Exploring the frontiers of cybersecurity behavior: a systematic review of studies and theories
Cybersecurity procedures and policies are prevalent countermeasures for protecting
organizations from cybercrimes and security incidents. Without considering human …
organizations from cybercrimes and security incidents. Without considering human …
Knowledge sharing and theory of planned behavior: a bibliometric analysis
Knowledge sharing and theory of planned behavior: a bibliometric analysis | Emerald Insight
Books and journals Case studies Expert Briefings Open Access Publish with us Advanced …
Books and journals Case studies Expert Briefings Open Access Publish with us Advanced …
Systematic literature review: Theory perspective in lean manufacturing performance
This review examines the trend of applying theories in LM performance and offers the latest
recapitulation of related theories in LM performance. The methodology is based on …
recapitulation of related theories in LM performance. The methodology is based on …
Social media influencer marketing: science mapping of the present and future trends
MA Fauzi, Z Ali, Z Satari, PAM Ramli… - International Journal of …, 2024 - emerald.com
Purpose This study aims to reveal the knowledge structure of social media influencer
marketing literature by performing science mapping analysis through a state-of-the-art …
marketing literature by performing science mapping analysis through a state-of-the-art …
Digital supply chain transformation: The role of smart technologies on operational performance in manufacturing industry
KL Lee, CX Teong, HM Alzoubi… - International …, 2024 - journals.sagepub.com
This study aims to investigate the impact of digital supply chains and smart technology on
the operational performance of the manufacturing industry. Due to the lack of knowledge …
the operational performance of the manufacturing industry. Due to the lack of knowledge …
ESASCF: expertise extraction, generalization and reply framework for optimized automation of network security compliance
Organizations constantly exposed to cyber threats are compelled to comply with cyber
security standards and policies for protecting their digital assets. Vulnerability assessment …
security standards and policies for protecting their digital assets. Vulnerability assessment …
Pro-environmental behavior and the theory of planned behavior: a state of the art science mapping
Pro-environmental behavior and the theory of planned behavior: a state of the art science
mapping | Emerald Insight Books and journals Case studies Expert Briefings Open Access …
mapping | Emerald Insight Books and journals Case studies Expert Briefings Open Access …
Reducing Fraud in Organizations through Information Security Policy Compliance: An Information Security Controls Perspective
As more business processes and information assets are digitized, computer resources are
increasingly being misused to perpetrate fraudulent activities. Research shows that fraud …
increasingly being misused to perpetrate fraudulent activities. Research shows that fraud …
Green human resources in higher education institutions: a systematic literature review
Purpose The purpose of this study is to conduct a comprehensive examination of the
concept of green human resources management (GHRM) within the context of higher …
concept of green human resources management (GHRM) within the context of higher …
Information Security Awareness in Higher Education Institutes: A Work in Progress
The demands for information security in Higher Education Institutions (HEIs) are expanding
as HEIs are vulnerable because of the involvement of human factors. Hence, maintaining …
as HEIs are vulnerable because of the involvement of human factors. Hence, maintaining …