Results 81 to 90 of about 205,649 (344)
Enabling a Circular Water Transition: Identifying Governance Pathways for Wastewater Reuse
ABSTRACT Over 80% of the world's wastewater is discharged untreated, making reuse a widely underutilised strategy for addressing water scarcity. Due to the complexity of implementing water reuse systems, supportive governance conditions are required to steer this process and overcome barriers.
Kirsty Holstead +4 more
wiley +1 more source
About Comunes: challenges of the social movements ecosystem
The social movements suffer multiple difficulties in their organization, communication, collaboration and long-term planning. Comunes is a non-profit collective that aims to minimize these difficulties and to facilitate the work of social movements ...
Bastien Guerry +3 more
doaj +1 more source
By manipulating current and voltage measurements, an assailant can induce unwanted relay action while attempting to avoid detection. Detecting advanced cyber intrusions in power protection environments requires specialised data analysis and anomaly detection methods.
Feras Alasali +6 more
wiley +1 more source
Wishing to be Like the Character on Screen: Media Exposure and Perception of Hacking Behavior
This research addressed whether exposure to media, which increasingly portrays hacker characters across diverse media domains, may predict perceptions of others’ willingness to hack.
Sarah Staggs +2 more
doaj +1 more source
Impact of evidence‐based information on horse owners' misconceptions of colic
Abstract Background Misconceptions can be defined as ‘false, persistent beliefs’ or ‘inaccurate, prior knowledge’ and can influence decision‐making. Objectives To investigate the impact of evidence‐based information on UK horse owners' decision‐making for colic. Study Design Mixed‐methods cross‐sectional study.
K. L. Burrell +3 more
wiley +1 more source
Ce que le “Libre” fait aux “libristes”
The development of personal computing has transformed how its technicians are perceived. However, despite the appearance of an abundant literature on hacker “culture”, they remain largely invisible from the viewpoint of their social insertions.
Gael Depoorter
doaj +1 more source
The Alignment Risks of AI Overconfidence about Consciousness
ABSTRACT Many contemporary AI systems (as of May 2025) have expressed extreme confidence in current and near‐future AI lacking consciousness and moral patiency. This article argues that artificially reinforcing such confidence, even if pragmatically useful, poses a novel alignment risk: as coherence‐seeking AIs become more epistemically principled ...
Sharon Berry
wiley +1 more source
The growing demand for computer security, and the cyberization trend, are hallmarks of the 21st century. The rise in cyber-crime, digital currency, and e-governance has been well met by a corresponding recent jump in investment in new technology for ...
Robert Ramirez, Nazli Choucri
doaj +1 more source
ABSTRACT This article identifies assistive technologies (ATs) as ‘pre‐technologies’ mediating access to other technologies for disabled subjects (DSs). The motivation is to show that without ATs, DSs cannot be said to have the same level of access to freedom and self‐forming activities as able‐bodied subjects.
Sarel Marais
wiley +1 more source
The Role of Hackers in Countering Surveillance and Promoting Democracy
Practices related to media technologies and infrastructures (MTI) are an increasingly important part of democratic constellations in general and of surveillance tactics in particular. This article does not seek to discuss surveillance per se, but instead
Sebastian Kubitschko
doaj +1 more source

