ACO-tuned randomized decision tree for detecting cyber threats in mobile web applications. [PDF]
Aljohani A.
europepmc +1 more source
ABSTRACT Rooted in the theoretical perspective of impression management, and drawing on the critical discourse analysis (CDA) approach, this study analyzes whether and how the Italian state‐owned enterprises (SOEs) in the energy sector over the period 2020–2023 use persuasive language strategies in their annual reports to portray the image of a ...
Fiorenza Meucci +3 more
wiley +1 more source
Human Capital 4.0: Readiness of Initial Vocational Education Programmes in Italy and Germany
ABSTRACT The rapid pace of technological innovation and the advent of Industry 4.0 have profoundly transformed labour markets and the nature of work. This paper examines the preparedness of Initial Vocational Education and Training (IVET) programmes in Germany and Italy to meet the demands of Human Capital 4.0. Utilising a comparative analysis of three
Luca Antonazzo, Susanne Peters
wiley +1 more source
Incident-aware smart prioritization framework for penetration testing and prevention of URL-based cybersecurity attacks in industry 4.0 IoT networks. [PDF]
Nurlan Z +7 more
europepmc +1 more source
Digital Identity Wallets: A Guide to the EU’s New Identity Model
ABSTRACT By 2026, the European Union will introduce digital identity wallets to its citizens, residents, and organisations. These wallets will have far‐reaching implications for how public and private sector organisations interact with their users—some evident, others less.
Andre Kudra +5 more
wiley +1 more source
Artificial Intelligence in African Cardiovascular Care: Opportunities, Challenges, and Pathways to Improved Outcomes. [PDF]
Fatokun BS +7 more
europepmc +1 more source
ABSTRACT The recent rise of Generative Artificial Intelligence (GenAI) is fundamentally changing the way businesses operate, with many now investing heavily in this technology. However, businesses are still exploring ways to extract value from GenAI and develop organisational capabilities.
Ashish Jagdish Sharma +4 more
wiley +1 more source
Towards Optimal Sensor Placement for Cybersecurity: An Extensible Model for Defensive Cybersecurity Sensor Placement Evaluation. [PDF]
Wagner N, Damodaran SK, Reavey M.
europepmc +1 more source
From Open Banking Regulation to Platform Orchestration: The Evolution of Digital Platform Governance
ABSTRACT This study contributes to information systems (IS) scholarship by extending platform governance theory to regulatory contexts, explaining how regulatory forces co‐evolve with technological architectures to shape openness and control. This research examines the evolution of platform governance in the context of open banking, where regulatory ...
Priyadharshini Muthukannan +3 more
wiley +1 more source
Assessment of cybersecurity awareness among healthcare professionals. A cross sectional study. [PDF]
Moothedath M +5 more
europepmc +1 more source

