Results 151 to 160 of about 196,474 (374)

Cybersecurity needs women [PDF]

open access: yesNature, 2018
Safeguarding our lives online requires skills and experiences that lie beyond masculine stereotypes of the hacker and soldier, says Winifred R. Poster. Safeguarding our lives online requires skills and experiences that lie beyond masculine stereotypes of the hacker and soldier, says Winifred R. Poster.
openaire   +4 more sources

Cybersecurity’s Role in Environmental Protection and Sustainable Development: Bridging Technology and Sustainability Goals

open access: yesComputer Science & IT Research Journal
This study investigates the pivotal role of cybersecurity in bolstering environmental protection and sustainable development, a critical yet underexplored nexus in contemporary research.
Scholar Chinenye Obasi   +3 more
semanticscholar   +1 more source

Expert Consensus‐Based Technical Guidelines for Remote Robotic‐Assisted Surgery and Procedures

open access: yesWorld Journal of Surgery, EarlyView.
Remote robotic‐assisted surgery and procedures offer significant potential to enhance access to surgical expertise, optimize patient outcomes, improve healthcare efficiency, reduce costs, and increase patient and provider satisfaction, aligning with the quintuple aim.
Yulun Wang   +9 more
wiley   +1 more source

Digital transformation in SMEs: Identifying cybersecurity risks and developing effective mitigation strategies

open access: yesGlobal Journal of Engineering and Technology Advances
This study delves into the cybersecurity landscape for small and medium-sized enterprises (SMEs), focusing on identifying prevalent cybersecurity risks, evaluating existing mitigation strategies, and exploring the role of innovation and technology in ...
Lucky Bamidele   +5 more
semanticscholar   +1 more source

Artificial intelligence for cybersecurity: Literature review and future research directions

open access: yesInformation Fusion, 2023
Ramanpreet Kaur   +2 more
semanticscholar   +1 more source

Cybersecurity for Sustainable Smart Healthcare: State of the Art, Taxonomy, Mechanisms, and Essential Roles

open access: yesMesopotamian Journal of CyberSecurity
Cutting-edge technologies have been widely employed in healthcare delivery, resulting in transformative advances and promising enhanced patient care, operational efficiency, and resource usage.
Guma Ali, Maad M. Mijwil
semanticscholar   +1 more source

Data privacy model using blockchain reinforcement federated learning approach for scalable internet of medical things

open access: yesCAAI Transactions on Intelligence Technology, EarlyView.
Abstract Internet of Medical Things (IoMT) has typical advancements in the healthcare sector with rapid potential proof for decentralised communication systems that have been applied for collecting and monitoring COVID‐19 patient data. Machine Learning algorithms typically use the risk score of each patient based on risk factors, which could help ...
Chandramohan Dhasaratha   +9 more
wiley   +1 more source

Local Government Cybersecurity Landscape: A Systematic Review and Conceptual Framework

open access: yesApplied Sciences
Local governments face critical challenges in the era of digital transformation, balancing the responsibility of safeguarding resident information and administrative documents while maintaining data integrity and public trust.
Sk Tahsin Hossain   +3 more
semanticscholar   +1 more source

Home - About - Disclaimer - Privacy