Results 11 to 20 of about 2,097 (152)
Strategies to Counter Disinformation for Healthcare Practitioners and Policymakers. [PDF]
Abstract Medical disinformation has interfered with healthcare workers' ability to communicate with the general population in a wide variety of public health contexts globally. This has limited the effectiveness of evidence‐based medicine and healthcare capacity.
Neylan JH, Patel SS, Erickson TB.
europepmc +2 more sources
Do Machines Replicate Humans? Toward a Unified Understanding of Radicalizing Content on the Open Social Web. [PDF]
The advent of the Internet inadvertently augmented the functioning and success of violent extremist organizations. Terrorist organizations like the Islamic State in Iraq and Syria (ISIS) use the Internet to project their message to a global audience. The majority of research and practice on web‐based terrorist propaganda uses human coders to classify ...
Hall M, Logan M, Ligon GS, Derrick DC.
europepmc +2 more sources
The UK AirQKD project has implemented a Free‐Space Optical (FSO) Quantum Key Distribution (QKD) system and one use case is Vehicle‐to‐Everything (V2X) communications. This work examines how FSO‐QKD could integrate into a V2X architecture and examines line‐of‐sight issues.
Hu Yuan +3 more
wiley +1 more source
Are the good spared? Corporate social responsibility as insurance against cyber security incidents
Abstract Despite the increasing consensus that socially responsible behavior can act as insurance against externally induced shocks, supporting evidence remains somewhat inconsistent. Our study provides a clear demonstration of the insurance‐like properties of corporate social responsibility (CSR) in preserving corporate financial performance (CFP), in
Vassiliki Bamiatzi +4 more
wiley +1 more source
Exploring the value of feminist theory in understanding digital crimes: Gender and cybercrime types
Abstract Do men and women perceive cybercrime types differently? This article draws on the distinction between socio‐economic and psychosocial cybercrime proposed by Lazarus (2019) to investigate whether men and women hold different perceptions of digital crimes across these two dimensions.
Suleman Lazarus +2 more
wiley +1 more source
LoRaWAN security issues and mitigation options by the example of agricultural IoT scenarios
This work presents both a recent review of already known LoRaWAN security issues for the available LoRaWAN versions and a novel list of preventive measures. Developers can use our findings to minimize the risks when developing applications for agriculture based on LoRaWAN.
Franz Kuntke +4 more
wiley +1 more source
Abstract This study discusses the current state of the art and future directions of research on digitalization, accountability, and accounting in public services. Through a systematic literature review, we investigate 232 articles published between 1998 and the first quarter of 2020.
Deborah Agostino +2 more
wiley +1 more source
Information security and journalism: Mapping a nascent research field
Abstract Information security (infosec) has become a field of primary interest for journalism, especially in the wake of the 2013 Edward Snowden revelations about the ramifications of Internet mass surveillance. Following the increasing dangers posed by digital threats—and surveillance in particular—to the safety of journalists and their sources ...
Philip Di Salvo
wiley +1 more source
Abstract This article examines the fascists imaginaries that are produced and circulated at 4chan /pol/. Based on analysis of memes and posts collected during a 6‐month period in 2019, it explores the diagnoses given by anonymous users to the imagining of the ultra‐nation and dehumanized others, and the prescriptions for the remedies needed to bring ...
Cathrine Thorleifsson
wiley +1 more source
Digital Forensics as Advanced Ransomware Pre‐Attack Detection Algorithm for Endpoint Data Protection
Ransomware is a malicious software that takes files hostage and demands ransomware to release them. It targets individuals, corporations, organizations, and public services such as hospitals and police stations. It is a growing industry that affected more than three million users from 2019 to 2020. The ransom payments totaled 25 billion‐plus dollars in
Jian Du +6 more
wiley +1 more source

