New challenges in supply chain management: cybersecurity across the supply chain

SA Melnyk, T Schoenherr, C Speier-Pero… - … Journal of Production …, 2022 - Taylor & Francis
Recent cybersecurity breaches have highlighted the resulting economic, political, and social
effects. These incidents highlight that cybersecurity is now a supply chain issue. This should …

Threat actors' tenacity to disrupt: Examination of major cybersecurity incidents

OI Falowo, S Popoola, J Riep, VA Adewopo… - IEEE Access, 2022 - ieeexplore.ieee.org
The exponential growth in the interconnectedness of people and devices, as well as the
upward trend in cyberspace usage will continue to lead to a greater reliance on the internet …

Cybersecurity as a response to combating cybercrime: Demystifying the prevailing threats and offering recommendations to the African regions

MR Mphatheni, W Maluleke - … Journal of Research in Business and …, 2022 - ssbfnet.com
Cybercrime is touted as any harmful behaviour that is in some way related to a computer but
does not have a specific legal reference. Therefore, the objective of this study was to explore …

Cybercrime change consumers' purchase intention in Indonesia: a moderating role of corporate social responsibility and business law

M Anggusti - International Journal of Cyber Criminology, 2022 - cybercrimejournal.com
Consumer intention and satisfaction are necessary for online businesses in this decade. The
fear of crime and perceived risk has emerged as a challenge for consumers. The less focus …

Differentiating Insider and Outsider Cyberattacks on Businesses

TE Dearden, K Parti, J Hawdon, R Gainey… - American Journal of …, 2023 - Springer
The use of information and communication technologies in business has opened several
new ways for employees to commit cybercrimes against their employers. Utilizing …

Enhanced automated code vulnerability repair using large language models

D de-Fitero-Dominguez, E Garcia-Lopez… - arXiv preprint arXiv …, 2024 - arxiv.org
This research addresses the complex challenge of automated repair of code vulnerabilities,
vital for enhancing digital security in an increasingly technology-driven world. The study …

Cybersecurity in the era of digital transformation: the case of Greece

L Maglaras, G Drivas, N Chouliaras… - … on Internet of Things …, 2020 - ieeexplore.ieee.org
This article presents the cyber security progress in Greece since the creation of the Greek
National Cyber Security Authority as a nation-wide cybersecurity coordination and policy …

Measures to ensure cybersecurity and regulation of the internet of things in the Russian federation: Effectiveness assessment

M Koniagina, D Belotserkovich… - Journal of Economic …, 2023 - Taylor & Francis
This study aimed to determine hierarchical structure of Russian legislation regulating the
Internet of Things (IoT) and cybersecurity, evaluate country's information security level, and …

China's digital shadows: unveiling the economic toll of cybercrime

Y He - Humanities and Social Sciences Communications, 2024 - nature.com
This study investigates the relationship between cybercrime and economic growth across
China's 28 provinces from 2005 to 2022, utilizing a comprehensive empirical model that …

Comparison of National-Level Cybersecurity and Cyber Power Indices: A Conceptual Framework

H Çifci - 2022 - researchsquare.com
Cybersecurity and cyber power have grown in importance as a way of mitigating risks and
threats and maintaining a secure and reliable cyberspace. Several methodologies have …