Results 91 to 100 of about 2,054,840 (293)
A Natural Resource‐Based View of Circular Economy Practices in the Pharmaceutical Industry
ABSTRACT Pharmaceutical industry is facing escalating environmental sustainability issues including gaseous emissions, waste generation, and excessive consumption of energy and non‐renewable materials. Nevertheless, the adoption of sustainable business models such as the circular economy (CE) is still in its infancy in this sector due to complex ...
Amna Farrukh, Muhammad Sohaib Sajjad
wiley +1 more source
Personal HealthCare of Things: A novel paradigm and futuristic approach
Abstract This study provides an investigative approach and offers a complete review of research on Internet of Medical Things (IoMT), describing the progress in general and highlighting the research issues, trends, and future aspects of IoMT. Exploring a research strategy for IoMT systems is vital as the need for IoT in healthcare grows. By aggregating
Surbhi Gupta +5 more
wiley +1 more source
Ensuring Cyber-Security in Smart Railway Surveillance with SHIELD [PDF]
Modern railways feature increasingly complex embedded computing systems for surveillance, that are moving towards fully wireless smart-sensors. Those systems are aimed at monitoring system status from a physical-security viewpoint, in order to detect ...
DELLI PRISCOLI, Francesco +6 more
core +1 more source
ABSTRACT This study analyzed Industry 4.0 (I4.0) technology applications in agribusiness and the role of strategic stakeholders, engagement methods, and other critical aspects data sharing, confidentiality, integrity, decision‐making, and sector‐specific requirements in promoting circularity.
Simone Sehnem +3 more
wiley +1 more source
Cloud EMRs auditing with decentralized (t, n)-threshold ownership transfer
In certain cloud Electronic Medical Records (EMRs) applications, the data ownership may need to be transferred. In practice, not only the data but also the auditing ability should be transferred securely and efficiently.
Yamei Wang +4 more
doaj +1 more source
The journal retracts the article, “A Publicly Verifiable E-Voting System Based on Biometrics” [...]
Jinhui Liu +5 more
doaj +1 more source
Individual Differences in Cyber Security [PDF]
A survey of IT professionals suggested that despite technological advancement and organizational procedures to prevent cyber-attacks, users are still the weakest link in cyber security (Crossler, 2013).
Conetta, Christopher
core +1 more source
Detecting periodic subsequences in cyber security data
Statistical approaches to cyber-security involve building realistic probability models of computer network data. In a data pre-processing phase, separating automated events from those caused by human activity should improve statistical model building and
Heard, Nick +2 more
core +1 more source
ABSTRACT The concept of predictive maintenance in advanced manufacturing systems is crucial from the point of view of resource efficiency in the era of high competitiveness forced by energy transformation in the digital economy. Against the backdrop of sustainability and the opportunities a data cooperative offers, the combination of predictive ...
Christian Schachtner +6 more
wiley +1 more source
Cyber Security’s Influence on Modern Society [PDF]
The world of cyber security is evolving every day, and cyber-criminals are trying to take advantage of it to gain as much money and power as possible. As the Internet continues to grow, more people around the world join the Internet.
Vallarelli, Nicholas
core +1 more source

