À propos de cet article

Citez

Alem, S., Espes, D., Martin, E., Nana, L.,v De Lamotte, F. (2019). A hybrid intrusion detection system in industry 4.0 based on ISA95 standard. In 2019 IEEE/ACS 16th International Conference on Computer Systems and Applications (AICCSA) (pp. 1-8). IEEE. https://doi.org/10.1109/AICCSA47632.2019.9035260 Search in Google Scholar

Alrfai, M. N., Alqudah, H., Lutfi, A., Al-Kofahi, M., Alrawad, M., Almaiah, M. (2023). The influence of artificial intelligence on the AISs efficiency: Moderating effect of the cyber security, Cogent Social Sciences, 9(2). https://doi.org/10.1080/23311886.2023.2243719 Search in Google Scholar

Aurucci, P. (2018). Applications and Security Risks of Artificial Intelligence for Cyber Security in Digital Environment. In Intelligent Environments 2018, 23 (pp. 308-317). IOS Press. https://doi.org/10.3233/978-1-61499-874-7-308 Search in Google Scholar

Aldoseri, A., Al-Khalifa, K.N., Hamouda, A.M. (2024). Methodological Approach to Assessing the Current State of Organizations for AI-Based Digital Transformation. Appl. Syst. Innov. 2024, 7, 14. https://doi.org/10.3390/asi7010014 Search in Google Scholar

Bawa, S. S. (2023). How Business can use ERP and AI to become Intelligent Enterprise. International Journal of Innovative Science and Research Technology, 8(2), 1186–1189. https://doi.org/10.5281/zenodo.7688737 Search in Google Scholar

Butler, T., Gozman, D., & Lyytinen, K. (2023). The regulation of and through information technology: Towards a conceptual ontology for IS research. Journal of Information Technology, 38(2), 86-107. https://doi.org/10.1177/02683962231181147 Search in Google Scholar

Cui C, Shen G, Wang Y, Xu Y, Du H, Zhang W, Kong X. (2023). Impact of In-Air Gestures on In-Car Task’s Diver Distraction. Electronics, 12(7):1626. https://doi.org/10.3390/electronics12071626 Search in Google Scholar

Costa, C., Aparicio, M., & Raposo, J. (2020). Determinants of the management learning performance in ERP context. Heliyon, 6. https://doi.org/10.1016/j.heliyon.2020.e03689. Search in Google Scholar

Dawson, M., Martinez, F. G. and Taveras, P. (2019). Framework for the development of virtual labs for industrial internet of things and hyperconnected systems. In 2019 IEEE Learning With MOOCS(LWMOOCS) (pp.196-198), IEEE https://doi.org/10.1109/lwmoocs47620.2019.8939660 Search in Google Scholar

François, M., Arduin, P. E., Merad, M. (2021). Artificial Intelligence & Cybersecurity: A Preliminary Study of Automated Pentesting with Offensive Artificial Intelligence. In: Saad, I., Rosenthal-Sabroux, C., Gargouri, F., Arduin, P. E. (eds) Information and Knowledge Systems. Digital Technologies, Artificial Intelligence and Decision Making. ICIKS 2021. Lecture Notes in Business Information Processing, vol 425. Springer, Cham. https://doi.org/10.1007/978-3-030-85977-0_10 Search in Google Scholar

eSentire(2023). 2023 Official Cybercrime Report by Cybersecurity Ventures. Retrieved from: https://www.esentire.com/resources/library/2023-official-cybercrime-report Search in Google Scholar

Forbes (2023). Navigating The Future Of Generative AI And ERP Cybersecurity. Retrieved from: https://www.forbes.com/sites/forbestechcouncil/2023/10/30/navigating-the-future-of-generative-ai-and-erp-cybersecurity/?sh=c1c5ac93303b Search in Google Scholar

Formosa, P., Wilson, M., & Richards, D. (2021). A principlist framework for cybersecurity ethics. Comput. Secur., 109, 102382. https://doi.org/10.1016/J.COSE.2021.102382. Search in Google Scholar

Gatti, G., Basile, C. and Perboli, G. (2023). An expert system for automatic cyber risk assessment and its AI-based improvements, 2023 IEEE 47th Annual Computers, Software, and Applications Conference (COMPSAC), Torino, Italy, 2023, 1434-1440, https://doi.org/10.1109/COMPSAC57700.2023.00220. Search in Google Scholar

