Photo from wikipedia
Sign Up to like & get
recommendations!
0
Published in 2020 at "Journal of Retailing and Consumer Services"
DOI: 10.1016/j.jretconser.2020.102129
Abstract: Abstract Consumers frequently browse online stores via mobile (m-) channels but seldom realize transactions through m-channels. Although this m-purchasing yields an attractive growth opportunity for online retailers, existing research still insufficiently explains m-purchasing (intentions). Hence,…
read more here.
Keywords:
security risk;
purchasing intentions;
consumer;
inhibitors consumer ... See more keywords
Sign Up to like & get
recommendations!
2
Published in 2017 at "Nuclear Engineering and Technology"
DOI: 10.1016/j.net.2016.11.004
Abstract: Abstract Cyber security is an important issue in the field of nuclear engineering because nuclear facilities use digital equipment and digital systems that can lead to serious hazards in the event of an accident. Regulatory…
read more here.
Keywords:
security risk;
risk evaluation;
cyber security;
security ... See more keywords
Photo from wikipedia
Sign Up to like & get
recommendations!
0
Published in 2021 at "Security Journal"
DOI: 10.1057/s41284-021-00292-4
Abstract: Globalisation and hyperconnectivity affect organisational resilience with threats such as the recent COVID-19 pandemic or large-scale cyberattacks. To strengthen organisational resilience capabilities, a framework such as enterprise risk management (ERM) is necessary so as to…
read more here.
Keywords:
security risk;
organisational resilience;
risk management;
security ... See more keywords
Sign Up to like & get
recommendations!
0
Published in 2018 at "IEEE Access"
DOI: 10.1109/access.2018.2800664
Abstract: In virtue of the rapid development of the Internet of Things (IoT), Organizations have grown to rely on their cyber systems and networks. However, this phenomenon also creates many new information security issues. In this…
read more here.
Keywords:
security risk;
information security;
improved information;
information ... See more keywords
Photo from wikipedia
Sign Up to like & get
recommendations!
1
Published in 2017 at "IT Professional"
DOI: 10.1109/mitp.2017.3680959
Abstract: Information security risk assessment methods have served us well over the past two decades. They have provided a tool for organizations and governments to use in protecting themselves against pertinent risks. As the complexity, pervasiveness,…
read more here.
Keywords:
security risk;
risk assessment;
risk;
internet things ... See more keywords
Sign Up to like & get
recommendations!
1
Published in 2022 at "IEEE Transactions on Dependable and Secure Computing"
DOI: 10.1109/tdsc.2020.3033150
Abstract: Systems integrators and vendors of industrial components need to establish a security-by-design approach, which includes the assessment and subsequent treatment of security risks. However, conducting security risk assessments along the engineering process is a costly…
read more here.
Keywords:
security risk;
identification;
security;
engineering data ... See more keywords
Sign Up to like & get
recommendations!
1
Published in 2022 at "Science, Technology and Society"
DOI: 10.1177/09717218221075128
Abstract: Informed by Foucault’s governmentality, this article examines the making of the smart home in China. Operating within the nexus of security and risk, smart homes foster a discourse of the ‘the good life’ that accelerates…
read more here.
Keywords:
home;
life;
security risk;
smart home ... See more keywords
Photo from wikipedia
Sign Up to like & get
recommendations!
0
Published in 2021 at "Applied Sciences"
DOI: 10.3390/app11199206
Abstract: In the COVID-19 and post-pandemic business environment, leveraging robust Internet of Things (IoT) security risk management strategies becomes of particular importance to IoT adopters. Thus, given that no research study was found to exclusively focus…
read more here.
Keywords:
security risk;
risk;
risk management;
iot security ... See more keywords
Photo from wikipedia
Sign Up to like & get
recommendations!
0
Published in 2021 at "Future Internet"
DOI: 10.3390/fi13060148
Abstract: Nowadays, Internet of Things (IoT) adoptions are burgeoning and deemed the lynchpin towards achieving ubiquitous connectivity. In this context, defining and leveraging robust IoT security risk management strategies are paramount for secure IoT adoptions. Thus,…
read more here.
Keywords:
security risk;
risk management;
iot security;
security ... See more keywords
Photo from wikipedia
Sign Up to like & get
recommendations!
2
Published in 2022 at "Future Internet"
DOI: 10.3390/fi14110305
Abstract: In the field of software development, the efficient prioritizing of software risks was essential and play significant roles. However, finding a viable solution to this issue is a difficult challenge. The software developers have to…
read more here.
Keywords:
software;
security risk;
risk factors;
risk ... See more keywords
Sign Up to like & get
recommendations!
0
Published in 2022 at "Games"
DOI: 10.3390/g14010001
Abstract: The growth of the Internet of Things (IoT) has accelerated digital transformation processes in organizations and cities. However, it has also opened new security challenges due to the complexity and dynamism of these systems. The…
read more here.
Keywords:
defining cyber;
cyber risk;
security risk;
risk ... See more keywords