Results 101 to 110 of about 2,054,840 (293)

Adolescent Cyberviolence in South Korea: A Multi‐Year, National Population‐Based Study of Cyberviolence Prevalence (2017–2024)

open access: yesBehavioral Sciences &the Law, EarlyView.
ABSTRACT With the rise of digital technology, adolescent cyberviolence has become a growing global concern in public health and criminal justice. This study used nationally representative data from South Korea (2017–2024) to examine the prevalence of eight types of cyberviolence (i.e., verbal abuse, defamation, stalking, sexual abuse, personal ...
Heng Choon (Oliver) Chan   +2 more
wiley   +1 more source

Synchronisation, Optimisation and Adaptation of Machine Learning Techniques for Computer Vision in Cyber‐Physical Systems: A Comprehensive Analysis

open access: yesIET Cyber-Physical Systems
Cyber‐physical systems (CPS) seamlessly integrate computers, networks and physical devices, enabling machines to communicate, process data and respond to real‐world conditions in real time.
Kai Hung Tang   +4 more
doaj   +1 more source

The Australian Cyber Security Centre threat report 2015 [PDF]

open access: yes
Introduction: The number, type and sophistication of cyber security threats to Australia and Australians are increasing. Due to the varied nature of motivations for cyber adversaries targeting Australian organisations, organisations could be a target for
Australian Cyber Security Centre
core  

Patterns and Drivers of Spanish Corporate Commitment to the UN Global Compact: A Quantitative Approach

open access: yesCorporate Social Responsibility and Environmental Management, EarlyView.
ABSTRACT This paper presents a quantitative assessment of Spanish companies' commitment to the United Nations Global Compact (UNGC) and the Sustainable Development Goals (SDGs). Analyzing over 1000 participating firms, we identify prioritization patterns and examine structural factors influencing SDG adherence.
Juan Laborda, Juan Pérez
wiley   +1 more source

Malicious email mitigation strategies [PDF]

open access: yes
Introduction Socially-engineered emails containing malicious attachments and embedded links have been observed by the Australian Signals Directorate (ASD) being used in targeted cyber intrusions against organisations.
Australian Cyber Security Centre
core  

Your employees: the front line in cyber security [PDF]

open access: yes, 2016
First published in The Chemical Engineer and reproduced by Crest - Centre for Research and Evidence on Security Threats, 26/01/2016 (https://crestresearch.ac.uk/comment/employees-front-line-cyber-security/
Ashenden, D
core  

Tokenism or Catalytic? Exploring Board Gender Diversity Through the Lens of SDG 9 Outcomes in the EU Context

open access: yesCorporate Social Responsibility and Environmental Management, EarlyView.
ABSTRACT This study explores the relationship between Executive gender diversity (EGD) and the achievement of Sustainable Development Goal 9 (SDG 9—Industry, Innovation, and Infrastructure) in the European Union. It investigates whether female representation in corporate governance contributes to innovation‐driven sustainability.
Suzan Dsouza   +2 more
wiley   +1 more source

Cyber Security [PDF]

open access: yesThe 5th Conference on Information and Knowledge Technology, 2013
  +7 more sources

Temporal Segment Connection Network for Action Recognition

open access: yesIEEE Access, 2020
Two-stream Convolutional Neural Networks have shown excellent performance in video action recognition. Most existing works train each sampling group independently, or just fuse at the last level, which obviously ignore the continuity of action in ...
Qian Li   +4 more
doaj   +1 more source

Cryptography: Mathematical Advancements on Cyber Security [PDF]

open access: yes, 2019
The origin of cryptography, the study of encoding and decoding messages, dates back to ancient times around 1900 BC. The ancient Egyptians enlisted the use of basic encryption techniques to conceal personal information.
Bower, Kristin
core   +1 more source

Home - About - Disclaimer - Privacy