Respite for SMEs: A systematic review of socio-technical cybersecurity metrics
Featured Application The results of this work will be incorporated in an application for SMEs
in Europe, which aims to improve cybersecurity awareness and resilience, as part of the EU …
in Europe, which aims to improve cybersecurity awareness and resilience, as part of the EU …
Prioritising enabling factors of Internet of things (IoT) adoption in digital supply chain
P Samaranayake, T Laosirihongthong… - International Journal of …, 2023 - emerald.com
Purpose This paper explores the role of Internet of things (IoT) enabling factors in adopting
digital supply chain. Design/methodology/approach Analytical hierarchy process (AHP) was …
digital supply chain. Design/methodology/approach Analytical hierarchy process (AHP) was …
Impact of technology, health and consumer-related factors on continued usage intention of wearable fitness tracking (WFT) devices
Purpose This paper aims to explore factors impacting wearable fitness tracking (WFT)
device continued usage intention from perspectives of technology attributes (autonomy …
device continued usage intention from perspectives of technology attributes (autonomy …
Is health consciousness and perceived privacy protection critical to use wearable health devices? Extending the model of goal-directed behavior
Purpose The present study is an attempt to extend the Model of Goal-directed Behavior
(MGB) to consider health consciousness and perceived privacy protection as two critical …
(MGB) to consider health consciousness and perceived privacy protection as two critical …
Role of e-HRM strength and job stress on turnover intention among employees: mediating effect of concern for information privacy
RS Yadav, G Balasubramanian… - … Knowledge, Memory and …, 2024 - emerald.com
Purpose This study aims to investigate the mediating effect of concern for information privacy
between e-HRM and job stress that eventually develops a turnover intention among …
between e-HRM and job stress that eventually develops a turnover intention among …
IoT Platform Selection Using Interval Valued Intuitionistic Fuzzy TOPSIS
Abstract The Internet of Things (IoT) platform selection is one of the important steps that
leads to digital transformation. The companies should consider multiple factors such as …
leads to digital transformation. The companies should consider multiple factors such as …
[PDF][PDF] Power quality assessment based on rough AHP and extension analysis
G Liu, C Zhang, Z Zhu, X Wang - Energy Eng, 2022 - cdn.techscience.cn
Due to the increasing power consumption of whole society and widely using of new non-
linear and asymmetric electrical equipment, power quality assessment problem in the new …
linear and asymmetric electrical equipment, power quality assessment problem in the new …
Analysis and Research of Network Information Security Evaluation Model Based on Machine Learning Algorithm
Y Luo - 2022 IEEE 4th Eurasia Conference on IOT …, 2022 - ieeexplore.ieee.org
Due to the rapid development of network technology and the rapid spread of information
through the network, the security of information systems is also threatened in many aspects …
through the network, the security of information systems is also threatened in many aspects …
HUMAN FACTORS ENGINEERING ON THE EDGE OF INDUSTRY 4.0: ANALYSIS FOR IOT-AIDED TECHNOLOGIES
BY Kaya - Endüstri Mühendisliği, 2022 - dergipark.org.tr
Using advanced technologies and devices in human factors engineering (HFE) processes is
becoming a rising trend in international arena, regarding Industry 4.0 philosophy and …
becoming a rising trend in international arena, regarding Industry 4.0 philosophy and …
A Data Symmetry Algorithm‐Based Security Awareness Model for Emergency Wireless Communication under Multisensor Fusion
Y Liang, N Gao - Mobile Information Systems, 2022 - Wiley Online Library
Due to the characteristics of sensor networks, wireless sensor networks (WSN) have a series
of security threats in their applications. For example, wireless sensor networks are …
of security threats in their applications. For example, wireless sensor networks are …