How blockchain technology can benefit marketing: Six pending research areas

A Rejeb, JG Keogh, H Treiblmaier - Frontiers in blockchain, 2020 - frontiersin.org
The proliferation of sophisticated e-commerce platforms coupled with mobile applications
has ignited growth in business-to-consumer (B2C) commerce, reshaped organizational …

Threat analysis of software systems: A systematic literature review

K Tuma, G Calikli, R Scandariato - Journal of Systems and Software, 2018 - Elsevier
Architectural threat analysis has become an important cornerstone for organizations
concerned with developing secure software. Due to the large number of existing techniques …

Exploring sybil and double-spending risks in blockchain systems

M Iqbal, R Matulevičius - IEEE Access, 2021 - ieeexplore.ieee.org
The first step to realise the true potential of blockchain systems is to explain the associated
security risks and vulnerabilities. These risks and vulnerabilities, exploited by the threat …

Smart organizations as a source of competitiveness and sustainable development in the age of industry 4.0: Integration of micro and macro perspective

A Adamik, D Sikora-Fernandez - Energies, 2021 - mdpi.com
The Industry 4.0 Revolution that is taking place nowadays means that organizations face not
only new opportunities, but also challenges related to the identification of their role in …

Post-quantum era privacy protection for intelligent infrastructures

L Malina, P Dzurenda, S Ricci, J Hajny… - IEEE …, 2021 - ieeexplore.ieee.org
As we move into a new decade, the global world of Intelligent Infrastructure (II) services
integrated into the Internet of Things (IoT) are at the forefront of technological advancements …

[HTML][HTML] Addressing insider attacks via forensic-ready risk management

L Daubner, M Macak, R Matulevičius… - Journal of Information …, 2023 - Elsevier
Cyberattacks perpetrated by insiders are difficult to prevent using traditional security
approaches. Often, such attackers misuse legitimate access to the system to conduct an …

An integrated conceptual model for information system security risk management supported by enterprise architecture management

N Mayer, J Aubert, E Grandry, C Feltus… - Software & Systems …, 2019 - Springer
Risk management is today a major steering tool for any organisation wanting to deal with
information system (IS) security. However, IS security risk management (ISSRM) remains a …

IoT health devices: exploring security risks in the connected landscape

AO Affia, H Finch, W Jung, IA Samori, L Potter… - IoT, 2023 - mdpi.com
The concept of the Internet of Things (IoT) spans decades, and the same can be said for its
inclusion in healthcare. The IoT is an attractive target in medicine; it offers considerable …

Cybersecurity risk management framework for blockchain identity management systems in health IoT

B Alamri, K Crowley, I Richardson - Sensors, 2022 - mdpi.com
Blockchain (BC) has recently paved the way for developing Decentralized Identity
Management (IdM) systems for different information systems. Researchers widely use it to …

Cyber security risk modeling in distributed information systems

D Palko, T Babenko, A Bigdan, N Kiktev, T Hutsol… - Applied Sciences, 2023 - mdpi.com
This paper deals with problems of the development and security of distributed information
systems. It explores the challenges of risk modeling in such systems and suggests a risk …