Results 11 to 20 of about 2,097 (152)

Strategies to Counter Disinformation for Healthcare Practitioners and Policymakers. [PDF]

open access: yesWorld Med Health Policy, 2022
Abstract Medical disinformation has interfered with healthcare workers' ability to communicate with the general population in a wide variety of public health contexts globally. This has limited the effectiveness of evidence‐based medicine and healthcare capacity.
Neylan JH, Patel SS, Erickson TB.
europepmc   +2 more sources

Do Machines Replicate Humans? Toward a Unified Understanding of Radicalizing Content on the Open Social Web. [PDF]

open access: yesPolicy Internet, 2020
The advent of the Internet inadvertently augmented the functioning and success of violent extremist organizations. Terrorist organizations like the Islamic State in Iraq and Syria (ISIS) use the Internet to project their message to a global audience. The majority of research and practice on web‐based terrorist propaganda uses human coders to classify ...
Hall M, Logan M, Ligon GS, Derrick DC.
europepmc   +2 more sources

Analysis of outage performance in a 6G‐V2X communications system utilising free‐space optical quantum key distribution

open access: yesIET Quantum Communication, Volume 4, Issue 4, Page 191-199, December 2023., 2023
The UK AirQKD project has implemented a Free‐Space Optical (FSO) Quantum Key Distribution (QKD) system and one use case is Vehicle‐to‐Everything (V2X) communications. This work examines how FSO‐QKD could integrate into a V2X architecture and examines line‐of‐sight issues.
Hu Yuan   +3 more
wiley   +1 more source

Are the good spared? Corporate social responsibility as insurance against cyber security incidents

open access: yesRisk Analysis, Volume 43, Issue 12, Page 2503-2518, December 2023., 2023
Abstract Despite the increasing consensus that socially responsible behavior can act as insurance against externally induced shocks, supporting evidence remains somewhat inconsistent. Our study provides a clear demonstration of the insurance‐like properties of corporate social responsibility (CSR) in preserving corporate financial performance (CFP), in
Vassiliki Bamiatzi   +4 more
wiley   +1 more source

Exploring the value of feminist theory in understanding digital crimes: Gender and cybercrime types

open access: yesThe Howard Journal of Crime and Justice, Volume 61, Issue 3, Page 381-398, September 2022., 2022
Abstract Do men and women perceive cybercrime types differently? This article draws on the distinction between socio‐economic and psychosocial cybercrime proposed by Lazarus (2019) to investigate whether men and women hold different perceptions of digital crimes across these two dimensions.
Suleman Lazarus   +2 more
wiley   +1 more source

 LoRaWAN security issues and mitigation options by the example of agricultural IoT scenarios

open access: yesTransactions on Emerging Telecommunications Technologies, Volume 33, Issue 5, May 2022., 2022
This work presents both a recent review of already known LoRaWAN security issues for the available LoRaWAN versions and a novel list of preventive measures. Developers can use our findings to minimize the risks when developing applications for agriculture based on LoRaWAN.
Franz Kuntke   +4 more
wiley   +1 more source

Digitalization, accounting and accountability: A literature review and reflections on future research in public services

open access: yesFinancial Accountability &Management, Volume 38, Issue 2, Page 152-176, May 2022., 2022
Abstract This study discusses the current state of the art and future directions of research on digitalization, accountability, and accounting in public services. Through a systematic literature review, we investigate 232 articles published between 1998 and the first quarter of 2020.
Deborah Agostino   +2 more
wiley   +1 more source

Information security and journalism: Mapping a nascent research field

open access: yesSociology Compass, Volume 16, Issue 3, March 2022., 2022
Abstract Information security (infosec) has become a field of primary interest for journalism, especially in the wake of the 2013 Edward Snowden revelations about the ramifications of Internet mass surveillance. Following the increasing dangers posed by digital threats—and surveillance in particular—to the safety of journalists and their sources ...
Philip Di Salvo
wiley   +1 more source

From cyberfascism to terrorism: On 4chan/pol/ culture and the transnational production of memetic violence

open access: yesNations and Nationalism, Volume 28, Issue 1, Page 286-301, January 2022., 2022
Abstract This article examines the fascists imaginaries that are produced and circulated at 4chan /pol/. Based on analysis of memes and posts collected during a 6‐month period in 2019, it explores the diagnoses given by anonymous users to the imagining of the ultra‐nation and dehumanized others, and the prescriptions for the remedies needed to bring ...
Cathrine Thorleifsson
wiley   +1 more source

Digital Forensics as Advanced Ransomware Pre‐Attack Detection Algorithm for Endpoint Data Protection

open access: yesSecurity and Communication Networks, Volume 2022, Issue 1, 2022., 2022
Ransomware is a malicious software that takes files hostage and demands ransomware to release them. It targets individuals, corporations, organizations, and public services such as hospitals and police stations. It is a growing industry that affected more than three million users from 2019 to 2020. The ransom payments totaled 25 billion‐plus dollars in
Jian Du   +6 more
wiley   +1 more source

Home - About - Disclaimer - Privacy