Results 121 to 130 of about 288,624 (313)

Cyber security picture 2013 [PDF]

open access: yes
Summary: This report summarises cyber intrusion activity identified by or reported to the Cyber Security Operations Centre (CSOC) during 2013. It provides a broad overview of cyber threats to Australian government networks, as observed by the CSOC.

core  

Beyond 5G and Non‐terrestrial Network (NTN) Integrated Architecture: Access Challenges for Expanding Artificial Intelligence of Things (AIoT)

open access: yesInternational Journal of Satellite Communications and Networking, EarlyView.
ABSTRACT This study analyzes the architecture of the beyond 5G‐NTN (Non‐terrestrial Network) integrated network and presents the technical, legal, and regulatory challenges and considerations for expanding the Artificial Intelligence of Things (AIoT) ecosystem.
Byung Woon Kim, Ga Eun Choi
wiley   +1 more source

Cyber security threats: A never-ending challenge for e-commerce. [PDF]

open access: yesFront Psychol, 2022
Liu X   +6 more
europepmc   +1 more source

Smart Waste, Smarter World: Exploring Waste Types, Trends, and Tech‐Driven Valorization Through Artificial Intelligence, Internet of Things, and Blockchain

open access: yesSustainable Development, EarlyView.
ABSTRACT Global municipal solid waste generation is projected to exceed 3.8 billion tonnes annually by 2050. This makes the need for smart, inclusive, and scalable waste valorization systems more urgent than ever. This review critically explores the shift from conventional waste management to intelligent, technology‐driven solutions aligned with ...
Segun E. Ibitoye   +8 more
wiley   +1 more source

Motivation and hygiene factors for curriculum (re)development and the embedding of technology in accounting programmes

open access: yesAccounting &Finance, EarlyView., 2023
Abstract Using Herzberg's two‐factor theory, this paper examines the hygiene and motivation factors that drive (re)development in accounting higher education programmes. Interviews with accounting educators and discipline leaders demonstrate a range of factors at play in the (re)development of accounting programmes in pursuit of embedding relevant ...
Esin Ozdil   +3 more
wiley   +1 more source

From ESG to Sustainable Development: A Path Designed for the Triple Helix Spheres

open access: yesSustainable Development, EarlyView.
ABSTRACT This work examines the relationship between environmental, social, and governance (ESG) initiatives and sustainable development (SD), highlighting a scientific gap in their effective connection. It aims to propose a framework with recommendations for promoting SD through ESG, considering the governmental, business, and academic spheres from ...
Elen Cristina Bravos Giupponi   +3 more
wiley   +1 more source

Named entity recognition model based on Multi‐BiLSTM and competition mechanism

open access: yesElectronics Letters
A named entity recognition (NER) model based on multiple bidirectional long short‐term memory networks (Multi‐BiLSTM) and competition mechanism (CM) is proposed.
Yang Zhou   +3 more
doaj   +1 more source

Digital Futures, Sustainable Outcomes: Mapping the Impact of Digital Transformation on EU SDG Progress

open access: yesSustainable Development, EarlyView.
ABSTRACT This study explores how digital transformation, measured by the Global Digitalisation Index (GDI), relates to progress on the UN Sustainable Development Goals (SDGs) across EU member states. Using partial correlation, regression analysis with interaction terms and cluster analysis, the research examines the moderating effects of governance and
Luis Fonseca   +4 more
wiley   +1 more source

A Method for Assessing the Risks to Sustainability Posed by Process Operations

open access: yesSustainable Development, EarlyView.
ABSTRACT We present a framework for assessing the risks to sustainability posed by any given set of processes. The objective is to improve sustainability by enabling better decision‐making in policy and business contexts. The framework can be applied to any system of processes where available information supports discovery and quantification of ...
Richard C. Darton, Colin J. Axon
wiley   +1 more source

Home - About - Disclaimer - Privacy