Update search
Filter
- All
- Title
- Author
- Author Affiliations
- Full Text
- Abstract
- Keyword
- DOI
- ISBN
- EISBN
- ISSN
- EISSN
- Issue
- Volume
- References
Filter
- All
- Title
- Author
- Author Affiliations
- Full Text
- Abstract
- Keyword
- DOI
- ISBN
- EISBN
- ISSN
- EISSN
- Issue
- Volume
- References
Filter
- All
- Title
- Author
- Author Affiliations
- Full Text
- Abstract
- Keyword
- DOI
- ISBN
- EISBN
- ISSN
- EISSN
- Issue
- Volume
- References
Filter
- All
- Title
- Author
- Author Affiliations
- Full Text
- Abstract
- Keyword
- DOI
- ISBN
- EISBN
- ISSN
- EISSN
- Issue
- Volume
- References
Filter
- All
- Title
- Author
- Author Affiliations
- Full Text
- Abstract
- Keyword
- DOI
- ISBN
- EISBN
- ISSN
- EISSN
- Issue
- Volume
- References
Filter
- All
- Title
- Author
- Author Affiliations
- Full Text
- Abstract
- Keyword
- DOI
- ISBN
- EISBN
- ISSN
- EISSN
- Issue
- Volume
- References
NARROW
Format
Journal
Type
Date
Availability
1-3 of 3
Keywords: Cybersecurity
Close
Follow your search
Access your saved searches in your account
Would you like to receive an alert when new items match your search?
Sort by
Journal Articles
Analysing the role of modern information technologies in HRM: management perspective and future agenda
Available to Purchase
Journal:
Kybernetes
Kybernetes (2025) 54 (14): 7409–7434.
Published: 08 August 2024
... 29 11 2023 15 04 2024 05 06 2024 15 07 2024 © Emerald Publishing Limited 2024 Emerald Publishing Limited Licensed re-use rights only HRM Artificial intelligence (AI) Machine learning (ML) IoT Big data Cybersecurity Bibliometric analysis Modern technology...
Journal Articles
Complex characteristics analysis of time-delay digital supply chain driven by cybersecurity
Available to Purchase
Journal:
Kybernetes
Kybernetes (2023) 52 (9): 3362–3390.
Published: 22 March 2022
... good guidance for the digitalization process of enterprises. The literature review focuses on four perspectives: digital supply chains, cybersecurity, advertising and complexity theories. This study investigates the short-term game behaviors and long-term evolutionary game behaviors of a time...
Journal Articles
Modeling anti-malware use intention of university students in a developing country using the theory of planned behavior
Available to Purchase
Journal:
Kybernetes
Kybernetes (2019) 48 (8): 1565–1585.
Published: 24 October 2018
... © Emerald Publishing Limited 2018 Emerald Publishing Limited Licensed re-use rights only Cybersecurity Information security awareness Developing country Technology adoption University students Anti-malware Based on Microsoft Security Intelligence report, Malaysia had 20.4 per...
