Trustworthy recommender systems

S Wang, X Zhang, Y Wang, F Ricci - ACM Transactions on Intelligent …, 2024 - dl.acm.org
Recommender systems (RSs) aim at helping users to effectively retrieve items of their
interests from a large catalogue. For a quite long time, researchers and practitioners have …

[HTML][HTML] Beyond Data Protection: Exploring the Convergence between Cybersecurity and Sustainable Development in Business

FI Morales-Sáenz, JM Medina-Quintero… - Sustainability, 2024 - mdpi.com
The increase in the use of information technology (IT) poses a challenge derived from the
risks and threats of computer security in all areas of society. In this sense, cybersecurity …

[HTML][HTML] Cascading information on best practice: Cyber security risk management in UK micro and small businesses and the role of IT companies

A Cartwright, E Cartwright, ES Edun - Computers & Security, 2023 - Elsevier
Micro and small businesses are increasingly reliant on digital and online technology. They
have, though, very limited resources and expertise to devote to cyber security. There is, thus …

A comprehensive cybersecurity framework for present and future global information technology organizations

W Shafik - Effective Cybersecurity Operations for Enterprise-Wide …, 2023 - igi-global.com
This chapter examines how education, technology, national and international regulations
contribute to a comprehensive cybersecurity framework for present and future global IT …

Exploring the impact of cybersecurity on using electronic health records and their performance among healthcare professionals: A multi-analytical SEM-ANN approach

M Ala'a, T Ramayah, MA Al-Sharafi - Technology in Society, 2024 - Elsevier
Cybersecurity is critical in safeguarding sensitive information against evolving threats,
especially in the healthcare sector, where Electronic Health Records (EHR) are central to …

Building a thematic framework of cybersecurity: a systematic literature review approach

TY Khaw, A Amran, AP Teoh - Journal of Systems and Information …, 2024 - emerald.com
Purpose This paper aims to explore the factors affecting cybersecurity implementation in
organizations in various countries and develop a cybersecurity framework to improve …

Ai-enabled system for efficient and effective cyber incident detection and response in cloud environments

MAM Farzaan, MC Ghanem, A El-Hajjar… - arXiv preprint arXiv …, 2024 - arxiv.org
The escalating sophistication and volume of cyber threats in cloud environments necessitate
a paradigm shift in strategies. Recognising the need for an automated and precise response …

[HTML][HTML] Exploring the economic role of cybersecurity in SMEs: A case study of the UK

MF Arroyabe, CFA Arranz, IF De Arroyabe… - Technology in …, 2024 - Elsevier
This study explores the economic role of cybersecurity in Small and Medium Enterprises
(SMEs), situating cybersecurity within the framework of merit-goods within the economic …

The cybersecurity applied by online travel agencies and hotels to protect users' private data in smart cities

L Florido-Benítez - Smart Cities, 2024 - mdpi.com
The purpose of this paper is to analyse the cybersecurity in online travel agencies (OTAs)
and hotel sectors to protect users' private data in smart cities. Methodologically, this research …

Cybersecurity resilience in SMEs. A machine learning approach

JC Fernandez de Arroyabe, MF Arroyabe… - Journal of Computer …, 2024 - Taylor & Francis
This study investigates cybersecurity resilience in small and medium-sized enterprises
(SMEs), focusing on three key aspects: the capacity to handle potential cyber incidents, the …