Resistance to artificial intelligence in health care: Literature review, conceptual framework, and research agenda

Y Yang, EWT Ngai, L Wang - Information & Management, 2024 - Elsevier
Resistance has historically been considered a salient obstacle to the implementation of
information systems, including healthcare information technology. However, artificial …

[HTML][HTML] Literature review: Anomaly detection approaches on digital business financial systems

SO Pinto, VA Sobreiro - Digital Business, 2022 - Elsevier
Anomaly detection approaches have become critically important to enhance decision-
making systems, especially regarding the process of risk reduction in the economic …

garak: A framework for security probing large language models

L Derczynski, E Galinkin, J Martin, S Majumdar… - arxiv preprint arxiv …, 2024 - arxiv.org
As Large Language Models (LLMs) are deployed and integrated into thousands of
applications, the need for scalable evaluation of how models respond to adversarial attacks …

Predicting the acceptance of e-government: a systematic review

X Wu, AYL Chong, Y Peng, H Bao - Internet Research, 2024 - emerald.com
Purpose This study uses a systematic review to explore the potential causes of previous
findings related to e-government acceptance research. By identifying the most frequently …

How Hard Is Cyber-risk Management in IT/OT Systems? A Theory to Classify and Conquer Hardness of Insuring ICSs

R Pal, P Liu, T Lu, E Hua - ACM Transactions on Cyber-Physical …, 2023 - dl.acm.org
Third-party residual cyber-risk management (RCRM) services (eg, insurance, re-insurance)
are getting increasingly popular (currently, a multi-billion-dollar annual market) with C-suites …

Exposure of software vulnerabilities on Twitter: Analyzing vendors' behavior of releasing software patches

R Syed, J Kaur, L Silva - Computers & Security, 2025 - Elsevier
Software vulnerabilities shared and discussed on social media platforms alert malicious
users about the existence of vulnerabilities and increase the risk of exploits. In this study, we …

Vulnerability Coordination Under the Cyber Resilience Act

J Ruohonen, P Timmers - arxiv preprint arxiv:2412.06261, 2024 - arxiv.org
A new Cyber Resilience Act (CRA) was recently agreed upon in the European Union (EU). It
imposes many new cyber security requirements practically to all information technology …

Signal Game Analysis between Software Vendors and Third‐Party Platforms in Collaborative Disclosure of Network Security Vulnerabilities

Q **ong, Y Zhu, Z Zeng, X Yang - Complexity, 2023 - Wiley Online Library
The global network threat is becoming more and more serious, and network security
vulnerability management has become one of the critical areas in the national information …

[PDF][PDF] Experience and Efficiency in Vulnerability Resolution on Bug Bounty Platforms (Research-in-progress)

A Ahmed, HCB Lee, A Deokar - … of the 19th Pre-ICIS Workshop …, 2024 - cybersecurity.fsu.edu
In cybersecurity, bug bounty programs have emerged as a new method of identifying
security vulnerabilities. Despite the growing interest in studying bug bounty programs, it …

Inter-temporal reward decisions with strategic ethical hackers

J Hou, X Wang, AZ Zeng - 2023 IEEE Conference on …, 2023 - ieeexplore.ieee.org
A skyrocketing increase in cyber attacks significantly elevates the importance of secure
software development. Companies launch various bug-bounty programs to reward ethical …