Results 31 to 40 of about 2,569 (184)
Land Use Transformation and Climate Resilience in Smart Cities: Role of ICT in Modern Urban Planning
ABSTRACT Modern urban planning is experiencing a transition from traditional planning to the integration of information technology, which defines the concept of a “smart city”. The study analyses the evolution of urban planning practices with an emphasis on the role of engineering and architecture in the process of urbanization, the transition to the ...
Dariusz Cichoń
wiley +1 more source
Human organ trafficking in the cyber space [PDF]
The accelerated growth of the information-communication technology use brought about cyber crime as a new form of crime connected with the misuse of computer network.
Vuletić Dejan
doaj +1 more source
Emotional intelligence mediated the association between interpersonal mindfulness and bullying victimization/perpetration (BV/BP). Higher interpersonal mindfulness was significantly associated with higher emotional intelligence. Higher emotional intelligence was significantly associated with lower BV/BP.
Marguerita Aoun +7 more
wiley +1 more source
Correlating Orphaned Windows Registry Data Structures
Recently, it has been shown that deleted entries of the Microsoft Windows registry (keys) may still reside in the system files once the entries have been deleted from the active database.
Damir Kahved, Tahar Kechadi
doaj
The Spatiotemporal Pattern and Driving Factors of Cyber Fraud Crime in China
As a typical cybercrime, cyber fraud poses severe threats to civilians’ property safety and social stability. Traditional criminological theories such as routine activity theory focus mainly on the effects of individual characteristics on cybercrime ...
Shuai Chen +7 more
doaj +1 more source
ABSTRACT Personal autonomous vehicles can sense their surrounding environment, plan their route, and drive with little or no involvement of human drivers. Despite the latest technological advancements and the hopeful announcements made by leading entrepreneurs, to date no personal vehicle is approved for road circulation in a “fully” or “semi ...
Xingshuai Dong +13 more
wiley +1 more source
A vast and growing body of research has shown that crime tends to run in families. However, previous studies focused only on traditional crimes and research on familial risk factors for cyber offending is very scarce.
Steve G.A. van de Weijer, Asier Moneva
doaj +1 more source
ABSTRACT This study investigates the relationship between cybersecurity capabilities (CCs) and cybersecurity performance (CP) across diverse regional contexts, employing ordinary least squares (OLS) and random forest (RF) regression models. The research highlights how economic, political and cultural factors shape CCs and their impact on CP ...
Angélica Pigola +2 more
wiley +1 more source
Between Hype and Understatement: Reassessing Cyber Risks as a Security Strategy
Most of the actions that fall under the trilogy of cyber crime, terrorism,and war exploit pre-existing weaknesses in the underlying technology.Because these vulnerabilities that exist in the network are not themselvesillegal, they tend to be overlooked ...
Audrey Guinchard
doaj
Collaborating in future states—Contextual instability, paradigmatic remaking, and public policy
Abstract Collaboration is ubiquitous in public policy life, with its presence and profile determined by prevailing governance conditions. Commitments to globalisation and marketisation in the latter part of the 20th century marked the onset of an era defined by collaboration, between and across tiers and spheres of government, with non‐state actors ...
Helen Sullivan
wiley +1 more source

