Results 161 to 170 of about 118,316 (239)

Moral Tolerance: The Ethics of Social Punishment in Cases of Moral Disagreement

open access: yesTheoria, EarlyView.
ABSTRACT In many practical contemporary contexts, people need to make correct ethical judgements about how to respond to perceived wrongdoing—in particular, whether to punish it or tolerate it. This judgement can be challenging when the wrongdoer does not accept the allegation of wrongdoing at the level of moral principle, holding that the type of ...
Hugh Breakey, Graham Wood
wiley   +1 more source

Cyber-attack group analysis method based on association of cyber-attack information

open access: yesKSII Transactions on Internet and Information Systems, 2020
Kyungho Son   +2 more
openaire   +1 more source

Personalized Model‐Driven Interventions for Decisions From Experience

open access: yesTopics in Cognitive Science, EarlyView.
Abstract Cognitive models that represent individuals provide many benefits for understanding the full range of human behavior. One way in which individual differences emerge is through differences in knowledge. In dynamic situations, where decisions are made from experience, models built upon a theory of experiential choice (instance‐based learning ...
Edward A. Cranford   +6 more
wiley   +1 more source

Paris Olympics and Paralympics: Insights from nationwide coordination in preparedness, supply chain management and blood inventory

open access: yesVox Sanguinis, EarlyView.
Abstract The Paris 2024 Olympic Games posed a unique challenge due to their scale, associated risks and the need for robust healthcare preparedness. This review outlines the forecasting and anticipatory measures taken by the Etablissement français du sang (EFS) to ensure a resilient blood supply chain throughout the event.
Jean‐Baptiste Thibert   +9 more
wiley   +1 more source

Blood supply continuity and emergency preparedness in natural and man‐made disasters and in armed conflicts—The Nordic perspectives

open access: yesVox Sanguinis, EarlyView.
Abstract Recent events have highlighted the urgent need for comprehensive blood preparedness plans at local, regional, national and cross‐border levels within the Nordic countries. This article outlines the perspectives and strategies related to blood preparedness in Norway, Sweden and Finland, in the context of emergencies, disasters and armed ...
Agneta Wikman   +8 more
wiley   +1 more source

CYBER ATTACKS AS A FORM OF CYBER TERRORISM

open access: yesScientific notes of Taurida National V.I. Vernadsky University. Series: Technical Sciences, 2021
openaire   +1 more source

Sharing conspiracy theories and staying in power: How leaders' false theories influence leadership perception

open access: yesBritish Journal of Social Psychology, Volume 65, Issue 3, July 2026.
Abstract Research shows that spreading conspiracy theories impacts leaders' reputations; yet, it remains unclear how leaders are viewed when their theories are debunked. Across four studies (N = 1437), we explored whether conveying a conspiracy theory, regardless of its accuracy, influences followers' impressions of leader dominance, competence and ...
Shen Cao   +2 more
wiley   +1 more source

Building centaur responders: is emergency management ready for artificial intelligence?

open access: yesDisasters, Volume 50, Issue 3, July 2026.
Abstract This article examines the preparedness of emergency management (EM) for addressing questions pertaining to artificial intelligence (AI), encompassing its benefits to EM missions, the potential biases, the societal impacts, and more. We pinpoint two key shortcomings in early EM research on AI: (i) insufficient discussion of both AI's history ...
Christopher Whyte   +1 more
wiley   +1 more source

On Using the Shapley Value for Anomaly Localization: A Statistical Investigation

open access: yesApplied AI Letters, Volume 7, Issue 2, June 2026.
ABSTRACT Recent publications have suggested using the Shapley value for anomaly localization for sensor data systems. We use a reasonable statistical model for the classifiers required to compute the Shapley value to provide repeatable and rigorous analysis in the anomaly localization application.
Rick S. Blum   +2 more
wiley   +1 more source

A Survey for Deep Reinforcement Learning Based Network Intrusion Detection

open access: yesApplied AI Letters, Volume 7, Issue 2, June 2026.
This paper surveys deep reinforcement learning (DRL) for network intrusion detection, evaluating model efficiency, minority attack detection, and dataset imbalance. Findings show DRL achieves state‐of‐the‐art results on public datasets, sometimes surpassing traditional deep learning.
Wanrong Yang   +3 more
wiley   +1 more source

Home - About - Disclaimer - Privacy