Results 11 to 20 of about 5,305 (181)

Artificial intelligence: An eye cast towards the mental health nursing horizon

open access: yesInternational Journal of Mental Health Nursing, Volume 32, Issue 3, Page 938-944, June 2023., 2023
Abstract There has been an international surge towards online, digital, and telehealth mental health services, further amplified during COVID‐19. Implementation and integration of technological innovations, including artificial intelligence (AI), have increased with the intention to improve clinical, governance, and administrative decision‐making ...
Rhonda L. Wilson   +10 more
wiley   +1 more source

Cybersecurity’s grammars: A more‐than‐human geopolitics of computation

open access: yesArea, Volume 55, Issue 1, Page 10-17, March 2023., 2023
Abstract On one June afternoon in 2017, during an autoethnography of a malware analysis and detection laboratory, NotPetya quickly caused destruction. This malware has since been characterised as a key geopolitical event in cybersecurity, causing billions of dollars in damage as it rendered inoperable computers across the world.
Andrew C. Dwyer
wiley   +1 more source

Towards an Improved Taxonomy of Attacks Related to Digital Identities and Identity Management Systems

open access: yesSecurity and Communication Networks, Volume 2023, Issue 1, 2023., 2023
Digital transformation with the adoption of cloud technologies, outsourcing, and working‐from‐home possibilities permits flexibility for organizations and persons. At the same time, it makes it more difficult to secure the IT infrastructure as the IT team needs to keep track of who is accessing what data from where and when on which device.
Daniela Pöhn   +2 more
wiley   +1 more source

Identifying Key Relationships between Nation‐State Cyberattacks and Geopolitical and Economic Factors: A Model

open access: yesSecurity and Communication Networks, Volume 2022, Issue 1, 2022., 2022
Nation‐state cyberattacks, and particularly Advanced Persistent Threats (APTs), have rocketed in the last years. Their use may be aligned with nation‐state geopolitical and economic (GPE) interests, which are key for the underlying international relations (IRs). However, the interdependency between APTs and GPE (and thus IRs) has not been characterized
Lorena González-Manzano   +5 more
wiley   +1 more source

[Retracted] Fast Modelling Algorithm for Realistic Three‐Dimensional Human Face for Film and Television Animation

open access: yesComplexity, Volume 2021, Issue 1, 2021., 2021
Aiming at the face photos of film and television animation, this paper proposes a new fast three‐dimensional (3D) face modelling algorithm. First of all, based on the LBF algorithm, this paper proposes a multifeature selection idea to automatically detect multiple features of the face. Secondly, in order to solve the shortcomings of slow training speed
Limin Xu, Zhihan Lv
wiley   +1 more source

MalSEIRS: Forecasting Malware Spread Based on Compartmental Models in Epidemiology

open access: yesComplexity, Volume 2021, Issue 1, 2021., 2021
Over the last few decades, the Internet has brought about a myriad of benefits to almost every aspect of our daily lives. However, malware attacks have also widely proliferated, mainly aiming at legitimate network users, resulting in millions of dollars in damages if proper protection and response measures are not settled and enforced. In this context,
Isabella Martínez Martínez   +5 more
wiley   +1 more source

An Adaptive Protection of Flooding Attacks Model for Complex Network Environments

open access: yesSecurity and Communication Networks, Volume 2021, Issue 1, 2021., 2021
Currently, online organizational resources and assets are potential targets of several types of attack, the most common being flooding attacks. We consider the Distributed Denial of Service (DDoS) as the most dangerous type of flooding attack that could target those resources.
Bashar Ahmad Khalaf   +9 more
wiley   +1 more source

The Myth of Cyberwar: Bringing War in Cyberspace Back Down to Earth [PDF]

open access: yes, 2013
Cyberwar has been described as a revolution in military affairs, a transformation of technology and doctrine capable of overturning the prevailing world order.
Clark David D.   +8 more
core   +1 more source

Cyber conflict in the light of article 5 of the North Atlantic treaty

open access: yesІсторико-політичні проблеми сучасного світу, 2019
The rapid development of technology and hence also the cybernetic sphere, including the associat-ed difficulties in defining it, as well as the occurrences within it and the lack of upholding legal regula-tions and too little awareness in public and ...
Сильвія Лещук
doaj   +1 more source

Cybersecurity Research Meets Science and Technology Studies

open access: yesPolitics and Governance, 2018
This article sets out to show how different understandings of technology as suggested by Science and Technology Studies (STS) help reveal different political facets of cybersecurity.
Myriam Dunn Cavelty
doaj   +1 more source

Home - About - Disclaimer - Privacy