Results 181 to 190 of about 76,134 (287)

Knowledge Graphs and Critical Infrastructures: Friends or Foes?

open access: yesWIREs Data Mining and Knowledge Discovery, Volume 16, Issue 2, June 2026.
Conceptual overview of Knowledge Graph integration in Critical Infrastructures, illustrating interconnected systems, data flows, and their role in enhancing resilience and operational intelligence. ABSTRACT Knowledge Graphs (KGs) are a natural evolution of data models representing and connecting data in a network of nodes and relations.
José Miguel Blanco   +3 more
wiley   +1 more source

Crisis Communication Readiness in the Age of Digital Transformation and GenAI: Insights From Hong Kong

open access: yesJournal of Contingencies and Crisis Management, Volume 34, Issue 2, June 2026.
ABSTRACT This study investigates the impact of digital transformation and emerging technologies, particularly generative artificial intelligence (GenAI), on the readiness and practices of crisis communication professionals in Hong Kong (HK). Despite growing theoretical advances, recent literature remains predominantly Western‐centric, with limited ...
Cindy Sing Bik Ngai   +3 more
wiley   +1 more source

How to Imagine Educational AI: The Filling of a Pail or the Lighting of a Fire?

open access: yesEducational Theory, Volume 76, Issue 3, Page 316-338, June 2026.
Abstract Recent advances in artificial intelligence (e.g., machine learning, generative AI) have led to increased interest in its application in educational settings. AI companies hope to revolutionize teaching and learning by tailoring material to the individual needs of students, automating parts of teachers' jobs, or analyzing educational data to ...
Michał Wieczorek, Alberto Romele
wiley   +1 more source

Experimental validation of the RESPONSE framework against cyberattacks on cyber‐physical process systems

open access: yesAIChE Journal, Volume 72, Issue 5, May 2026.
Abstract This work experimentally validates the RESPONSE (Resilient Process cONtrol SystEm) framework as a solution for maintaining safe, continuous operation of cyber‐physical process systems under cyberattacks. RESPONSE implements a dual‐loop architecture that runs a networked online controller in parallel with a hard‐isolated offline controller ...
Luyang Liu   +5 more
wiley   +1 more source

‘Crossing the Line’: Child Protection and Welfare Managers' and Social Workers' Experiences of Social Media, Online and Digital Abuse and Harassment in Ireland

open access: yesChild Abuse Review, Volume 35, Issue 3, May/June 2026.
ABSTRACT Users of child protection social work and/or their families are fully entitled to express their dissatisfaction with the professional or service through both formal and informal channels. Fair criticism and dissatisfaction can sometimes, however, escalate and cross the line into violence, harassment and abuse (VHA).
Amy Bradley   +3 more
wiley   +1 more source

The Evolution of Impression Management Research in Social Media: A Bibliometric Perspective

open access: yesCorporate Social Responsibility and Environmental Management, Volume 33, Issue 3, Page 4070-4087, May 2026.
ABSTRACT The purpose of the present study is to investigate impression management (IM) usage by companies in the context of social media communication and emerging technologies through a comprehensive mapping of the scientific literature. In this matter, a bibliometric analysis has been conducted, extracting a sample of 262 peer‐reviewed journal ...
Antonio Iazzi   +3 more
wiley   +1 more source

Home - About - Disclaimer - Privacy