Results 11 to 20 of about 3,809 (177)
AI and core electoral processes: Mapping the horizons
Abstract It is well documented that there has been significant enthusiasm across the globe in respect of using AI for all forms of social activity. However, the electoral process – the time, place, and manner of elections within democratic nations – is one of few sectors in which there has been limited penetration of AI.
Deepak P +2 more
wiley +1 more source
Abstract The Onion Router (Tor) is a sophisticated web browser accompanied by an encrypted network that enables online anonymity, protecting people's privacy. Adopted by many as a counter‐surveillance mitigation around the world, legitimate users of Tor include the military, journalists, whistle‐blowers, and citizens from authoritarian regimes.
Thais Sardá
wiley +1 more source
In this manuscript, we develop a novel game‐theoretic framework to understand the complex interactions between individuals in the context of information sharing on social media, conservation philanthropy, and how these interactions ultimately impact ecological outcomes.
Nao Takashina +2 more
wiley +1 more source
Are cryptocurrencies homogeneous?
Abstract This article investigates if cryptocurrencies returns' are similarly affected by a selection of demand‐ and supply‐side determinants. Homogeneity among cryptocurrencies is tested via a least absolute shrinkage and selection operator (LASSO) model where determinants of Bitcoin returns are applied to a sample of 12 cryptocurrencies. The analysis
Elias Bengtsson, Frida Gustafsson
wiley +1 more source
Explainable AI methods in cyber risk management
Abstract Artificial intelligence (AI) methods are becoming widespread, especially when data are not sufficient to build classical statistical models, as is the case for cyber risk management. However, when applied to regulated industries, such as energy, finance, and health, AI methods lack explainability.
Paolo Giudici, Emanuela Raffinetti
wiley +1 more source
Cybersecurity in the GCC: From Economic Development to Geopolitical Controversy
Abstract While the Gulf Cooperation Council (GCC) countries are not alone in their increasing exposure to the negative side effects of greater digital dependency, their status as technological leaders—not just in the region, but also in the world—means that they are vulnerable to a variety of cybersecurity threats.
Bassant Hassib, James Shires
wiley +1 more source
Information security and journalism: Mapping a nascent research field
Abstract Information security (infosec) has become a field of primary interest for journalism, especially in the wake of the 2013 Edward Snowden revelations about the ramifications of Internet mass surveillance. Following the increasing dangers posed by digital threats—and surveillance in particular—to the safety of journalists and their sources ...
Philip Di Salvo
wiley +1 more source
Media psychology: Modern man and nonlocality of psyche. [PDF]
The development of modern information technologies is causing changes in the structure of the human psyche, bringing about a new psychotype. The transition to a new level of evolution is accompanied by the growing manifestation of the psyche’s ...
Pronina E.E.
doaj +1 more source
Hackers as terrorists? Why it doesn't compute [PDF]
The bulk of this article is concerned with showing why computer hackers and terrorists are unlikely to form an unholy alliance to engage in so-called cyberterrorism.
Conway, Maura
core +1 more source
Justifying Uncivil Disobedience [PDF]
A prominent way of justifying civil disobedience is to postulate a pro tanto duty to obey the law and to argue that the considerations that ground this duty sometimes justify forms of civil disobedience.
Lai, Ten-Herng
core +1 more source

