Articles with "security risk" as a keyword



Photo from wikipedia

Understanding the inhibitors to consumer mobile purchasing intentions

Sign Up to like & get
recommendations!
Published in 2020 at "Journal of Retailing and Consumer Services"

DOI: 10.1016/j.jretconser.2020.102129

Abstract: Abstract Consumers frequently browse online stores via mobile (m-) channels but seldom realize transactions through m-channels. Although this m-purchasing yields an attractive growth opportunity for online retailers, existing research still insufficiently explains m-purchasing (intentions). Hence,… read more here.

Keywords: security risk; purchasing intentions; consumer; inhibitors consumer ... See more keywords
Photo by scottwebb from unsplash

Cyber Security Risk Evaluation of a Nuclear I&C Using BN and ET

Sign Up to like & get
recommendations!
Published in 2017 at "Nuclear Engineering and Technology"

DOI: 10.1016/j.net.2016.11.004

Abstract: Abstract Cyber security is an important issue in the field of nuclear engineering because nuclear facilities use digital equipment and digital systems that can lead to serious hazards in the event of an accident. Regulatory… read more here.

Keywords: security risk; risk evaluation; cyber security; security ... See more keywords
Photo from wikipedia

Security as a key contributor to organisational resilience: a bibliometric analysis of enterprise security risk management

Sign Up to like & get
recommendations!
Published in 2021 at "Security Journal"

DOI: 10.1057/s41284-021-00292-4

Abstract: Globalisation and hyperconnectivity affect organisational resilience with threats such as the recent COVID-19 pandemic or large-scale cyberattacks. To strengthen organisational resilience capabilities, a framework such as enterprise risk management (ERM) is necessary so as to… read more here.

Keywords: security risk; organisational resilience; risk management; security ... See more keywords
Photo by scottwebb from unsplash

An Improved Information Security Risk Assessments Method for Cyber-Physical-Social Computing and Networking

Sign Up to like & get
recommendations!
Published in 2018 at "IEEE Access"

DOI: 10.1109/access.2018.2800664

Abstract: In virtue of the rapid development of the Internet of Things (IoT), Organizations have grown to rely on their cyber systems and networks. However, this phenomenon also creates many new information security issues. In this… read more here.

Keywords: security risk; information security; improved information; information ... See more keywords
Photo from wikipedia

Security Risk Assessment in Internet of Things Systems

Sign Up to like & get
recommendations!
Published in 2017 at "IT Professional"

DOI: 10.1109/mitp.2017.3680959

Abstract: Information security risk assessment methods have served us well over the past two decades. They have provided a tool for organizations and governments to use in protecting themselves against pertinent risks. As the complexity, pervasiveness,… read more here.

Keywords: security risk; risk assessment; risk; internet things ... See more keywords
Photo by scottwebb from unsplash

Automated Security Risk Identification Using AutomationML-Based Engineering Data

Sign Up to like & get
recommendations!
Published in 2022 at "IEEE Transactions on Dependable and Secure Computing"

DOI: 10.1109/tdsc.2020.3033150

Abstract: Systems integrators and vendors of industrial components need to establish a security-by-design approach, which includes the assessment and subsequent treatment of security risks. However, conducting security risk assessments along the engineering process is a costly… read more here.

Keywords: security risk; identification; security; engineering data ... See more keywords
Photo by andrewtneel from unsplash

Xiaomi and the Promises of the Good Life? Issues of Security and Risk in the Making of the Smart Home in China

Sign Up to like & get
recommendations!
Published in 2022 at "Science, Technology and Society"

DOI: 10.1177/09717218221075128

Abstract: Informed by Foucault’s governmentality, this article examines the making of the smart home in China. Operating within the nexus of security and risk, smart homes foster a discourse of the ‘the good life’ that accelerates… read more here.

Keywords: home; life; security risk; smart home ... See more keywords
Photo from wikipedia

Leaders’ Perspectives on IoT Security Risk Management Strategies in Surveyed Organizations Relative to IoTSRM2

Sign Up to like & get
recommendations!
Published in 2021 at "Applied Sciences"

DOI: 10.3390/app11199206

Abstract: In the COVID-19 and post-pandemic business environment, leveraging robust Internet of Things (IoT) security risk management strategies becomes of particular importance to IoT adopters. Thus, given that no research study was found to exclusively focus… read more here.

Keywords: security risk; risk; risk management; iot security ... See more keywords
Photo from wikipedia

IoT Security Risk Management Strategy Reference Model (IoTSRM2)

Sign Up to like & get
recommendations!
Published in 2021 at "Future Internet"

DOI: 10.3390/fi13060148

Abstract: Nowadays, Internet of Things (IoT) adoptions are burgeoning and deemed the lynchpin towards achieving ubiquitous connectivity. In this context, defining and leveraging robust IoT security risk management strategies are paramount for secure IoT adoptions. Thus,… read more here.

Keywords: security risk; risk management; iot security; security ... See more keywords
Photo from wikipedia

Identification of Risk Factors Using ANFIS-Based Security Risk Assessment Model for SDLC Phases

Sign Up to like & get
recommendations!
Published in 2022 at "Future Internet"

DOI: 10.3390/fi14110305

Abstract: In the field of software development, the efficient prioritizing of software risks was essential and play significant roles. However, finding a viable solution to this issue is a difficult challenge. The software developers have to… read more here.

Keywords: software; security risk; risk factors; risk ... See more keywords
Photo by scottwebb from unsplash

Defining Cyber Risk Scenarios to Evaluate IoT Systems

Sign Up to like & get
recommendations!
Published in 2022 at "Games"

DOI: 10.3390/g14010001

Abstract: The growth of the Internet of Things (IoT) has accelerated digital transformation processes in organizations and cities. However, it has also opened new security challenges due to the complexity and dynamism of these systems. The… read more here.

Keywords: defining cyber; cyber risk; security risk; risk ... See more keywords