Results 131 to 140 of about 2,352,580 (365)

Framework for Network Topology Generation and Traffic Prediction Analytics for Cyber Exercises

open access: yesIEEE Access
Today’s cyber-attacks have become increasingly sophisticated and diverse, targeting systems that hold sensitive information, creating the need for continuous cyber exercise and skill development for cyber professionals.
Dong-Wook Kim   +6 more
doaj   +1 more source

The Open Shop, Closed Shop, Agency Shop, and Union Default in Comparative Perspective: Members, Resources, and Individual Autonomy

open access: yesIndustrial Relations Journal, EarlyView.
ABSTRACT Strategies designed to revive the declining union movement require new resources and new members for success. For this, many unions often used closed or agency shops. We compare these with the now dominant open shop as well as the union default.
Mark Harcourt, Gregor Gall
wiley   +1 more source

Susceptibility to Disinformation: A Data-Driven Typology Based on COVID-19 Hoaxes and Pro-Russian Propaganda. [PDF]

open access: yesInt J Psychol
ABSTRACT An original dataset based on a national quota sample in the Czech Republic (n = 490, M = 46.09 y/o, 45.7% women) was used to assess susceptibility to medical (COVID‐19) and political (Russian invasion of Ukraine) disinformation. Susceptibility to disinformation was assessed using 30 items addressing contemporary topics.
Klicperova-Baker M, Jelinek M, Kveton P.
europepmc   +2 more sources

Navy Nexus [PDF]

open access: yes, 2014
Shortly after the article that follows was drafted, I was notified that I had been nominated for promotion to vice admiral and assignment as Superintendent of the U.S. Naval Academy.
Carter, Walter E. Ted, Jackson, John E.
core   +1 more source

Post-Westgate SWAT : C4ISTAR Architectural Framework for Autonomous Network Integrated Multifaceted Warfighting Solutions Version 1.0 : A Peer-Reviewed Monograph

open access: yes, 2013
Police SWAT teams and Military Special Forces face mounting pressure and challenges from adversaries that can only be resolved by way of ever more sophisticated inputs into tactical operations.
Nyagudi, Nyagudi Musandu
core   +3 more sources

Compassionate Digital Innovation: A Pluralistic Perspective and Research Agenda

open access: yesInformation Systems Journal, EarlyView.
ABSTRACT Digital innovation offers significant societal, economic and environmental benefits but is also a source of profound harms. Prior information systems (IS) research has often overlooked the ethical tensions involved, framing harms as ‘unintended consequences’ rather than symptoms of deeper systemic problems.
Raffaele F. Ciriello   +5 more
wiley   +1 more source

A minimum data set of user profile or electronic health record for chemical warfare victims' recommender system

open access: gold, 2020
Marjan Ghazisaeedi   +5 more
openalex   +1 more source

Resilient IT: Winning With People and Process

open access: yesInformation Systems Journal, EarlyView.
ABSTRACT In today's dynamic environment, IT organisations face numerous challenges from disruptions such as natural disasters, cybersecurity threats, international conflicts, evolving regulations, pandemics and recent global incidents such as the CrowdStrike outage.
Wesam Helou   +2 more
wiley   +1 more source

Information Warfare [PDF]

open access: yes, 2013
Goncharov, Sergey   +2 more
core   +1 more source

Thoughts about a General Theory of Influence in a DIME/PMESII/ASCOP/IRC2 Model [PDF]

open access: yes, 2019
The leading question of this paper is: “How would influence warfare (“iWar”) work and how can we simulate it?” The paper discusses foundational aspects of a theory and model of influence warfare by discussing a framework built along the DIME/PMESII/ASCOP
Kodalle, Thorsten   +3 more
core  

Home - About - Disclaimer - Privacy