Cyber security threats and vulnerabilities: a systematic mapping study

M Humayun, M Niazi, NZ Jhanjhi, M Alshayeb… - Arabian Journal for …, 2020 - Springer
There has been a tremendous increase in research in the area of cyber security to support
cyber applications and to avoid key security threats faced by these applications. The goal of …

Blockchain technology in logistics and supply chain management—A bibliometric literature review from 2016 to January 2020

B Müßigmann, H von der Gracht… - IEEE transactions on …, 2020 - ieeexplore.ieee.org
As part of business and management studies, research works addressed blockchain
technology (BCT) in logistics and supply chain management (LSCM) first in 2016. Increasing …

A survey on technical threat intelligence in the age of sophisticated cyber attacks

W Tounsi, H Rais - Computers & security, 2018 - Elsevier
Today's cyber attacks require a new line of security defenses. The static approach of
traditional security based on heuristic and signature does not match the dynamic nature of …

Software-defined networking: A comprehensive survey

D Kreutz, FMV Ramos, PE Verissimo… - Proceedings of the …, 2014 - ieeexplore.ieee.org
The Internet has led to the creation of a digital society, where (almost) everything is
connected and is accessible from anywhere. However, despite their widespread adoption …

Uncertainty, knowledge problems, and entrepreneurial action

DM Townsend, RA Hunt, JS McMullen… - Academy of …, 2018 - journals.aom.org
Whether new business ventures emerge in the context of start-ups or corporate giants, one
of the enduring and fundamental assumptions underlying theories of entrepreneurial action …

A new direction in social network analysis: Online social network analysis problems and applications

U Can, B Alatas - Physica A: Statistical Mechanics and its Applications, 2019 - Elsevier
The use of online social networks has made significant progress in recent years as the use
of the Internet has become widespread worldwide as the technological infrastructure and the …

Have you been a victim of COVID-19-related cyber incidents? Survey, taxonomy, and mitigation strategies

S Hakak, WZ Khan, M Imran, KKR Choo… - Ieee …, 2020 - ieeexplore.ieee.org
Cybercriminals are constantly on the lookout for new attack vectors, and the recent COVID-
19 pandemic is no exception. For example, social distancing measures have resulted in …

Applying routine activity theory to cybercrime: A theoretical and empirical analysis

ER Leukfeldt, M Yar - Deviant Behavior, 2016 - Taylor & Francis
The central question of this article is whether routine activity theory (RAT) can be used as an
analytical framework to study cybercrimes. Both a theoretical analysis and an analysis of …

Future directions for behavioral information security research

RE Crossler, AC Johnston, PB Lowry, Q Hu… - computers & …, 2013 - Elsevier
Information Security (InfoSec) research is far reaching and includes many approaches to
deal with protecting and mitigating threats to the information assets and technical resources …

An information security knowledge sharing model in organizations

NS Safa, R Von Solms - Computers in Human Behavior, 2016 - Elsevier
Abstract Knowledge sharing plays an important role in the domain of information security,
due to its positive effect on employees' information security awareness. It is acknowledged …