Results 191 to 200 of about 123,825 (281)

Double‐Edged Sword of Social Media Algorithms: Assessing the Risks to University Cybersecurity and Student Data Privacy

open access: yesEngineering Reports, Volume 8, Issue 5, May 2026.
Social media algorithms drive a hidden risk chain: over‐disclosure → behavioral fusion → targeted attacks. We propose a 128‐dim, law‐aware risk scoring model with Drools‐based dynamic alerts for universities. ABSTRACT As universities undergo accelerated digital transformation, social media algorithms—while streamlining campus services—have emerged as a
Weishu Ye, Zhi Li
wiley   +1 more source

Science that speaks: The public face of physiology

open access: yes
Experimental Physiology, EarlyView.
Danny W. Walmsley   +4 more
wiley   +1 more source

The end stage of barrier estuary infill: Insights from Jack Smith Lake, Southeastern Australia

open access: yesEarth Surface Processes and Landforms, Volume 51, Issue 5, May 2026.
Infill model for the saline coastal lake estuary, Jack Smith Lake. Abstract Jack Smith Lake in southeastern Australia is an infilled saline coastal lake, disconnected from the ocean by a foredune barrier. This study explores the Holocene infill history of this estuary in order to understand the end‐stage evolution of barrier estuarine systems with ...
David M. Kennedy   +6 more
wiley   +1 more source

Blockchain for the Arts and Humanities

open access: yesFuture Humanities, Volume 4, Issue 1, May 2026.
ABSTRACT As born‐digital cultural materials proliferate, the arts and humanities require infrastructures that guarantee provenance, authenticity, and equitable access. This paper delivers a comprehensive, critical survey of blockchain's potential and limits across the sector.
James O'Sullivan
wiley   +1 more source

Enhancing Cloud‐Based Healthcare Security With Quantum‐Secure HealthChain: A Quantum Computing and Blockchain Integrated Framework

open access: yesHealth Science Reports, Volume 9, Issue 5, May 2026.
ABSTRACT Background and Aims Rising quantum hazards and flaws in conventional encryption make cloud‐based healthcare data security harder. Quantum‐Secure HealthChain, a new architecture using blockchain and quantum computing, improves medical data security, patient privacy, and data fidelity. Methods To prevent quantum attacks, the proposed system uses
Rajesh Bose   +6 more
wiley   +1 more source

Home - About - Disclaimer - Privacy