Gupta, S., Modgil, S., Meissonier, R. and Dwivedi, Y. K. (2021). Artificial Intelligence and Information System Resilience to Cope With Supply Chain Disruption. IEEE Transactions on Engineering Management. https://doi.org/10.1109/TEM.2021.3116770. Search in Google Scholar

He, Y., Zamani, E., Kun, N.,Yevseyeva, I. & Cunjin, L. (2022). AI-based Ethical Hacking for Health Information Systems (HIS): a simulation study (Preprint). Journal of Medical Internet Research. 25. https://doi.org/10.2196/41748 Search in Google Scholar

Hamon, R., Junklewitz, H., Sanchez, I., Malgieri, G., & Hert, P. (2022). Bridging the Gap Between AI and Explainability in the GDPR: Towards Trustworthiness-by-Design in Automated Decision-Making. IEEE Computational Intelligence Magazine, 17, 72-85. https://doi.org/10.1109/MCI.2021.3129960. Search in Google Scholar

Hosney, E.S., Halim I.T.A. and Yousef, A. H. (2022). An Artificial Intelligence Approach for Deploying Zero Trust Architecture (ZTA). 2022 5th International Conference on Computing and Informatics (ICCI), New Cairo, Cairo, Egypt, pp. 343-350, https://doi.org/10.1109/ICCI54321.2022.9756117. Search in Google Scholar

Indre, I. and Lemnaru, C. (2016). Detection and prevention system against cyber attacks and botnet malware for information systems and Internet of Things. In 2016 IEEE 12th International Conference on Intelligent Computer Communication and Processing (ICCP) (pp. 175-182). IEEE. Search in Google Scholar

Jain, H., Padmanabhan, B., Pavlou, P.A., Raghu, T.S. (2021). Editorial for the special section on humans, algorithms, and augmented intelligence: The future of work, organizations, and society. Information Systems Research, 32(3), 675-687. https://doi.org/10.1287/isre.2021.1046 Search in Google Scholar

Jada Irshaad, Mayayise Thembekile O. (2023). The impact of artificial intelligence on organisational cyber security: An outcome of a systematic literature review, Data and Information Management, 100063, ISSN 2543-9251, https://doi.org/10.1016/j.dim.2023.100063. Search in Google Scholar

Kholidy, H. (2021). Autonomous mitigation of cyber risks in the Cyber-Physical Systems. Future Gener. Comput. Syst., 115, 171-187. https://doi.org/10.1016/j.future.2020.09.002. Search in Google Scholar

Kumar, S. and Mallipeddi, R.R. (2022). Impact of cybersecurity on operations and supply chain management: Emerging trends and future research directions, Production and Operations Management, Production and Operations Management Society, vol. 31(12), pp. 4488-4500, December. https://doi.org/10.1111/poms.13859. Search in Google Scholar

Larriva-Novo, X., Vega-Barbas, M., Villagrá, V., Berrocal, J. (2021). Análisis comparativo y evaluación de la aplicación de técnicas deep learning a datasets de ciberseguridad. DYNAIngeniería e Industria, 96(5), 528-533. https://doi.org/10.6036/10007 Search in Google Scholar

Lee, S. (2021). AI-Based CYBERSECURITY: Benefits and Limitations. Journal of Instrumentation, 6, 18-28. https://doi.org/10.22471/AI.2021.6.1.18. Search in Google Scholar

Lee, C.W. and Madnick, S. (2021). Cybersafety approach to cybersecurity analysis and mitigation for mobility-as-a-service and internet of vehicles. Electronics, 10(10), 1220. https://doi.org/10.3390/electronics10101220 Search in Google Scholar

Levshun Diana and Kotenko Igor (2023). A survey on artificial intelligence techniques for security event correlation: models, challenges, and opportunities. Artif. Intell. Rev. 56, 8 (Aug 2023), 8547–8590. https://doi.org/10.1007/s10462-022-10381-4 Search in Google Scholar

Lohn, A., Knack, A., Burke, A., & Jackson, K. (2023). Autonomous Cyber Defense. . https://doi.org/10.51593/2022ca007 Search in Google Scholar

Levshun, D., Kotenko, I. (2023). A survey on artificial intelligence techniques for security event correlation: models, challenges, and opportunities. Artificial Intelligence Review, 56, 8547–8590. https://doi.org/10.1007/s10462-022-10381-4 Search in Google Scholar

