Results 111 to 120 of about 339,241 (259)
Cyber-Deception and Attribution in Capture-the-Flag Exercises
Attributing the culprit of a cyber-attack is widely considered one of the major technical and policy challenges of cyber-security. The lack of ground truth for an individual responsible for a given attack has limited previous studies.
Kulkarni, Nimish +4 more
core +1 more source
ABSTRACT Despite growing research on bullying in Western contexts, less is known about its prevalence and predictors in post‐Soviet nations. This study explores bullying among 8th‐grade students in Kazakhstan and Russia‐two post‐Soviet countries with contrasting development levels but shared historical ties.
Saltanat Kaliyeva
wiley +1 more source
BackgroundNon-suicidal self-injury and cyber aggression are increasingly prevalent among college students. Childhood maltreatment is a known risk factor for both behaviors, yet few studies have examined their co-occurrence (dual harm) or the underlying ...
Yanxia Mao +3 more
doaj +1 more source
Edge Computing in Healthcare Using Machine Learning: A Systematic Literature Review
Three key parts of our review. This review examines recent research on integrating machine learning with edge computing in healthcare. It is structured around three key parts: the demographic characteristics of the selected studies; the themes, tools, motivations, and data sources; and the key limitations, challenges, and future research directions ...
Amir Mashmool +7 more
wiley +1 more source
The national security argument for protection of domestic industries
Tracing the origin of the national security argument for protection of domestic industries to Adam Smith, Alexander Hamilton, and Friedrich List, we study its post-GATT applications with reference to Article XXI of the WTO.
CHENG, Kwok Hon, Leonard +2 more
core
Patient and Family Perpetrated Cyber-Incivility and Cyber-Aggression Within Healthcare: A Cross-Sectional Descriptive Study. [PDF]
Spencer C, Loehr K, Byrd A.
europepmc +1 more source
Amygdala activity to angry and fearful faces relates to bullying and victimization in adolescents. [PDF]
Relational bullying and victimization are common social experiences during adolescence, but relatively little functional magnetic resonance imaging (fMRI) research has examined the neural correlates of bullying and victimization in adolescents.
Carranza, Angelica F +2 more
core
ABSTRACT Geopolitical uncertainties and the resurgence of security and defence needs present both opportunities and challenges for creativity and innovation management. At both the organizational and the individual levels, we are confronted with multiple ethically challenging choices. Given the changing global security and defence realities, we outline
Mette Præst Knudsen +4 more
wiley +1 more source
Dark triad and cyber aggression among Chinese adolescents during COVID-19: A moderated mediation model. [PDF]
Zhang Z, Bian S, Zhao H, Qi C.
europepmc +1 more source
The Tension Between Privacy and Security [PDF]
A Review of President’s Review Group on Intelligence and Communications Technologies, Liberty and Security in a Changing World, 2013 and United Nations Office of the High Commissioner, Report of the Special Rapporteur on the Right to Privacy, Joseph A ...
De Baets, Antoon, Maret, Susan
core +2 more sources

