Results 101 to 110 of about 142,803 (291)

A Study of Cyber Security and Cyber Threats

open access: yesCGC International Journal of Contemporary Technology and Research, 2020
Cybersecurity has a vital role in Information Technology. The cybersecurity security involves the security on data/information stored in various devices present on different networks. However, it is very difficult to secure information in today’s world because of the increasing number of devices like computer systems, mobile phones, televisions, etc ...
openaire   +1 more source

Maximizing the Economic, Environmental, and Social Impact of the Metaverse

open access: yesThunderbird International Business Review, EarlyView.
ABSTRACT The metaverse is a transformative digital ecosystem with the potential to redefine economic, environmental, and social systems. This qualitative study examines how the metaverse and its enabling technologies—such as AR/VR, blockchain, and AI—might evolve to influence sustainability. Drawing on semi‐structured interviews with global experts and
Alessandro Lanteri   +2 more
wiley   +1 more source

Investigating SME‐Inclusive Public‐Private AI Innovation Network: Evidence From U.S. Small Business Administration (1991–2023)

open access: yesThunderbird International Business Review, EarlyView.
ABSTRACT Understanding innovation policy is pivotal to enhancing national competitiveness for global value chain. This research investigates an SME‐Inclusive public‐private AI innovation network over time in the U.S. context (1991–2023), revealing how a government's demand‐based innovation policy bolsters technological prowess through isomorphism and ...
Jiyoon An
wiley   +1 more source

An Integrated Approach to Cyber Risk Management with Cyber Threat Intelligence Framework to Secure Critical Infrastructure

open access: yesJournal of Cybersecurity and Privacy
Emerging cyber threats’ sophistication, impact, and complexity rapidly evolve, confronting organizations with demanding challenges. This severe escalation requires a deeper understanding of adversary dynamics to develop enhanced defensive strategies and ...
Habib El Amin   +4 more
doaj   +1 more source

Cyber Threat Hunting

open access: yesInternational Journal of Cognitive Informatics and Natural Intelligence, 2021
Security and Information Event Management (SIEM) systems require significant manual input; SIEM tools with machine learning minimizes this effort but are reactive and only effective if known attack patterns are captured by the configured rules and queries.
openaire   +1 more source

Cyber threats in mobile healthcare applications: systematic review of enabling technologies, threat models, detection approaches, and future directions

open access: yesDiscover Computing
Mobile healthcare (mHealth) delivery has revolutionized the healthcare industry 5.0. With the move toward mHealth, access to healthcare services has gradually increased, allowing individualized treatment routines, and real-time health monitoring. However,
Anayo Chukwu Ikegwu   +2 more
doaj   +1 more source

Cybersecurity in the system of the national security priorities

open access: yesJournal of New Economy
Currently, a comprehensive approach to forecasting and system neutralisation of cyber threats, which allows for their cross-border nature and impact on economic development, is found lacking.
Aleksandr S. Voronov, Maxim V. Shamolin
doaj   +1 more source

The Challenge of Ensuring Business Security in Information Age [PDF]

open access: yes
Every day, thousands of businesses rely on the services and information ensured by information and communication networks. As the dependence on information systems grows, so the security of information networks becomes ever more critical to any entity ...
Delia Mioara POPESCU   +2 more
core  

Data privacy model using blockchain reinforcement federated learning approach for scalable internet of medical things

open access: yesCAAI Transactions on Intelligence Technology, EarlyView.
Abstract Internet of Medical Things (IoMT) has typical advancements in the healthcare sector with rapid potential proof for decentralised communication systems that have been applied for collecting and monitoring COVID‐19 patient data. Machine Learning algorithms typically use the risk score of each patient based on risk factors, which could help ...
Chandramohan Dhasaratha   +9 more
wiley   +1 more source

Home - About - Disclaimer - Privacy