Results 131 to 140 of about 181,953 (301)
ABSTRACT The last few years have seen a reemergence in the awareness of virtual worlds among practitioners and academics. Driven by tech giants' investments, the Metaverse is considered by some as an unprecedented revolutionary technology with the potential to unlock an entire gamut of new unexplored opportunities for both companies and individuals ...
Giulio Ferrigno +2 more
wiley +1 more source
AI as a Strategic Driver in Foreign Direct Investment Flows: Evidence of OECD Countries
ABSTRACT This study examines how AI‐related capabilities and institutional signals shape foreign direct investment (FDI) inward and outward flows in OECD countries. Drawing on Dunning's OLI paradigm and North's Institutional Theory, the paper investigates whether AI Patent Grants, Newly Funded AI Firms and Mentions of AI in Legislative Proceedings ...
Dafni Grigoriadi
wiley +1 more source
Uses and misuses of Bayes’ rule and Bayesian classifiers in cybersecurity [PDF]
Gregory V. Bard
openalex +1 more source
ABSTRACT Small and medium‐sized enterprises (SMEs) face significant institutional barriers when expanding across borders, including regulatory constraints, financial accessibility issues, and market entry challenges. Institutional theory provides a useful framework for understanding how external regulative, normative, and cognitive institutional forces
Sharmin Nahar, Muntasir Alam
wiley +1 more source
The Role of Machine Learning in Cybersecurity [PDF]
Giovanni Apruzzese +6 more
openalex +1 more source
Abstract Internet of Medical Things (IoMT) has typical advancements in the healthcare sector with rapid potential proof for decentralised communication systems that have been applied for collecting and monitoring COVID‐19 patient data. Machine Learning algorithms typically use the risk score of each patient based on risk factors, which could help ...
Chandramohan Dhasaratha +9 more
wiley +1 more source
Organizational information system users (OISUs) that are open to cyber threats vectors are contributing to major financial and information losses for individuals, businesses, and governments.
Richard K. Nilsen +3 more
doaj
Deviation‐Guided Attention for Semi‐Supervised Anomaly Detection With Contrastive Regularisation
ABSTRACT Anomaly detection (AD) aims to identify abnormal patterns that deviate from normal behaviour, playing a critical role in applications such as industrial inspection, medical imaging and autonomous driving. However, AD often faces a scarcity of labelled data. To address this challenge, we propose a novel semi‐supervised anomaly detection method,
Guanglei Xie +6 more
wiley +1 more source
Adaptive Cybersecurity Architecture for Digital Product Ecosystems Using Agentic AI [PDF]
Oluwakemi Temitope Olayinka +2 more
openalex +1 more source
ABSTRACT Networked control systems (NCSs) often suffer from performance degradation due to limited communication bandwidth, which can cause data transmission conflicts and packet loss. Existing scheduling strategies may fail to simultaneously meet the real‐time requirements and the importance of multisensor data, and they are particularly vulnerable ...
Da Chen +5 more
wiley +1 more source

