Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
appraisal
biblio
Cyber Supply Chain Security: A Cost Benefit Analysis Using Net Present Value
Submitted by grigby1 on Fri, 09/09/2022 - 3:05pm
supply chain security
appraisal
business continuity
Cost benefit analysis
cyber security
cyber supply chain
Net Present Value
Planning
pubcrawl
radio access technologies
resilience
Resiliency
security
supply chains
biblio
A Security Analysis of Chinese Robot Supply Chain Based on Open-Source Intelligence
Submitted by grigby1 on Fri, 08/26/2022 - 12:21pm
pubcrawl
text analysis
supply chains
Sino-US game
security management
Scalability
robot supply chain
Risk
Resiliency
resilience
supply chain security
Predictive models
Open-Source Intelligence
machine learning algorithms
Human Factors
Human behavior
game theory
Control Theory
appraisal
biblio
The Influence of Mobile Operating Systems on User Security Behavior
Submitted by grigby1 on Fri, 07/29/2022 - 4:14pm
operating systems
User behavior
technology threat avoidance theory
Stakeholders
Resiliency
resilience
pubcrawl
privacy
Operating systems security
iOS Security
operating system
Mobile Security
ios
Cryptography
Conferences
appraisal
android
biblio
Information Security Policy Perceived Compliance Among Staff in Palestine Universities: An Empirical Pilot Study
Submitted by grigby1 on Tue, 01/21/2020 - 10:23am
planned behaviour theory
Instruments
ISP
Least squares approximations
Mathematical model
Metrics
organisational aspects
Palestine university staffs
partial least squares structural equation modelling
Personnel
insider threat
PLS-SEM
policy-based governance
protection motivation theory
pubcrawl
resilience
Resiliency
security of data
statistical analysis
General Deterrence Theory
appraisal
Bibliographies
collaboration
Communications technology
compliance behaviour
data collection method
Educational institutions
employees
Security Policies Analysis
government policies
Human behavior
Human Factors
information reinforcement theory
information security
information security policy
Information Security Policy Awareness
information security risks mitigation