Results 81 to 90 of about 1,171,713 (299)

Broadening the semiaquatic scene: Quantification of long bone microanatomy across pinnipeds

open access: yesThe Anatomical Record, EarlyView.
Abstract Investigations of bone microanatomy are commonly used to explore lifestyle strategies in vertebrates. While distinct microanatomical limb bone features have been established for exclusively aquatic and terrestrial lifestyles, identifying clear patterns for the semiaquatic lifestyle remains more challenging.
Apolline Alfsen   +10 more
wiley   +1 more source

D4I - Digital forensics framework for reviewing and investigating cyber attacks

open access: yesArray, 2020
Many companies have cited lack of cyber-security as the main barrier to Industrie 4.0 or digitalization. Security functions include protection, detection, response and investigation.
Athanasios Dimitriadis   +3 more
doaj   +1 more source

A holistic and proactive approach to forecasting cyber threats

open access: yesScientific Reports, 2023
Traditionally, cyber-attack detection relies on reactive, assistive techniques, where pattern-matching algorithms help human experts to scan system logs and network traffic for known virus or malware signatures.
Zaid Almahmoud   +4 more
doaj   +1 more source

Cyber-Attack Attributes [PDF]

open access: yesTechnology Innovation Management Review, 2014
Senior corporate executives, government officials, and academics have become aware that there are: i) serious financial and regulatory costs arising from cyber-attacks (Pearson, 2014; Sugarman, 2014; US Securities and Exchange Commission, 2014); ii) vulnerabilities in high-value assets such as supervisory-control and dataacquisition systems (Ashford ...
openaire   +1 more source

The Evolution of Impression Management Research in Social Media: A Bibliometric Perspective

open access: yesCorporate Social Responsibility and Environmental Management, EarlyView.
ABSTRACT The purpose of the present study is to investigate impression management (IM) usage by companies in the context of social media communication and emerging technologies through a comprehensive mapping of the scientific literature. In this matter, a bibliometric analysis has been conducted, extracting a sample of 262 peer‐reviewed journal ...
Antonio Iazzi   +3 more
wiley   +1 more source

Hacking the market: Systemic contagion from cybersecurity breaches [PDF]

open access: yes, 2017
The average stock market reaction in the 10 days after a cyber attack has become increasingly negative, write Constantin Gurdgiev and Shaen ...
Vieira, Helena
core  

Cyber Security’s Influence on Modern Society [PDF]

open access: yes, 2020
The world of cyber security is evolving every day, and cyber-criminals are trying to take advantage of it to gain as much money and power as possible. As the Internet continues to grow, more people around the world join the Internet.
Vallarelli, Nicholas
core   +1 more source

Tokenism or Catalytic? Exploring Board Gender Diversity Through the Lens of SDG 9 Outcomes in the EU Context

open access: yesCorporate Social Responsibility and Environmental Management, EarlyView.
ABSTRACT This study explores the relationship between Executive gender diversity (EGD) and the achievement of Sustainable Development Goal 9 (SDG 9—Industry, Innovation, and Infrastructure) in the European Union. It investigates whether female representation in corporate governance contributes to innovation‐driven sustainability.
Suzan Dsouza   +2 more
wiley   +1 more source

Cyber Physical Defense Framework for Distributed Smart Grid Applications

open access: yesFrontiers in Energy Research, 2021
Cyber-Physical Systems (CPS) is the amalgamation of highly sophisticated sensors with physical spaces. These close conjunctions of sensors with communication infrastructure intrinsically linking to society’s Critical Infrastructures (C.I.) are being ...
Ayush Sinha   +3 more
doaj   +1 more source

Proportionality and its Applicability in the Realm of Cyber Attacks [PDF]

open access: yes, 2019
With an ever-increasing reliance on State cyber-attacks, the need for an international treaty governing the actions of Nation-States in the realm of cyberwarfare has never been greater.
Fenton, Hensey, III
core   +1 more source

Home - About - Disclaimer - Privacy