[HTML][HTML] Cybersecurity in the internet of things in industrial management
RJ Raimundo, AT Rosário - Applied Sciences, 2022 - mdpi.com
Nowadays, people live amidst the smart home domain, while there are business
opportunities in industrial smart cities and healthcare. However, there are concerns about …
opportunities in industrial smart cities and healthcare. However, there are concerns about …
Investigation on vulnerabilities, threats and attacks prohibiting UAVs charging and depleting UAVs batteries: Assessments & countermeasures
Unmanned aerial vehicles (UAVs) are the current leading devices used by different sectors.
They open doors to new opportunities for investors and business service providers. Their …
They open doors to new opportunities for investors and business service providers. Their …
[HTML][HTML] Boosting holistic cybersecurity awareness with outsourced wide-scope CyberSOC: A generalization from a spanish public organization study
M Domínguez-Dorado, FJ Rodríguez-Pérez… - Information, 2023 - mdpi.com
Public sector organizations are facing an escalating challenge with the increasing volume
and complexity of cyberattacks, which disrupt essential public services and jeopardize …
and complexity of cyberattacks, which disrupt essential public services and jeopardize …
[HTML][HTML] Cyber vulnerabilities detection system in logistics-based IoT data exchange
A Alzahrani, MZ Asghar - Egyptian Informatics Journal, 2024 - Elsevier
Modern-day digitalization has a profound impact on business and society, revolutionizing
logistics. Supply chain digitalization improves transparency, speed, and cost-effectiveness …
logistics. Supply chain digitalization improves transparency, speed, and cost-effectiveness …
Franchising for Global Distribution: A Systematic Review
The purpose of this study is to explore areas that have been studied extensively in previous
studies related to franchising as a platform for global distribution. Furthermore, franchising is …
studies related to franchising as a platform for global distribution. Furthermore, franchising is …
[HTML][HTML] A taxonomy for threat actors' delivery techniques
A Villalón-Huerta, I Ripoll-Ripoll, H Marco-Gisbert - Applied Sciences, 2022 - mdpi.com
The main contribution of this paper is to provide an accurate taxonomy for delivery
techniques, which allows the detection of novel techniques and the identification of …
techniques, which allows the detection of novel techniques and the identification of …
A novel resource-saving and traceable tea production and supply chain based on blockchain and IoT
X Xu, X Bao, H Yi, J Wu, J Han - IEEE Access, 2023 - ieeexplore.ieee.org
To realize efficient cooperation among tea plantations, manufacturers, logistics, and sellers,
the tea production and supply chain (PSC) benefits participating enterprises by coordinating …
the tea production and supply chain (PSC) benefits participating enterprises by coordinating …
Impact of innovation, entrepreneurial orientation and entrepreneurial leadership on supply chain resilience in handicraft industry: moderating role of supply chain …
US Yadav, R Tripathi - Benchmarking: An International Journal, 2024 - emerald.com
Purpose The study aims to explore dynamic capabilities such as innovation, entrepreneurial
leadership, absorptive capability, and the dimension of entrepreneurial orientation in the …
leadership, absorptive capability, and the dimension of entrepreneurial orientation in the …
[图书][B] Evaluation of Cyber Insecurities of the Cyber Physical System Supply Chains Using α-Discounting MCDM
R Mohamed, MM Ismail - 2024 - books.google.com
Recently, supply chains (SCs) are applying information technology to enable data sharing
among suppliers, instant access to information, and complete tracking of products. With …
among suppliers, instant access to information, and complete tracking of products. With …
Identification of asymmetric information in the supplier–buyer relationship: A structural review
A Mardenli, D Sackmann - Supply Management Research: Aktuelle …, 2023 - Springer
The purpose of this paper is to develop an influence-effect model as a construct for
determining information asymmetry influencing factors between suppliers and buyers, a …
determining information asymmetry influencing factors between suppliers and buyers, a …