tomas pleta - Academia.edu (original) (raw)

Papers by tomas pleta

Research paper thumbnail of Cyber Security Management Model for Critical Infrastructure Protection

Purpose-in this article, the authors propose a management model for Critical Infrastructure cyber... more Purpose-in this article, the authors propose a management model for Critical Infrastructure cybersecurity, further development of a model developed by Limba, Plėta, Agafonov, and Damkus (2017). Research methodology-methodology consists of researching the best practices in cybersecurity management for Critical Infrastructures and evaluating the best element to be included. The article offers an overview of the model, including structure and objectives, and further analysis that focuses on pre-existing CI management frameworks. Findings-main results show that, although previously published protocols and models contain valuable elements, there is still the need to implement a comprehensive model which can be applied to every type of CI. Research limitations-research might have been limited due to the lack of a unitary approach to cybersecurity management for CI, meaning the lack of possibility of reference to a similar model and approach. Practical implications-model which is presented in the article could offer a new approach to CI protection strategies and could be the beginning of a more structured approach towards their protection. Originality/Value-model was created by the authors with references to past published protocols and models, which are present in the quotation in the text as well as the bibliography.

Research paper thumbnail of Cyber security management of critical energy infrastructure in national cybersecurity strategies: cases of USA, UK, France, Estonia and Lithuania

Insights into regional development, Dec 30, 2020

The progresses made in terms of cybersecurity in these past years have been huge, and the impleme... more The progresses made in terms of cybersecurity in these past years have been huge, and the implementation of newer strategies has brought interesting results all over the globe. However, the full implementation of cybersecurity presents a challenge to a lot of countries, especially if considered the Critical Infrastructure Protection (CIP), which is still one of the areas with the most gaps in terms of cybersecurity. In this article, the first five countries by cybersecurity level according to the Global Cybersecurity Index (GCI) 2018, in order UK, USA, France, Estonia and Lithuania, will be evaluated for their solutions in terms of Critical Infrastructure Protection. The results will show the effective accuracy of the index and will shed light on the various approaches to Critical Infrastructure Protection.

Research paper thumbnail of Cyber-attacks to critical energy infrastructure and management issues: overview of selected cases

Insights into regional development, Sep 1, 2020

The purpose of the paper is to analyze the vulnerabilities of Critical Energy Infrastructures' sy... more The purpose of the paper is to analyze the vulnerabilities of Critical Energy Infrastructures' systems in the event of cyber-attack. The global tendency of cyber-attacks puts Critical Energy Infrastructures on one of the first places for targets. Critical Infrastructure Protection (CIP) has become an increasingly relevant topic in the global industrial environment, as the consequences of cyber-attacks toward ICS can result in physical disruption and loss of human lives. The analysis presented in the paper will take into consideration three different case scenarios of cyber-attacks to Critical Energy Infrastructures, and will evaluate the outcomes and the tactics used by the organizations' response and recovery.

Research paper thumbnail of Industrial Control Systems (ICS) cyber prediction model

Insights into Regional Development

Acceleration of scientific and technical progress, speeding up of technological changes, IT proce... more Acceleration of scientific and technical progress, speeding up of technological changes, IT process globalisation and integration of OT processes invoked new challenges in preparing cyber strategies. Issues with adapting strategy for a particular specificity, region and specific cyber-attacks are not applicable. Therefore, a natural need arises to adjust the process for future cyber-attacks. It should be noted that the vast majority of organisations still need to possess a strategy that has been developed in correlation with future cyber-attacks. A part of organisations, irrespective of the lack of methodology and necessary infrastructure at the initial stage, commenced applying strategic management methods as a more dynamic environment demanded adequate changes in the cyber security within the organisation itself. The organisation started to plan such changes because, at the initial stage of the strategic management theory development, the strategy was understood as a plan drawn up to achieve the set objectives, regardless of the future need. Implementing such strategic procedures is grounded on something other than scientific calculations and is often associated with excessive use of funds. Therefore, the main goal of this article is to determine how much the r-Interdiction Median Problem with Fortification (RIMF) module can be used as a model for deciding methods for protecting critical infrastructure systems.

