Evolving Zero Trust Architectures for AI-Driven Cyber Threats in Healthcare and Other High-Risk Data Environments: A Systematic Review. [PDF]
Zakhmi K +5 more
europepmc +1 more source
Dialogue of the Deaf: How Deliberation With Discontented Citizens May Hopelessly Fail
ABSTRACT Governments employ public deliberation in response to citizen discontent, intending to achieve consensus, mutual understanding, and clarification. However, some studies suggest that deliberation can devolve into a “dialogue of the deaf,” where parties talk past each other, counterproductively leading to conflict, distrust, and confusion ...
Anouk van Twist
wiley +1 more source
A Comprehensive Survey of Privacy-Enhancing and Trust-Centric Cloud-Native Security Techniques Against Cyber Threats. [PDF]
Arif T, Jo B, Park JH.
europepmc +1 more source
Beyond the European Army Illusion: A Prudent Strategy for the Real European Zeitenwende
JCMS: Journal of Common Market Studies, EarlyView.
Benjamin Daßler, Moritz Weiss
wiley +1 more source
Unpacking Resilience in Public Administration: Insights From a Meta‐Narrative Review
ABSTRACT Increasing environmental complexity and uncertainty have made organizational resilience a key concern in public administration. Yet its inherent ambiguity calls for a systematic examination of its conceptualizations, operationalizations, and applications. This meta‐narrative review synthesizes 49 studies, advancing the discourse by identifying
Jixiang Li, Shui‐Yan Tang, Bo Wen
wiley +1 more source
An AI-Driven Model to Enhance Sustainability for the Detection of Cyber Threats in IoT Environments. [PDF]
Alsulami MH.
europepmc +1 more source
Balancing Digital Transformation and Modernization: Pathways for Public Managers
ABSTRACT This study examines the interplay between digital modernization and transformation in the public sector, challenging the notion that they are mutually exclusive strategies. Through interviews with public sector leaders, we find that modernization and transformation can be jointly implemented rather than managed as competing efforts.
Marc E. B. Picavet +4 more
wiley +1 more source
Near-Field Communication (NFC) Cyber Threats and Mitigation Solutions in Payment Transactions: A Review. [PDF]
Onumadu P, Abroshan H.
europepmc +1 more source
ABSTRACT Recent literature calls for scholars to bridge the divide that has emerged between criminology and regulation and governance. In the current work, we propose that criminological opportunity theories provide one fruitful pathway to that end.
Carole Gibbs +3 more
wiley +1 more source

