Cybersecurity in Remote Work DOI
S. Ida Evangeline

Advances in computational intelligence and robotics book series, Год журнала: 2025, Номер unknown, С. 227 - 240

Опубликована: Апрель 18, 2025

Through remote work, business operations have become widespread, providing companies with the capability of accessing a global talent base and flexibility within operations. However, this shift has made corporate networks vulnerable as employees access from their personal devices, unsecured home networks, cloud based collaboration tools. Due to increase attack surface, work environments are becoming more susceptible various types cyber attacks, such phishing ransomware, insider risks, zero-day exploits. The evolving risks no longer allow traditional security models designed for office centralized be effective, requiring move proactive adaptive cybersecurity strategy. This chapter explores key threatening presented by specific technological, human, regulatory challenges between distributing organizations secures workforces.

Язык: Английский

Does management support drive sustained agile usage? a serial mediation model and cIPMA perspective DOI Creative Commons

Uthpala Wijesinghe,

Vidara Mapitiyage,

Chathurya Wickramarathne

и другие.

PLoS ONE, Год журнала: 2025, Номер 20(2), С. e0316538 - e0316538

Опубликована: Фев. 5, 2025

Agile software development is immensely popular in the industry, but most teams struggle to sustain its use. Human factors like management support, agile training, mindset, and team resilience are often neglected, hindering long-term success. However, research has not explored their underlying mechanisms depth. Therefore, this study examines if support impacts sustained usage of methodologies within teams. It subsequently investigates individual serial mediating effects on relationship. Additionally, it compares importance performance infusing practices. Finally, determines these antecedents’ necessity for enduring success application. Data collected from 391 professionals using a structured questionnaire. Partial-least-squares structural equation modelling, importance-performance map analysis necessary condition were used investigate relationships. The findings underscore pivotal role emerge as critical mediators, with strong mediation effect. While paramount, practical implementation falls short All four antecedents found be optimal sustainment. Thus, significantly advances theoretical understanding by introducing model that elucidates impacting infusion. extends prior organisational-level team-level. study’s quantitative verification qualitative strengthens generalisability broader spectrum pioneers expounding constructs’ relative importance, necessity, offer actionable insights practitioners. provides methodological guidance apply research.

Язык: Английский

Процитировано

1

A Study of scrum @ S&P global in the post-COVID-19 era: Unsuitable for remote work or just flawed implementation? DOI Creative Commons
Adam Przybyłek,

Dennis Belter,

Kieran Conboy

и другие.

Information and Software Technology, Год журнала: 2025, Номер unknown, С. 107728 - 107728

Опубликована: Март 1, 2025

Язык: Английский

Процитировано

1

A Systematic Literature Review of Agile Software Development Projects DOI

Soumya Prakash Rath,

Nikunj Kumar Jain, Gaurav Singh Tomar

и другие.

Information and Software Technology, Год журнала: 2025, Номер unknown, С. 107727 - 107727

Опубликована: Март 1, 2025

Язык: Английский

Процитировано

0

Cybersecurity in Remote Work DOI
S. Ida Evangeline

Advances in computational intelligence and robotics book series, Год журнала: 2025, Номер unknown, С. 227 - 240

Опубликована: Апрель 18, 2025

Through remote work, business operations have become widespread, providing companies with the capability of accessing a global talent base and flexibility within operations. However, this shift has made corporate networks vulnerable as employees access from their personal devices, unsecured home networks, cloud based collaboration tools. Due to increase attack surface, work environments are becoming more susceptible various types cyber attacks, such phishing ransomware, insider risks, zero-day exploits. The evolving risks no longer allow traditional security models designed for office centralized be effective, requiring move proactive adaptive cybersecurity strategy. This chapter explores key threatening presented by specific technological, human, regulatory challenges between distributing organizations secures workforces.

Язык: Английский

Процитировано

0