What are the trend and core knowledge of information security? A citation and co-citation analysis

WL Shiau, X Wang, F Zheng - Information & Management, 2023 - Elsevier
Abstract Information technology brings business success opportunities, but also causes
potential safety hazards to organizations. In response to the increasing academia and …

Applying LSA text mining technique in envisioning social impacts of emerging technologies: The case of drone technology

H Kwon, J Kim, Y Park - Technovation, 2017 - Elsevier
This research proposes a novel method of identifying and understanding the holistic
overview of emerging technologies' unintended consequences. Latent Semantic Analysis …

Layered structures of robustness and resilience: Evidence from cybersecurity projects for critical infrastructures in Central Europe

F Maurer, A Fritzsche - Strategic Change, 2023 - Wiley Online Library
The article studies cybersecurity projects from the perspective of social systems theory.
Measures taken to increase cybersecurity are aimed at the robustness and resilience of …

Proactive development of emerging technology in a socially responsible manner: Data-driven problem solving process using latent semantic analysis

H Kwon, Y Park - Journal of Engineering and Technology Management, 2018 - Elsevier
This article offers a quantitative method of realizing the responsible development of
emerging technologies via text analysis of future-oriented web data and scientific publication …

Data-driven Product Functional Configuration: Patent Data and Hypergraph

W Lin, X Liu, R Xiao - Chinese Journal of Mechanical Engineering, 2022 - Springer
The product functional configuration (PFC) is typically used by firms to satisfy the individual
requirements of customers and is realized based on market analysis. This study aims to help …

Using linguistics to mine unstructured data from FASB exposure drafts

KE Karim, KJ Lin, RE Pinsker… - Journal of Information …, 2019 - publications.aaahq.org
Accounting standard setting is a high-stakes, political, and market process influenced by
constituents through a public commenting mechanism. Comment letters are widely studied …

Information Security Management in High Quality IS Journals: A Review and Research Agenda

S Maynard, A Ahmad - arXiv preprint arXiv:2208.13087, 2022 - arxiv.org
In the digital age, the protection of information resources is critical to the viability of
organizations. Information Security Management (ISM) is a protective function that preserves …

A Process Model to Improve Information Security Governance in Organisations

CK Wong - arXiv preprint arXiv:2302.01753, 2023 - arxiv.org
Information security governance (ISG) is a relatively new and under-researched topic. A
review of literature shows the lack of an ISG framework or model that can help the …

Understanding the main failure scenarios of subsea blowout preventers systems: An approach through Latent Semantic Analysis

GJM de Aguiar, RB Narcizo, R Cardoso… - arXiv preprint arXiv …, 2023 - arxiv.org
The blowout preventer (BOP) system is one of the most important well safety barriers during
the drilling phase because it can prevent the development of blowout events. This paper …

[PDF][PDF] An Approach using SVD in Latent Semantic Analysis for Topic Modeling: Analyzing Frequent Failure Scenarios in Subsea Blowout Preventer Systems

GJM de Aguiara, RB Narcizoa… - Available at SSRN …, 2024 - researchgate.net
The blowout preventer (BOP) system is one of the most important well safety barriers during
the drilling phase because it can prevent the development of blowout events. 1312 …