Research paper thumbnail of Cyber Security Management Model for Critical Infrastructure Protection

International Scientific Conference „Contemporary Issues in Business, Management and Economics Engineering"

Purpose – in this article, the authors propose a management model for Critical Infrastructure cyb... more Purpose – in this article, the authors propose a management model for Critical Infrastructure cybersecurity, further development of a model developed by Limba, Plėta, Agafonov, and Damkus (2017). Research methodology – methodology consists of researching the best practices in cybersecurity management for Critical Infrastructures and evaluating the best element to be included. The article offers an overview of the model, including structure and objectives, and further analysis that focuses on pre-existing CI management frameworks. Findings – main results show that, although previously published protocols and models contain valuable elements, there is still the need to implement a comprehensive model which can be applied to every type of CI. Research limitations – research might have been limited due to the lack of a unitary approach to cybersecurity management for CI, meaning the lack of possibility of reference to a similar model and approach. Practical implications – model which is...

Research paper thumbnail of Analysis of the critical infrastructure cyber security policy

Insights into Regional Development, 2022

Critical infrastructures are complex operating environments that often require special protection... more Critical infrastructures are complex operating environments that often require special protection and security. A successful security strategy design should adhere to the principles of durability, integrity, and regularity. In the European Union, there is a strong interest in the security of critical infrastructures, especially those with interdependence. Given the fact that critical infrastructures play an essential role in a country's economy, it makes them even more vulnerable. The main aim of this article is to analyze the critical infrastructures' cyber security policy. The creation of a security strategy requires identification of the needs for equipment, mode of operation, and required security level. It has to establish rules for precise operation and handling of situations. The article tackles the issues of security strategy for critical infrastructures to protect sensitive areas and sectors. In addition, a cybersecurity policy as a countermeasure is discussed.

Research paper thumbnail of Peculiarities of cyber security management in the process of internet voting implementation

Entrepreneurship and Sustainability Issues, 2017

The modern world could not be imagined without the information and communications technology. Tod... more The modern world could not be imagined without the information and communications technology. Today's society, its life and social relations are deeply influenced by the virtual space, and that stands as a reason why the world's Information Technology specialists and representatives of various branches of science have been focusing on solving the problems in the sphere of cyber security. Software and technological solutions used in reorganization of the activity of private sector nowadays are widely used in the public sector as well. By using technologies, countries put their effort into involving their citizens into the process of governance and direct participation in various political processes inside the state itself, and one of the most widespread tools to motivate the citizen-to-state political participation and resident's direct interaction in political processes is internet voting. Authors of scientific literature investigate how cybersecurity management is being comprehended and analyzed in technological, legal, management, economical, human resource management and other aspects; how cyber security is analyzed in the context of services provided by institutions of public administration; which means of cyber security management are essential, in order to speed up the processes of establishing e-voting systems. In this article the authors investigate the theoretical aspects of cyber security management in internet voting, analyze the global experience in the sphere of cyber security management implementation with the help of already established e-voting systems, evaluate the properties of cyber security management in the process of implementation of internet voting in Lithuania, as well as present audience with an in-depth analysis of the opinion of the local population, cyber security and voting system specialists, concerning the matters and possibilities of establishing internet voting in Lithuania. The authors also propose a cyber security management model, which could be used in the process of implementation (both preparation and establishment) of the internet voting system in Lithuania.

Research paper thumbnail of Cyber-attacks to critical energy infrastructure and management issues: overview of selected cases

Insights into Regional Development, 2020

The purpose of the paper is to analyze the vulnerabilities of Critical Energy Infrastructures' sy... more The purpose of the paper is to analyze the vulnerabilities of Critical Energy Infrastructures' systems in the event of cyber-attack. The global tendency of cyber-attacks puts Critical Energy Infrastructures on one of the first places for targets. Critical Infrastructure Protection (CIP) has become an increasingly relevant topic in the global industrial environment, as the consequences of cyber-attacks toward ICS can result in physical disruption and loss of human lives. The analysis presented in the paper will take into consideration three different case scenarios of cyber-attacks to Critical Energy Infrastructures, and will evaluate the outcomes and the tactics used by the organizations' response and recovery.

