Building cyber resilience in fintech through AI and GRC integration: An exploratory Study
A Oluokun, AB Ige, MN Ameyaw - GSC Advanced Research …, 2024 - gsconlinepress.com
The fintech industry, at the forefront of digital innovation, faces an evolving landscape of
cyber threats that necessitates robust cyber resilience strategies. This study explores …
cyber threats that necessitates robust cyber resilience strategies. This study explores …
Enhancing banking performance through dynamic digital transformation capabilities and governance, risk management, and compliance: Insights from the Indonesian …
A Abdurrahman, A Gustomo… - The Electronic Journal of …, 2024 - Wiley Online Library
Digital transformation (DT) is a crucial strategic initiative for organizations to rectify output,
adapt, and keep up with the digital economy. Dynamic capability (DC) is a widely‐used …
adapt, and keep up with the digital economy. Dynamic capability (DC) is a widely‐used …
Information technology challenges for integrated governance, risk and compliance (grc)
I Mahendra, H Prabowo… - 2022 1st International …, 2022 - ieeexplore.ieee.org
Integrated GRC is an area of concern for organizations today. Integrated GRC provides
benefits for increasing competitiveness and organizational excellence, realizing …
benefits for increasing competitiveness and organizational excellence, realizing …
Information security failures identified and measured–ISO/IEC 27001: 2013 controls ranked based on GDPR penalty case analysis
M Suorsa, P Helo - Information Security Journal: A Global …, 2024 - Taylor & Francis
This paper identifies the failures and impacts of information security, as well as the most
effective controls to mitigate information security risks in organizations. Root cause analysis …
effective controls to mitigate information security risks in organizations. Root cause analysis …
Ant: a process aware annotation software for regulatory compliance
R Gyory, D Restrepo Amariles, G Lewkowicz… - Artificial Intelligence and …, 2023 - Springer
Accurate data annotation is essential to successfully implementing machine learning (ML)
for regulatory compliance. Annotations allow organizations to train supervised ML …
for regulatory compliance. Annotations allow organizations to train supervised ML …
[图书][B] IT governance and information security: Guides, standards, and frameworks
IT governance seems to be one of the best strategies to optimize IT assets in an economic
context dominated by information, innovation, and the race for performance. The …
context dominated by information, innovation, and the race for performance. The …
[PDF][PDF] Towards a strategic it grc framework for healthcare organizations
The rapidly changing healthcare market requires healthcare institutions to adjust their
operations to address regulatory, strategic, and other risks. Healthcare organizations use a …
operations to address regulatory, strategic, and other risks. Healthcare organizations use a …
[PDF][PDF] Sistema de reconocimiento facial para el control de accesos mediante Inteligencia Artificial
JEMR Campos, CSC Rodríguez, LDA Luján… - Innovación y …, 2023 - redalyc.org
El presente artículo tiene como objetivo principal el desarrollo de un sistema que permita el
reconocimiento facial de una persona para el control de accesos mediante Inteligencia …
reconocimiento facial de una persona para el control de accesos mediante Inteligencia …
CAFISGO: a Capability Assessment Framework for Information Security Governance in Organizations.
Due to the pervasive nature of new systems, information security raises new concerns and
issues. Organizations need to understand the data and systems protection mechanisms. To …
issues. Organizations need to understand the data and systems protection mechanisms. To …
[图书][B] Investigating the Factors That Influence Organizational Security Behavior Towards IoT Purchase Decision
IO Moses - 2023 - search.proquest.com
Abstract As Internet of Things proliferate, so are the vulnerabilities that may expose
consumers to threat actors. Some of the early adopters include home users, industries, and …
consumers to threat actors. Some of the early adopters include home users, industries, and …