B Müßigmann, H von der Gracht… - IEEE transactions on …, 2020 - ieeexplore.ieee.org
As part of business and management studies, research works addressed blockchain technology (BCT) in logistics and supply chain management (LSCM) first in 2016. Increasing …
W Tounsi, H Rais - Computers & security, 2018 - Elsevier
Today's cyber attacks require a new line of security defenses. The static approach of traditional security based on heuristic and signature does not match the dynamic nature of …
The Internet has led to the creation of a digital society, where (almost) everything is connected and is accessible from anywhere. However, despite their widespread adoption …
Whether new business ventures emerge in the context of start-ups or corporate giants, one of the enduring and fundamental assumptions underlying theories of entrepreneurial action …
U Can, B Alatas - Physica A: Statistical Mechanics and its Applications, 2019 - Elsevier
The use of online social networks has made significant progress in recent years as the use of the Internet has become widespread worldwide as the technological infrastructure and the …
Cybercriminals are constantly on the lookout for new attack vectors, and the recent COVID- 19 pandemic is no exception. For example, social distancing measures have resulted in …
The central question of this article is whether routine activity theory (RAT) can be used as an analytical framework to study cybercrimes. Both a theoretical analysis and an analysis of …
Information Security (InfoSec) research is far reaching and includes many approaches to deal with protecting and mitigating threats to the information assets and technical resources …
Abstract Knowledge sharing plays an important role in the domain of information security, due to its positive effect on employees' information security awareness. It is acknowledged …