Research paper thumbnail of Cyber security management of critical energy infrastructure in national cybersecurity strategies: cases of USA, UK, France, Estonia and Lithuania

Insights into Regional Development, 2020

The progresses made in terms of cybersecurity in these past years have been huge, and the impleme... more The progresses made in terms of cybersecurity in these past years have been huge, and the implementation of newer strategies has brought interesting results all over the globe. However, the full implementation of cybersecurity presents a challenge to a lot of countries, especially if considered the Critical Infrastructure Protection (CIP), which is still one of the areas with the most gaps in terms of cybersecurity. In this article, the first five countries by cybersecurity level according to the Global Cybersecurity Index (GCI) 2018, in order UK, USA, France, Estonia and Lithuania, will be evaluated for their solutions in terms of Critical Infrastructure Protection. The results will show the effective accuracy of the index and will shed light on the various approaches to Critical Infrastructure Protection.

Research paper thumbnail of Model based on qualitative criteria for internet marketing development

Entrepreneurship and Sustainability Issues, 2018

Purpose of this paper is to propose a model for assessment of internet marketing efficacy, based ... more Purpose of this paper is to propose a model for assessment of internet marketing efficacy, based on qualitative criteria and building on the theoretical and empirical investigation of various qualitative criteria applicable to internet marketing. The methodological framework used in the investigation is based on theoretical descriptive, comparative, analytical methods. Qualitative empirical study based on expert interviews was also employed. Nine experts of internet marketing and related fields were involved in the study. The aim of qualitative study is to explore the expert opinnions on the qualitative criteria for internet marketing assessment. This feedback helps to identify problems faced by business developing internet marketing campaigns, the steps to be taken further to solve them and advance campaign efficacy. The model integrating the qualitative criteria into the internet marketing assessment is proposed. The paper analyses the creation and application of qualitative criteria of internet marketing, discusses the problems of internet marketing development, proposes the ways how to deal with the emerging problems and presents the qualitative criteria based model for internet marketing assesment. The qualitative study is the main novety of the research and is intended to scrutinise the concept of internet marketing quality and distinguish the qualitative criteria for internet marketing development.The conclusions and recommendations of the research have practical value, which will help in the process of internet marketing quality implementation.

Research paper thumbnail of Cyber security management model for critical infrastructure

Entrepreneurship and Sustainability Issues, 2017

Cyber security is the most critical aspect nowadays of our technologically based lives. Governmen... more Cyber security is the most critical aspect nowadays of our technologically based lives. Government institutions, banking sectors, public and private services, nuclear power plants, power grid operators, water suppliers or waste water treatment companies use information technologies in their day-today operations. Everything that uses technologies are based on communication and information systems and that means that it depends on cyber security. The public and private sector each year spend millions of dollars on technologies, security software and hardware devices that will increase the cyber security inside their companies, but they are still vulnerable. The main problem of this situation is that cyber security is still usually treated as a technical aspect or technology which can be easily implemented inside the organization and this implementation will guarantee cyber security. This attitude must change, because cyber security nowadays is something more than just the technology. This article presents the taxonomy of the critical infrastructure attacks, analyzes attack vectors and attack methods used to damage critical infrastructure as well as the most common cyber security mistakes which organizations make in the cyber security field when trying to make themselves safer from vulnerabilities. The main aim of this article is to provide theoretical aspects of the cyber security management model which can be used to ensure security of critical infrastructure in an organization or company. The cyber security management model that is presented in this article is analyzed from management perspectives and is not concerned with technological aspects and products that are used to protect critical infrastructure from cyber security attacks and vulnerabilities.

Research paper thumbnail of Cyber effect and security management aspects in critical energy infrastructures

Insights into Regional Development, 2020

The purpose of the paper is to compare various types of management models that regulate the respo... more The purpose of the paper is to compare various types of management models that regulate the response to cyber threats to Critical Infrastructures. The development of an effective management model that regulates the response to cyber-attack against Critical Infrastructure is an important issue in security management. Many frameworks attempt to regulate the response that has to be done to recover and eradicate possible threats, but still, there is not a universal appliable model for all Critical Infrastructures. The paper will offer a comparison of various frameworks in an attempt of evaluating the features that a hypothetical model for response to Cyber Incidents to Critical Infrastructures. The focus is on Critical Energy Infrastructure, as their damage directly means damage to other critical infrastructures, given their extreme interconnectivity. After the analysis of five frameworks of responses to Cyber Incidents, an evaluation will be provided, along with a recommendation.

