PRECEPT: a framework for ethical digital forensics investigations

RI Ferguson, K Renaud, S Wilford… - Journal of Intellectual …, 2020 - emerald.com
Purpose Cyber-enabled crimes are on the increase, and law enforcement has had to
expand many of their detecting activities into the digital domain. As such, the field of digital …

Securing intellectual capital: an exploratory study in Australian universities

I Bongiovanni, K Renaud, G Cairns - Journal of Intellectual Capital, 2020 - emerald.com
Purpose To investigate the links between IC and the protection of data, information and
knowledge in universities, as organizations with unique knowledge-related foci and …

Assessment of the history and trends of “The Journal of Intellectual Capital”: a bibliometrics, altmetrics and text mining analysis

M Esmaeili Givi, MK Saberi, M Talafidaryani… - Journal of Intellectual …, 2022 - emerald.com
Purpose The Journal of Intellectual Capital (JIC) celebrated its 20th anniversary in 2020.
Therefore, the present study aims to provide a general overview of the history and key trends …

A bibliomeric analysis of cybersecurity research papers in Eastern Europe: Case study from the Republic of Moldova

I Cojocaru, I Cojocaru - Central and Eastern European eDem and eGov …, 2019 - ibn.idsi.md
Nowadays it has become clear that cybersecurity must be an integral and indivisible part of
technological progress and it must be integrated at the core of ICTs. Almost all states around …

Critical and Creative Thinking in A Hacker's Work

AK Mahamood, MF Zolkipli - Borneo International Journal eISSN …, 2023 - majmuah.com
Ethical and unethical hackers possess similar skill levels, intelligence levels, and
competency, though their manner of practice differentiates them. Ethical hackers practice …

Security Architecture Components Cybersecurity Specialists Need to Establish a Limited-Budget Cybersecurity Program: A Qualitative Study

LD Romero - 2020 - search.proquest.com
The problem to be addressed in the research study is the security architecture components
cybersecurity specialists need to establish a robust limited-budget cybersecurity program …

[PDF][PDF] Knowledge sharing and (In) security: towards a comprehensive view of managerial aspects

C Leal, G Meirinhos, M Loureiro, R Silva… - … (ECKM 2017). Academic …, 2017 - academia.edu
The present study characterizes the global dynamics of academic publications about
Knowledge Sharing and Information Security through a research restricted to articles and …

[引用][C] Safeguards against electoral fraud vs. accessibility and citizens' convenience–Need for changes in the German electoral system

I Cojocaru