Articles with "security risk" as a keyword



Understanding the inhibitors to consumer mobile purchasing intentions

Sign Up to like & get
recommendations!
Published in 2020 at "Journal of Retailing and Consumer Services"

DOI: 10.1016/j.jretconser.2020.102129

Abstract: Abstract Consumers frequently browse online stores via mobile (m-) channels but seldom realize transactions through m-channels. Although this m-purchasing yields an attractive growth opportunity for online retailers, existing research still insufficiently explains m-purchasing (intentions). Hence,… read more here.

Keywords: security risk; purchasing intentions; consumer; inhibitors consumer ... See more keywords
Photo by scottwebb from unsplash

Cyber Security Risk Evaluation of a Nuclear I&C Using BN and ET

Sign Up to like & get
recommendations!
Published in 2017 at "Nuclear Engineering and Technology"

DOI: 10.1016/j.net.2016.11.004

Abstract: Abstract Cyber security is an important issue in the field of nuclear engineering because nuclear facilities use digital equipment and digital systems that can lead to serious hazards in the event of an accident. Regulatory… read more here.

Keywords: security risk; risk evaluation; cyber security; security ... See more keywords

Construction of power network security risk assessment model based on LSA-SVM algorithm in the background of smart grid

Sign Up to like & get
recommendations!
Published in 2024 at "Scientific Reports"

DOI: 10.1038/s41598-024-59473-x

Abstract: Due to theintricate and interdependent nature of the smart grid, it has encountered an increasing number of security threats in recent years. Currently, conventional security measures such as firewalls, intrusion detection, and malicious detection technologies… read more here.

Keywords: security risk; security; power network; network security ... See more keywords
Photo from wikipedia

Security as a key contributor to organisational resilience: a bibliometric analysis of enterprise security risk management

Sign Up to like & get
recommendations!
Published in 2021 at "Security Journal"

DOI: 10.1057/s41284-021-00292-4

Abstract: Globalisation and hyperconnectivity affect organisational resilience with threats such as the recent COVID-19 pandemic or large-scale cyberattacks. To strengthen organisational resilience capabilities, a framework such as enterprise risk management (ERM) is necessary so as to… read more here.

Keywords: security risk; organisational resilience; risk management; security ... See more keywords

Does financial development reduce energy security risk? Evidence from E7 economies

Sign Up to like & get
recommendations!
Published in 2025 at "Applied Economics Letters"

DOI: 10.1080/13504851.2025.2482856

Abstract: ABSTRACT Energy security is a necessity for sustainable development (SD). This study investigates the role of financial development (FD) on energy security risk (ESR) in the E7 economies from 1995 to 2018. The findings show… read more here.

Keywords: financial development; security risk; energy security; energy ... See more keywords

An Improved Information Security Risk Assessments Method for Cyber-Physical-Social Computing and Networking

Sign Up to like & get
recommendations!
Published in 2018 at "IEEE Access"

DOI: 10.1109/access.2018.2800664

Abstract: In virtue of the rapid development of the Internet of Things (IoT), Organizations have grown to rely on their cyber systems and networks. However, this phenomenon also creates many new information security issues. In this… read more here.

Keywords: security risk; information security; improved information; information ... See more keywords

Security Risk Assessment in Internet of Things Systems

Sign Up to like & get
recommendations!
Published in 2017 at "IT Professional"

DOI: 10.1109/mitp.2017.3680959

Abstract: Information security risk assessment methods have served us well over the past two decades. They have provided a tool for organizations and governments to use in protecting themselves against pertinent risks. As the complexity, pervasiveness,… read more here.

Keywords: security risk; risk assessment; risk; internet things ... See more keywords

Automated Security Risk Identification Using AutomationML-Based Engineering Data

Sign Up to like & get
recommendations!
Published in 2022 at "IEEE Transactions on Dependable and Secure Computing"

DOI: 10.1109/tdsc.2020.3033150

Abstract: Systems integrators and vendors of industrial components need to establish a security-by-design approach, which includes the assessment and subsequent treatment of security risks. However, conducting security risk assessments along the engineering process is a costly… read more here.

Keywords: security risk; identification; security; engineering data ... See more keywords

Xiaomi and the Promises of the Good Life? Issues of Security and Risk in the Making of the Smart Home in China

Sign Up to like & get
recommendations!
Published in 2022 at "Science, Technology and Society"

DOI: 10.1177/09717218221075128

Abstract: Informed by Foucault’s governmentality, this article examines the making of the smart home in China. Operating within the nexus of security and risk, smart homes foster a discourse of the ‘the good life’ that accelerates… read more here.

Keywords: home; life; security risk; smart home ... See more keywords
Photo from wikipedia

Leaders’ Perspectives on IoT Security Risk Management Strategies in Surveyed Organizations Relative to IoTSRM2

Sign Up to like & get
recommendations!
Published in 2021 at "Applied Sciences"

DOI: 10.3390/app11199206

Abstract: In the COVID-19 and post-pandemic business environment, leveraging robust Internet of Things (IoT) security risk management strategies becomes of particular importance to IoT adopters. Thus, given that no research study was found to exclusively focus… read more here.

Keywords: security risk; risk; risk management; iot security ... See more keywords
Photo from wikipedia

IoT Security Risk Management Strategy Reference Model (IoTSRM2)

Sign Up to like & get
recommendations!
Published in 2021 at "Future Internet"

DOI: 10.3390/fi13060148

Abstract: Nowadays, Internet of Things (IoT) adoptions are burgeoning and deemed the lynchpin towards achieving ubiquitous connectivity. In this context, defining and leveraging robust IoT security risk management strategies are paramount for secure IoT adoptions. Thus,… read more here.

Keywords: security risk; risk management; iot security; security ... See more keywords