Results 41 to 50 of about 79,967 (299)
ABSTRACT This article presents the development of a five‐phase Indigenous Data Governance (IDGov) Framework in Australia, focusing on partnerships between the Aboriginal Community Controlled Health Organisation (ACCHO) sector and non‐Indigenous health entities.
Jacob Prehn +4 more
wiley +1 more source
Malware in the Future? Forecasting of Analyst Detection of Cyber Events
There have been extensive efforts in government, academia, and industry to anticipate, forecast, and mitigate cyber attacks. A common approach is time-series forecasting of cyber attacks based on data from network telescopes, honeypots, and automated ...
Barabasi +51 more
core +1 more source
Is the well‐known phrase ‘small is beautiful’ true of small transnational education institutions?
Abstract The purpose of this research is to consider the potential attractiveness of operating a small international branch campus (IBC). Drawing upon resource‐based and legitimacy theories, we examine the strengths, weaknesses, opportunities and threats associated with the business model that is based on having a small institution size.
Stephen Wilkins, Joe Hazzam
wiley +1 more source
Security Culture and Organizational Resilience in the Context of Cyberwarfare: the Case of Romania
This article examines the relationship between Cyber Warfare, security culture, and organizational resilience in Romania through the interaction of the legal framework, institutional architecture, and public governance practices.
Mihail-George GURANDA, Dănuţ MAFTEI
doaj +1 more source
ABSTRACT This study analyzed Industry 4.0 (I4.0) technology applications in agribusiness and the role of strategic stakeholders, engagement methods, and other critical aspects data sharing, confidentiality, integrity, decision‐making, and sector‐specific requirements in promoting circularity.
Simone Sehnem +3 more
wiley +1 more source
Exploring the potential and challenges of E-Governance in Pakistan
As digitalization spreads, governments must implement electronic governance (e-governance) to increase efficiency, transparency, and citizen participation. This study examines Pakistan's e-governance potential and the main obstacles to its acceptance and
Ayesha Nazuk +3 more
doaj +1 more source
Reinforcement learning for efficient network penetration testing [PDF]
Penetration testing (also known as pentesting or PT) is a common practice for actively assessing the defenses of a computer network by planning and executing all possible attacks to discover and exploit existing vulnerabilities.
Chen, T., Ghanem, M.
core +3 more sources
ABSTRACT This study examines the role of corporate zero‐deforestation commitments (ZDCs) and Industry 4.0 (I4.0) enabling technologies in mitigating deforestation. Drawing on data from 110 companies included in the Forest 500 dataset, the research explores whether sustainability commitments and digital innovation influence firms' deforestation ...
Valentina Beretta +2 more
wiley +1 more source
Remote learning has reshaped higher education by expanding access and flexibility, while also exposing institutions to heightened cybersecurity risks.
Chrispus Zacharia Oroni, Fu Xianping
doaj +1 more source
Democracy and Digital Authoritarianism: An Assessment of the EU’s External Engagement in the Promotion and Protection of Internet Freedom. College of Europe EU Diplomacy Paper 01/2020 [PDF]
The past decade has seen a gradual global increase in digital authoritarianism. Internet shutdowns, online censorship, mass surveillance and violations of privacy rights have all become more frequent in parts of the world where citizens are not ...
Garside, Susanna
core

