Results 101 to 110 of about 164,979 (324)
The Government and Cybersecurity
We all realize that computer security is a serious problem. But who should solve it? More precisely, who should be responsible for coping with computer insecurity—governments or the private sector? To some extent, the answer depends on how we view the problem. This installment of ClearText aims to get to the bottom of it.
openaire +4 more sources
Cybersecurity by executive order [PDF]
This report explores the details of the Obama Administration\u27s executive order on cybersecurity, breaking down the challenges, criticisms, and successes of the effort to date, before offering clear lessons from the US experience that can be applied to
Klee Aiken
core
Major Conundrums and Possible Solutions in DeFi Insurance
ABSTRACT This paper empirically explores the early development of insurance projects in the decentralised finance (DeFi) industry, which is based on disruptive technologies like blockchain and smart contracts. A brief history of DeFi is narrated, stressing four risks of DeFi (volatility risk, cyberattack risk, liquidity risk, and regulation risk) and ...
Peng Zhou, Ying Zhang
wiley +1 more source
A Framework to Quantify the Quality of Source Code Obfuscation
Malicious reverse engineering of software has served as a valuable technique for attackers to infringe upon and steal intellectual property. We can employ obfuscation techniques to protect against such attackers as useful tools to safeguard software ...
Hongjoo Jin +4 more
doaj +1 more source
After decades of digitalization spreading into every area of our lives, with very little attention given to the aspects linked to cybersecurity, information technology (IT) had essentially become an “open bar” for cybercriminals. For a few years, with a marked degradation during the peak of the COVID-19 pandemic, the news has been rife with reports of ...
Zendra, Olivier, Coppens, Bart
openaire +1 more source
ABSTRACT This study investigates how Corporate Digital Transformation (CDT) influences audit opinions in Chinese A‐share‐listed non‐financial firms from 2011 to 2022, with a focus on the moderating role of Economic Policy Uncertainty (EPU). Results reveal an inverted U‐shaped relationship: moderate levels of CDT enhance audit outcomes through improved ...
He Min +2 more
wiley +1 more source
System Approach to Coherent Cybersecurity Strategy
Cyber-attacks affect not only our daily lives, but also national security by influencing elections, the economy, and communication. This article is an attempt to give an answer to the question included in the topic “How to build a coherent cybersecurity ...
Daniel MICHALSKI
doaj +1 more source
Although adopting cost‐effective technologies may reduce the negative effects of wind turbines on wildlife and help achieve both energy production and conservation goals, consensus is lacking among developers, regulators, and the conservation community regarding how to define technology effectiveness and acceptance and how to develop a standardized ...
Isabel Gottlieb +3 more
wiley +1 more source
A Primer on Cybersecurity for Physicians
N/a.
Filip De Meyer, Nathan Lea
openaire +4 more sources
Artificial intelligence agents in orthopaedics: Concepts, capabilities and the road ahead
Abstract Artificial intelligence (AI) is increasingly used in orthopaedics, yet current models are often limited to narrow, isolated tasks like analysing an X‐ray or predicting a single outcome. This paper introduces AI agents—a new class of AI systems designed to overcome these limitations. Unlike traditional AI, agents can autonomously manage complex,
Felix C. Oettl +9 more
wiley +1 more source

