Results 161 to 170 of about 96,539 (341)
Editorial: Ethical challenges in AI-enhanced military operations. [PDF]
Helkala KM, Lucas G, Barrett E, Syse H.
europepmc +1 more source
Major Cybersecurity Breaches: Shaping Corporate Cybersecurity Policies and Closing the Gaps
ABSTRACT As digitalization accelerates, cybercrime has intensified in both scale and impact over the past two decades. This study aims to critically examine major cybersecurity events, assess them through the lens of routine activity theory, examine insight from three other established criminological and organizational theories, and address central ...
Laura K. Rickett, Deborah Smith
wiley +1 more source
The national security argument for protection of domestic industries
Tracing the origin of the national security argument for protection of domestic industries to Adam Smith, Alexander Hamilton, and Friedrich List, we study its post-GATT applications with reference to Article XXI of the WTO.
CHENG, Kwok Hon, Leonard +2 more
core
Abstract Background Victimisation has been associated with self‐harm (with or without suicidal intent), but little is known about this association during young adulthood—a distinct developmental period. Further, not all individuals who experience victimisation will later engage in self‐harm, suggesting the influence of other factors.
Filip Marzecki +8 more
wiley +1 more source
ABSTRACT This article investigates the impact of coerced AI adoption on the psychological well‐being of academic staff within higher education institutions. Data were collected from a sample of 470 faculty members randomly selected from higher education institutions in Pakistan.
Muhammad Imran Qureshi +3 more
wiley +1 more source
Strategies and Process of Trade Secret Misappropriation Mitigation: The Case of UK
ABSTRACT Trade Secrets (TS) are vital for innovation‐driven companies, and their loss can inflict significant financial and reputational damage, particularly in the absence of established policies to mitigate misappropriation in the UK. The current academic literature lacks detailed strategies for firms to effectively address these threats.
Oleksandra Ozcan, David Pickernell
wiley +1 more source
Synonym‐based multi‐keyword ranked search with secure k‐NN in 6G network
Abstract Sixth Generation (6G) integrates the next generation communication systems such as maritime, terrestrial, and aerial to offer robust network and massive device connectivity with ultra‐low latency requirement. The cutting edge technologies such as artificial intelligence, quantum machine learning, and millimetre enable hyper‐connectivity to ...
Deebak Bakkiam David, Fadi Al‐Turjman
wiley +1 more source
Greater reactivity to stressors as an indicator of service utilization and need in veteran women with sexual assault histories. [PDF]
Metts A +5 more
europepmc +1 more source

