Digital Identity Wallets: A Guide to the EU’s New Identity Model
ABSTRACT By 2026, the European Union will introduce digital identity wallets to its citizens, residents, and organisations. These wallets will have far‐reaching implications for how public and private sector organisations interact with their users—some evident, others less.
Andre Kudra +5 more
wiley +1 more source
Third-Party Access Cybersecurity Threats and Precautions: A Survey of Healthcare Delivery Organizations. [PDF]
Gellert GA +4 more
europepmc +1 more source
The Missing Link in Digital Transformation Leadership: Unpacking the Role of Knowledge
ABSTRACT Leading digital transformation (DT) is challenging due to the unforeseen hurdles that arise through the novelty of digital technologies and the broad scope of organisational change. Even those with a wealth of experience and skills may struggle to respond adequately to inherently novel situations.
Malmi Amadoru +2 more
wiley +1 more source
FedMedSecure: federated few-shot learning with cross-attention mechanisms and explainable AI for collaborative healthcare cybersecurity. [PDF]
Tawfik M +4 more
europepmc +1 more source
Risk Management in Commercial Banking Institutions: An Examination of the Cybersecurity Challenges for Commercial Banks in India: Recommendations for Guyana’s Banking Sector [PDF]
La donna Delon
openalex +1 more source
ABSTRACT The recent rise of Generative Artificial Intelligence (GenAI) is fundamentally changing the way businesses operate, with many now investing heavily in this technology. However, businesses are still exploring ways to extract value from GenAI and develop organisational capabilities.
Ashish Jagdish Sharma +4 more
wiley +1 more source
Cybersecure Intelligent Sensor Framework for Smart Buildings: AI-Based Intrusion Detection and Resilience Against IoT Attacks. [PDF]
Siam MA +6 more
europepmc +1 more source
Abstract The application of automated ground vehicles (AGVs) is well‐established in closed environments such as port terminals, while their operation in open areas remains challenging. In this work, we set out to overcome this limitation by introducing platooning as a transfer mode in heterogeneous vehicle networks.
Nadia Pourmohammad‐Zia +2 more
wiley +1 more source
An efficient federated learning based defense mechanism for software defined network cyber threats through machine learning models. [PDF]
Amin R +5 more
europepmc +1 more source
Supervisor experience and cybersecurity response in aviation organizations using a two-wave exploratory design. [PDF]
Mizrak F, Mizrak KC, Elbir U.
europepmc +1 more source