Research paper thumbnail of Cold Energy Economy and Cybersecurity of Floating Storage and Regasification Units: Emerging Trends, Challenges, and Opportunities

Journal of Security and Sustainability Issues

Research paper thumbnail of Cyber Security Management Model for Critical Infrastructure Protection

Purpose-in this article, the authors propose a management model for Critical Infrastructure cyber... more Purpose-in this article, the authors propose a management model for Critical Infrastructure cybersecurity, further development of a model developed by Limba, Plėta, Agafonov, and Damkus (2017). Research methodology-methodology consists of researching the best practices in cybersecurity management for Critical Infrastructures and evaluating the best element to be included. The article offers an overview of the model, including structure and objectives, and further analysis that focuses on pre-existing CI management frameworks. Findings-main results show that, although previously published protocols and models contain valuable elements, there is still the need to implement a comprehensive model which can be applied to every type of CI. Research limitations-research might have been limited due to the lack of a unitary approach to cybersecurity management for CI, meaning the lack of possibility of reference to a similar model and approach. Practical implications-model which is presented in the article could offer a new approach to CI protection strategies and could be the beginning of a more structured approach towards their protection. Originality/Value-model was created by the authors with references to past published protocols and models, which are present in the quotation in the text as well as the bibliography.

Research paper thumbnail of Cyber security management of critical energy infrastructure in national cybersecurity strategies: cases of USA, UK, France, Estonia and Lithuania

Insights into regional development, Dec 30, 2020

The progresses made in terms of cybersecurity in these past years have been huge, and the impleme... more The progresses made in terms of cybersecurity in these past years have been huge, and the implementation of newer strategies has brought interesting results all over the globe. However, the full implementation of cybersecurity presents a challenge to a lot of countries, especially if considered the Critical Infrastructure Protection (CIP), which is still one of the areas with the most gaps in terms of cybersecurity. In this article, the first five countries by cybersecurity level according to the Global Cybersecurity Index (GCI) 2018, in order UK, USA, France, Estonia and Lithuania, will be evaluated for their solutions in terms of Critical Infrastructure Protection. The results will show the effective accuracy of the index and will shed light on the various approaches to Critical Infrastructure Protection.

Research paper thumbnail of Cyber-attacks to critical energy infrastructure and management issues: overview of selected cases

Insights into regional development, Sep 1, 2020

The purpose of the paper is to analyze the vulnerabilities of Critical Energy Infrastructures' sy... more The purpose of the paper is to analyze the vulnerabilities of Critical Energy Infrastructures' systems in the event of cyber-attack. The global tendency of cyber-attacks puts Critical Energy Infrastructures on one of the first places for targets. Critical Infrastructure Protection (CIP) has become an increasingly relevant topic in the global industrial environment, as the consequences of cyber-attacks toward ICS can result in physical disruption and loss of human lives. The analysis presented in the paper will take into consideration three different case scenarios of cyber-attacks to Critical Energy Infrastructures, and will evaluate the outcomes and the tactics used by the organizations' response and recovery.

Research paper thumbnail of Industrial Control Systems (ICS) cyber prediction model

Insights into Regional Development

Acceleration of scientific and technical progress, speeding up of technological changes, IT proce... more Acceleration of scientific and technical progress, speeding up of technological changes, IT process globalisation and integration of OT processes invoked new challenges in preparing cyber strategies. Issues with adapting strategy for a particular specificity, region and specific cyber-attacks are not applicable. Therefore, a natural need arises to adjust the process for future cyber-attacks. It should be noted that the vast majority of organisations still need to possess a strategy that has been developed in correlation with future cyber-attacks. A part of organisations, irrespective of the lack of methodology and necessary infrastructure at the initial stage, commenced applying strategic management methods as a more dynamic environment demanded adequate changes in the cyber security within the organisation itself. The organisation started to plan such changes because, at the initial stage of the strategic management theory development, the strategy was understood as a plan drawn up to achieve the set objectives, regardless of the future need. Implementing such strategic procedures is grounded on something other than scientific calculations and is often associated with excessive use of funds. Therefore, the main goal of this article is to determine how much the r-Interdiction Median Problem with Fortification (RIMF) module can be used as a model for deciding methods for protecting critical infrastructure systems.

