Results 131 to 140 of about 181,953 (301)

Not All That Glitters Is Gold! The Brokerage Role of Consulting Companies in Disseminating Information to Overcome the Barriers to Metaverse Adoption

open access: yesThunderbird International Business Review, EarlyView.
ABSTRACT The last few years have seen a reemergence in the awareness of virtual worlds among practitioners and academics. Driven by tech giants' investments, the Metaverse is considered by some as an unprecedented revolutionary technology with the potential to unlock an entire gamut of new unexplored opportunities for both companies and individuals ...
Giulio Ferrigno   +2 more
wiley   +1 more source

AI as a Strategic Driver in Foreign Direct Investment Flows: Evidence of OECD Countries

open access: yesThunderbird International Business Review, EarlyView.
ABSTRACT This study examines how AI‐related capabilities and institutional signals shape foreign direct investment (FDI) inward and outward flows in OECD countries. Drawing on Dunning's OLI paradigm and North's Institutional Theory, the paper investigates whether AI Patent Grants, Newly Funded AI Firms and Mentions of AI in Legislative Proceedings ...
Dafni Grigoriadi
wiley   +1 more source

Technology‐Enabled Cross‐Border Entrepreneurship: The Role of Digital Platforms in SME Expansion Through the Lens of Institutional Theory

open access: yesThunderbird International Business Review, EarlyView.
ABSTRACT Small and medium‐sized enterprises (SMEs) face significant institutional barriers when expanding across borders, including regulatory constraints, financial accessibility issues, and market entry challenges. Institutional theory provides a useful framework for understanding how external regulative, normative, and cognitive institutional forces
Sharmin Nahar, Muntasir Alam
wiley   +1 more source

The Role of Machine Learning in Cybersecurity [PDF]

open access: diamond, 2022
Giovanni Apruzzese   +6 more
openalex   +1 more source

Data privacy model using blockchain reinforcement federated learning approach for scalable internet of medical things

open access: yesCAAI Transactions on Intelligence Technology, EarlyView.
Abstract Internet of Medical Things (IoMT) has typical advancements in the healthcare sector with rapid potential proof for decentralised communication systems that have been applied for collecting and monitoring COVID‐19 patient data. Machine Learning algorithms typically use the risk score of each patient based on risk factors, which could help ...
Chandramohan Dhasaratha   +9 more
wiley   +1 more source

A Developmental Study on Assessing the Cybersecurity Competency of Organizational Information System Users

open access: yesJournal of Cybersecurity Education, Research & Practice, 2017
Organizational information system users (OISUs) that are open to cyber threats vectors are contributing to major financial and information losses for individuals, businesses, and governments.
Richard K. Nilsen   +3 more
doaj  

Deviation‐Guided Attention for Semi‐Supervised Anomaly Detection With Contrastive Regularisation

open access: yesCAAI Transactions on Intelligence Technology, EarlyView.
ABSTRACT Anomaly detection (AD) aims to identify abnormal patterns that deviate from normal behaviour, playing a critical role in applications such as industrial inspection, medical imaging and autonomous driving. However, AD often faces a scarcity of labelled data. To address this challenge, we propose a novel semi‐supervised anomaly detection method,
Guanglei Xie   +6 more
wiley   +1 more source

Dynamic Resource Allocation Optimisation and Security‐Resilient Control for Bandwidth‐Limited Network Control Systems With Data Conflicts

open access: yesCAAI Transactions on Intelligence Technology, EarlyView.
ABSTRACT Networked control systems (NCSs) often suffer from performance degradation due to limited communication bandwidth, which can cause data transmission conflicts and packet loss. Existing scheduling strategies may fail to simultaneously meet the real‐time requirements and the importance of multisensor data, and they are particularly vulnerable ...
Da Chen   +5 more
wiley   +1 more source

Home - About - Disclaimer - Privacy