Turnitin
降AI改写
早检测系统
早降重系统
Turnitin-UK版
万方检测-期刊版
维普编辑部版
Grammarly检测
Paperpass检测
checkpass检测
PaperYY检测
Impact of cybersecurity on operations and supply chain management: Emerging trends and future research directions
The new age economy is primarily driven by Industry 4.0 and Industry 5.0, which facilitate
smartification of organizations by hel** them integrate and automate decision making …
smartification of organizations by hel** them integrate and automate decision making …
Nudges for privacy and security: Understanding and assisting users' choices online
Advancements in information technology often task users with complex and consequential
privacy and security decisions. A growing body of research has investigated individuals' …
privacy and security decisions. A growing body of research has investigated individuals' …
[HTML][HTML] Decision support approaches for cyber security investment
When investing in cyber security resources, information security managers have to follow
effective decision-making strategies. We refer to this as the cyber security investment …
effective decision-making strategies. We refer to this as the cyber security investment …
The economics of information security investment
This article presents an economic model that determines the optimal amount to invest to
protect a given set of information. The model takes into account the vulnerability of the …
protect a given set of information. The model takes into account the vulnerability of the …
Systematically understanding the cyber attack business: A survey
Cyber attacks are increasingly menacing businesses. Based on the literature review and
publicly available reports, this article conducts an extensive and consistent survey of the …
publicly available reports, this article conducts an extensive and consistent survey of the …
The economic cost of publicly announced information security breaches: empirical evidence from the stock market
This study examines the economic effect of information security breaches reported in
newspapers on publicly traded US corporations. We find limited evidence of an overall …
newspapers on publicly traded US corporations. We find limited evidence of an overall …
The economics of information security
The economics of information security has recently become a thriving and fast-moving
discipline. As distributed systems are assembled from machines belonging to principals with …
discipline. As distributed systems are assembled from machines belonging to principals with …
So long, and no thanks for the externalities: the rational rejection of security advice by users
C Herley - Proceedings of the 2009 workshop on New security …, 2009 - dl.acm.org
It is often suggested that users are hopelessly lazy and unmotivated on security questions.
They chose weak passwords, ignore security warnings, and are oblivious to certificates …
They chose weak passwords, ignore security warnings, and are oblivious to certificates …
Interdependent security
H Kunreuther, G Heal - Journal of risk and uncertainty, 2003 - Springer
Do firms have adequate incentives to invest in protection against a risk whose magnitude
depends on the actions of others? This paper characterizes the Nash equilibria for this type …
depends on the actions of others? This paper characterizes the Nash equilibria for this type …
AHP–TOPSIS integration extended with Pythagorean fuzzy sets for information security risk analysis
Risk analysis (RA) contains several methodologies that object to ensure the protection and
safety of occupational stakeholders. Multi attribute decision-making (MADM) is one of the …
safety of occupational stakeholders. Multi attribute decision-making (MADM) is one of the …