Turnitin
降AI改写
早检测系统
早降重系统
Turnitin-UK版
万方检测-期刊版
维普编辑部版
Grammarly检测
Paperpass检测
checkpass检测
PaperYY检测
Human–machine cooperation research for navigation of maritime autonomous surface ships: A review and consideration
Abstract Maritime Autonomous Surface Ships (MASS) have obtained much attention in
recent years. Navigation with human–machine cooperation is the core for L1–L3 MASS. In …
recent years. Navigation with human–machine cooperation is the core for L1–L3 MASS. In …
[HTML][HTML] Cyber-threat intelligence for security decision-making: A review and research agenda for practice
The increasing militarization of the cyber-threat environment has driven considerable
interest in understanding the role of cyber-threat intelligence (CTI) in supporting the …
interest in understanding the role of cyber-threat intelligence (CTI) in supporting the …
[HTML][HTML] Information security risk assessments following cybersecurity breaches: The mediating role of top management attention to cybersecurity
Abstract Information Systems (IS) research on managerial response to cybersecurity
breaches has largely focused on externally oriented actions such as customer redressal and …
breaches has largely focused on externally oriented actions such as customer redressal and …
Information security policy compliance model in organizations
The Internet and information technology have influenced human life significantly. However,
information security is still an important concern for both users and organizations …
information security is still an important concern for both users and organizations …
How can organizations develop situation awareness for incident response: A case study of management practice
Organized, sophisticated and persistent cyber-threat-actors pose a significant challenge to
large, high-value organizations. They are capable of disrupting and destroying cyber …
large, high-value organizations. They are capable of disrupting and destroying cyber …
Adopting and integrating cyber-threat intelligence in a commercial organisation
Cyber-attacks are increasingly perpetrated by organised, sophisticated and persistent
entities such as crime syndicates and paramilitary forces. Even commercial firms that fully …
entities such as crime syndicates and paramilitary forces. Even commercial firms that fully …
Strategically-motivated advanced persistent threat: Definition, process, tactics and a disinformation model of counterattack
Advanced persistent threat (APT) is widely acknowledged to be the most sophisticated and
potent class of security threat. APT refers to knowledgeable human attackers that are …
potent class of security threat. APT refers to knowledgeable human attackers that are …
How integration of cyber security management and incident response enables organizational learning
Digital assets of organizations are under constant threat from a wide assortment of nefarious
actors. When threats materialize, the consequences can be significant. Most large …
actors. When threats materialize, the consequences can be significant. Most large …
Enabling cybersecurity incident response agility through dynamic capabilities: the role of real-time analytics
We explore how organisations enable agility in their cybersecurity incident response (IR)
process by develo** dynamic capabilities using real-time analytics (RTA). Drawing on …
process by develo** dynamic capabilities using real-time analytics (RTA). Drawing on …
[HTML][HTML] Cyber-threat perception and risk management in the Swedish financial sector
The financial sector relies heavily on information systems for business. This study sets out to
investigate cyber situation awareness in the financial sector in Sweden, by examining what …
investigate cyber situation awareness in the financial sector in Sweden, by examining what …