49   Artículos

 
en línea
Adam James Fenton    
This paper examines hybrid threats to maritime transportation systems and their governance responses; focusing on the congested Straits of Malacca and Singapore (SOMS) as an illustrative case study. The methodology combines secondary sources with primary... ver más
Revista: Journal of Marine Science and Engineering    Formato: Electrónico

 
en línea
Anas A. Makki and Ammar Y. Alqahtani    
This study analyzes the barriers to developing smart cities (SCs) using the decision-making trial and evaluation laboratory (DEMATEL) approach. The primary objective is to identify, classify, and assess the main barriers hindering the progress of SCs. Th... ver más
Revista: Urban Science    Formato: Electrónico

 
en línea
Madhav Mukherjee, Ngoc Thuy Le, Yang-Wai Chow and Willy Susilo    
As the demand for cybersecurity experts in the industry grows, we face a widening shortage of skilled professionals. This pressing concern has spurred extensive research within academia and national bodies, who are striving to bridge this skills gap thro... ver más
Revista: Information    Formato: Electrónico

 
en línea
Razvan Rughini?, Emanuela Bran, Ana Rodica Staiculescu and Alexandru Radovici    
This article examines configurations of digital concerns within the European Union (EU27), a leading hub of innovation and policy development. The core objective is to uncover the social forces shaping technology acceptance and risk awareness, which are ... ver más
Revista: Information    Formato: Electrónico

 
en línea
Moatsum Alawida, Bayan Abu Shawar, Oludare Isaac Abiodun, Abid Mehmood, Abiodun Esther Omolara and Ahmad K. Al Hwaitat    
The Chat Generative Pre-training Transformer (GPT), also known as ChatGPT, is a powerful generative AI model that can simulate human-like dialogues across a variety of domains. However, this popularity has attracted the attention of malicious actors who ... ver más
Revista: Information    Formato: Electrónico

 
en línea
Shouq Alrobaian, Saif Alshahrani and Abdulaziz Almaleh    
People are the weakest link in the cybersecurity chain when viewed in the context of technological advancement. People become vulnerable to trickery through contemporary technical developments such as social media platforms. Information accessibility and... ver más
Revista: Big Data and Cognitive Computing    Formato: Electrónico

 
en línea
Thomas Schiller, Bruce Caulkins, Annie S. Wu and Sean Mondesire    
Internet of Things (IoT) devices are common in today?s computer networks. These devices can be computationally powerful, yet prone to cybersecurity exploitation. To remedy these growing security weaknesses, this work proposes a new artificial intelligenc... ver más
Revista: Information    Formato: Electrónico

 
en línea
Manuel Domínguez-Dorado, Francisco J. Rodríguez-Pérez, Javier Carmona-Murillo, David Cortés-Polo and Jesús Calle-Cancho    
Public sector organizations are facing an escalating challenge with the increasing volume and complexity of cyberattacks, which disrupt essential public services and jeopardize citizen data and privacy. Effective cybersecurity management has become an ur... ver más
Revista: Information    Formato: Electrónico

 
en línea
Omar Flor-Unda, Freddy Simbaña, Xavier Larriva-Novo, Ángel Acuña, Rolando Tipán and Patricia Acosta-Vargas    
Vulnerabilities in cyber defense in the countries of the Latin American region have favored the activities of cybercriminals from different parts of the world who have carried out a growing number of cyberattacks that affect public and private services a... ver más
Revista: Informatics    Formato: Electrónico

 
en línea
Afrah Almansoori, Mostafa Al-Emran and Khaled Shaalan    
Cybersecurity procedures and policies are prevalent countermeasures for protecting organizations from cybercrimes and security incidents. Without considering human behaviors, implementing these countermeasures will remain useless. Cybersecurity behavior ... ver más
Revista: Applied Sciences    Formato: Electrónico

« Anterior     Página: 1 de 3     Siguiente »