Results 91 to 100 of about 1,175,680 (325)

Cyber security as a central strategy for smart community [PDF]

open access: yes, 2013
The cyber threat landscape has evolved in fairly dramatic ways.Cyber threats come in various different forms both technical and content related threats.Emerging threats have become sophisticated and a lot more disastrous involving state actors, state ...
Abdul Wahab, Amirudin
core  

Transforming healthcare with large language models: Current applications, challenges, and future directions—a literature review

open access: yesJournal of Intelligent Medicine, EarlyView.
Abstract AI‐based large language models (LLMs) have gradually made their way into various fields, transforming industries and changing the way we solve problems. LLMs have great potential in healthcare, where they can share the burden of data management, retrieval, and decision‐making.
Muhammad Umar   +11 more
wiley   +1 more source

CYBER SECURITY IN A DIGITAL LEARNING ENVIRONMENT

open access: yesІнформаційні технології і засоби навчання, 2019
The article discusses the problems of cyber-security of participants of the educational process, emphasizes the fact that these problems are not limited to the technical aspects of the protection of information resources, they must include in their ...
Valeriy Yu. Bykov   +2 more
doaj   +1 more source

An analysis of security issues in building automation systems [PDF]

open access: yes, 2014
The purpose of Building Automation Systems (BAS) is to centralise the management of a wide range of building services, through the use of integrated protocol and communication media.
Johnstone, Michael N, Peacock, Matthew D
core   +2 more sources

Cyber Insurance for Heterogeneous Wireless Networks

open access: yes, 2017
Heterogeneous wireless networks (HWNs) composed of densely deployed base stations of different types with various radio access technologies have become a prevailing trend to accommodate ever-increasing traffic demand in enormous volume.
Jiang, Hai   +4 more
core   +1 more source

Algorithm Selection Framework for Cyber Attack Detection

open access: yes, 2020
The number of cyber threats against both wired and wireless computer systems and other components of the Internet of Things continues to increase annually.
Ajmera Aman   +15 more
core   +1 more source

Technostress and Technophobia: Unmasking the Impact of Coerced AI Adoption in Higher Education Institutions

open access: yesGlobal Business and Organizational Excellence, EarlyView.
ABSTRACT This article investigates the impact of coerced AI adoption on the psychological well‐being of academic staff within higher education institutions. Data were collected from a sample of 470 faculty members randomly selected from higher education institutions in Pakistan.
Muhammad Imran Qureshi   +3 more
wiley   +1 more source

Cyber security and cyber threats

open access: yes, 2023
The article examines the impact of cybersecurity in the digital space on the international economy. The classification today, yesterday, and in the future and analysis of cyber threats are carried out. The practical significance of the research results is obvious, since the active spread of IT technologies and their application in many areas of human ...
Gnediuc, I.O., Ohrimenco, S.A.
openaire   +1 more source

Strategies and Process of Trade Secret Misappropriation Mitigation: The Case of UK

open access: yesStrategic Change, EarlyView.
ABSTRACT Trade Secrets (TS) are vital for innovation‐driven companies, and their loss can inflict significant financial and reputational damage, particularly in the absence of established policies to mitigate misappropriation in the UK. The current academic literature lacks detailed strategies for firms to effectively address these threats.
Oleksandra Ozcan, David Pickernell
wiley   +1 more source

Life after herbarium digitisation: Physical and digital collections, curation and use

open access: yesPLANTS, PEOPLE, PLANET, EarlyView.
Societal Impact Statement Collections of dried plant specimens (herbaria) provide an invaluable resource for the study of many areas of scientific interest and conservation globally. Digitisation increases access to specimens and metadata, enabling efficient use across a broad spectrum of research.
Alan James Paton   +39 more
wiley   +1 more source

Home - About - Disclaimer - Privacy