Results 91 to 100 of about 140,490 (288)

Maximizing the Economic, Environmental, and Social Impact of the Metaverse

open access: yesThunderbird International Business Review, EarlyView.
ABSTRACT The metaverse is a transformative digital ecosystem with the potential to redefine economic, environmental, and social systems. This qualitative study examines how the metaverse and its enabling technologies—such as AR/VR, blockchain, and AI—might evolve to influence sustainability. Drawing on semi‐structured interviews with global experts and
Alessandro Lanteri   +2 more
wiley   +1 more source

Formation of the TNI Cyber Force: A Strategic and Policy Analysis

open access: yesDefense and Security Studies
The increasing cyber threats in Indonesia require strengthening the country's defense strategy. This study focuses on the formation of the Indonesian National Army (TNI) Cyber Force as part of efforts to strengthen the country's cyber security in facing
Aris Sarjito
doaj   +1 more source

Investigation of Attitudes Towards Security Behaviors [PDF]

open access: yes, 2018
Cybersecurity attacks have increased as Internet technology has proliferated. Symantec’s 2013 Internet Security Report stated that two out of the top three causes of data breaches in 2012 were attributable to human error (Pelgrin, 2014).
Kelley, Daniel
core   +1 more source

Data privacy model using blockchain reinforcement federated learning approach for scalable internet of medical things

open access: yesCAAI Transactions on Intelligence Technology, EarlyView.
Abstract Internet of Medical Things (IoMT) has typical advancements in the healthcare sector with rapid potential proof for decentralised communication systems that have been applied for collecting and monitoring COVID‐19 patient data. Machine Learning algorithms typically use the risk score of each patient based on risk factors, which could help ...
Chandramohan Dhasaratha   +9 more
wiley   +1 more source

Cybersecurity in the system of the national security priorities

open access: yesJournal of New Economy
Currently, a comprehensive approach to forecasting and system neutralisation of cyber threats, which allows for their cross-border nature and impact on economic development, is found lacking.
Aleksandr S. Voronov, Maxim V. Shamolin
doaj   +1 more source

Graph neural network‐based attack prediction for communication‐based train control systems

open access: yesCAAI Transactions on Intelligence Technology, EarlyView.
Abstract The Advanced Persistent Threats (APTs) have emerged as one of the key security challenges to industrial control systems. APTs are complex multi‐step attacks, and they are naturally diverse and complex. Therefore, it is important to comprehend the behaviour of APT attackers and anticipate the upcoming attack actions.
Junyi Zhao   +3 more
wiley   +1 more source

Cyber threats in mobile healthcare applications: systematic review of enabling technologies, threat models, detection approaches, and future directions

open access: yesDiscover Computing
Mobile healthcare (mHealth) delivery has revolutionized the healthcare industry 5.0. With the move toward mHealth, access to healthcare services has gradually increased, allowing individualized treatment routines, and real-time health monitoring. However,
Anayo Chukwu Ikegwu   +2 more
doaj   +1 more source

An Integrated Approach to Cyber Risk Management with Cyber Threat Intelligence Framework to Secure Critical Infrastructure

open access: yesJournal of Cybersecurity and Privacy
Emerging cyber threats’ sophistication, impact, and complexity rapidly evolve, confronting organizations with demanding challenges. This severe escalation requires a deeper understanding of adversary dynamics to develop enhanced defensive strategies and ...
Habib El Amin   +4 more
doaj   +1 more source

Enabling pandemic‐resilient healthcare: Narrowband Internet of Things and edge intelligence for real‐time monitoring

open access: yesCAAI Transactions on Intelligence Technology, EarlyView.
Abstract The Internet of Things (IoT) in deploying robotic sprayers for pandemic‐associated disinfection and monitoring has garnered significant attention in recent research. The authors introduce a novel architectural framework designed to interconnect smart monitoring robotic devices within healthcare facilities using narrowband Internet of Things ...
Md Motaharul Islam   +9 more
wiley   +1 more source

The Challenge of Ensuring Business Security in Information Age [PDF]

open access: yes
Every day, thousands of businesses rely on the services and information ensured by information and communication networks. As the dependence on information systems grows, so the security of information networks becomes ever more critical to any entity ...
Delia Mioara POPESCU   +2 more
core  

Home - About - Disclaimer - Privacy