Results 161 to 170 of about 61,083 (243)

Nurturing Digital Government Reform: Nuggets of Wisdom From a Global Frontrunner

open access: yesInformation Systems Journal, Volume 36, Issue 2, Page 214-229, March 2026.
ABSTRACT Government reform initiatives increasingly incorporate significant digital elements. This article builds on successful, long‐term Danish experiences with digital government reform and offers “nuggets of wisdom” to policymakers, organisations, and countries wishing to advance such reform. In international surveys, Denmark is consistently ranked
Ulrik B. U. Roehl, Andreas Berggreen
wiley   +1 more source

Cyber-attack Detection and Isolation

open access: yesInternational Journal of Advanced Engineering and Management Research
Chetanpal Singh, Rahul Thakkar
openaire   +1 more source

The Missing Link in Digital Transformation Leadership: Unpacking the Role of Knowledge

open access: yesInformation Systems Journal, Volume 36, Issue 2, Page 230-246, March 2026.
ABSTRACT Leading digital transformation (DT) is challenging due to the unforeseen hurdles that arise through the novelty of digital technologies and the broad scope of organisational change. Even those with a wealth of experience and skills may struggle to respond adequately to inherently novel situations.
Malmi Amadoru   +2 more
wiley   +1 more source

A cybersecurity risk analysis framework for systems with artificial intelligence components

open access: yesInternational Transactions in Operational Research, Volume 33, Issue 2, Page 798-825, March 2026.
Abstract The introduction of the European Union Artificial Intelligence (AI) Act, the NIST AI Risk Management Framework, and related international norms and policy documents demand a better understanding and implementation of novel risk analysis issues when facing systems with AI components: dealing with new AI‐related impacts; incorporating AI‐based ...
J.M. Camacho   +3 more
wiley   +1 more source

Protocol‐Agnostic Meta Key Distribution for Encrypted Wireless Communications Enabled by Space‐Time‐Coding Metasurface

open access: yesAdvanced Science, Volume 13, Issue 7, 3 February 2026.
This paper presents a programmable metasurface‐based Meta Key Distribution (MKD) system for secure, protocol‐independent key exchange in indoor wireless settings. By embedding entropy into the wireless channel, it enables lightweight, compatible cryptographic key generation.
Xinyu Li   +7 more
wiley   +1 more source

Transparent and trustworthy CyberSecurity: an XAI-integrated big data framework for phishing attack detection. [PDF]

open access: yesFront Big Data
Nauman M   +4 more
europepmc   +1 more source

Digital Agriculture: Past, Present, and Future

open access: yesAdvanced Intelligent Discovery, Volume 2, Issue 1, February 2026.
Digital agriculture integrates Internet of Things, artificial intelligence, and blockchain to enhance efficiency and sustainability in farming. This review outlines its evolution, current applications, and future directions, highlighting both technological advances and key challenges for global implementation.
Xiaoding Wang   +3 more
wiley   +1 more source

Meta Reinforcement Learning for Automated Cyber Defence

open access: yesApplied AI Letters, Volume 7, Issue 1, February 2026.
ABSTRACT Reinforcement learning (RL) solutions have shown considerable promise for automating the defense of networks to cyber attacks. However, a limitation to their real world deployment is the sample efficiency and generalizability of RL agents. This means that even small changes to attack types require a new agent to be trained from scratch.
Andrew Thomas, Nick Tillyer
wiley   +1 more source

Home - About - Disclaimer - Privacy