Results 51 to 60 of about 142,803 (291)

Is the well‐known phrase ‘small is beautiful’ true of small transnational education institutions?

open access: yesBritish Educational Research Journal, EarlyView.
Abstract The purpose of this research is to consider the potential attractiveness of operating a small international branch campus (IBC). Drawing upon resource‐based and legitimacy theories, we examine the strengths, weaknesses, opportunities and threats associated with the business model that is based on having a small institution size.
Stephen Wilkins, Joe Hazzam
wiley   +1 more source

Cyber Threats Against the North Atlantic Treaty Organization (NATO) and Selected Responses

open access: yesİstanbul Gelişim Üniversitesi Sosyal Bilimler Dergisi, 2014
This article focuses on the disparate cyber threats against the North Atlantic Treaty Organization (NATO), its members, and selected NATO responses to such perils.
Dean Alexander
doaj   +1 more source

Active Cyber Defense Dynamics Exhibiting Rich Phenomena [PDF]

open access: yes, 2016
The Internet is a man-made complex system under constant attacks (e.g., Advanced Persistent Threats and malwares). It is therefore important to understand the phenomena that can be induced by the interaction between cyber attacks and cyber defenses.
Lu, Wenlian, Xu, Shouhuai, Zheng, Ren
core  

Corporate Decarbonization via Technology and Management

open access: yesBusiness Strategy and the Environment, EarlyView.
ABSTRACT This study provides a comprehensive overview of key findings on decarbonization, advanced technologies, and management strategies, highlighting emerging themes shaping the field. Advanced technologies enhance carbon reduction through efficiency, real‐time monitoring, and optimizing resource optimization.
Heidy Montero‐Teran   +2 more
wiley   +1 more source

Internet of Things Meet Internet of Threats: New Concern Cyber Security Issues of Critical Cyber Infrastructure

open access: yesApplied Sciences, 2021
As a new area of technology, the Internet of Things (IoT) is a flagship and promising paradigm for innovating society. However, IoT-based critical infrastructures are an appealing target for cybercriminals.
Amir Djenna   +2 more
doaj   +1 more source

Your employees: the front line in cyber security [PDF]

open access: yes, 2016
First published in The Chemical Engineer and reproduced by Crest - Centre for Research and Evidence on Security Threats, 26/01/2016 (https://crestresearch.ac.uk/comment/employees-front-line-cyber-security/
Ashenden, D
core  

ESG Decoupling Phenomenon: A Systematic and Bibliometric Analysis

open access: yesBusiness Strategy and the Environment, EarlyView.
ABSTRACT ESG decoupling, defined as the gap between a firm's ESG disclosures and its actual practices, poses a critical challenge to corporate sustainability. Using the PRISMA protocol, 451 articles were selected for a comprehensive bibliometric and systematic literature review to map the intellectual structure and thematic evolution of the research on
Maryam Laeeq   +2 more
wiley   +1 more source

Artificial Intelligence–Driven and Digital Practices for Circular Business and Finance: Insights for Advancing Hubs for Circularity

open access: yesBusiness Strategy and the Environment, EarlyView.
ABSTRACT The emerging concept of Hubs for Circularity (H4Cs) presents an opportunity to create collaborative, self‐sustaining regional industrial ecosystems that drive circular economy transitions at scale. However, the operationalisation of H4Cs faces financial, organisational and data‐driven challenges.
Aditya Tripathi   +3 more
wiley   +1 more source

Building Cyber Resilience: Key Factors for Enhancing Organizational Cyber Security

open access: yesJournal of Informatics and Web Engineering, 2023
The increasingly pervasive influence of technology on a global scale, coupled with the accelerating pace of organizations operating in cyberspace, has intensified the need for adequate protection against the risks posed by cyber threats. This paper aims
Thavaselvi Munusamy, Touraj Khodadi
doaj   +1 more source

Real‐time monitoring of tunnel structures using digital twin and artificial intelligence: A short overview

open access: yesDeep Underground Science and Engineering, EarlyView.
How artificial intelligence (AI) and digital twin (DT) technologies are revolutionizing tunnel surveillance, offering proactive maintenance strategies and enhanced safety protocols. It explores AI's analytical power and DT's virtual replicas of infrastructure, emphasizing their role in optimizing maintenance and safety in tunnel management.
Mohammad Afrazi   +4 more
wiley   +1 more source

Home - About - Disclaimer - Privacy