Results 101 to 110 of about 111,415 (271)
ABSTRACT This paper examines the impact of regulatory controls on Bitcoin's excess returns and volatility. The paper innovates by proxying changes in the regulatory environment using global Google search volume intensity data. The generated regulatory indices accurately identify episodes of regulatory tightening within cryptocurrency markets.
Robert Mullings
wiley +1 more source
Analysis of cyber security knowledge gaps based on cyber security body of knowledge. [PDF]
Catal C, Ozcan A, Donmez E, Kasif A.
europepmc +1 more source
ABSTRACT This study aims to classify pivotal fintech innovations and explore the prospects and pitfalls associated with emerging fintech services extensively discussed in the literature. We conducted a multistage systematic review of research published on fintech over the past decade from a technological perspective. Using the Preferred Reporting Items
Muhammad Imran Qureshi, Nohman Khan
wiley +1 more source
Named Entity Recognition Model Based on the Fusion of Word Vectors and Category Vectors
Named entity recognition (NER) in deep learning mode heavily relies on the processing and analysis of text vectors. This paper introduces an NER model based on deep learning techniques, emphasizing the fusion of word vectors and category vectors to ...
Yang Zhou +3 more
doaj +1 more source
Major Cybersecurity Breaches: Shaping Corporate Cybersecurity Policies and Closing the Gaps
ABSTRACT As digitalization accelerates, cybercrime has intensified in both scale and impact over the past two decades. This study aims to critically examine major cybersecurity events, assess them through the lens of routine activity theory, examine insight from three other established criminological and organizational theories, and address central ...
Laura K. Rickett, Deborah Smith
wiley +1 more source
Synonym‐based multi‐keyword ranked search with secure k‐NN in 6G network
Abstract Sixth Generation (6G) integrates the next generation communication systems such as maritime, terrestrial, and aerial to offer robust network and massive device connectivity with ultra‐low latency requirement. The cutting edge technologies such as artificial intelligence, quantum machine learning, and millimetre enable hyper‐connectivity to ...
Deebak Bakkiam David, Fadi Al‐Turjman
wiley +1 more source
Towards an extensive set of criteria for safety and cyber-security evaluation of cyber-physical systems. [PDF]
Smrčka A +9 more
europepmc +1 more source
Strategies and Process of Trade Secret Misappropriation Mitigation: The Case of UK
ABSTRACT Trade Secrets (TS) are vital for innovation‐driven companies, and their loss can inflict significant financial and reputational damage, particularly in the absence of established policies to mitigate misappropriation in the UK. The current academic literature lacks detailed strategies for firms to effectively address these threats.
Oleksandra Ozcan, David Pickernell
wiley +1 more source
Features requirement elicitation process for designing a chatbot application
This article seeks to assist the chatbot community by outlining the characteristics that a chatbot needs to possess and explaining how to create a chatbot for a bank. In order to determine which capabilities are most crucial to ending users, a study of a small sample of chatbot users was conducted.
Nurul Muizzah Johari +4 more
wiley +1 more source
What changed in the cyber-security after COVID-19? [PDF]
Kumar R, Sharma S, Vachhani C, Yadav N.
europepmc +1 more source

