[HTML][HTML] Blockchain technology for cybersecurity: A text mining literature analysis
Blockchain, the technology infrastructure behind the famous cryptocurrency bitcoin, can take
away the notion of trust from centralized organizations to a decentralized platform that is …
away the notion of trust from centralized organizations to a decentralized platform that is …
[HTML][HTML] Starting a new business? Assessing university students' intentions towards digital entrepreneurship in Saudi Arabia
A Alferaih - International Journal of Information Management Data …, 2022 - Elsevier
The creation of new businesses is vital to the economic prosperity and stability of developed
and developing countries worldwide. Although three-quarters of adults in Saudi Arabia have …
and developing countries worldwide. Although three-quarters of adults in Saudi Arabia have …
[HTML][HTML] Perspective of small and medium enterprise (SME's) and their relationship with government in overcoming cybersecurity challenges and barriers in Wales
Small and medium enterprises (SMEs) have adapted their working methods in response to
cyber threats, including security checks on internet-connected devices and securing social …
cyber threats, including security checks on internet-connected devices and securing social …
[HTML][HTML] Cascading information on best practice: Cyber security risk management in UK micro and small businesses and the role of IT companies
A Cartwright, E Cartwright, ES Edun - Computers & Security, 2023 - Elsevier
Micro and small businesses are increasingly reliant on digital and online technology. They
have, though, very limited resources and expertise to devote to cyber security. There is, thus …
have, though, very limited resources and expertise to devote to cyber security. There is, thus …
Building a thematic framework of cybersecurity: a systematic literature review approach
TY Khaw, A Amran, AP Teoh - Journal of Systems and Information …, 2024 - emerald.com
Purpose This paper aims to explore the factors affecting cybersecurity implementation in
organizations in various countries and develop a cybersecurity framework to improve …
organizations in various countries and develop a cybersecurity framework to improve …
Mitigating cybercrimes in an evolving organizational landscape
A Yeboah-Ofori, FA Opoku-Boateng - Continuity & Resilience Review, 2023 - emerald.com
Purpose Various organizational landscapes have evolved to improve their business
processes, increase production speed and reduce the cost of distribution and have …
processes, increase production speed and reduce the cost of distribution and have …
A service lens on cybersecurity continuity and management for organizations' subsistence and growth
Purpose This paper proposes a holistic, proactive and adaptive approach to cybersecurity
from a service lens, given the continuously evolving cyber-attack techniques, threat and …
from a service lens, given the continuously evolving cyber-attack techniques, threat and …
Modelling the conundrums to cyber-risks management in logistics firms for supply chain social sustainability
IJ Orji, CM U-Dominic - Journal of Enterprise Information …, 2024 - emerald.com
Purpose Cybersecurity has received growing attention from academic researchers and
industry practitioners as a strategy to accelerate performance gains and social sustainability …
industry practitioners as a strategy to accelerate performance gains and social sustainability …
Navigating Cybersecurity Training: A Comprehensive Review
SAD Qawasmeh, AAS AlQahtani, MK Khan - arXiv preprint arXiv …, 2024 - arxiv.org
In the dynamic realm of cybersecurity, awareness training is crucial for strengthening
defenses against cyber threats. This survey examines a spectrum of cybersecurity …
defenses against cyber threats. This survey examines a spectrum of cybersecurity …
Building resilient SMEs: Harnessing large language models for cyber security in Australia
B Kereopa-Yorke - Journal of AI, Robotics & Workplace …, 2024 - ingentaconnect.com
The escalating digitalisation of our lives and enterprises has led to a parallel growth in the
complexity and frequency of cyberattacks. Small and medium-sized enterprises (SMEs) …
complexity and frequency of cyberattacks. Small and medium-sized enterprises (SMEs) …