Theoretical insights into IT governance and compliance in banking: Perspectives from African and US regulatory environments

G Nzeako, MO Akinsanya, OA Popoola… - International Journal of …, 2024 - fepbl.com
This review paper provides a comprehensive comparative analysis of IT governance and
compliance within the banking sectors of Africa and the US, highlighting the intricacies of …

[HTML][HTML] Artificial intelligence-based techniques for adulteration and defect detections in food and agricultural industry: A review

S Othman, NR Mavani, MA Hussain… - Journal of Agriculture …, 2023 - Elsevier
Artificial Intelligence (AI) techniques have evolved into practical, fast and effective tools in
combination with detecting devices for quality assessment, particularly in adulteration and …

[HTML][HTML] Managing cybersecurity risks of cyber-physical systems: The MARISMA-CPS pattern

DG Rosado, A Santos-Olmo, LE Sánchez… - Computers in …, 2022 - Elsevier
Cyber-physical systems (CPSs) are smart systems that include engineered interacting
networks of physical and computational components. CPSs have an increasingly presence …

A dynamic and adaptive cybersecurity governance framework

HM Melaku - Journal of Cybersecurity and Privacy, 2023 - mdpi.com
Cybersecurity protects cyberspace from a wide range of cyber threats to reduce overall
business risk, ensure business continuity, and maximize business opportunities and return …

Formal and relational governance of artificial intelligence outsourcing

E Beulen, A Plugge, J van Hillegersberg - Information Systems and e …, 2022 - Springer
Outsourcing emerging technologies such as Artificial Intelligence (AI) are expected to impact
organisations significantly, due to a tight labour market for AI expertise. However, how formal …

Develo** an agile cybersecurity framework with organizational culture approach using Q methodology

EY Handri, DI Sensuse, A Tarigan - IEEE Access, 2024 - ieeexplore.ieee.org
Cyberattacks continue to pose significant threats and damages across a wide range of
sectors. The main problem that causes this lies in the misinterpretation of the implementation …

[HTML][HTML] Enabling security risk assessment and management for business process models

DG Rosado, LE Sánchez, ÁJ Varela-Vaca… - Journal of Information …, 2024 - Elsevier
Business processes (BP) are considered the enterprise's cornerstone but are increasingly in
the spotlight of attacks. Therefore, the design of business processes must consider the …

To join or not to join?–A framework for the evaluation of enterprise blockchain consortia

M Schwarzer, T Gürpinar, M Henke - Frontiers in Blockchain, 2022 - frontiersin.org
Within the past years, enterprise blockchain solutions were frequently developed within
different industry consortia. In most cases, this resulted in isolated solutions competing …

Assessing and improving measurability of process performance indicators based on quality of logs

C Cappiello, M Comuzzi, P Plebani, M Fim - Information systems, 2022 - Elsevier
The efficiency and effectiveness of business processes are usually evaluated by Process
Performance Indicators (PPIs), which are computed using process event logs. PPIs can be …

The Influence of Internal Governance and External Legitimacy on Greenwashing: A Digitalization Perspective

K Zhang, B Ahmed, R Wang, B Gu - Environment, Development and …, 2023 - Springer
This research aims to address the gap in existing literature regarding the relationship
between digitalization and greenwashing. Drawing upon legitimacy theory, corporate …