Results 11 to 20 of about 3,809 (177)

AI and core electoral processes: Mapping the horizons

open access: yesAI Magazine, Volume 44, Issue 3, Page 218-239, Fall 2023., 2023
Abstract It is well documented that there has been significant enthusiasm across the globe in respect of using AI for all forms of social activity. However, the electoral process – the time, place, and manner of elections within democratic nations – is one of few sectors in which there has been limited penetration of AI.
Deepak P   +2 more
wiley   +1 more source

An onion with layers of hope and fear: A cross‐case analysis of the media representation of Tor Network reflecting theoretical perspectives of new technologies

open access: yesSECURITY AND PRIVACY, Volume 6, Issue 4, July/August 2023., 2023
Abstract The Onion Router (Tor) is a sophisticated web browser accompanied by an encrypted network that enables online anonymity, protecting people's privacy. Adopted by many as a counter‐surveillance mitigation around the world, legitimate users of Tor include the military, journalists, whistle‐blowers, and citizens from authoritarian regimes.
Thais Sardá
wiley   +1 more source

Spread the word: Sharing information on social media can stabilize conservation funding and improve ecological outcomes

open access: yesConservation Science and Practice, Volume 5, Issue 5, May 2023., 2023
In this manuscript, we develop a novel game‐theoretic framework to understand the complex interactions between individuals in the context of information sharing on social media, conservation philanthropy, and how these interactions ultimately impact ecological outcomes.
Nao Takashina   +2 more
wiley   +1 more source

Are cryptocurrencies homogeneous?

open access: yesEuropean Financial Management, Volume 29, Issue 1, Page 150-195, January 2023., 2023
Abstract This article investigates if cryptocurrencies returns' are similarly affected by a selection of demand‐ and supply‐side determinants. Homogeneity among cryptocurrencies is tested via a least absolute shrinkage and selection operator (LASSO) model where determinants of Bitcoin returns are applied to a sample of 12 cryptocurrencies. The analysis
Elias Bengtsson, Frida Gustafsson
wiley   +1 more source

Explainable AI methods in cyber risk management

open access: yesQuality and Reliability Engineering International, Volume 38, Issue 3, Page 1318-1326, April 2022., 2022
Abstract Artificial intelligence (AI) methods are becoming widespread, especially when data are not sufficient to build classical statistical models, as is the case for cyber risk management. However, when applied to regulated industries, such as energy, finance, and health, AI methods lack explainability.
Paolo Giudici, Emanuela Raffinetti
wiley   +1 more source

Cybersecurity in the GCC: From Economic Development to Geopolitical Controversy

open access: yesMiddle East Policy, Volume 29, Issue 1, Page 90-103, Spring 2022., 2022
Abstract While the Gulf Cooperation Council (GCC) countries are not alone in their increasing exposure to the negative side effects of greater digital dependency, their status as technological leaders—not just in the region, but also in the world—means that they are vulnerable to a variety of cybersecurity threats.
Bassant Hassib, James Shires
wiley   +1 more source

Information security and journalism: Mapping a nascent research field

open access: yesSociology Compass, Volume 16, Issue 3, March 2022., 2022
Abstract Information security (infosec) has become a field of primary interest for journalism, especially in the wake of the 2013 Edward Snowden revelations about the ramifications of Internet mass surveillance. Following the increasing dangers posed by digital threats—and surveillance in particular—to the safety of journalists and their sources ...
Philip Di Salvo
wiley   +1 more source

Media psychology: Modern man and nonlocality of psyche. [PDF]

open access: yesPsychology in Russia: State of Art, 2014
The development of modern information technologies is causing changes in the structure of the human psyche, bringing about a new psychotype. The transition to a new level of evolution is accompanied by the growing manifestation of the psyche’s ...
Pronina E.E.
doaj   +1 more source

Hackers as terrorists? Why it doesn't compute [PDF]

open access: yes, 2003
The bulk of this article is concerned with showing why computer hackers and terrorists are unlikely to form an unholy alliance to engage in so-called cyberterrorism.
Conway, Maura
core   +1 more source

Justifying Uncivil Disobedience [PDF]

open access: yes, 2019
A prominent way of justifying civil disobedience is to postulate a pro tanto duty to obey the law and to argue that the considerations that ground this duty sometimes justify forms of civil disobedience.
Lai, Ten-Herng
core   +1 more source

Home - About - Disclaimer - Privacy