Results 41 to 50 of about 681 (153)

Strategies and Process of Trade Secret Misappropriation Mitigation: The Case of UK

open access: yesStrategic Change, EarlyView.
ABSTRACT Trade Secrets (TS) are vital for innovation‐driven companies, and their loss can inflict significant financial and reputational damage, particularly in the absence of established policies to mitigate misappropriation in the UK. The current academic literature lacks detailed strategies for firms to effectively address these threats.
Oleksandra Ozcan, David Pickernell
wiley   +1 more source

Cyber Dating Abuse Among Spanish Emerging Adults: The Moderating Role of Resilience in the Association Between Perpetration and Victimization

open access: yesSAGE Open
Cyber dating abuse is a significant issue among emerging adults, with harmful implications for both victims and perpetrators. This study had two main objectives: first, to validate previous findings regarding the association between victimization and ...
Beatriz Víllora   +3 more
doaj   +1 more source

Violencia cara a cara (offline) y en línea (online) en el noviazgo de adolescentes mexicanos

open access: yesCivilizar, 2020
La violencia en el noviazgo que se ejerce a través de los medios tecnológicos y redes sociales (online) ha mostrado tener una alta frecuencia en la población de jóvenes y adolescentes.
José Luis González Ortega   +3 more
doaj   +1 more source

Pengaruh Interaksi Digital terhadap Tingkat Cyber Dating Abuse pada Generasi Z

open access: yesENTITA: Jurnal Pendidikan Ilmu Pengetahuan Sosial dan Ilmu-Ilmu Sosial, 2023
Penelitian ini mengkaji tentang pengaruh dari Interaksi Digital terhadap tingkat Cyber Dating Abuse yang sering terjadi pada generasi Z. Adapun tujuan dari penelitian ini diantaranya untuk mengkaji dan menganalisis seberapa besar pengaruh Interaksi Digital terhadap tingkat terjadinya Cyber Dating Abuse, serta menjelaskan faktor-faktor apa saja yang ...
Prita Dwi Yanti   +2 more
openaire   +1 more source

Why Autonomous Vehicles Are Not Ready Yet: A Multi‐Disciplinary Review of Problems, Attempted Solutions, and Future Directions

open access: yesJournal of Field Robotics, EarlyView.
ABSTRACT Personal autonomous vehicles can sense their surrounding environment, plan their route, and drive with little or no involvement of human drivers. Despite the latest technological advancements and the hopeful announcements made by leading entrepreneurs, to date no personal vehicle is approved for road circulation in a “fully” or “semi ...
Xingshuai Dong   +13 more
wiley   +1 more source

Ensuring Battery Safety in Electric Vehicles: Challenges, Developments, and Future Perspectives

open access: yesSmall, EarlyView.
This review explores machine learning techniques to predict and mitigate thermal runaway in lithium‐ion batteries. By analyzing failure mechanisms and safety issues, the study develops data‐driven models for early detection. It proposes safety enhancement strategies for battery design and maintenance, offering actionable insights to prevent ...
Oumayma ELJarray   +7 more
wiley   +1 more source

Data privacy model using blockchain reinforcement federated learning approach for scalable internet of medical things

open access: yesCAAI Transactions on Intelligence Technology, EarlyView.
Abstract Internet of Medical Things (IoMT) has typical advancements in the healthcare sector with rapid potential proof for decentralised communication systems that have been applied for collecting and monitoring COVID‐19 patient data. Machine Learning algorithms typically use the risk score of each patient based on risk factors, which could help ...
Chandramohan Dhasaratha   +9 more
wiley   +1 more source

Cost-Inflicting Mate Retention Tactics Predict the Perpetration of Cyber Dating Abuse

open access: yesEvolutionary Psychological Science, 2021
Cyber dating abuse involves the use of electronic communication technology to direct abuse towards a romantic partner. Research has explored the perpetration of cyber dating abuse through an evolutionary lens, suggesting people use technology to perform mate retention tactics.
Manpal Singh Bhogal, Dionne Wallace
openaire   +3 more sources

Exploring the Materiality of Data Breach Disclosures on the Australian Stock Exchange

open access: yesAbacus, EarlyView.
This study examines Australian Stock Exchange (ASX) data breach announcements to provide insights into the extent and nature of data breach disclosures, as well as the costs, particularly to stakeholder relationships. Using a dataset of all data breach‐related announcements on the ASX, we identify a lack of data breach disclosure and, where disclosures
Jane Andrew   +3 more
wiley   +1 more source

Cyber Dating Abuse Among Korean College Students: An Exploratory Study of Risk and Protective Factors

open access: yesSAGE Open
This study investigated the factors associated with cyber dating abuse (CDA) among college students in South Korea. In order to shed light on this relatively understudied area concerning social and health issues, the study analyzed data from a ...
Riccardo Ferraresso, Chunrye Kim
doaj   +1 more source

Home - About - Disclaimer - Privacy