How blockchain technology can benefit marketing: Six pending research areas
A Rejeb, JG Keogh, H Treiblmaier - Frontiers in blockchain, 2020 - frontiersin.org
The proliferation of sophisticated e-commerce platforms coupled with mobile applications
has ignited growth in business-to-consumer (B2C) commerce, reshaped organizational …
has ignited growth in business-to-consumer (B2C) commerce, reshaped organizational …
Threat analysis of software systems: A systematic literature review
Architectural threat analysis has become an important cornerstone for organizations
concerned with developing secure software. Due to the large number of existing techniques …
concerned with developing secure software. Due to the large number of existing techniques …
Exploring sybil and double-spending risks in blockchain systems
M Iqbal, R Matulevičius - IEEE Access, 2021 - ieeexplore.ieee.org
The first step to realise the true potential of blockchain systems is to explain the associated
security risks and vulnerabilities. These risks and vulnerabilities, exploited by the threat …
security risks and vulnerabilities. These risks and vulnerabilities, exploited by the threat …
Smart organizations as a source of competitiveness and sustainable development in the age of industry 4.0: Integration of micro and macro perspective
A Adamik, D Sikora-Fernandez - Energies, 2021 - mdpi.com
The Industry 4.0 Revolution that is taking place nowadays means that organizations face not
only new opportunities, but also challenges related to the identification of their role in …
only new opportunities, but also challenges related to the identification of their role in …
Post-quantum era privacy protection for intelligent infrastructures
As we move into a new decade, the global world of Intelligent Infrastructure (II) services
integrated into the Internet of Things (IoT) are at the forefront of technological advancements …
integrated into the Internet of Things (IoT) are at the forefront of technological advancements …
[HTML][HTML] Addressing insider attacks via forensic-ready risk management
Cyberattacks perpetrated by insiders are difficult to prevent using traditional security
approaches. Often, such attackers misuse legitimate access to the system to conduct an …
approaches. Often, such attackers misuse legitimate access to the system to conduct an …
An integrated conceptual model for information system security risk management supported by enterprise architecture management
Risk management is today a major steering tool for any organisation wanting to deal with
information system (IS) security. However, IS security risk management (ISSRM) remains a …
information system (IS) security. However, IS security risk management (ISSRM) remains a …
IoT health devices: exploring security risks in the connected landscape
The concept of the Internet of Things (IoT) spans decades, and the same can be said for its
inclusion in healthcare. The IoT is an attractive target in medicine; it offers considerable …
inclusion in healthcare. The IoT is an attractive target in medicine; it offers considerable …
Cybersecurity risk management framework for blockchain identity management systems in health IoT
Blockchain (BC) has recently paved the way for developing Decentralized Identity
Management (IdM) systems for different information systems. Researchers widely use it to …
Management (IdM) systems for different information systems. Researchers widely use it to …
Cyber security risk modeling in distributed information systems
This paper deals with problems of the development and security of distributed information
systems. It explores the challenges of risk modeling in such systems and suggests a risk …
systems. It explores the challenges of risk modeling in such systems and suggests a risk …