Open Access. Powered by Scholars. Published by Universities.®
- Keyword
-
- : IT clusters (1)
- BISO responsibilities (1)
- Big data (1)
- Business Information Security Officer (1)
- Cloud services (1)
-
- Containment (1)
- Detection and Analysis (1)
- Eradication and Recovery (1)
- Funding basic science (1)
- Gujarat State (1)
- Healthcare expenditure (1)
- Identification (1)
- Incident response plan (1)
- Indian IT industry (1)
- Knowledge Innovation clusters. (1)
- Masternodes (1)
- Medical innovation (1)
- Mobile computation (1)
- Music notation (1)
- Music notation software (1)
- Music publishing (1)
- Music scores (1)
- Post-Incident Activity (1)
- Preparation (1)
- Research methods (1)
- Scientific funding (1)
- Smartphones (1)
- Social externality (1)
- Staking coins (1)
- Technology (1)
Articles 1 - 8 of 8
Full-Text Articles in Business
Types Of Cyber Attacks And Incident Responses, Kaung Myat Thu
Types Of Cyber Attacks And Incident Responses, Kaung Myat Thu
Publications and Research
Cyber-attacks are increasingly prevalent in today's digital age, and their impact can be severe for individuals, organizations, and governments. To effectively protect against these threats, it is essential to understand the different types of attacks and have an incident response plan in place to minimize damage and restore normal operations quickly.
This research aims to contribute to the field by addressing the following questions: What are the main types of cyber-attacks, and how can organizations effectively respond to these incidents? How can the incident response process be improved through post-incident activities?
The study examines various cyber-attack types, including malware, phishing, …
Business Information Security Officer (Biso) Responsibilities And Role Development, Kaung Myat Thu, Hudda Siddique
Business Information Security Officer (Biso) Responsibilities And Role Development, Kaung Myat Thu, Hudda Siddique
Publications and Research
In today's interconnected world, the success of enterprises heavily relies on network connectivity and technology. To safeguard sensitive information from cyber threats and ensure business success, the role of Information Security has become critical. This research project focuses on the Business Information Security Officer (BISO) role, studying their responsibilities, strategies, and how they handle threats. We explore the knowledge and skills required for BISOs, including certifications such as ISC² CISSP, ISACA CRISC, CISM, and CompTIA Security+. By contributing to the maturity of the BISO role, this study aims to enhance information security in organizations.
What Impedes The Success Of Late Mover It Clusters Despite Economically Favorable Environments? A Case Study Of An Indian It Cluster, Harini Mittal, Punit Saurabh, Devang Rohit, Kathak Mehta
What Impedes The Success Of Late Mover It Clusters Despite Economically Favorable Environments? A Case Study Of An Indian It Cluster, Harini Mittal, Punit Saurabh, Devang Rohit, Kathak Mehta
Publications and Research
The Information Technology (IT) industry in India, is one of the major contributors to the country’s growth story. It is organized in a few strong and dominant clusters across the country. Recent research focuses on the emergence, growth and success of the seven big IT clusters that account for 96.55 of total software exports from the country. Unlike the six successful late mover clusters, there are several other late mover IT clusters that have not experienced similar growth. Why do some of the late mover IT clusters in India succeed while others fail to take off despite favorable economic conditions? …
Keeping Score, Digitally, Kimmy Szeto
Keeping Score, Digitally, Kimmy Szeto
Publications and Research
How does a music score behave in the cloud? As music software moves to the cloud, the integrated interface for editing, engraving, and instantaneous publishing sparks innovative music practices. Artists can now create new works not only using notation and instruments, but also by way of physical gestures, movements, and live coding. The result brings audio, video, lighting, and visual design into a single artistic product. While traditional music making will continue to demand traditional scores, multimodal and multimedia integration will ultimately be reflected in its documentation, which will undoubtedly test our understanding of a “score,” and what roles libraries …
Funding Science With Science (And, Admittedly, A Lot Of Math), John R. Ziegler, Dylan Hunzeker, Edward Lehner
Funding Science With Science (And, Admittedly, A Lot Of Math), John R. Ziegler, Dylan Hunzeker, Edward Lehner
Publications and Research
Scientific funding within the academy is an often complicated affair involving disparate and competing interests. Private universities, for instance, are vastly outpacing public institutions in garnering large, prestigious grants. Inequities also extend to the kinds of research funded, with government, corporate, and even military interests privileging certain types of inquiry.This work proposes an innovative type of research fund using cryptocurrencies, a fast growing asset class. Although not a total funding solution, staking coins, specifically, can be strategically invested in to yield compound interest. These coins use central hub technology to collateralise the network and speed transaction pace. Additionally. These staking …
Medical Innovation And Social Externality, Chul-Young Roh, Sangheon Kim
Medical Innovation And Social Externality, Chul-Young Roh, Sangheon Kim
Publications and Research
Healthcare expenditure in the United States has grown and will continue to increase. The increasing healthcare expenditure is to reduce real income as well as to diminish total utility and increase financial stresses. This study argues that the most critical factor that increases healthcare expenditures during last 50 years has been the advent, adoption and diffusion of new medical technologies that include new drugs, equipment and healthcare delivery systems. This study introduces various examples how medical innovations influence to increase healthcare expenditures. In company with the advanced medical technology, this study suggests a free market in medical technology that means …
Smartphones: A Game Changer For Psychological Research, Wei Wang, Jibo He
Smartphones: A Game Changer For Psychological Research, Wei Wang, Jibo He
Publications and Research
As technology continues to advance and smartphones continue to grow in popularity, we argue that smartphones have rapidly evolved as a suitable tool for psychological research. In this editorial, we will first briefly introduce the technological and social features possessed by smartphones that are ideal for psychology research. Then we distinguish two approaches to use smartphones for research, highlighting the external and internal validity of each approach. We further discuss computer skills and analysis methods needed for research with smartphones.
Brighter Future On The Way For Batteries, Aldemaro Romero Jr.
Brighter Future On The Way For Batteries, Aldemaro Romero Jr.
Publications and Research
No abstract provided.