Abstract Cyber Threat Intelligence (CTI) sharing has become a novel weapon in the arsenal of cyber defenders to proactively mitigate increasing cyber attacks. Automating the process …
The Internet and information technology have influenced human life significantly. However, information security is still an important concern for both users and organizations …
Abstract Knowledge Management (KM) processes play a significant role in the implementation of various Information Systems (IS). Several review studies were carried out …
Today, the Internet can be considered to be a basic commodity, similar to electricity, without which many businesses simply cannot operate. However, information security for both …
Abstract Knowledge sharing plays an important role in the domain of information security, due to its positive effect on employees' information security awareness. It is acknowledged …
MA Fauzi - Knowledge Management & E-Learning, 2022 - ERIC
Partial least square structural equation modelling (PLS-SEM) has been used as a popular research method in various disciplines, including knowledge management (KM). This paper …
A Yeboah - Cogent business & management, 2023 - Taylor & Francis
The main objective of this paper is to bring together scattered literature on knowledge sharing, and analyse them to provide a better understanding of the concept and to suggest …
The opportunity to capture the opinions of the general public about multiple topics such as social events, marketing campaigns, and product preferences has raised more and more …
H Mohammadi - Computers in Human Behavior, 2015 - Elsevier
The purpose of this paper is to explore the effects of perceived ease of use, perceived usefulness, subjective norm, perceived image, personal innovativeness, individual mobility …