Research paper thumbnail of Cyber Security Management Model for Critical Infrastructure Protection

International Scientific Conference „Contemporary Issues in Business, Management and Economics Engineering"

Purpose – in this article, the authors propose a management model for Critical Infrastructure cyb... more Purpose – in this article, the authors propose a management model for Critical Infrastructure cybersecurity, further development of a model developed by Limba, Plėta, Agafonov, and Damkus (2017). Research methodology – methodology consists of researching the best practices in cybersecurity management for Critical Infrastructures and evaluating the best element to be included. The article offers an overview of the model, including structure and objectives, and further analysis that focuses on pre-existing CI management frameworks. Findings – main results show that, although previously published protocols and models contain valuable elements, there is still the need to implement a comprehensive model which can be applied to every type of CI. Research limitations – research might have been limited due to the lack of a unitary approach to cybersecurity management for CI, meaning the lack of possibility of reference to a similar model and approach. Practical implications – model which is...

Research paper thumbnail of Analysis of the critical infrastructure cyber security policy

Insights into Regional Development, 2022

Critical infrastructures are complex operating environments that often require special protection... more Critical infrastructures are complex operating environments that often require special protection and security. A successful security strategy design should adhere to the principles of durability, integrity, and regularity. In the European Union, there is a strong interest in the security of critical infrastructures, especially those with interdependence. Given the fact that critical infrastructures play an essential role in a country's economy, it makes them even more vulnerable. The main aim of this article is to analyze the critical infrastructures' cyber security policy. The creation of a security strategy requires identification of the needs for equipment, mode of operation, and required security level. It has to establish rules for precise operation and handling of situations. The article tackles the issues of security strategy for critical infrastructures to protect sensitive areas and sectors. In addition, a cybersecurity policy as a countermeasure is discussed.

Research paper thumbnail of Peculiarities of cyber security management in the process of internet voting implementation

Entrepreneurship and Sustainability Issues, 2017

The modern world could not be imagined without the information and communications technology. Tod... more The modern world could not be imagined without the information and communications technology. Today's society, its life and social relations are deeply influenced by the virtual space, and that stands as a reason why the world's Information Technology specialists and representatives of various branches of science have been focusing on solving the problems in the sphere of cyber security. Software and technological solutions used in reorganization of the activity of private sector nowadays are widely used in the public sector as well. By using technologies, countries put their effort into involving their citizens into the process of governance and direct participation in various political processes inside the state itself, and one of the most widespread tools to motivate the citizen-to-state political participation and resident's direct interaction in political processes is internet voting. Authors of scientific literature investigate how cybersecurity management is being comprehended and analyzed in technological, legal, management, economical, human resource management and other aspects; how cyber security is analyzed in the context of services provided by institutions of public administration; which means of cyber security management are essential, in order to speed up the processes of establishing e-voting systems. In this article the authors investigate the theoretical aspects of cyber security management in internet voting, analyze the global experience in the sphere of cyber security management implementation with the help of already established e-voting systems, evaluate the properties of cyber security management in the process of implementation of internet voting in Lithuania, as well as present audience with an in-depth analysis of the opinion of the local population, cyber security and voting system specialists, concerning the matters and possibilities of establishing internet voting in Lithuania. The authors also propose a cyber security management model, which could be used in the process of implementation (both preparation and establishment) of the internet voting system in Lithuania.

Research paper thumbnail of Cyber-attacks to critical energy infrastructure and management issues: overview of selected cases

Insights into Regional Development, 2020

The purpose of the paper is to analyze the vulnerabilities of Critical Energy Infrastructures' sy... more The purpose of the paper is to analyze the vulnerabilities of Critical Energy Infrastructures' systems in the event of cyber-attack. The global tendency of cyber-attacks puts Critical Energy Infrastructures on one of the first places for targets. Critical Infrastructure Protection (CIP) has become an increasingly relevant topic in the global industrial environment, as the consequences of cyber-attacks toward ICS can result in physical disruption and loss of human lives. The analysis presented in the paper will take into consideration three different case scenarios of cyber-attacks to Critical Energy Infrastructures, and will evaluate the outcomes and the tactics used by the organizations' response and recovery.

