Results 121 to 130 of about 150,359 (291)
Exploring the Materiality of Data Breach Disclosures on the Australian Stock Exchange
This study examines Australian Stock Exchange (ASX) data breach announcements to provide insights into the extent and nature of data breach disclosures, as well as the costs, particularly to stakeholder relationships. Using a dataset of all data breach‐related announcements on the ASX, we identify a lack of data breach disclosure and, where disclosures
Jane Andrew +3 more
wiley +1 more source
The ethics of responding to democratic backsliding abroad
Abstract The past decade has seen a marked shift as many previously liberal democratic states have backslidden, taking authoritarian turns. How should liberal actors respond to democratic backsliding by others? Although it might seem that it is vital for liberal actors to react robustly to avoid complicity or to maintain their liberal integrity, this ...
James Pattison
wiley +1 more source
Machine Learning Applications in Cyber Threat Intelligence: A Comprehensive Review
Contemporary institutions are consistently confronted with fraudulent activities that exploit weaknesses in interconnected systems. Securing critical data against unauthorized access by hackers and other cybercriminals requires the application of ...
Iqra Naseer
semanticscholar +1 more source
Abstract How can defense alliances reap the efficiency gains of working together when coordination and opportunism costs are high? Although specializing as part of a collective comes with economic and functional benefits, states must bargain over the distribution of those gains and ensure the costs of collective action are minimized.
J. Andrés Gannon
wiley +1 more source
This work explores the integration and effectiveness of artificial intelligence in improving the security of critical energy infrastructure, highlighting its potential to transform cybersecurity practices in the sector.
Jaime Govea +2 more
doaj +1 more source
Enhancing Cyber-Threat Intelligence in the Arab World: Leveraging IoC and MISP Integration
Cybercrime threat intelligence enables proactive measures against threat actors and informed, data-driven security decisions. This study proposes a practical implementation of cybercrime threat intelligence in the Arab world by integrating Indicators of ...
I. Alzahrani, Seokhee Lee, Kyounggon Kim
semanticscholar +1 more source
We explore a topological model that situates teachers' agency as a constituent element within the convergent and divergent dynamics at the intersection of human‐mediated and algorithmically mediated pedagogies. Ubiquitous AI in education is designed to simulate, emulate and automate human processes and behaviours through datafication.
Keith Turvey, Norbert Pachler
wiley +1 more source
Developing a Cybersecurity Training Environment through the Integration of OpenAI and AWS
Cybersecurity is a critical concern in today’s digital age, where organizations face an ever-evolving cyber threat landscape. This study explores the potential of leveraging artificial intelligence and Amazon Web Services to improve cybersecurity ...
William Villegas-Ch +2 more
doaj +1 more source
Cyber Guardian : Intelligent Threat Surveillance
Advanced persistent threats (APTs) are cyberattacking that use covert strategies to target specific groups. As a result of the rapid growth of computing technology and the widespread connectivity of devices, there has been a boom in data transfer across networks. Because APTs' attack tactics are always changing, it can be difficult to detect them. This
null Aditi. H. R. +2 more
openaire +1 more source
How to Imagine Educational AI: The Filling of a Pail or the Lighting of a Fire?
Abstract Recent advances in artificial intelligence (e.g., machine learning, generative AI) have led to increased interest in its application in educational settings. AI companies hope to revolutionize teaching and learning by tailoring material to the individual needs of students, automating parts of teachers' jobs, or analyzing educational data to ...
Michał Wieczorek, Alberto Romele
wiley +1 more source

