Theoretical insights into IT governance and compliance in banking: Perspectives from African and US regulatory environments
This review paper provides a comprehensive comparative analysis of IT governance and
compliance within the banking sectors of Africa and the US, highlighting the intricacies of …
compliance within the banking sectors of Africa and the US, highlighting the intricacies of …
[HTML][HTML] Artificial intelligence-based techniques for adulteration and defect detections in food and agricultural industry: A review
Artificial Intelligence (AI) techniques have evolved into practical, fast and effective tools in
combination with detecting devices for quality assessment, particularly in adulteration and …
combination with detecting devices for quality assessment, particularly in adulteration and …
[HTML][HTML] Managing cybersecurity risks of cyber-physical systems: The MARISMA-CPS pattern
Cyber-physical systems (CPSs) are smart systems that include engineered interacting
networks of physical and computational components. CPSs have an increasingly presence …
networks of physical and computational components. CPSs have an increasingly presence …
A dynamic and adaptive cybersecurity governance framework
HM Melaku - Journal of Cybersecurity and Privacy, 2023 - mdpi.com
Cybersecurity protects cyberspace from a wide range of cyber threats to reduce overall
business risk, ensure business continuity, and maximize business opportunities and return …
business risk, ensure business continuity, and maximize business opportunities and return …
Formal and relational governance of artificial intelligence outsourcing
Outsourcing emerging technologies such as Artificial Intelligence (AI) are expected to impact
organisations significantly, due to a tight labour market for AI expertise. However, how formal …
organisations significantly, due to a tight labour market for AI expertise. However, how formal …
Develo** an agile cybersecurity framework with organizational culture approach using Q methodology
Cyberattacks continue to pose significant threats and damages across a wide range of
sectors. The main problem that causes this lies in the misinterpretation of the implementation …
sectors. The main problem that causes this lies in the misinterpretation of the implementation …
[HTML][HTML] Enabling security risk assessment and management for business process models
Business processes (BP) are considered the enterprise's cornerstone but are increasingly in
the spotlight of attacks. Therefore, the design of business processes must consider the …
the spotlight of attacks. Therefore, the design of business processes must consider the …
To join or not to join?–A framework for the evaluation of enterprise blockchain consortia
Within the past years, enterprise blockchain solutions were frequently developed within
different industry consortia. In most cases, this resulted in isolated solutions competing …
different industry consortia. In most cases, this resulted in isolated solutions competing …
Assessing and improving measurability of process performance indicators based on quality of logs
The efficiency and effectiveness of business processes are usually evaluated by Process
Performance Indicators (PPIs), which are computed using process event logs. PPIs can be …
Performance Indicators (PPIs), which are computed using process event logs. PPIs can be …
The Influence of Internal Governance and External Legitimacy on Greenwashing: A Digitalization Perspective
K Zhang, B Ahmed, R Wang, B Gu - Environment, Development and …, 2023 - Springer
This research aims to address the gap in existing literature regarding the relationship
between digitalization and greenwashing. Drawing upon legitimacy theory, corporate …
between digitalization and greenwashing. Drawing upon legitimacy theory, corporate …