Results 131 to 140 of about 61,083 (243)

War as a Phenomenon of Inquiry in Management Studies

open access: yesJournal of Management Studies, EarlyView.
Abstract We argue that war as a phenomenon deserves more focused attention in management. First, we highlight why war is an important and relevant area of inquiry for management scholars. We then integrate scattered conversations on war in management studies into a framework structured around three building blocks – (a) the nature of war from an ...
Fabrice Lumineau, Arne Keller
wiley   +1 more source

Real‐Time Cyberattack Detection for SCADA in Power System

open access: yesIET Energy Systems Integration
Supervisory Control and Data Acquisition (SCADA) systems monitor and control industrial processes, but their integration with information technology and network connectivity, including the internet, exposes them to potential cyber threats.
Botta Prudhvi   +2 more
doaj   +1 more source

Markov Determinantal Point Process for Dynamic Random Sets

open access: yesJournal of Time Series Analysis, EarlyView.
ABSTRACT The Law of Determinantal Point Process (LDPP) is a flexible parametric family of distributions over random sets defined on a finite state space, or equivalently over multivariate binary variables. The aim of this paper is to introduce Markov processes of random sets within the LDPP framework. We show that, when the pairwise distribution of two
Christian Gouriéroux, Yang Lu
wiley   +1 more source

Analyze and Forecast the Cyber Attack Detection

open access: yesInternational Journal for Research in Applied Science and Engineering Technology
Abstract: The relentless evolution of digital technologies has ushered in an era of unprecedented connectivity and convenience, but it has also exposed our digital infrastructure to a growing spectrum of cyber threats. In this context, the importance of robust cyber attack detection mechanisms cannot be overstated.The increasing complexity and ...
Prof. Prakash Kshirsagar   +5 more
openaire   +1 more source

mixFOCuS: A Communication‐Efficient Online Changepoint Detection Method in Distributed System for Mixed‐Type Data

open access: yesJournal of Time Series Analysis, EarlyView.
ABSTRACT With the advent of the Internet of Things, it is increasingly common to have large networks of sensors, where each sensor may collect different types of data, has limited local computing resources and the ability to transmit data to a central cloud. Detecting events that trigger changes in sensor data properties is a key concern.
Ziyang Yang   +2 more
wiley   +1 more source

Association of Adverse Childhood Experiences and Metabolic Syndrome: A Systematic Review and Meta‐Analysis

open access: yesObesity Reviews, EarlyView.
ABSTRACT Background The association between adverse childhood experiences (ACEs) and metabolic syndrome (MetS) across life course and its components (abdominal obesity, elevated blood pressure, dyslipidemia, and hyperglycemia) is poorly understood. Methods Three databases were screened for studies published January 2000–February 2024 that examined the ...
Joohan Kim   +4 more
wiley   +1 more source

Unpacking Resilience in Public Administration: Insights From a Meta‐Narrative Review

open access: yesPublic Administration Review, EarlyView.
ABSTRACT Increasing environmental complexity and uncertainty have made organizational resilience a key concern in public administration. Yet its inherent ambiguity calls for a systematic examination of its conceptualizations, operationalizations, and applications. This meta‐narrative review synthesizes 49 studies, advancing the discourse by identifying
Jixiang Li, Shui‐Yan Tang, Bo Wen
wiley   +1 more source

Reengaging Criminology in Regulation and Governance: A Synergistic Research Agenda on Regulatory Guardianship

open access: yesRegulation &Governance, EarlyView.
ABSTRACT Recent literature calls for scholars to bridge the divide that has emerged between criminology and regulation and governance. In the current work, we propose that criminological opportunity theories provide one fruitful pathway to that end.
Carole Gibbs   +3 more
wiley   +1 more source

Law and Infrastructure: Reliability, Automation Transition, and Irregularities of “U‐Space”

open access: yesRegulation &Governance, EarlyView.
ABSTRACT The European Union (EU) is making regulatory efforts to allow for the safe integration of drones into civilian airspace through automated means. Commission Implementing Regulation (EU) 2021/664 concerning unmanned traffic management (a system referred to as “U‐Space”) furthers that commitment. Accordingly, drone operators must avail themselves
Samar Abbas Nawaz
wiley   +1 more source

Personalized Model‐Driven Interventions for Decisions From Experience

open access: yesTopics in Cognitive Science, EarlyView.
Abstract Cognitive models that represent individuals provide many benefits for understanding the full range of human behavior. One way in which individual differences emerge is through differences in knowledge. In dynamic situations, where decisions are made from experience, models built upon a theory of experiential choice (instance‐based learning ...
Edward A. Cranford   +6 more
wiley   +1 more source

Home - About - Disclaimer - Privacy