The extent and impact of intellectual capital research: a two decade analysis

U Bamel, V Pereira, M Del Giudice… - Journal of Intellectual …, 2022 - emerald.com
Purpose This paper examines the leading publication trends including the extent and impact
of intellectual capital research in the Journal of Intellectual Capital (JIC) over a two-decade …

Toward an intellectual capital cyber security theory: insights from Lebanon

P Balozian, D Leidner, B Xue - Journal of Intellectual Capital, 2022 - emerald.com
Purpose Intellectual capital (IC) cyber security is a priority in all organizations. Because of
the dearth in IC cyber security (ICCS) research theories and the constant call to theory …

Transparency of artificial intelligence in healthcare: insights from professionals in computing and healthcare worldwide

J Bernal, C Mazo - Applied Sciences, 2022 - mdpi.com
Although it is widely assumed that Artificial Intelligence (AI) will revolutionise healthcare in
the near future, considerable progress must yet be made in order to gain the trust of …

Do intellectual property rights promote foreign direct investment inflows and technological exports in developing and developed countries?

F ALshubiri, MK Al Ani - foresight, 2024 - emerald.com
Purpose This study aims to analyse the intellectual property rights (INPR), foreign direct
investment (FDI) inflows and technological exports of 32 developing and developed …

Procedural information security countermeasure awareness and cybersecurity protection motivation in enhancing employee's cybersecurity protective behaviour

N Humaidi, SHA Alghazo - 2022 10th International Symposium …, 2022 - ieeexplore.ieee.org
Radical changes in the Industrial Revolution 4.0 (IR4. 0) have provoked several
organizations in developed and emerging economies to constantly re-evaluate …

High-risk deviant decisions: does neutralization still play a role?

BS Trinkle, M Warkentin, K Malimage… - Journal of the …, 2021 - aisel.aisnet.org
Extant research has shown that neutralization processes can enable potential IS security
policy violators to justify their behavior and overcome the deterrence effect of sanctions in …

Legal aspects of corporate systems for preventing cybercrime among personnel

B Dong, S Chernov, KO Akpinar - Crime, Law and Social Change, 2024 - Springer
The activities of enterprise employees can become a risk factor in terms of cybercrime, which
is often associated with their lack of preparedness to counter potential cyber threats. Many …

A game theory-based model for the dissemination of privacy information in online social networks

J He, Y Li, N Zhu - Future Internet, 2023 - mdpi.com
Online social networks (OSNs) have experienced rapid growth in recent years, and an
increasing number of people now use OSNs, such as Facebook and Twitter, to share and …

Assessing Information Security Competencies of Firm Leaders towards Improving Procedural Information Security Countermeasure: Awareness and Cybersecurity …

SHA Alghazo, N Humaidi… - … and Business Review, 2023 - ojs.amhinternational.com
Cybersecurity threats are a serious issue faced by many organizations in this new
information era. Therefore, security leaders play a significant role not only to ensure that all …

[PDF][PDF] Privacy Preservation Method Based on Clustering Interference Algorithm in Social Networks.

R Zhang, X Wu - Journal of Engineering Science & Technology Review, 2022 - jestr.org
Social network data are very important because they have become an indispensable tool in
people's daily life. Therefore, data leakage greatly impacts people. To protect personal …