Results 201 to 210 of about 137,873 (290)
ABSTRACT Immigrant youth have been found to be particularly vulnerable to the negative effects of cyberbullying. Cyber‐upstanders have been highlighted with the potential to tackle bias‐based bullying, such as immigrant cyberbullying; thus, it is crucial to understand its predictors.
Nicola Abbott +2 more
wiley +1 more source
Norm Transformation in EU Research Security: A Pragmatist Approach
ABSTRACT This article examines the recent development of a research security policy agenda in the EU. In responding to changes in the geopolitical environment, the EU has adapted its research and innovation policy by subjecting it to security concerns. At stake in this development is the norm of openness in international science, and more broadly, the ...
Håvard Rustad Markussen
wiley +1 more source
Transparent and trustworthy CyberSecurity: an XAI-integrated big data framework for phishing attack detection. [PDF]
Nauman M +4 more
europepmc +1 more source
Smart Contracts and SME Resilience: Business Model Adaptation and International Considerations
ABSTRACT Smart contracts (SCs), appended to a blockchain, protect digital environments and their resources, processes and structures, reducing mismatches between legal and actual rights and ownership. They enhance digital resilience by improving transparency, traceability and trust in digital transactions.
Araz Zirar +2 more
wiley +1 more source
ACO-tuned randomized decision tree for detecting cyber threats in mobile web applications. [PDF]
Aljohani A.
europepmc +1 more source
ABSTRACT As digitalization accelerates across the global economy, small and medium enterprises (SMEs) face increasing exposure to cybersecurity threats, not due to flaws in external platforms, but because of internal organizational vulnerabilities. This paper presents a conceptual framework that integrates the resource‐based view (RBV) and dynamic ...
Ifedapo Francis Awolowo +4 more
wiley +1 more source
Terrorism, Perceived Threat, and Support for Surveillance: A Virtual Reality Experiment on Cyber vs. Conventional Terrorism. [PDF]
Snider KLG +5 more
europepmc +1 more source
A novel three‐layer architecture is proposed for cell‐to‐cell communication, integrating molecular, nano‐electronic, and digital components. It enables bio‐integrated applications such as remote emotional touching, consensual telepathy, and autonomous drug delivery. Molecular Communication (MC) is utilized with advanced implants, modulation techniques,
Saeed Banaeian Far +2 more
wiley +1 more source
Privacy-preserving cyberthreat detection in decentralized social media with federated cross-modal graph transformers. [PDF]
Premkumar D, Nachimuthu SK.
europepmc +1 more source

