Zobrazeno 1 - 7
of 7
pro vyhledávání: '"Humza Naseer"'
Publikováno v:
Australasian Journal of Information Systems, Vol 28 (2024)
Organisations are increasingly practising business analytics to generate actionable insights that can guide their digital business transformation. Transforming business digitally using business analytics is an ongoing process that requires an integra
Externí odkaz:
https://doaj.org/article/3c6fd322eb1e42da867e1521c9672c45
Autor:
Nor Hasnul Azirah Abdul Hamid, Normalina Ibrahim @ Mat Nor, Fazlin Marini Hussain, Rajeswari Raju, Humza Naseer, Atif Ahmad
Publikováno v:
Computers & Security. 122:102893
Publikováno v:
Journal of the Association for Information Science and Technology. 71:939-953
Digital assets of organizations are under constant threat from a wide assortment of nefarious actors. When threats materialize, the consequences can be significant. Most large organizations invest in a dedicated information security management (ISM)
Publikováno v:
International Journal of Information Management. 59:102334
Emerging paradigms of attack challenge enterprise cybersecurity with sophisticated custom-built tools, unpredictable patterns of exploitation, and an increasing ability to adapt to cyber defenses. As a result, organizations continue to experience inc
Publikováno v:
Decision Support Systems. 143:113476
Little is known about how organizations leverage business analytics (BA) to develop, process, and exploit analytical information in cybersecurity incident response (CSIR). Drawing on information processing theory (IPT), we conducted a field study usi
Publikováno v:
Computers & Security. 88:101606
Information systems continue to be used by actors who want to undermine public institutions and disrupt political systems. In recent times, actors have engaged in acts of information warfare ranging from attempts to compromising voting systems, to sp
Semantic web is a web of future. TheResource Description Framework ( RDF) is a language to represent resources in the World Wide Web. When these resources are queried the problem of duplicate query results occurs. The present techniques used hash ind
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_dedup___::ccd42d1418cec888030e8de18bef1d25