Results 161 to 170 of about 1,171,713 (299)
Behavioral responses to a cyber attack in a hospital environment. [PDF]
Willing M +8 more
europepmc +1 more source
Abstract Alongside their continuing growth in the popularity, both practice research in creative disciplines and arts‐based methods in research in the social sciences have histories now spanning several decades. In doctoral education, art and design education research sits within and across two distinct fields – the art and design doctorate and the ...
Sian Vaughan
wiley +1 more source
Abstract The future of money is a crucial issue in the digital age, and the emergence of central bank digital currencies (CBDCs) is widely recognised as a transformative development. However, despite its significant implications for monetary sovereignty, regulatory governance and strategic autonomy, we know relatively little about the political ...
Sebastian Heidebrecht
wiley +1 more source
The Effect of the 2021 Irish Cyber-Attack on Otolaryngology Outpatient Non-attendance at a Model 4 Hospital in the Post-COVID Era. [PDF]
Slattery FJ, Farrell E, Lacy PD.
europepmc +1 more source
Pan‐Europe Revisited: Inter‐War Debates and the EU's Pursuit of Geopolitical Power
ABSTRACT The European Union's (EU) transformation from a peace project to an assertive geopolitical actor reflects enduring tensions in integration theory dating back to the inter‐war period. This paper develops a comparative framework distinguishing territorial integration logic, which emphasises bounded political communities and collective defence ...
Kamil Zwolski
wiley +1 more source
Do robots boost productivity? A quantitative meta‐study
ABSTRACT This meta‐study analyzes the productivity effects of industrial robots. More than 1800 estimates from 85 primary studies are collected. The meta‐analytic evidence suggests that robotization has so far provided, at best, a small boost to productivity. There is strong evidence of publication bias in the positive direction.
Florian Schneider
wiley +1 more source
Real‐Time Cyberattack Detection for SCADA in Power System
Supervisory Control and Data Acquisition (SCADA) systems monitor and control industrial processes, but their integration with information technology and network connectivity, including the internet, exposes them to potential cyber threats.
Botta Prudhvi +2 more
doaj +1 more source
Extreme learning machine and bayesian optimization-driven intelligent framework for IoMT cyber-attack detection. [PDF]
Nayak J +4 more
europepmc +1 more source
War as a Phenomenon of Inquiry in Management Studies
Abstract We argue that war as a phenomenon deserves more focused attention in management. First, we highlight why war is an important and relevant area of inquiry for management scholars. We then integrate scattered conversations on war in management studies into a framework structured around three building blocks – (a) the nature of war from an ...
Fabrice Lumineau, Arne Keller
wiley +1 more source
Risk Psychology & Cyber-Attack Tactics
Submitted and presented at AHFE Hawaii 2025.
Kim, Rubens +7 more
openaire +2 more sources

