[HTML][HTML] Towards insighting cybersecurity for healthcare domains: A comprehensive review of recent practices and trends
Healthcare information security is becoming a significant responsibility for all healthcare
organisations and individuals. Innovative medical equipment and healthcare apps are vital …
organisations and individuals. Innovative medical equipment and healthcare apps are vital …
[HTML][HTML] How industry 4.0 and sensors can leverage product design: opportunities and challenges
AT Rosário, JC Dias - Sensors, 2023 - mdpi.com
The fourth industrial revolution, also known as Industry 4.0, has led to an increased
transition towards automation and reliance on data-driven innovations and strategies. The …
transition towards automation and reliance on data-driven innovations and strategies. The …
Internet of things, big data analytics and operational performance: the mediating effect of supply chain visibility
AW Al-Khatib - Journal of Manufacturing Technology Management, 2022 - emerald.com
Purpose This paper aims to investigate hypothesized relationships between the Internet of
things (IoT) and big data analytics (BDA) with supply chain visibility (SCV) and operational …
things (IoT) and big data analytics (BDA) with supply chain visibility (SCV) and operational …
Understanding blockchain applications in Industry 4.0: From information technology to manufacturing and operations management
The current literature regarding blockchain-based applications in the context of Industry 4.0
has rapidly grown during the last decade. However, a systematic literature review that …
has rapidly grown during the last decade. However, a systematic literature review that …
[HTML][HTML] Global digital convergence: Impact of cybersecurity, business transparency, economic transformation, and AML efficiency
The article substantiates the existence of convergence processes in the field of digitization of
countries, taking into account the number of Internet users; people with advanced skills; and …
countries, taking into account the number of Internet users; people with advanced skills; and …
A comprehensive study on cybersecurity challenges and opportunities in the IoT world
It has become possible to link anything and everything to the Internet in recent decades due
to the expanding Internet of Things (IoT). As a result, our usage of technology has changed a …
to the expanding Internet of Things (IoT). As a result, our usage of technology has changed a …
[HTML][HTML] Industry 4.0 and marketing: Towards an integrated future research agenda
AT Rosário, JC Dias - Journal of Sensor and Actuator Networks, 2022 - mdpi.com
Industry 4.0, or the Fourth Industrial Revolution, is driven by innovative technologies that
have profound effects on both production systems and business models. This revolution is …
have profound effects on both production systems and business models. This revolution is …
Security in internet of things: a review on approaches based on blockchain, machine learning, cryptography, and quantum computing
Abstract The Internet of Things (IoT) is an important virtual network that allows remote users
to access linked multimedia devices. The development of IoT and its ubiquitous application …
to access linked multimedia devices. The development of IoT and its ubiquitous application …
Integrating cybersecurity risk management into strategic management: a comprehensive literature review
F Mızrak - Research Journal of Business and Management, 2023 - dergipark.org.tr
Purpose-This literature review aims to delve into the nexus between cybersecurity risk
management and strategic management, comprehensively exploring how organizations …
management and strategic management, comprehensively exploring how organizations …
[HTML][HTML] A cluster-tree-based trusted routing algorithm using Grasshopper Optimization Algorithm (GOA) in Wireless Sensor Networks (WSNs)
In wireless sensor networks (WSNs), existing routing protocols mainly consider energy
efficiency or security separately. However, these protocols must be more comprehensive …
efficiency or security separately. However, these protocols must be more comprehensive …