[HTML][HTML] Developing a data breach protection capability framework in retailing

MR Uddin, S Akter, WJT Lee - International Journal of Production …, 2024 - Elsevier
Protecting data in retail operations is vital in the age of data-driven digital transformation.
Businesses face a constant challenge from data breaches due to the unpredictable and …

Autonomous Threat Hunting: A Future Paradigm for AI-Driven Threat Intelligence

SR Sindiramutty - arXiv preprint arXiv:2401.00286, 2023 - arxiv.org
The evolution of cybersecurity has spurred the emergence of autonomous threat hunting as
a pivotal paradigm in the realm of AI-driven threat intelligence. This review navigates …

What Works Well? A Safety-II Approach to Cybersecurity

T van Steen, C Del-Real, B van den Berg - International Conference on …, 2024 - Springer
The field of cybersecurity is used to focusing on what goes wrong. Threats, incidents, and
impact are factors that are widely investigated, and the solutions presented often lie in …

We need to aim at the top: Factors associated with cybersecurity awareness of cyber and information security decision-makers

S Vrhovec, B Markelj - arXiv preprint arXiv:2404.04725, 2024 - arxiv.org
Cyberattacks pose a significant business risk to organizations. Although there is ample
literature focusing on why people pose a major risk to organizational cybersecurity and how …

Scientometric insights into dynamic capabilities: measuring academic impact and trends

CA Martínez-Pinzón… - Clío América, 2024 - revistas.unimagdalena.edu.co
The business world is characterized by the rapid pace of changes in technological, political,
and economic spheres. It is important to have the theoretical foundations that allow for the …

Digital Transformation of Marketing Processes, Customer Privacy, Data Security, and Emerging Challenges in Fostering Sustainable Digital Marketing

H Gull, S Saeed, HAK Alaied, ANA Alajmi… - Ethical AI and Data …, 2024 - igi-global.com
Marketing is a core business function to communicate the value of a product to its customers.
Digital technologies have transformed this business function into digital marketing, which is …

DEVELOPONG DYNAMIC CAPABILITIES TO INCREASE CYBERSECURITY POLICYMAKING AGILITY AND RESILIENCE

M Afshari Mofrad, B Abedin, A Amrollahi - 2024 - aisel.aisnet.org
Organizations need to keep pace with the ever-changing dynamics of their cyber
environments. A crucial facet of this adaptability involves embracing agility in cybersecurity …

Ciberseguridad para mejorar el proceso de matrícula en una institución educativa, Lima, 2023

KA Sanchez Magallanes - 2024 - repositorio.ucv.edu.pe
Mediante la presente investigación se tuvo como objetivo demostrar que la ciberseguridad
mejora el proceso de matrícula en la ficha de registro de los estudiantes de una institución …

Simuliacinė aplinka aktyvios kibernetinės žvalgybos tyrimams

A Petraška - 2024 - dspace.kaunokolegija.lt
Autorius Ainoras Petraška. Simuliacinė aplinka aktyvios kibernetinės žvalgybos tyrimams.
Baigiamasis darbas. Vadovas Paulius Baltrušaitis. Kauno kolegija, Technologijų fakultetas …

[PDF][PDF] Analyze the Network Firewall Traffic of Malware Infecting IoT Firmware in Hospitals

C Chan, T Lee - osf.io
The integration of Internet of Things (IoT) devices within healthcare facilities has brought
significant advancements in patient care through increased data connectivity and medical …