Results 131 to 140 of about 2,352,580 (365)
Framework for Network Topology Generation and Traffic Prediction Analytics for Cyber Exercises
Today’s cyber-attacks have become increasingly sophisticated and diverse, targeting systems that hold sensitive information, creating the need for continuous cyber exercise and skill development for cyber professionals.
Dong-Wook Kim +6 more
doaj +1 more source
ABSTRACT Strategies designed to revive the declining union movement require new resources and new members for success. For this, many unions often used closed or agency shops. We compare these with the now dominant open shop as well as the union default.
Mark Harcourt, Gregor Gall
wiley +1 more source
Susceptibility to Disinformation: A Data-Driven Typology Based on COVID-19 Hoaxes and Pro-Russian Propaganda. [PDF]
ABSTRACT An original dataset based on a national quota sample in the Czech Republic (n = 490, M = 46.09 y/o, 45.7% women) was used to assess susceptibility to medical (COVID‐19) and political (Russian invasion of Ukraine) disinformation. Susceptibility to disinformation was assessed using 30 items addressing contemporary topics.
Klicperova-Baker M, Jelinek M, Kveton P.
europepmc +2 more sources
Shortly after the article that follows was drafted, I was notified that I had been nominated for promotion to vice admiral and assignment as Superintendent of the U.S. Naval Academy.
Carter, Walter E. Ted, Jackson, John E.
core +1 more source
Police SWAT teams and Military Special Forces face mounting pressure and challenges from adversaries that can only be resolved by way of ever more sophisticated inputs into tactical operations.
Nyagudi, Nyagudi Musandu
core +3 more sources
Compassionate Digital Innovation: A Pluralistic Perspective and Research Agenda
ABSTRACT Digital innovation offers significant societal, economic and environmental benefits but is also a source of profound harms. Prior information systems (IS) research has often overlooked the ethical tensions involved, framing harms as ‘unintended consequences’ rather than symptoms of deeper systemic problems.
Raffaele F. Ciriello +5 more
wiley +1 more source
Resilient IT: Winning With People and Process
ABSTRACT In today's dynamic environment, IT organisations face numerous challenges from disruptions such as natural disasters, cybersecurity threats, international conflicts, evolving regulations, pandemics and recent global incidents such as the CrowdStrike outage.
Wesam Helou +2 more
wiley +1 more source
Thoughts about a General Theory of Influence in a DIME/PMESII/ASCOP/IRC2 Model [PDF]
The leading question of this paper is: “How would influence warfare (“iWar”) work and how can we simulate it?” The paper discusses foundational aspects of a theory and model of influence warfare by discussing a framework built along the DIME/PMESII/ASCOP
Kodalle, Thorsten +3 more
core

