4.4 Article

On-Farm Data Security: Practical Recommendations for Securing Farm Data

Related references

Note: Only part of the references are listed.
Article Environmental Sciences

Have farmers had enough of experts?

Niki A. Rust et al.

Summary: The exponential growth of information allows access to knowledge on almost any question asked, but challenges arise in determining which information is trustworthy. Farmers historically relied on traditional 'experts' for advice on agricultural innovations, but as more turn to online sources, they may be shifting towards peer networks and online information over traditional sources of expertise.

ENVIRONMENTAL MANAGEMENT (2022)

Review Automation & Control Systems

A Survey on Smart Agriculture: Development Modes, Technologies, and Security and Privacy Challenges

Xing Yang et al.

Summary: This paper introduces the development modes, key technologies, and key applications of smart agriculture, and summarizes security and privacy measures. It analyzes and organizes the security challenges of smart agriculture, proposing solutions in agricultural production and information technology. Additionally, it describes future research directions.

IEEE-CAA JOURNAL OF AUTOMATICA SINICA (2021)

Article Multidisciplinary Sciences

Human factor, a critical weak point in the information security of an organization's Internet of things

Kwesi Hughes-Lartey et al.

Summary: Human factors are a critical point in Information Security, and cannot simply be purchased. The study validates human factors as a weak-point in information security and shows a positive correlation between human factors and data breach incidents.

HELIYON (2021)

Article Computer Science, Information Systems

Proposing a sparse representational based face verification system to run in a shortage of memory

Seyed Mehdi Hazrati Fard et al.

MULTIMEDIA TOOLS AND APPLICATIONS (2020)

Article Computer Science, Hardware & Architecture

Beyond Zero Trust: Trust Is a Vulnerability

Mark Campbell

COMPUTER (2020)

Article Computer Science, Information Systems

A survey of machine learning-based solutions to protect privacy in the Internet of Things

Mohammad Amiri-Zarandi et al.

COMPUTERS & SECURITY (2020)

Review Agriculture, Multidisciplinary

Systematic literature review of implementations of precision agriculture

Isabel Cisternas et al.

COMPUTERS AND ELECTRONICS IN AGRICULTURE (2020)

Article Agriculture, Multidisciplinary

Requirements for cybersecurity in agricultural communication networks

Jussi Nikander et al.

COMPUTERS AND ELECTRONICS IN AGRICULTURE (2020)

Article Engineering, Electrical & Electronic

Cybersecurity for Smart Farming: Socio-Cultural Context Matters

Dirk van der Linden et al.

IEEE TECHNOLOGY AND SOCIETY MAGAZINE (2020)

Review Computer Science, Information Systems

Blockchain Technology for Agriculture: Applications and Rationale

Hang Xiong et al.

FRONTIERS IN BLOCKCHAIN (2020)

Article Computer Science, Hardware & Architecture

Risk-based automated assessment and testing for the cybersecurity certification and labelling of IoT devices

Sara N. Matheu-Garcia et al.

COMPUTER STANDARDS & INTERFACES (2019)

Proceedings Paper Engineering, Electrical & Electronic

Reference Architectures for Security-by-design IoT: Comparative Study

Valentin Vallois et al.

PROCEEDINGS OF THE 2019 FIFTH INTERNATIONAL CONFERENCE ON MOBILE AND SECURE SERVICES (MOBISECSERV) (2019)

Article Computer Science, Information Systems

An exploratory study of cyber hygiene behaviors and knowledge

Ashley A. Cain et al.

JOURNAL OF INFORMATION SECURITY AND APPLICATIONS (2018)

Article Agriculture, Multidisciplinary

A Prediction Model Framework for Cyber-Attacks to Precision Agriculture Technologies

Jason West

JOURNAL OF AGRICULTURAL & FOOD INFORMATION (2018)

Article Computer Science, Information Systems

Multi-Factor Authentication: A Survey

Aleksandr Ometov et al.

CRYPTOGRAPHY (2018)

Article Computer Science, Information Systems

Location-Based Key Management Strong Against Insider Threats in Wireless Sensor Networks

Jaewoo Choi et al.

IEEE SYSTEMS JOURNAL (2017)

Article Computer Science, Artificial Intelligence

Enterprise data breach: causes, challenges, prevention, and future directions

Long Cheng et al.

WILEY INTERDISCIPLINARY REVIEWS-DATA MINING AND KNOWLEDGE DISCOVERY (2017)

Article Computer Science, Information Systems

Impact of Users' Security Awareness on Desktop Security Behavior: A Protection Motivation Theory Perspective

Bartlomiej Hanus et al.

INFORMATION SYSTEMS MANAGEMENT (2016)

Article Computer Science, Hardware & Architecture

A survey on data leakage prevention systems

Sultan Alneyadi et al.

JOURNAL OF NETWORK AND COMPUTER APPLICATIONS (2016)

Article Operations Research & Management Science

Information security investment for competitive firms with hacker behavior and security requirements

Xing Gao et al.

ANNALS OF OPERATIONS RESEARCH (2015)