The extent and impact of intellectual capital research: a two decade analysis
Purpose This paper examines the leading publication trends including the extent and impact
of intellectual capital research in the Journal of Intellectual Capital (JIC) over a two-decade …
of intellectual capital research in the Journal of Intellectual Capital (JIC) over a two-decade …
Toward an intellectual capital cyber security theory: insights from Lebanon
Purpose Intellectual capital (IC) cyber security is a priority in all organizations. Because of
the dearth in IC cyber security (ICCS) research theories and the constant call to theory …
the dearth in IC cyber security (ICCS) research theories and the constant call to theory …
Transparency of artificial intelligence in healthcare: insights from professionals in computing and healthcare worldwide
Although it is widely assumed that Artificial Intelligence (AI) will revolutionise healthcare in
the near future, considerable progress must yet be made in order to gain the trust of …
the near future, considerable progress must yet be made in order to gain the trust of …
Do intellectual property rights promote foreign direct investment inflows and technological exports in develo** and developed countries?
Purpose This study aims to analyse the intellectual property rights (INPR), foreign direct
investment (FDI) inflows and technological exports of 32 develo** and developed …
investment (FDI) inflows and technological exports of 32 develo** and developed …
Synthesizing Information Security Policy Compliance And Non-compliance: A Comprehensive Study And Unified Framework
A Aggarwal, SK Srivastava - Journal of Organizational Computing …, 2024 - Taylor & Francis
In today's organizational landscape, safeguarding information against both intentional and
unintentional insider threats has become a paramount concern. To address this challenge …
unintentional insider threats has become a paramount concern. To address this challenge …
Cultural drivers behind employees neutralizing deviant information systems security behaviors
Purpose This study aims to investigate how cultural factors–specifically power distance (PD)
and uncertainty avoidance (UA)–affect employees' use of neutralization techniques to …
and uncertainty avoidance (UA)–affect employees' use of neutralization techniques to …
Procedural information security countermeasure awareness and cybersecurity protection motivation in enhancing employee's cybersecurity protective behaviour
N Humaidi, SHA Alghazo - 2022 10th International Symposium …, 2022 - ieeexplore.ieee.org
Radical changes in the Industrial Revolution 4.0 (IR4. 0) have provoked several
organizations in developed and emerging economies to constantly re-evaluate …
organizations in developed and emerging economies to constantly re-evaluate …
High-risk deviant decisions: does neutralization still play a role?
Extant research has shown that neutralization processes can enable potential IS security
policy violators to justify their behavior and overcome the deterrence effect of sanctions in …
policy violators to justify their behavior and overcome the deterrence effect of sanctions in …
Legal aspects of corporate systems for preventing cybercrime among personnel
The activities of enterprise employees can become a risk factor in terms of cybercrime, which
is often associated with their lack of preparedness to counter potential cyber threats. Many …
is often associated with their lack of preparedness to counter potential cyber threats. Many …
A game theory-based model for the dissemination of privacy information in online social networks
J He, Y Li, N Zhu - Future Internet, 2023 - mdpi.com
Online social networks (OSNs) have experienced rapid growth in recent years, and an
increasing number of people now use OSNs, such as Facebook and Twitter, to share and …
increasing number of people now use OSNs, such as Facebook and Twitter, to share and …