[HTML][HTML] Blockchain technology for cybersecurity: A text mining literature analysis

R Prakash, VS Anoop, S Asharaf - International Journal of Information …, 2022 - Elsevier
Blockchain, the technology infrastructure behind the famous cryptocurrency bitcoin, can take
away the notion of trust from centralized organizations to a decentralized platform that is …

[HTML][HTML] Starting a new business? Assessing university students' intentions towards digital entrepreneurship in Saudi Arabia

A Alferaih - International Journal of Information Management Data …, 2022 - Elsevier
The creation of new businesses is vital to the economic prosperity and stability of developed
and developing countries worldwide. Although three-quarters of adults in Saudi Arabia have …

[HTML][HTML] Perspective of small and medium enterprise (SME's) and their relationship with government in overcoming cybersecurity challenges and barriers in Wales

N Rawindaran, A Jayal, E Prakash… - International Journal of …, 2023 - Elsevier
Small and medium enterprises (SMEs) have adapted their working methods in response to
cyber threats, including security checks on internet-connected devices and securing social …

[HTML][HTML] Cascading information on best practice: Cyber security risk management in UK micro and small businesses and the role of IT companies

A Cartwright, E Cartwright, ES Edun - Computers & Security, 2023 - Elsevier
Micro and small businesses are increasingly reliant on digital and online technology. They
have, though, very limited resources and expertise to devote to cyber security. There is, thus …

Building a thematic framework of cybersecurity: a systematic literature review approach

TY Khaw, A Amran, AP Teoh - Journal of Systems and Information …, 2024 - emerald.com
Purpose This paper aims to explore the factors affecting cybersecurity implementation in
organizations in various countries and develop a cybersecurity framework to improve …

Mitigating cybercrimes in an evolving organizational landscape

A Yeboah-Ofori, FA Opoku-Boateng - Continuity & Resilience Review, 2023 - emerald.com
Purpose Various organizational landscapes have evolved to improve their business
processes, increase production speed and reduce the cost of distribution and have …

A service lens on cybersecurity continuity and management for organizations' subsistence and growth

G Thomas, MJ Sule - Organizational Cybersecurity Journal: Practice …, 2023 - emerald.com
Purpose This paper proposes a holistic, proactive and adaptive approach to cybersecurity
from a service lens, given the continuously evolving cyber-attack techniques, threat and …

Modelling the conundrums to cyber-risks management in logistics firms for supply chain social sustainability

IJ Orji, CM U-Dominic - Journal of Enterprise Information …, 2024 - emerald.com
Purpose Cybersecurity has received growing attention from academic researchers and
industry practitioners as a strategy to accelerate performance gains and social sustainability …

Navigating Cybersecurity Training: A Comprehensive Review

SAD Qawasmeh, AAS AlQahtani, MK Khan - arXiv preprint arXiv …, 2024 - arxiv.org
In the dynamic realm of cybersecurity, awareness training is crucial for strengthening
defenses against cyber threats. This survey examines a spectrum of cybersecurity …

Building resilient SMEs: Harnessing large language models for cyber security in Australia

B Kereopa-Yorke - Journal of AI, Robotics & Workplace …, 2024 - ingentaconnect.com
The escalating digitalisation of our lives and enterprises has led to a parallel growth in the
complexity and frequency of cyberattacks. Small and medium-sized enterprises (SMEs) …