Results 131 to 140 of about 137,074 (286)

Complementarity in alliances: How strategic compatibility and hierarchy promote efficient cooperation in international security

open access: yesAmerican Journal of Political Science, EarlyView.
Abstract How can defense alliances reap the efficiency gains of working together when coordination and opportunism costs are high? Although specializing as part of a collective comes with economic and functional benefits, states must bargain over the distribution of those gains and ensure the costs of collective action are minimized.
J. Andrés Gannon
wiley   +1 more source

A topological exploration of convergence/divergence of human‐mediated and algorithmically mediated pedagogy

open access: yesBritish Journal of Educational Technology, EarlyView.
We explore a topological model that situates teachers' agency as a constituent element within the convergent and divergent dynamics at the intersection of human‐mediated and algorithmically mediated pedagogies. Ubiquitous AI in education is designed to simulate, emulate and automate human processes and behaviours through datafication.
Keith Turvey, Norbert Pachler
wiley   +1 more source

Parental Understandings of ‘Stranger Danger’: Balancing Fear of Victimisation by Strangers Against Enabling Autonomy and Independence in Children

open access: yesChildren &Society, EarlyView.
ABSTRACT For decades, children have been taught about ‘stranger danger’. Fear of the stranger has been associated with overly cautious parenting strategies, and the curtailing of freedoms as children transition to adolescents. This article aims to examine the extent to which parents consider this issue of stranger danger in their decisions to grant ...
Craig Collie
wiley   +1 more source

Cyber Astra (Cyber Security Threats Detection)

open access: yesInternational Journal of Advanced Research in Science, Communication and Technology
Cyber security is a critical issue in today's interconnected digital environment where organizations face increasing threats. This content demonstrates integrated threat detection system, user-friendly network application designed to enhance the security of the organization.
null Ms. Snehal A. Pagare   +3 more
openaire   +1 more source

How to Imagine Educational AI: The Filling of a Pail or the Lighting of a Fire?

open access: yesEducational Theory, EarlyView.
Abstract Recent advances in artificial intelligence (e.g., machine learning, generative AI) have led to increased interest in its application in educational settings. AI companies hope to revolutionize teaching and learning by tailoring material to the individual needs of students, automating parts of teachers' jobs, or analyzing educational data to ...
Michał Wieczorek, Alberto Romele
wiley   +1 more source

Research on knowledge graph construction technology for cyber threat intelligence based on large language models

open access: yesTongxin xuebao
As the complexity and sophistication of cyber threats continue to increase, integrating cyber threat intelligence into cybersecurity measures has become crucial.
LAI Qingnan   +2 more
doaj  

From products to smart solutions: A value‐creation approach

open access: yesEuropean Management Review, EarlyView.
Abstract Smart solutions comprise a synergy of products, services, software, connectivity, data, and intelligence. This study examines the evolution of a manufacturer into a smart solution provider, highlighting the role of value‐creation capabilities, activities, and practices. Through a longitudinal, in‐depth single‐case study of a leading technology
Tayyab Warraich   +4 more
wiley   +1 more source

Transitions between homes in parenting plans: A Canadian perspective on legal considerations

open access: yesFamily Court Review, EarlyView.
Abstract Children and adolescents can experience a wide range of emotions when transitioning between their parents' homes after separation and divorce, including anticipation, distress, and fear. Even when they enjoy spending time at each parent's residence, changeovers can expose them to interparental conflict and loyalty conflicts.
Michael A. Saini, Lisa Chung
wiley   +1 more source

The Labor Market Effects of Occupational Licensing in the Public Sector

open access: yesIndustrial Relations: A Journal of Economy and Society, EarlyView.
ABSTRACT In the United States, occupational licensing is about twice as prevalent in the public sector as in the private sector. However, the influence of occupational regulation for public sector workers and how it compares with that of private sector workers has not been analyzed in detail.
Morris M. Kleiner, Wenchen Wang
wiley   +1 more source

Compassionate Digital Innovation: A Pluralistic Perspective and Research Agenda

open access: yesInformation Systems Journal, EarlyView.
ABSTRACT Digital innovation offers significant societal, economic and environmental benefits but is also a source of profound harms. Prior information systems (IS) research has often overlooked the ethical tensions involved, framing harms as ‘unintended consequences’ rather than symptoms of deeper systemic problems.
Raffaele F. Ciriello   +5 more
wiley   +1 more source

Home - About - Disclaimer - Privacy