SDGs and innovation in the business context literature review
MF Cordova, A Celone - Sustainability, 2019 - mdpi.com
On 25 October 2015 the United Nations approved The 2030 Agenda for Sustainable
Development and its 17 sustainable development goals (SDGs). It is an important event from …
Development and its 17 sustainable development goals (SDGs). It is an important event from …
Systematic literature review to investigate the application of open source intelligence (osint) with artificial intelligence
Abstract Open Source Intelligence (OSINT) is a concept to describe the search, collection,
analysis, and use of information from open sources, as well as the techniques and tools …
analysis, and use of information from open sources, as well as the techniques and tools …
Big data for creating and capturing value in the digitalized environment: unpacking the effects of volume, variety, and veracity on firm performance
Despite significant academic and managerial interest in big data, there is a dearth of
research on how big data impacts the long‐term firm performance. Reasons for this gap …
research on how big data impacts the long‐term firm performance. Reasons for this gap …
Conceptual framework of an intelligent decision support system for smart city disaster management
In order to protect human lives and infrastructure, as well as to minimize the risk of damage,
it is important to predict and respond to natural disasters in advance. However, currently, the …
it is important to predict and respond to natural disasters in advance. However, currently, the …
“Pledge” me your ears! The role of narratives and narrator experience in explaining crowdfunding success
This study examines how the success of reward-based crowdfunding (RBCF) is affected by
two narrative styles—namely “results in progress”(RIP) and “ongoing journey”(OJ)—and by …
two narrative styles—namely “results in progress”(RIP) and “ongoing journey”(OJ)—and by …
[HTML][HTML] An effective approach to mobile device management: Security and privacy issues associated with mobile applications
Consumers and organizations often rely on permissions requested during the installation of
mobile applications (apps) and on official privacy policies to determine how safe an app is …
mobile applications (apps) and on official privacy policies to determine how safe an app is …
Monetary and social rewards for crowdsourcing
Crowdsourcing of inventive activities is a particular form of crowdsourcing that helps firms to
innovate by involving dispersed individuals to exploit “crowd wisdom”. In this context, the …
innovate by involving dispersed individuals to exploit “crowd wisdom”. In this context, the …
Forensic conflict studies: Making sense of war in the social media age
J Hauter - Media, War & Conflict, 2023 - journals.sagepub.com
Online media is a blessing and a curse for academic research on war. On the one hand, the
internet provides unprecedented access to information from conflict zones. On the other …
internet provides unprecedented access to information from conflict zones. On the other …
Cybersecurity risk assessment: a systematic map** review, proposal, and validation
Incorporating technologies across all sectors has meant that cybersecurity risk assessment
is now a critical step in cybersecurity risk management. However, risk assessment can be a …
is now a critical step in cybersecurity risk management. However, risk assessment can be a …
A framework for more effective dark web marketplace investigations
The success of the Silk Road has prompted the growth of many Dark Web marketplaces.
This exponential growth has provided criminal enterprises with new outlets to sell illicit …
This exponential growth has provided criminal enterprises with new outlets to sell illicit …