Results 111 to 120 of about 79,967 (299)
The Cyber Science and Security Institute [PDF]
Brase, J M, Spain, C W
openaire +2 more sources
Partly Cloudy, Scattered Clients: Cloud Implementation in the Federal Government [PDF]
Since the issuance of a federal mandate in 2010 requiring federal government agencies in the United States of America to immediately shift to a “Cloud First” policy, agencies have struggled to adopt cloud computing.
Steele, Elston +3 more
core +1 more source
Maximizing the Economic, Environmental, and Social Impact of the Metaverse
ABSTRACT The metaverse is a transformative digital ecosystem with the potential to redefine economic, environmental, and social systems. This qualitative study examines how the metaverse and its enabling technologies—such as AR/VR, blockchain, and AI—might evolve to influence sustainability. Drawing on semi‐structured interviews with global experts and
Alessandro Lanteri +2 more
wiley +1 more source
ASEAN and the non-traditional regional security agenda [PDF]
Without a doubt, the whole area of non-traditional security – whether it be threats, issues or challenges (the three are more or less used interchangeably in ASEAN statements and documents on the subject) – has come to occupy a prominent place on the ...
Rolls, Mark G.
core +1 more source
ABSTRACT Understanding innovation policy is pivotal to enhancing national competitiveness for global value chain. This research investigates an SME‐Inclusive public‐private AI innovation network over time in the U.S. context (1991–2023), revealing how a government's demand‐based innovation policy bolsters technological prowess through isomorphism and ...
Jiyoon An
wiley +1 more source
Empirical Study of Cyber Security Threats in Moldovan Higher Education Institutions
Higher Education Institutions HEIs have always been the target of cyber attacks due to the information assets they hold. The move to online study as a result of restrictions imposed in the spring of 2020 has led to increased cyber security threats to academia due to the vulnerabilities of online learning platforms and video conferencing applications ...
Alexei Lachi, A. +3 more
openaire +2 more sources
Green revolution 2.0: a sustainable energy path [PDF]
This repository item contains a single issue of Sustainable Development Insights, a series of short policy essays that began publishing in 2008 by the Boston University Frederick S. Pardee Center for the Study of the Longer-Range Future. The series seeks
Kulatilaka, Nalin
core +1 more source
Abstract Internet of Medical Things (IoMT) has typical advancements in the healthcare sector with rapid potential proof for decentralised communication systems that have been applied for collecting and monitoring COVID‐19 patient data. Machine Learning algorithms typically use the risk score of each patient based on risk factors, which could help ...
Chandramohan Dhasaratha +9 more
wiley +1 more source
Non-Technical Cyber-Attacks and International Cybersecurity: The Case of Social Engineering
This paper aims to provide an overview of social engineering attacks, and their impacts on cybersecurity, including national and international security, and figures out detection techniques, and major methods for countermeasure. How do social engineering
Amal Alhosban, Nezir Akyeşilmen
doaj +1 more source
Abstract The Internet of Things (IoT) in deploying robotic sprayers for pandemic‐associated disinfection and monitoring has garnered significant attention in recent research. The authors introduce a novel architectural framework designed to interconnect smart monitoring robotic devices within healthcare facilities using narrowband Internet of Things ...
Md Motaharul Islam +9 more
wiley +1 more source

