FT Lohrke… - Journal of General …, 2023 - journals.sagepub.com
Firms continue to face increasing threats of financial and reputational damage from cybersecurity events. Despite increasing scholarly attention, our 25-year review of studies …
Phishing and social engineering contribute to various cyber incidents such as data breaches and ransomware attacks, financial frauds, and denial of service attacks. Often, phishers …
Q Sun, P Chen, X Wang, ZS Ye - Production and …, 2023 - journals.sagepub.com
We study the robust production and maintenance control for a production system subject to degradation. A periodic maintenance scheme is considered, and the system production rate …
X Wang, Y Zhang, S Zhang - European Journal of Operational Research, 2024 - Elsevier
We develop a continuous-time stochastic differential game model that aims to capture market demand and stochastic cross-network effects, and we seek to find equilibrium order …
During software product development, the combination of digital resources (such as application programming interfaces and software development kits) establishes loose and …
Purpose The vulnerability of customers to malware attacks through weak supplier links has prompted a need for collaboration as a strategic alternative in improving supply chain …
Modern cyberattacks such as advanced persistent threats have become sophisticated. Hackers can stay undetected for an extended time and defenders do not have sufficient …
J Ju, D Cho, JK Lee, JH Ahn - Production and Operations …, 2021 - journals.sagepub.com
Although spam email messages have been the primary source of cybercrime since the early Internet era, there is no quick fix to this problem. Governments have established anti‐spam …
Q Wang, CH Peng, Y Jin… - Production and …, 2024 - journals.sagepub.com
<? show [AQ ID= GQ2 POS=-20pt]?><? show [AQ ID= GQ4]?><? show [AQ ID= GQ5 POS= 12pt]?> The extant literature has provided valuable insights into the post-failure behavior of …