Michailidi, E., Michailidis, H., Tavoultzidou, S., Papatsimouli, M., Fragulis, G. F. (2021). Digital Transformation of Small Greek Companies During the Covid-19 Pandemic. In 2021 International Conference on Decision Aid Sciences and Application (DASA), Sakheer, Bahrain, 2021 (pp. 1103-1108). IEEE. https://doi.org/10.1109/DASA53625.2021.9682410 Search in Google Scholar

Maurya, R. (2023). Analyzing the Role of AI in Cyber Security Threat Detection & Prevention. International Journal for Research in Applied Science and Engineering Technology. https://doi.org/10.22214/ijraset.2023.56510.\ Search in Google Scholar

Mottaleb, A. & Canan, M. (2021). Analyzing the Cyberattacks Sponsored by State-Actors Under the Contemporary Global Political and Legal Frameworks. In ICCWS 2021 16th International Conference on Cyber Warfare and Security (p. 223-230). Academic Conferences Limited. Search in Google Scholar

Mohan, P. V., Dixit, S., Gyaneshwar, A., Chadha, U., Srinivasan, K., Seo, J.T. (2022). Leveraging Computational Intelligence Techniques for Defensive Deception: A Review, Recent Advances, Open Problems and Future Directions. Sensors (Basel). Mar 11, 22(6), 2194. https://doi.org/10.3390/s22062194. Search in Google Scholar

Maia, E., Wannous, S., Dias, T., Praça, I., Faria, A. (2022). Holistic Security and Safety for Factories of the Future. Sensors. 22(24):9915. https://doi.org/10.3390/s22249915 Search in Google Scholar

Mogollón-Gutiérrez, J.C., Núñez, S., Vegas, M.A., Lindo, A.C. (2023). A novel ensemble learning system for cyberattack classification, Intelligent Automation & Soft Computing, vol. 37, no.2, pp. 1691–1709 . https://doi.org/10.32604/iasc.2023.039255 Search in Google Scholar

Morrison, Christina (2024). AI in ERP: The Next Wave of Intelligent ERP Systems, ERP Technologies, posted on Jan 23, 2024. Retrieve from: https://www.top10erp.org/blog/ai-inerp Search in Google Scholar

Murugesan, S. (2022). The AI-Cybersecurity Nexus: The Good and the Evil. in IT Professional, vol. 24, no. 5, pp. 4-8, 1 Sept.-Oct. 2022, https://doi.org/10.1109/MITP.2022.3205529. Search in Google Scholar

Ospina Díaz, M.R., Vera Osorio, S.P. & Zambrano Ospina, K.J. (2023). Sistemas de Información de Administración Financiera (SIAF) en la gobernanza pública inteligente: una exploración del caso colombiano, Opera. 34 (nov. 2023), 31–55. https://doi.org/10.18601/16578651.n34.03. Search in Google Scholar

Onapsis (2024). ERP Applications Under Fire: How cyberattackers target the crown jewels. Retrieved from: https://onapsis.com/resources/reports/erp-applications-under-fire-report/ Search in Google Scholar

Pawlicki, M., Choraś, M. and Kozik, R. (2019). Recent granular computing implementations and its feasibility in cybersecurity domain. In Proceedings of the 13th International Conference on Availability, Reliability and Security (ARES 2018) (pp. 1-6). Search in Google Scholar

Pawlicki, M., Choraś, M., Kozik, R., Hołubowicz, W. (2021). Missing and Incomplete Data Handling in Cybersecurity Applications. In: Nguyen, N.T., Chittayasothorn, S., Niyato, D., Trawiński, B. (eds) Intelligent Information and Database Systems. ACIIDS 2021. Lecture Notes in Computer Science, 12672 (pp. 413-426). Springer, Cham. https://doi.org/10.1007/978-3-030-73280-6_33 Search in Google Scholar

Poulsen, A., Fosch-Villaronga, E., and Burmeister, O. K. (2020). Cybersecurity, value sensing robots for LGBTIQ+ elderly, and the need for revised codes of conduct. Australasian Journal of Information Systems, 24. https://doi.org/10.3127/ajis.v24i0.2789 Search in Google Scholar

Ramanpreet, K., Dušan, G., Tomaž K. (2023). Artificial intelligence for cybersecurity: Literature review and future research directions, Information Fusion, Volume 97, 2023, 101804, ISSN 1566-2535, https://doi.org/10.1016/j.inffus.2023.101804 Search in Google Scholar

