing cyber threat intelligence (CTI) …

Sharing is caring: Hurdles and prospects of open, crowd-sourced cyber threat intelligence

V Jesus, B Bains, V Chang - IEEE Transactions on Engineering …, 2023 - ieeexplore.ieee.org
Cyber threat intelligence (CTI) is widely recognized as an important area in cybersecurity but
it remains an area showing silos and reserved for large organizations. For an area whose …

Towards a trustful game-theoretic mechanism for data trading in the blockchain-IoT ecosystem

S Khezr, A Yassine, R Benlamri - Journal of Network and Systems …, 2022 - Springer
This paper introduces a data trading system based on the blockchain network, where a
trusted data aggregator collects data from the Internet of Things (IoT) device owners and …

[HTML][HTML] The economics of sharing unclassified cyber threat intelligence by government agencies and departments

J Dykstra, LA Gordon, MP Loeb, L Zhou - Journal of Information Security, 2022 - scirp.org
This paper extends the literature on the economics of sharing cybersecurity information by
and among profit-seeking firms by modeling the case where a government agency or …

[HTML][HTML] EE-ISAC—practical cybersecurity solution for the energy sector

T Wallis, R Leszczyna - Energies, 2022 - mdpi.com
A recent survey of cybersecurity assessment methods proposed by the scientific community
revealed that their practical adoption constitutes a great challenge. Further research that …