Results 161 to 170 of about 181,953 (301)
Sanctions, National Security, and Free Speech
ABSTRACT A fundamental, but largely overlooked, aspect of the New Washington Consensus is the use of national security arguments to restrict speech and punish disfavored speakers. Although the United States has a longer history of using sanctions to restrict speech in the terrorism context, it has recently applied sanctions to restrict political speech,
Joshua Andresen
wiley +1 more source
Transparent and trustworthy CyberSecurity: an XAI-integrated big data framework for phishing attack detection. [PDF]
Nauman M +4 more
europepmc +1 more source
Lithuanian case study on cybersecurity technology and information transfer
INFOBALT
openalex +1 more source
Tales of Cyberspace and Artificial Intelligence: Diverging Stakeholderships?
ABSTRACT This article traces the evolution of the Internet from the 1990s to the 2020s and compares it with the development of Artificial Intelligence (AI), particularly following the public launch of ChatGPT in late 2022. It identifies both parallels and divergencies between these two overlapping technological domains, focusing on the growing ...
Johan Eriksson, Giampiero Giacomello
wiley +1 more source
Abstract The COVID‐19 pandemic in 2020–2021 has created an unprecedented incentive to digitize firms. This paper aims to explore how European companies may have responded to COVID‐19 through digitalization. An online survey of experts from 22 European countries showed that software technologies supporting online meetings, remote working and e‐commerce ...
Wojciech Dyba, Eleonora Di Maria
wiley +1 more source
ChatNVD: Advancing Cybersecurity Vulnerability Assessment with Large Language Models [PDF]
Sidhant Chopra +3 more
openalex +1 more source
ABSTRACT This empirically grounded commentary explores the impacts of the COVID‐19 pandemic on the strategic direction of Canada's accounting profession and highlights opportunities and challenges that lie ahead in the post‐pandemic era. We undertake a systematic literature review using deductive and inductive approaches within both the academic ...
Merridee Bujaki +4 more
wiley +1 more source
AI-Driven Cybersecurity in IoT-Based Systems. [PDF]
Zhao W, Wang P.
europepmc +1 more source
Cyber-Vulnerabilities & Public Health Emergency Response [PDF]
Cashwell, Glyn
core +1 more source