Research paper thumbnail of Cyber security management of critical energy infrastructure in national cybersecurity strategies: cases of USA, UK, France, Estonia and Lithuania

Insights into Regional Development, 2020

The progresses made in terms of cybersecurity in these past years have been huge, and the impleme... more The progresses made in terms of cybersecurity in these past years have been huge, and the implementation of newer strategies has brought interesting results all over the globe. However, the full implementation of cybersecurity presents a challenge to a lot of countries, especially if considered the Critical Infrastructure Protection (CIP), which is still one of the areas with the most gaps in terms of cybersecurity. In this article, the first five countries by cybersecurity level according to the Global Cybersecurity Index (GCI) 2018, in order UK, USA, France, Estonia and Lithuania, will be evaluated for their solutions in terms of Critical Infrastructure Protection. The results will show the effective accuracy of the index and will shed light on the various approaches to Critical Infrastructure Protection.

Research paper thumbnail of Model based on qualitative criteria for internet marketing development

Entrepreneurship and Sustainability Issues, 2018

Purpose of this paper is to propose a model for assessment of internet marketing efficacy, based ... more Purpose of this paper is to propose a model for assessment of internet marketing efficacy, based on qualitative criteria and building on the theoretical and empirical investigation of various qualitative criteria applicable to internet marketing. The methodological framework used in the investigation is based on theoretical descriptive, comparative, analytical methods. Qualitative empirical study based on expert interviews was also employed. Nine experts of internet marketing and related fields were involved in the study. The aim of qualitative study is to explore the expert opinnions on the qualitative criteria for internet marketing assessment. This feedback helps to identify problems faced by business developing internet marketing campaigns, the steps to be taken further to solve them and advance campaign efficacy. The model integrating the qualitative criteria into the internet marketing assessment is proposed. The paper analyses the creation and application of qualitative criteria of internet marketing, discusses the problems of internet marketing development, proposes the ways how to deal with the emerging problems and presents the qualitative criteria based model for internet marketing assesment. The qualitative study is the main novety of the research and is intended to scrutinise the concept of internet marketing quality and distinguish the qualitative criteria for internet marketing development.The conclusions and recommendations of the research have practical value, which will help in the process of internet marketing quality implementation.

Research paper thumbnail of Cyber security management model for critical infrastructure

Entrepreneurship and Sustainability Issues, 2017

Cyber security is the most critical aspect nowadays of our technologically based lives. Governmen... more Cyber security is the most critical aspect nowadays of our technologically based lives. Government institutions, banking sectors, public and private services, nuclear power plants, power grid operators, water suppliers or waste water treatment companies use information technologies in their day-today operations. Everything that uses technologies are based on communication and information systems and that means that it depends on cyber security. The public and private sector each year spend millions of dollars on technologies, security software and hardware devices that will increase the cyber security inside their companies, but they are still vulnerable. The main problem of this situation is that cyber security is still usually treated as a technical aspect or technology which can be easily implemented inside the organization and this implementation will guarantee cyber security. This attitude must change, because cyber security nowadays is something more than just the technology. This article presents the taxonomy of the critical infrastructure attacks, analyzes attack vectors and attack methods used to damage critical infrastructure as well as the most common cyber security mistakes which organizations make in the cyber security field when trying to make themselves safer from vulnerabilities. The main aim of this article is to provide theoretical aspects of the cyber security management model which can be used to ensure security of critical infrastructure in an organization or company. The cyber security management model that is presented in this article is analyzed from management perspectives and is not concerned with technological aspects and products that are used to protect critical infrastructure from cyber security attacks and vulnerabilities.

Research paper thumbnail of Cyber effect and security management aspects in critical energy infrastructures

Insights into Regional Development, 2020

The purpose of the paper is to compare various types of management models that regulate the respo... more The purpose of the paper is to compare various types of management models that regulate the response to cyber threats to Critical Infrastructures. The development of an effective management model that regulates the response to cyber-attack against Critical Infrastructure is an important issue in security management. Many frameworks attempt to regulate the response that has to be done to recover and eradicate possible threats, but still, there is not a universal appliable model for all Critical Infrastructures. The paper will offer a comparison of various frameworks in an attempt of evaluating the features that a hypothetical model for response to Cyber Incidents to Critical Infrastructures. The focus is on Critical Energy Infrastructure, as their damage directly means damage to other critical infrastructures, given their extreme interconnectivity. After the analysis of five frameworks of responses to Cyber Incidents, an evaluation will be provided, along with a recommendation.

Research paper thumbnail of Cold Energy Economy and Cybersecurity of Floating Storage and Regasification Units: Emerging Trends, Challenges, and Opportunities

Journal of Security and Sustainability Issues