E-commerce channel management on the manufacturers' side: ongoing debates and future research pathways

J Ballerini, D Yahiaoui, G Giovando… - Review of Managerial …, 2024 - Springer
Since the beginning of the 2000s, online commerce has been gradually taking over and
shaping the global marketplace. This has led several scholars to study the phenomenon …

A review of blockchain's role in E-Commerce transactions: Open challenges, and future research directions

L Albshaier, S Almarri, MM Hafizur Rahman - Computers, 2024 - mdpi.com
The Internet's expansion has changed how the services accessed and businesses operate.
Blockchain is an innovative technology that emerged after the rise of the Internet. In addition …

Energy-efficient clustering scheme for flying ad-hoc networks using an optimized LEACH protocol

S Bharany, S Sharma, S Badotra, OI Khalaf, Y Alotaibi… - Energies, 2021 - mdpi.com
A Flying Ad-hoc network constitutes many sensor nodes with limited processing speed and
storage capacity as they institute a minor battery-driven device with a limited quantity of …

[HTML][HTML] How commitment and platform adoption drive the e-commerce performance of SMEs: A mixed-method inquiry into e-commerce affordances

J Ballerini, D Herhausen, A Ferraris - International Journal of Information …, 2023 - Elsevier
To cope with the digital transition exacerbated by the COVID-19 pandemic, managers of
manufacturing small and medium enterprises (SMEs) need to adopt innovative practices to …

[HTML][HTML] Attributes impacting cybersecurity policy development: An evidence from seven nations

A Mishra, YI Alzoubi, MJ Anwar, AQ Gill - Computers & Security, 2022 - Elsevier
Cyber threats have risen as a result of the growing usage of the Internet. Organizations must
have effective cybersecurity policies in place to respond to escalating cyber threats …

Cybersecurity enterprises policies: A comparative study

A Mishra, YI Alzoubi, AQ Gill, MJ Anwar - Sensors, 2022 - mdpi.com
Cybersecurity is a critical issue that must be prioritized not just by enterprises of all kinds, but
also by national security. To safeguard an organization's cyberenvironments, information …

A high-accuracy phishing website detection method based on machine learning

M Bahaghighat, M Ghasemi, F Ozen - Journal of Information Security and …, 2023 - Elsevier
The rapid development of e-commerce, e-banking, and social networks has made phishing
attack detection one of the most critical technologies in all cyber security systems. To …

A novel optimization for gpu mining using overclocking and undervolting

M Shuaib, S Badotra, MI Khalid, AD Algarni, SS Ullah… - Sustainability, 2022 - mdpi.com
Cryptography and associated technologies have existed for a long time. This field is
advancing at a remarkable speed. Since the inception of its initial application, blockchain …

Applying detection leakage on hybrid cryptography to secure transaction information in e-commerce apps

M Al-Zubaidie, GS Shyaa - Future Internet, 2023 - mdpi.com
Technology advancements have driven a boost in electronic commerce use in the present
day due to an increase in demand processes, regardless of whether goods, products …

Evaluation of autism spectrum disorder based on the healthcare by using artificial intelligence strategies

A Sundas, S Badotra, S Rani, R Gyaang - Journal of Sensors, 2023 - Wiley Online Library
The behaviors of children with autism spectrum disorder (ASD) are often erratic and difficult
to predict. Most of the time, they are unable to communicate effectively in their own …