SAP(2024). What is Internet of Things? (IoT). Retrieved from: https://www.sap.com/products/artificial-intelligence/what-is-iot.html Search in Google Scholar

Sen, R., Heim, G., and Zhu, Q. (2022). Artificial Intelligence and Machine Learning in Cybersecurity: Applications, Challenges, and Opportunities for MIS Academics. Communications of the Association for Information Systems, 51, https://doi.org/10.17705/1CAIS.05109 Search in Google Scholar

Samtani, S., Zhu, H., Padmanabhan, B., Chai, Y., Chen, H. & Nunamaker Jr., J. F. (2023). Deep Learning for Information Systems Research, Journal of Management Information Systems, 40:1, 271-301 Search in Google Scholar

Sarcevic, A., Pintar, D., Vranic, M., Krajna, A. (2022). Cybersecurity Knowledge Extraction Using XAI. Applied Sciences.12, 8669. https://doi.org/10.3390/app12178669 Search in Google Scholar

Sipior, J. (2021). Monitoring Remote Employees at FinPro. Communications of the Association for Information Systems, 49(1), 14, 304-320. https://doi.org/10.17705/1CAIS.04912 Search in Google Scholar

Singh, N., Krishnaswamy, V. and Zhang, J. (2022). Intellectual structure of cybersecurity research in enterprise information systems. Enterprise Information Systems. 17. 1-25. https://doi.org/10.1080/17517575.2022.2025545. Search in Google Scholar

Stafford, T. F. (2022). Platform-Dependent Computer Security Complacency: The Unrecognized Insider Threat. IEEE Transactions on Engineering Management, 69(6), 3814-3825. https://doi.org/10.1109/TEM.2021.3058344 Search in Google Scholar

Tagarev, T., Stoianov, N. and Sharkov, G. (2019). Integrative approach to understand vulnerabilities and enhance the security of cyber-bio-cognitive-physical systems. In Cruz, T. and Simoes, P., Proceedings of the 18th European Conference on Cyber Warfare and Security (ECCWS 2019, Coimbra, Portugal), (pp. 492-500). Academic Conferences International Limited. Search in Google Scholar

Tran, D. M., Thwaites, C.L., Van Nuil, J.I., McKnight, J., Luu, A. P., Paton, C. (2022), Vietnam ICU Translational Applications Laboratory (VITAL). Digital Health Policy and Programs for Hospital Care in Vietnam: Scoping Review. Journal of Medical Internet Research, 2022 Feb 9;24(2), e32392. https://doi.org/10.2196/32392 Search in Google Scholar

Vargas, M., & Comuzzi, M. (2020). A multi-dimensional model of Enterprise Resource Planning critical success factors. Enterprise Information Systems, 14, 38-57. https://doi.org/10.1080/17517575.2019.1678072. Search in Google Scholar

Wan, B., Xu, C., Mahapatra, R. P., Selvaraj, P. (2022). Understanding the cyber-physical system in international stadiums for security in the network from cyber-attacks and adversaries using AI.Wireless Personal Communications, 127(2), 1207-1224. https://doi.org/10.1007/s11277-021-08573-2 Search in Google Scholar

Ye, J. (2021). Health information system's responses to COVID-19 pandemic in China: a national cross-sectional study. Applied Clinical Informatics, 12(02), 399-406. https://doi.org/10.1055/s-0041-1728770 Search in Google Scholar

Yathiraju, Nikhitha (2022). Investigating the use of an Artificial Intelligence Model in an ERP Cloud-Based System, International Journal of Electrical, Electronics and Computers (IJECC), Vol-7, Issue-2, March - April 2022, Pages 1-26, 10.22161/eec.72.1 Search in Google Scholar

Zhao, F., Zhang, H., Peng, J., Zhuang, X., & Na, S. (2020). A semi-self-taught network intrusion detection system. Neural Computing and Applications, 1-11. https://doi.org/10.1007/s00521-020-04914-7. Search in Google Scholar

Zeadally, S., Adi, E., Baig, Z., & Khan, I. (2020). Harnessing Artificial Intelligence Capabilities to Improve Cybersecurity. IEEE Access, 8, 23817-23837. https://doi.org/10.1109/ACCESS.2020.2968045. Search in Google Scholar

eISSN:
2558-9652
Langue:
Anglais