ABSTRACT Recent literature calls for scholars to bridge the divide that has emerged between criminology and regulation and governance. In the current work, we propose that criminological opportunity theories provide one fruitful pathway to that end.
Carole Gibbs +3 more
wiley +1 more source
Law and Infrastructure: Reliability, Automation Transition, and Irregularities of “U‐Space”
ABSTRACT The European Union (EU) is making regulatory efforts to allow for the safe integration of drones into civilian airspace through automated means. Commission Implementing Regulation (EU) 2021/664 concerning unmanned traffic management (a system referred to as “U‐Space”) furthers that commitment. Accordingly, drone operators must avail themselves
Samar Abbas Nawaz
wiley +1 more source
Informal Firms' Adoption and Use of Mobile Money Under Uncertain Times: Evidence From Burkina Faso
ABSTRACT This paper investigates how uncertainty affects mobile money adoption and use by informal businesses. Despite the prevalence of the informal sector in developing countries and the recognized potential of mobile money for financial inclusion, empirical research on its adoption and usage among unregistered businesses is limited.
Serge Stéphane Ky, Clovis Rugemintwari
wiley +1 more source
Cyber attack and fault detection in DC microgrids by designing an event-triggered based-robust algorithm. [PDF]
Hosseini Rostami SM +2 more
europepmc +1 more source
Internet, Inequality, and Regime Stability
ABSTRACT This study examines the link between income inequality and political instability, focusing on the moderating role of Internet penetration. Using data from over 120 countries (1996–2020), we find a conditional relationship: in low‐Internet countries, higher inequality associates with lower instability, likely due to limited political awareness ...
Mohammad Reza Farzanegan +1 more
wiley +1 more source
HCAP: Hybrid cyber attack prediction model for securing healthcare applications. [PDF]
Ali MF +6 more
europepmc +1 more source
Cryogenian Glacial Erosion and Tectonics as Agents of Crustal Recycling
ABSTRACT Zircon preserves evidence of recycling processes that link surface environments to the mantle. Combined δ18O‐εHf in zircon fingerprints magmatic sources and tracks how crustal material is reworked over time. We apply statistical analyses to a global compilation that apparently resolves shifts in zircon U–Pb, δ18O, and Lu‐Hf data spanning the ...
M. Seraine +9 more
wiley +1 more source
An efficient cyber-attack detection and classification in IoT networks with high-dimensional feature set using Levenberg-Marquardt optimized feedforward neural network. [PDF]
Kuang Q, Kuang X.
europepmc +1 more source
Personalized Model‐Driven Interventions for Decisions From Experience
Abstract Cognitive models that represent individuals provide many benefits for understanding the full range of human behavior. One way in which individual differences emerge is through differences in knowledge. In dynamic situations, where decisions are made from experience, models built upon a theory of experiential choice (instance‐based learning ...
Edward A. Cranford +6 more
wiley +1 more source
Hybrid quantum enhanced federated learning for cyber attack detection. [PDF]
Subramanian G, Chinnadurai M.
europepmc +1 more source

