[HTML][HTML] Cyber security threats: A never-ending challenge for e-commerce

X Liu, SF Ahmad, MK Anser, J Ke, M Irshad… - Frontiers in …, 2022 - frontiersin.org
This study explores the challenge of cyber security threats that e-commerce technology and
business are facing. Technology applications for e-commerce are attracting attention from …

Machine learning in cybersecurity: A review of threat detection and defense mechanisms

UI Okoli, OC Obi, AO Adewusi… - World Journal of Advanced …, 2024 - wjarr.com
The cybersecurity concerns get increasingly intricate as the digital world progresses. In light
of the increasing complexity of cyber threats, it is imperative to develop and implement …

[HTML][HTML] Attributes impacting cybersecurity policy development: An evidence from seven nations

A Mishra, YI Alzoubi, MJ Anwar, AQ Gill - Computers & Security, 2022 - Elsevier
Cyber threats have risen as a result of the growing usage of the Internet. Organizations must
have effective cybersecurity policies in place to respond to escalating cyber threats …

[HTML][HTML] Global digital convergence: Impact of cybersecurity, business transparency, economic transformation, and AML efficiency

A Kuzior, T Vasylieva, O Kuzmenko… - Journal of Open …, 2022 - mdpi.com
The article substantiates the existence of convergence processes in the field of digitization of
countries, taking into account the number of Internet users; people with advanced skills; and …

[HTML][HTML] Exploring the impact of AI-based cyber security financial sector management

S Mishra - Applied Sciences, 2023 - mdpi.com
Cyber threats are attempts to secure unauthorized access to, change, or delete private
information, to demand money from victims, or to disrupt business. Cybercrime includes …

[HTML][HTML] The effectiveness and privacy preservation of IoT on ubiquitous learning: Modern learning paradigm to enhance higher education

N El-Haggar, L Amouri, A Alsumayt, FH Alghamedy… - Applied Sciences, 2023 - mdpi.com
The progress made in Information and Communication Technologies (ICT) has played a
crucial role in turning the Internet of Things (IoT) into a reality. IoT is an emerging technology …

[HTML][HTML] Enhancing cyber-resilience for small and medium-sized organizations with prescriptive malware analysis, detection and response

LF Ilca, OP Lucian, TC Balan - Sensors, 2023 - mdpi.com
In this study, the methodology of cyber-resilience in small and medium-sized organizations
(SMEs) is investigated, and a comprehensive solution utilizing prescriptive malware …

[HTML][HTML] Digital Workplaces and Information Security Behavior of Business Employees: An Empirical Study of Saudi Arabia

S Saeed - Sustainability, 2023 - mdpi.com
In the post pandemic era, the telecommuting of business employees has widely become
acceptable in organizations, which demands extensive dependence on digital technologies …

[HTML][HTML] Exploring cybersecurity education and training techniques: a comprehensive review of traditional, virtual reality, and augmented reality approaches

AM Alnajim, S Habib, M Islam, HS AlRawashdeh… - Symmetry, 2023 - mdpi.com
Considering the alarming increase in cyberattacks and their potential financial implications,
the importance of cybersecurity education and training cannot be overstated. This paper …

The Concept of Facilities and Infrastructure Management in Schools: A Literature Review

A Nurhuda, M Al Fajri… - … (International Journal of …, 2023 - journal.ummat.ac.id
Education is a long-term investment in human resources and aims to produce quality
generations. One way to guarantee the achievement of this goal is to require standards for …