[HTML][HTML] Cybersecurity in the internet of things in industrial management

RJ Raimundo, AT Rosário - Applied Sciences, 2022 - mdpi.com
Nowadays, people live amidst the smart home domain, while there are business
opportunities in industrial smart cities and healthcare. However, there are concerns about …

Investigation on vulnerabilities, threats and attacks prohibiting UAVs charging and depleting UAVs batteries: Assessments & countermeasures

F Tlili, LC Fourati, S Ayed, B Ouni - Ad hoc networks, 2022 - Elsevier
Unmanned aerial vehicles (UAVs) are the current leading devices used by different sectors.
They open doors to new opportunities for investors and business service providers. Their …

[HTML][HTML] Boosting holistic cybersecurity awareness with outsourced wide-scope CyberSOC: A generalization from a spanish public organization study

M Domínguez-Dorado, FJ Rodríguez-Pérez… - Information, 2023 - mdpi.com
Public sector organizations are facing an escalating challenge with the increasing volume
and complexity of cyberattacks, which disrupt essential public services and jeopardize …

[HTML][HTML] Cyber vulnerabilities detection system in logistics-based IoT data exchange

A Alzahrani, MZ Asghar - Egyptian Informatics Journal, 2024 - Elsevier
Modern-day digitalization has a profound impact on business and society, revolutionizing
logistics. Supply chain digitalization improves transparency, speed, and cost-effectiveness …

Franchising for Global Distribution: A Systematic Review

NAA Aziz, MR Ramdan, KA Aziz… - Journal of …, 2023 - myscholar.umk.edu.my
The purpose of this study is to explore areas that have been studied extensively in previous
studies related to franchising as a platform for global distribution. Furthermore, franchising is …

[HTML][HTML] A taxonomy for threat actors' delivery techniques

A Villalón-Huerta, I Ripoll-Ripoll, H Marco-Gisbert - Applied Sciences, 2022 - mdpi.com
The main contribution of this paper is to provide an accurate taxonomy for delivery
techniques, which allows the detection of novel techniques and the identification of …

A novel resource-saving and traceable tea production and supply chain based on blockchain and IoT

X Xu, X Bao, H Yi, J Wu, J Han - IEEE Access, 2023 - ieeexplore.ieee.org
To realize efficient cooperation among tea plantations, manufacturers, logistics, and sellers,
the tea production and supply chain (PSC) benefits participating enterprises by coordinating …

Impact of innovation, entrepreneurial orientation and entrepreneurial leadership on supply chain resilience in handicraft industry: moderating role of supply chain …

US Yadav, R Tripathi - Benchmarking: An International Journal, 2024 - emerald.com
Purpose The study aims to explore dynamic capabilities such as innovation, entrepreneurial
leadership, absorptive capability, and the dimension of entrepreneurial orientation in the …

[图书][B] Evaluation of Cyber Insecurities of the Cyber Physical System Supply Chains Using α-Discounting MCDM

R Mohamed, MM Ismail - 2024 - books.google.com
Recently, supply chains (SCs) are applying information technology to enable data sharing
among suppliers, instant access to information, and complete tracking of products. With …

Identification of asymmetric information in the supplier–buyer relationship: A structural review

A Mardenli, D Sackmann - Supply Management Research: Aktuelle …, 2023 - Springer
The purpose of this paper is to develop an influence-effect model as a construct for
determining information asymmetry influencing factors between suppliers and buyers, a …