[HTML][HTML] Attributes impacting cybersecurity policy development: An evidence from seven nations

A Mishra, YI Alzoubi, MJ Anwar, AQ Gill - Computers & Security, 2022 - Elsevier
Cyber threats have risen as a result of the growing usage of the Internet. Organizations must
have effective cybersecurity policies in place to respond to escalating cyber threats …

Prospects of cybersecurity in smart cities

F Almeida - Future Internet, 2023 - mdpi.com
The complex and interconnected infrastructure of smart cities offers several opportunities for
attackers to exploit vulnerabilities and carry out cyberattacks that can have serious …

Digital transformation in business development: A comparative review of USA and Africa

O Olubusola, NZ Mhlongo, T Falaiye… - World Journal of …, 2024 - wjarr.com
This comparative review explores the dynamics of digital transformation in business
development, drawing parallels between the United States (USA) and various countries in …

[HTML][HTML] Потенциал цифровизации экосистемы фирмы

ЕВ Попов, ВЛ Симонова - Вопросы управления, 2022 - cyberleninka.ru
Стремительное развитие цифровых технологий изменило представления о бизнес-
взаимодействиях, экосистемная парадигма управления фирмой стала …

CYBER SECURITY AND ITS IMPLICATION ON LIBRARY USERS’ PRIVACY

RA YUSUF, OO AWOYEMI - … OF LIBRARY AND …, 2022 - nigerianjournalsonline.com
It is an undisputed fact that technology advancement has reached a stage that hardly can an
individual do away with internet connected devices, or totally abstain from services offered …

Proliferation of cyber situational awareness: Today's truly pervasive drive of cybersecurity

HMJ Nazir, W Han - Security and Communication Networks, 2022 - Wiley Online Library
Situation awareness (SA) issues necessitate a comprehension of present activities, the
ability to forecast, what will happen next, and strategies to assess the threat or impact of …

[PDF][PDF] Cybercrime and the Nature of Insider Threat Complexities in Healthcare and Biotechnology Engineering Organizations

DN Burrell, C Nobles, A Cusak, M Omar… - Journal of Crime and …, 2022 - arfjournals.com
This article explores the nature of cybersecurity professionals being insider threats to their
own organization, as well as the general increase in harder-to-detect threats coming from an …

Strong and Δ-convergence fixed-point theorems using Noor iterations

A Tassaddiq, S Kanwal, F Lakhani, R Srivastava - Axioms, 2023 - mdpi.com
A wide range of new research articles in artificial intelligence, logic programming, and other
applied sciences are based on fixed-point theorems. The aim of this article is to present an …

The Model of OTC Securities Market Transformation in the Context of Asset Tokenization

E Popov, A Veretennikova, S Fedoreev - Mathematics, 2022 - mdpi.com
The relevance of this study stems from the fact that the development of a market for financial
instruments can significantly expand lending opportunities for small-and medium-sized …

Development of a Method for Assessing the Security of Cyber-Physical Systems Based on the Lotka-Volterra Model

S Yevseiev, S Pohasii, S Milevskyi, O Milov… - … -European Journal of …, 2021 - papers.ssrn.com
The paper presents the results of the development of a method for assessing the security of
cyber-physical systems based on the Lotka–Volterra model. Security models of cyber …