Results 111 to 120 of about 339,241 (259)

Cyber-Deception and Attribution in Capture-the-Flag Exercises

open access: yes, 2015
Attributing the culprit of a cyber-attack is widely considered one of the major technical and policy challenges of cyber-security. The lack of ground truth for an individual responsible for a given attack has limited previous studies.
Kulkarni, Nimish   +4 more
core   +1 more source

The Prevalence of Different Types of Bullying and Their Predictors Among 8th Graders in Post‐Soviet Countries: Cross‐National Insights From Kazakhstan and Russia. Findings From Trends in International Mathematics and Science Study 2019

open access: yesPsychology in the Schools, Volume 63, Issue 3, Page 709-726, March 2026.
ABSTRACT Despite growing research on bullying in Western contexts, less is known about its prevalence and predictors in post‐Soviet nations. This study explores bullying among 8th‐grade students in Kazakhstan and Russia‐two post‐Soviet countries with contrasting development levels but shared historical ties.
Saltanat Kaliyeva
wiley   +1 more source

Internalized criticism and absence of care: separate pathways from childhood abuse and neglect to dual harm via self-compassion

open access: yesFrontiers in Psychiatry
BackgroundNon-suicidal self-injury and cyber aggression are increasingly prevalent among college students. Childhood maltreatment is a known risk factor for both behaviors, yet few studies have examined their co-occurrence (dual harm) or the underlying ...
Yanxia Mao   +3 more
doaj   +1 more source

Edge Computing in Healthcare Using Machine Learning: A Systematic Literature Review

open access: yesWIREs Data Mining and Knowledge Discovery, Volume 16, Issue 1, March 2026.
Three key parts of our review. This review examines recent research on integrating machine learning with edge computing in healthcare. It is structured around three key parts: the demographic characteristics of the selected studies; the themes, tools, motivations, and data sources; and the key limitations, challenges, and future research directions ...
Amir Mashmool   +7 more
wiley   +1 more source

The national security argument for protection of domestic industries

open access: yes, 2019
Tracing the origin of the national security argument for protection of domestic industries to Adam Smith, Alexander Hamilton, and Friedrich List, we study its post-GATT applications with reference to Article XXI of the WTO.
CHENG, Kwok Hon, Leonard   +2 more
core  

Amygdala activity to angry and fearful faces relates to bullying and victimization in adolescents. [PDF]

open access: yes, 2019
Relational bullying and victimization are common social experiences during adolescence, but relatively little functional magnetic resonance imaging (fMRI) research has examined the neural correlates of bullying and victimization in adolescents.
Carranza, Angelica F   +2 more
core  

The Role of Creativity and Innovation Management Research in Times of Changing Security and Defence Realities

open access: yesCreativity and Innovation Management, Volume 35, Issue 1, Page 84-90, March 2026.
ABSTRACT Geopolitical uncertainties and the resurgence of security and defence needs present both opportunities and challenges for creativity and innovation management. At both the organizational and the individual levels, we are confronted with multiple ethically challenging choices. Given the changing global security and defence realities, we outline
Mette Præst Knudsen   +4 more
wiley   +1 more source

The Tension Between Privacy and Security [PDF]

open access: yes, 2016
A Review of President’s Review Group on Intelligence and Communications Technologies, Liberty and Security in a Changing World, 2013 and United Nations Office of the High Commissioner, Report of the Special Rapporteur on the Right to Privacy, Joseph A ...
De Baets, Antoon, Maret, Susan
core   +2 more sources

Home - About - Disclaimer - Privacy