Results 121 to 130 of about 150,359 (291)

Exploring the Materiality of Data Breach Disclosures on the Australian Stock Exchange

open access: yesAbacus, EarlyView.
This study examines Australian Stock Exchange (ASX) data breach announcements to provide insights into the extent and nature of data breach disclosures, as well as the costs, particularly to stakeholder relationships. Using a dataset of all data breach‐related announcements on the ASX, we identify a lack of data breach disclosure and, where disclosures
Jane Andrew   +3 more
wiley   +1 more source

The ethics of responding to democratic backsliding abroad

open access: yesAmerican Journal of Political Science, EarlyView.
Abstract The past decade has seen a marked shift as many previously liberal democratic states have backslidden, taking authoritarian turns. How should liberal actors respond to democratic backsliding by others? Although it might seem that it is vital for liberal actors to react robustly to avoid complicity or to maintain their liberal integrity, this ...
James Pattison
wiley   +1 more source

Machine Learning Applications in Cyber Threat Intelligence: A Comprehensive Review

open access: yesThe Asian Bulletin of Big Data Management
Contemporary institutions are consistently confronted with fraudulent activities that exploit weaknesses in interconnected systems. Securing critical data against unauthorized access by hackers and other cybercriminals requires the application of ...
Iqra Naseer
semanticscholar   +1 more source

Complementarity in alliances: How strategic compatibility and hierarchy promote efficient cooperation in international security

open access: yesAmerican Journal of Political Science, EarlyView.
Abstract How can defense alliances reap the efficiency gains of working together when coordination and opportunism costs are high? Although specializing as part of a collective comes with economic and functional benefits, states must bargain over the distribution of those gains and ensure the costs of collective action are minimized.
J. Andrés Gannon
wiley   +1 more source

Transforming Cybersecurity into Critical Energy Infrastructure: A Study on the Effectiveness of Artificial Intelligence

open access: yesSystems
This work explores the integration and effectiveness of artificial intelligence in improving the security of critical energy infrastructure, highlighting its potential to transform cybersecurity practices in the sector.
Jaime Govea   +2 more
doaj   +1 more source

Enhancing Cyber-Threat Intelligence in the Arab World: Leveraging IoC and MISP Integration

open access: yesElectronics
Cybercrime threat intelligence enables proactive measures against threat actors and informed, data-driven security decisions. This study proposes a practical implementation of cybercrime threat intelligence in the Arab world by integrating Indicators of ...
I. Alzahrani, Seokhee Lee, Kyounggon Kim
semanticscholar   +1 more source

A topological exploration of convergence/divergence of human‐mediated and algorithmically mediated pedagogy

open access: yesBritish Journal of Educational Technology, EarlyView.
We explore a topological model that situates teachers' agency as a constituent element within the convergent and divergent dynamics at the intersection of human‐mediated and algorithmically mediated pedagogies. Ubiquitous AI in education is designed to simulate, emulate and automate human processes and behaviours through datafication.
Keith Turvey, Norbert Pachler
wiley   +1 more source

Developing a Cybersecurity Training Environment through the Integration of OpenAI and AWS

open access: yesApplied Sciences
Cybersecurity is a critical concern in today’s digital age, where organizations face an ever-evolving cyber threat landscape. This study explores the potential of leveraging artificial intelligence and Amazon Web Services to improve cybersecurity ...
William Villegas-Ch   +2 more
doaj   +1 more source

Cyber Guardian : Intelligent Threat Surveillance

open access: yesInternational Journal of Advanced Research in Science, Communication and Technology
Advanced persistent threats (APTs) are cyberattacking that use covert strategies to target specific groups. As a result of the rapid growth of computing technology and the widespread connectivity of devices, there has been a boom in data transfer across networks. Because APTs' attack tactics are always changing, it can be difficult to detect them. This
null Aditi. H. R.   +2 more
openaire   +1 more source

How to Imagine Educational AI: The Filling of a Pail or the Lighting of a Fire?

open access: yesEducational Theory, EarlyView.
Abstract Recent advances in artificial intelligence (e.g., machine learning, generative AI) have led to increased interest in its application in educational settings. AI companies hope to revolutionize teaching and learning by tailoring material to the individual needs of students, automating parts of teachers' jobs, or analyzing educational data to ...
Michał Wieczorek, Alberto Romele
wiley   +1 more source

Home - About - Disclaimer - Privacy