Results 61 to 70 of about 26,063,590 (386)

Data Governance to Counter Hybrid Threats against Critical Infrastructures

open access: yesSmart Cities
Hybrid threats exploit vulnerabilities in digital infrastructures, posing significant challenges to democratic countries and the resilience of critical infrastructures (CIs).
Gabriel Pestana, S. Sofou
semanticscholar   +1 more source

Performative innovation: Data governance in China's fintech industries

open access: yesBig Data & Society, 2022
The financial applications of data technology have enabled the rise of Chinese fintech industries. As part of people's everyday lives, fintech apps have helped companies collect vast amounts of user data for business profit and social good.
Jing Wang
semanticscholar   +1 more source

Data Governance in International Neuroscience Research [PDF]

open access: yes, 2019
open access ...
Akintoye, Simisola   +5 more
core  

Unheard and Under‐Supported: Health‐Related Quality of Life in Children, Adolescents, and Young Adults With Sickle Cell Disease

open access: yesPediatric Blood &Cancer, EarlyView.
Abstract Background Sickle cell disease (SCD) is an autosomal recessive hemoglobinopathy affecting millions of individuals worldwide. The clinical expression and psychosocial burden of SCD vary widely across geographical, cultural, and healthcare system contexts, underscoring the need for setting‐specific approaches to assessment.
Desiré Fantasia   +7 more
wiley   +1 more source

Analysis of Multivariate Indoor Building Data: A Comparative Study of Time-Series Clustering Methods

open access: yesIEEE Access
Clustering multivariate time-series data is crucial for uncovering complex temporal patterns in dynamic environments, such as building indoor conditions and behavior where variables like temperature, humidity, and CO2 concentration evolve simultaneously.
Quoc-Dung Ngo, Ly-Huynh Phan
doaj   +1 more source

A comparative analysis of data governance: Socio-technical imaginaries of digital personal data in the USA and EU (2008–2016)

open access: yesBig Data & Society, 2022
Personal data are produced through our daily interactions with digital technologies like search engines, social media, and online shopping, and is often referred to as our “digital exhaust.” It has been characterized as the key resource or asset for our ...
Robert Guay, K. Birch
semanticscholar   +1 more source

Imaging of High‐Risk Neuroblastoma: Recommendations From SIOPEN Radiology and Nuclear Medicine Specialty Committees

open access: yesPediatric Blood &Cancer, EarlyView.
ABSTRACT Neuroblastoma is the most common extracranial solid tumor in early childhood. Its clinical behavior is highly variable, ranging from spontaneous regression to fatal outcome despite intensive treatment. The International Society of Pediatric Oncology Europe Neuroblastoma Group (SIOPEN) Radiology and Nuclear Medicine Specialty Committees ...
Annemieke Littooij   +11 more
wiley   +1 more source

AI ethics and data governance in the geospatial domain of Digital Earth

open access: yesBig Data & Society, 2022
Digital Earth applications provide a common ground for visualizing, simulating, and modeling real-world situations. The potential of Digital Earth applications has increased significantly with the evolution of artificial intelligence systems and the ...
Marina Micheli   +12 more
semanticscholar   +1 more source

Exploring Preferences for a Digital Single‐Session Intervention for Adolescent Siblings of Youth With Cancer

open access: yesPediatric Blood &Cancer, EarlyView.
ABSTRACT Introduction Adolescent siblings of children with cancer are at elevated risk for psychosocial problems. Unfortunately, various barriers such as limited family time and resources, conflicting schedules, and psychosocial staffing constraints at cancer centers hinder sibling access to support.
Christina M. Amaro   +10 more
wiley   +1 more source

From .com to .gov: The internet’s inevitable nationalist turn

open access: yesInternet Policy Review
This essay examines Iran’s most extensive internet disruption since 2022, imposed during the June 2025 conflict with Israel, when missile strikes quickly evolved into coordinated cyberattacks on banking, radar, and communications systems.
Imad Payande, Hadyeh Charkameh
doaj   +1 more source

Home - About - Disclaimer - Privacy