Results 101 to 110 of about 181,953 (301)

Crisis Preparation, Capacity Building, and Community Resilience: Lessons From Maui

open access: yesNonprofit Management and Leadership, EarlyView.
ABSTRACT The 2023 Maui wildfires provide a unique context to explore the impact of nonprofit crisis networks taking a proactive role in community crisis response, leveraging resources, expertise, and networks. The Hawaiʻi Community Foundation (HCF) has been a key player in Maui's local response, providing critical support, mobilizing volunteers, and ...
Lauren Azevedo   +3 more
wiley   +1 more source

Two-Stage Botnet Detection Method Based on Feature Selection for Industrial Internet of Things

open access: yesIET Information Security
Industrial control systems (ICSs) increasingly leverage the industrial internet of things (IIoTs) for sensor-based automation, enhancing operational efficiency.
Jian Shu, Jiazhong Lu
doaj   +1 more source

Cybersecurity by executive order [PDF]

open access: yes
This report explores the details of the Obama Administration\u27s executive order on cybersecurity, breaking down the challenges, criticisms, and successes of the effort to date, before offering clear lessons from the US experience that can be applied to
Klee Aiken
core  

Reflections on Comparative Teaching in Public Administration

open access: yesPublic Administration and Development, EarlyView.
ABSTRACT This article integrates our scholarly experience of teaching comparative public administration. In doing so, we offer a unique perspective as the co‐authors carry several diverse attributes, among them their countries of origin, current country in which they are teaching, and their academic experience.
Kim Moloney   +6 more
wiley   +1 more source

A Framework to Quantify the Quality of Source Code Obfuscation

open access: yesApplied Sciences
Malicious reverse engineering of software has served as a valuable technique for attackers to infringe upon and steal intellectual property. We can employ obfuscation techniques to protect against such attackers as useful tools to safeguard software ...
Hongjoo Jin   +4 more
doaj   +1 more source

CYBERSECURITY ENGINEERING: THE GROWING NEED

open access: diamond, 2020
Jennifer Callen   +6 more
openalex   +1 more source

Why Autonomous Vehicles Are Not Ready Yet: A Multi‐Disciplinary Review of Problems, Attempted Solutions, and Future Directions

open access: yesJournal of Field Robotics, EarlyView.
ABSTRACT Personal autonomous vehicles can sense their surrounding environment, plan their route, and drive with little or no involvement of human drivers. Despite the latest technological advancements and the hopeful announcements made by leading entrepreneurs, to date no personal vehicle is approved for road circulation in a “fully” or “semi ...
Xingshuai Dong   +13 more
wiley   +1 more source

Preparing millennials as digital citizens and socially and environmentally responsible business professionals in a socially irresponsible climate [PDF]

open access: yes, 2018
As of 2015, a millennial born in the 1990's became the largest population in the workplace and are still growing. Studies indicate that a millennial is tech savvy but lag in the exercise of digital responsibility.
Burgess-Wilkerson, Barbara   +3 more
core   +2 more sources

Trends and Challenges of Sustainable Rural Tourism in the Face of Artificial Intelligence: A Bibliometric Analysis

open access: yesSustainable Development, EarlyView.
ABSTRACT This study explores the development of sustainable rural tourism through a multidisciplinary approach, integrating economic, technological, and environmental perspectives. It aims to analyze research trends, key contributors, and the role of artificial intelligence (AI) in shaping the future of rural tourism.
Ana M. Sánchez‐Sánchez   +2 more
wiley   +1 more source

Home - About - Disclaimer - Privacy