Results 31 to 40 of about 2,569 (184)

Land Use Transformation and Climate Resilience in Smart Cities: Role of ICT in Modern Urban Planning

open access: yesLand Degradation &Development, EarlyView.
ABSTRACT Modern urban planning is experiencing a transition from traditional planning to the integration of information technology, which defines the concept of a “smart city”. The study analyses the evolution of urban planning practices with an emphasis on the role of engineering and architecture in the process of urbanization, the transition to the ...
Dariusz Cichoń
wiley   +1 more source

Human organ trafficking in the cyber space [PDF]

open access: yesTemida, 2009
The accelerated growth of the information-communication technology use brought about cyber crime as a new form of crime connected with the misuse of computer network.
Vuletić Dejan
doaj   +1 more source

Unraveling the direct and indirect effects of interpersonal mindfulness on school‐age bullying perpetration and victimization: The mediating role of emotional intelligence

open access: yesPediatric Investigation, EarlyView.
Emotional intelligence mediated the association between interpersonal mindfulness and bullying victimization/perpetration (BV/BP). Higher interpersonal mindfulness was significantly associated with higher emotional intelligence. Higher emotional intelligence was significantly associated with lower BV/BP.
Marguerita Aoun   +7 more
wiley   +1 more source

Correlating Orphaned Windows Registry Data Structures

open access: yesJournal of Digital Forensics, Security and Law, 2009
Recently, it has been shown that deleted entries of the Microsoft Windows registry (keys) may still reside in the system files once the entries have been deleted from the active database.
Damir Kahved, Tahar Kechadi
doaj  

The Spatiotemporal Pattern and Driving Factors of Cyber Fraud Crime in China

open access: yesISPRS International Journal of Geo-Information, 2021
As a typical cybercrime, cyber fraud poses severe threats to civilians’ property safety and social stability. Traditional criminological theories such as routine activity theory focus mainly on the effects of individual characteristics on cybercrime ...
Shuai Chen   +7 more
doaj   +1 more source

Why Autonomous Vehicles Are Not Ready Yet: A Multi‐Disciplinary Review of Problems, Attempted Solutions, and Future Directions

open access: yesJournal of Field Robotics, EarlyView.
ABSTRACT Personal autonomous vehicles can sense their surrounding environment, plan their route, and drive with little or no involvement of human drivers. Despite the latest technological advancements and the hopeful announcements made by leading entrepreneurs, to date no personal vehicle is approved for road circulation in a “fully” or “semi ...
Xingshuai Dong   +13 more
wiley   +1 more source

Familial concentration of crime in a digital era: Criminal behavior among family members of cyber offenders

open access: yesComputers in Human Behavior Reports, 2022
A vast and growing body of research has shown that crime tends to run in families. However, previous studies focused only on traditional crimes and research on familial risk factors for cyber offending is very scarce.
Steve G.A. van de Weijer, Asier Moneva
doaj   +1 more source

Unveiling Regional Disparities: Exploring Cybersecurity Capabilities and Performance Through Systems Theory Approach

open access: yesSystems Research and Behavioral Science, EarlyView.
ABSTRACT This study investigates the relationship between cybersecurity capabilities (CCs) and cybersecurity performance (CP) across diverse regional contexts, employing ordinary least squares (OLS) and random forest (RF) regression models. The research highlights how economic, political and cultural factors shape CCs and their impact on CP ...
Angélica Pigola   +2 more
wiley   +1 more source

Between Hype and Understatement: Reassessing Cyber Risks as a Security Strategy

open access: yesJournal of Strategic Security, 2011
Most of the actions that fall under the trilogy of cyber crime, terrorism,and war exploit pre-existing weaknesses in the underlying technology.Because these vulnerabilities that exist in the network are not themselvesillegal, they tend to be overlooked ...
Audrey Guinchard
doaj  

Collaborating in future states—Contextual instability, paradigmatic remaking, and public policy

open access: yesAustralian Journal of Public Administration, EarlyView.
Abstract Collaboration is ubiquitous in public policy life, with its presence and profile determined by prevailing governance conditions. Commitments to globalisation and marketisation in the latter part of the 20th century marked the onset of an era defined by collaboration, between and across tiers and spheres of government, with non‐state actors ...
Helen Sullivan
wiley   +1 more source

Home - About - Disclaimer - Privacy