Reviewing third-party risk management: best practices in accounting and cybersecurity for superannuation organizations

TO Abrahams, OA Farayola, S Kaggwa… - Finance & Accounting …, 2024 - fepbl.com
This paper conducts a comprehensive review of third-party risk management practices
tailored to the unique context of superannuation organizations, with a specific focus on …

Eleven years of cyberattacks on Chinese supply chains in an era of cyber warfare, a review and future research agenda

J Pérez-Morón - Journal of Asia Business Studies, 2022 - emerald.com
Purpose The contribution of this study aims to twofold: First, it provides an overview of the
current state of research on cyberattacks on Chinese supply chains (SCs). Second, it offers a …

Artificial Intelligence in Terms of Spotting Malware and Delivering Cyber Risk Management

G Jakka, N Yathiraju, MF Ansari - Journal of Positive School …, 2022 - journalppw.com
Cyber security is an effective area of “Computer Science and Engineering (CSE)” and this
system generates a detailed idea to students of CSE, a hands-on practical experience to …

Cyber threats classifications and countermeasures in banking and financial sector

AA Darem, AA Alhashmi, TM Alkhaldi… - IEEE …, 2023 - ieeexplore.ieee.org
The banking and financial sector has always been a prime target for cyber threats due to the
critical nature of the information they handle. With the increasing dependence on technology …

The impact of e-banking service quality on the sustainable customer satisfaction: Evidence from the Saudi Arabia commercial banking sector

M Alkhaibari, A Albarq, M Elrayah… - … Journal of Data and …, 2023 - growingscience.com
The banking sector around the globe has witnessed a huge development in its services and
products. The electronic banking services are considered as a competitive advantage for the …

Enhancing Software Supply Chain Resilience: Strategy For Mitigating Software Supply Chain Security Risks And Ensuring Security Continuity In Development …

A Akinsola, A Akinde - arXiv preprint arXiv:2407.13785, 2024 - arxiv.org
This article delves into the strategic approaches and preventive measures necessary to
safeguard the software supply chain against evolving threats. It aims to foster an …

Fuzzy expert system of Information security risk assessment on the example of analysis learning management systems

SA Abdymanapov, M Muratbekov, S Altynbek… - IEEE …, 2021 - ieeexplore.ieee.org
The rapid development and application of new digital technologies has, on the one hand,
opened up new opportunities for more efficient management of technological and business …

[HTML][HTML] Healthcare breaches during COVID-19: the effect of the healthcare entity type on the number of impacted individuals

M Ignatovski - Perspectives in Health Information Management, 2022 - ncbi.nlm.nih.gov
The COVID-19 pandemic led to an increase in cybersecurity attacks on organizations
operating in the healthcare industry. Health information professionals and health executives …

A new framework for agile cybersecurity risk management: Integrating continuous adaptation and real-time threat intelligence (ACSRM-ICTI)

M Zaydi, Y Maleh, Y Khourdifi - Agile Security in the Digital Era, 2025 - taylorfrancis.com
In an ever-evolving digital world, where cybersecurity threats are becoming increasingly
sophisticated, agility in cybersecurity risk management (CSRM) has become crucial. This …

Understanding the association of personal outlook in free speech regulation and the risk of being mis/disinformed

KM Caramancion - 2021 IEEE World AI IoT Congress (AIIoT), 2021 - ieeexplore.ieee.org
This paper explores the relationship between a person's outlook on the issues of freedom of
speech (IV1), fake news regulation (IV2), and the risk of him/her falling prey to …