<?xml version="1.0" encoding="UTF-8"?><xml><records><record><source-app name="Biblio" version="7.x">Drupal-Biblio</source-app><ref-type>13</ref-type><contributors><authors><author><style face="normal" font="default" size="100%">Matthew N.O. Sadiku</style></author><author><style face="normal" font="default" size="100%">Kelechi G. Eze</style></author><author><style face="normal" font="default" size="100%">Sarhan M. Musa</style></author></authors></contributors><titles><title><style face="normal" font="default" size="100%">Blockchain in Agriculture</style></title><secondary-title><style face="normal" font="default" size="100%">Information &amp; Security: An International Journal</style></secondary-title></titles><keywords><keyword><style  face="normal" font="default" size="100%">agriculture</style></keyword><keyword><style  face="normal" font="default" size="100%">blockchain</style></keyword><keyword><style  face="normal" font="default" size="100%">farming</style></keyword><keyword><style  face="normal" font="default" size="100%">supply chain</style></keyword></keywords><dates><year><style  face="normal" font="default" size="100%">20212</style></year><pub-dates><date><style  face="normal" font="default" size="100%">2021</style></date></pub-dates></dates><volume><style face="normal" font="default" size="100%">49</style></volume><language><style face="normal" font="default" size="100%">eng</style></language><abstract><style face="normal" font="default" size="100%">&lt;p&gt;The blockchain is a ledger of accounts and transactions that are written and stored by all participants. It refers to a digitized platform that stores and verifies transactions between users of a system. The technology offers a reliable approach of tracing transactions between anonymous participants, thereby quickly detecting fraud and malfunctions. Several companies and government agencies are experimenting with the promising technology. Blockchain has different uses in the agricultural industry such as providing solutions to food safety, food waste, food fraud, supply chain visibility, and management.&lt;/p&gt;&lt;p&gt;Several farmers and agribusinesses have started introducing blockchain technology in agriculture. This article examines the applications of blockchain technology in agriculture and discusses the opportunities and challenges of blockchain.&lt;/p&gt;</style></abstract></record><record><source-app name="Biblio" version="7.x">Drupal-Biblio</source-app><ref-type>17</ref-type><contributors><authors><author><style face="normal" font="default" size="100%">Tania Wallis</style></author><author><style face="normal" font="default" size="100%">Chris Johnson</style></author><author><style face="normal" font="default" size="100%">Mohamed Khamis</style></author></authors></contributors><titles><title><style face="normal" font="default" size="100%">Interorganizational Cooperation in Supply Chain Cybersecurity: A Cross-Industry Study  of the Effectiveness of the UK Implementation of the NIS Directive</style></title><secondary-title><style face="normal" font="default" size="100%">Information &amp; Security: An International Journal</style></secondary-title></titles><keywords><keyword><style  face="normal" font="default" size="100%">Critical Infrastructure</style></keyword><keyword><style  face="normal" font="default" size="100%">Cybersecurity</style></keyword><keyword><style  face="normal" font="default" size="100%">essential services</style></keyword><keyword><style  face="normal" font="default" size="100%">interorganizational cooperation</style></keyword><keyword><style  face="normal" font="default" size="100%">operational technology</style></keyword><keyword><style  face="normal" font="default" size="100%">supply chain</style></keyword></keywords><dates><year><style  face="normal" font="default" size="100%">2021</style></year></dates><volume><style face="normal" font="default" size="100%">48</style></volume><pages><style face="normal" font="default" size="100%">36-68</style></pages><language><style face="normal" font="default" size="100%">eng</style></language><abstract><style face="normal" font="default" size="100%">The transposition of the EU Directive on Network and Information Security (NIS) by EU Member States involved assigning a set of responsibilities to operators, regulators and policy makers within a national cybersecurity strategy, in order to improve cybersecurity levels across critical infrastructures. This research investigates the perspectives and experiences of organisations affected by the NIS Directive focussing on three different sectors (Energy, Water &amp;amp; Aviation). The authors evaluate the response of different actors to NIS interventions and their challenges in meeting their assigned responsibilities, in particular their ability to oversee supply chain cybersecurity. It proposes further support for partnerships and cooperation across organisations to increase the effectiveness of NIS implementation. Based on results from semi-structured interviews and observations of industry working groups, an approach to supply chain oversight to achieve a balance between control and cooperation is recommended, to improve cybersecurity within industry sectors and across critical national infrastructures. Although our initial focus has been on working mainly with UK stakeholders, we argue that our recommendations have a more general application beyond those countries directly affected by the Directive.</style></abstract><issue><style face="normal" font="default" size="100%">1</style></issue><section><style face="normal" font="default" size="100%">36</style></section></record><record><source-app name="Biblio" version="7.x">Drupal-Biblio</source-app><ref-type>17</ref-type><contributors><authors><author><style face="normal" font="default" size="100%">Ricard Munné</style></author></authors></contributors><titles><title><style face="normal" font="default" size="100%">Future Security Trends and Their Impact from an Industry Point of View</style></title><secondary-title><style face="normal" font="default" size="100%">Information &amp; Security: An International Journal</style></secondary-title></titles><keywords><keyword><style  face="normal" font="default" size="100%">comprehen¬sive approach</style></keyword><keyword><style  face="normal" font="default" size="100%">Critical Infrastructure</style></keyword><keyword><style  face="normal" font="default" size="100%">EU framework</style></keyword><keyword><style  face="normal" font="default" size="100%">foresight</style></keyword><keyword><style  face="normal" font="default" size="100%">global actor</style></keyword><keyword><style  face="normal" font="default" size="100%">impact</style></keyword><keyword><style  face="normal" font="default" size="100%">industry</style></keyword><keyword><style  face="normal" font="default" size="100%">Natural Disasters</style></keyword><keyword><style  face="normal" font="default" size="100%">security</style></keyword><keyword><style  face="normal" font="default" size="100%">supply chain</style></keyword></keywords><dates><year><style  face="normal" font="default" size="100%">2013</style></year><pub-dates><date><style  face="normal" font="default" size="100%">2013</style></date></pub-dates></dates><volume><style face="normal" font="default" size="100%">29</style></volume><pages><style face="normal" font="default" size="100%">147-160</style></pages><language><style face="normal" font="default" size="100%">eng</style></language><abstract><style face="normal" font="default" size="100%">Impacts from future security trends on industry have been derived from the work performed in the scenario foresight for alternative futures, and for embedded scenarios of security research in the FOCUS project. For each FOCUS theme,  and for each scenario found in project reports, changes from the current situation have been analyzed and their impacts for different industries and activity sectors have been assessed. Trends have been grouped by industry/activity in each theme and those with significant ground in each scenario have been selected. According to scenario analysis, public services, ICT and technology, and critical infrastructure sectors are those which are more impacted by detected security trends from the scenarios analyzed. Specifically ICT has some cross cutting trends impacting in more than one theme, like information integration; intelligent knowledge based monitoring of new social media and other open information sources, information management and common situational pictures. Natural disasters, global environmental change and comprehensive approach are the most impacted FOCUS themes by future industry security trends. The analysis presented here may be useful for the assessment in the development of new research tracks or new products in the industry.</style></abstract><issue><style face="normal" font="default" size="100%">2</style></issue><section><style face="normal" font="default" size="100%">147</style></section></record></records></xml>