Results 71 to 80 of about 20,005 (219)
How artificial intelligence (AI) and digital twin (DT) technologies are revolutionizing tunnel surveillance, offering proactive maintenance strategies and enhanced safety protocols. It explores AI's analytical power and DT's virtual replicas of infrastructure, emphasizing their role in optimizing maintenance and safety in tunnel management.
Mohammad Afrazi +4 more
wiley +1 more source
A new energy paradigm assisted by AI. ABSTRACT The tremendous penetration of renewable energy sources and the integration of power electronics components increase the complexity of the operation and power system control. The advancements in Artificial Intelligence and machine learning have demonstrated proficiency in processing tasks requiring ...
Balasundaram Bharaneedharan +4 more
wiley +1 more source
System Approach to Coherent Cybersecurity Strategy
Cyber-attacks affect not only our daily lives, but also national security by influencing elections, the economy, and communication. This article is an attempt to give an answer to the question included in the topic “How to build a coherent cybersecurity ...
Daniel MICHALSKI
doaj +1 more source
ABSTRACT Big data and financial innovations are vital to enhancing the performance of banking institutions. However, limited evidence exists on the effects of big data applications and financial innovation on bank performance. This study addresses this gap by constructing a theoretical framework linking big data applications and financial innovations ...
Mandella Osei‐Assibey Bonsu +1 more
wiley +1 more source
ABSTRACT This study aims to classify pivotal fintech innovations and explore the prospects and pitfalls associated with emerging fintech services extensively discussed in the literature. We conducted a multistage systematic review of research published on fintech over the past decade from a technological perspective. Using the Preferred Reporting Items
Muhammad Imran Qureshi, Nohman Khan
wiley +1 more source
Reports produced by popular malware analysis services showed a disparity in samples available for different malware families. The unequal distribution between such classes can be attributed to several factors, such as technological advances and the ...
Antonio Coscia +3 more
doaj +1 more source
Enacting Expertise: Ritual and Risk in Cybersecurity
This article applies the concept of ritual to cybersecurity expertise, beginning with the cybersecurity “skills gap”: the perceived lack of suitably qualified professionals necessary to tackle contemporary cybersecurity challenges.
James Shires
doaj +1 more source
ABSTRACT This study investigates how Corporate Digital Transformation (CDT) influences audit opinions in Chinese A‐share‐listed non‐financial firms from 2011 to 2022, with a focus on the moderating role of Economic Policy Uncertainty (EPU). Results reveal an inverted U‐shaped relationship: moderate levels of CDT enhance audit outcomes through improved ...
He Min +2 more
wiley +1 more source
Major Cybersecurity Breaches: Shaping Corporate Cybersecurity Policies and Closing the Gaps
ABSTRACT As digitalization accelerates, cybercrime has intensified in both scale and impact over the past two decades. This study aims to critically examine major cybersecurity events, assess them through the lens of routine activity theory, examine insight from three other established criminological and organizational theories, and address central ...
Laura K. Rickett, Deborah Smith
wiley +1 more source
A Framework to Quantify the Quality of Source Code Obfuscation
Malicious reverse engineering of software has served as a valuable technique for attackers to infringe upon and steal intellectual property. We can employ obfuscation techniques to protect against such attackers as useful tools to safeguard software ...
Hongjoo Jin +4 more
doaj +1 more source

