Results 101 to 110 of about 8,269 (263)
Exploring the Materiality of Data Breach Disclosures on the Australian Stock Exchange
This study examines Australian Stock Exchange (ASX) data breach announcements to provide insights into the extent and nature of data breach disclosures, as well as the costs, particularly to stakeholder relationships. Using a dataset of all data breach‐related announcements on the ASX, we identify a lack of data breach disclosure and, where disclosures
Jane Andrew +3 more
wiley +1 more source
In the SCADA (Supervisory Control and Data Acquisition) network of a smart grid, the network switch is connected to multiple Intelligent Electronic Devices (IEDs) that are based on protective relays.
Nabeel Al-Qirim +3 more
doaj +1 more source
Building Cyber-Attack Immunity in Electric Energy System Inspired by Infectious Disease Ecology
Despite being man-made, cyber-power systems and the associated cyber-attacks evolve in tandem with human expertise, which matures over time. This dynamic mirrors the evolutionary processes observed in infectious disease ecology within microbial and human
Hussain M. Mustafa +4 more
doaj +1 more source
Cyber Attack Detection for Self-Driving Vehicle Networks Using Deep Autoencoder Algorithms. [PDF]
Alsaade FW, Al-Adhaileh MH.
europepmc +1 more source
Abstract How can defense alliances reap the efficiency gains of working together when coordination and opportunism costs are high? Although specializing as part of a collective comes with economic and functional benefits, states must bargain over the distribution of those gains and ensure the costs of collective action are minimized.
J. Andrés Gannon
wiley +1 more source
GridAttackAnalyzer: A Cyber Attack Analysis Framework for Smart Grids. [PDF]
Le TD +6 more
europepmc +1 more source
ABSTRACT Hereditary angioedema (HAE) with C1 inhibitor deficiency is a rare disease characterized by unpredictable episodes of tissue swelling (angioedema), which, in most cases, occur first under the age of 18 years, and entail a significant burden of disease not only for the patients but also for their families.
Henriette Farkas +128 more
wiley +1 more source
Security Risk Assessment Approach for Distribution Network Cyber Physical Systems Considering Cyber Attack Vulnerabilities. [PDF]
Zhou B +5 more
europepmc +1 more source
In this large single‐centre series, conversional one‐anastomosis gastric bypass was demonstrated to be safe and to deliver meaningful medium‐term weight loss with low morbidity after primary sleeve gastrectomy or gastric banding. While reflux was not universally resolved, patient‐reported satisfaction was high, and secondary enteroenterostomy provided ...
Aaron Lerch +2 more
wiley +1 more source
From Open Banking Regulation to Platform Orchestration: The Evolution of Digital Platform Governance
ABSTRACT This study contributes to information systems (IS) scholarship by extending platform governance theory to regulatory contexts, explaining how regulatory forces co‐evolve with technological architectures to shape openness and control. This research examines the evolution of platform governance in the context of open banking, where regulatory ...
Priyadharshini Muthukannan +3 more
wiley +1 more source

