Results 61 to 70 of about 137,873 (290)

Real‐time monitoring of tunnel structures using digital twin and artificial intelligence: A short overview

open access: yesDeep Underground Science and Engineering, EarlyView.
How artificial intelligence (AI) and digital twin (DT) technologies are revolutionizing tunnel surveillance, offering proactive maintenance strategies and enhanced safety protocols. It explores AI's analytical power and DT's virtual replicas of infrastructure, emphasizing their role in optimizing maintenance and safety in tunnel management.
Mohammad Afrazi   +4 more
wiley   +1 more source

Analysis and Characterization of Cyber Threats Leveraging the MITRE ATT&CK Database

open access: yesIEEE Access
MITRE ATT&CK is a comprehensive knowledge-base of adversary tactics, techniques, and procedures (TTP) based on real-world attack scenarios. It has been used in different sectors, such as government, academia, and industry, as a foundation for ...
Bader Al-Sada   +2 more
doaj   +1 more source

Cyber Threat in Interstate Relations: Case of US-Russia Cyber Tensions

open access: yesPolicy Perspectives, 2018
The 20 th century was overshadowed by conventional military threats, whereas the 21 st century has witnessed the preeminence of non-conventional security threats, including terrorism, transnational crime, civil wars, environmental degeneration and ...
Dr. Muhammad Riaz Shad
doaj   +1 more source

Technological Evolution in Fintech: A Decadal Scientometric and Systematic Review of Developments and Criticisms

open access: yesInternational Journal of Finance &Economics, EarlyView.
ABSTRACT This study aims to classify pivotal fintech innovations and explore the prospects and pitfalls associated with emerging fintech services extensively discussed in the literature. We conducted a multistage systematic review of research published on fintech over the past decade from a technological perspective. Using the Preferred Reporting Items
Muhammad Imran Qureshi, Nohman Khan
wiley   +1 more source

Major Cybersecurity Breaches: Shaping Corporate Cybersecurity Policies and Closing the Gaps

open access: yesJournal of Corporate Accounting &Finance, EarlyView.
ABSTRACT As digitalization accelerates, cybercrime has intensified in both scale and impact over the past two decades. This study aims to critically examine major cybersecurity events, assess them through the lens of routine activity theory, examine insight from three other established criminological and organizational theories, and address central ...
Laura K. Rickett, Deborah Smith
wiley   +1 more source

Exploring the motivation behind cybersecurity insider threat and proposed research agenda [PDF]

open access: yes, 2016
Cyber exploitation and malicious activities have become more sophisticated. Insider threat is one of the most significant cyber security threat vector, while posing a great concern to corporations and governments.
Clarke, Karla   +2 more
core  

Technostress and Technophobia: Unmasking the Impact of Coerced AI Adoption in Higher Education Institutions

open access: yesGlobal Business and Organizational Excellence, EarlyView.
ABSTRACT This article investigates the impact of coerced AI adoption on the psychological well‐being of academic staff within higher education institutions. Data were collected from a sample of 470 faculty members randomly selected from higher education institutions in Pakistan.
Muhammad Imran Qureshi   +3 more
wiley   +1 more source

Cyber security and cyber threats

open access: yes, 2023
The article examines the impact of cybersecurity in the digital space on the international economy. The classification today, yesterday, and in the future and analysis of cyber threats are carried out. The practical significance of the research results is obvious, since the active spread of IT technologies and their application in many areas of human ...
Gnediuc, I.O., Ohrimenco, S.A.
openaire   +1 more source

Strategies and Process of Trade Secret Misappropriation Mitigation: The Case of UK

open access: yesStrategic Change, EarlyView.
ABSTRACT Trade Secrets (TS) are vital for innovation‐driven companies, and their loss can inflict significant financial and reputational damage, particularly in the absence of established policies to mitigate misappropriation in the UK. The current academic literature lacks detailed strategies for firms to effectively address these threats.
Oleksandra Ozcan, David Pickernell
wiley   +1 more source

Detecting Cyber Threat Event from Twitter Using IDCNN and BiLSTM

open access: yesApplied Sciences, 2020
In the context of increasing cyber threats and attacks, monitoring and analyzing network security incidents in a timely and effective way is the key to ensuring network infrastructure security. As one of the world’s most popular social media sites, users
Yong Fang   +3 more
doaj   +1 more source

Home - About - Disclaimer - Privacy