Results 71 to 80 of about 79,039 (285)

THE INFORMATION CONFIDENTIALITY AND CYBER SECURITY IN MEDICAL INSTITUTIONS

open access: yesAnnals of the University of Oradea: Economic Science, 2015
The information confidentiality and cyber security risk affects the right to confidentiality and privacy of the patient, as regulated in Romania by the Law 46/2002. The manifestation of the cyber security risk event affects the reputation of the healthcare institution and is becoming more and more complex and often due to the: development of network ...
SABAU-POPA CLAUDIA DIANA   +3 more
openaire   +1 more source

Beyond 5G and Non‐terrestrial Network (NTN) Integrated Architecture: Access Challenges for Expanding Artificial Intelligence of Things (AIoT)

open access: yesInternational Journal of Satellite Communications and Networking, EarlyView.
ABSTRACT This study analyzes the architecture of the beyond 5G‐NTN (Non‐terrestrial Network) integrated network and presents the technical, legal, and regulatory challenges and considerations for expanding the Artificial Intelligence of Things (AIoT) ecosystem.
Byung Woon Kim, Ga Eun Choi
wiley   +1 more source

Smart Waste, Smarter World: Exploring Waste Types, Trends, and Tech‐Driven Valorization Through Artificial Intelligence, Internet of Things, and Blockchain

open access: yesSustainable Development, EarlyView.
ABSTRACT Global municipal solid waste generation is projected to exceed 3.8 billion tonnes annually by 2050. This makes the need for smart, inclusive, and scalable waste valorization systems more urgent than ever. This review critically explores the shift from conventional waste management to intelligent, technology‐driven solutions aligned with ...
Segun E. Ibitoye   +8 more
wiley   +1 more source

From ESG to Sustainable Development: A Path Designed for the Triple Helix Spheres

open access: yesSustainable Development, EarlyView.
ABSTRACT This work examines the relationship between environmental, social, and governance (ESG) initiatives and sustainable development (SD), highlighting a scientific gap in their effective connection. It aims to propose a framework with recommendations for promoting SD through ESG, considering the governmental, business, and academic spheres from ...
Elen Cristina Bravos Giupponi   +3 more
wiley   +1 more source

Smart Computer Security Audit: Reinforcement Learning with a Deep Neural Network Approximator [PDF]

open access: yes, 2020
A significant challenge in modern computer security is the growing skill gap as intruder capabilities increase, making it necessary to begin automating elements of penetration testing so analysts can contend with the growing number of cyber threats.
Alonso, E.   +4 more
core  

Digital Futures, Sustainable Outcomes: Mapping the Impact of Digital Transformation on EU SDG Progress

open access: yesSustainable Development, EarlyView.
ABSTRACT This study explores how digital transformation, measured by the Global Digitalisation Index (GDI), relates to progress on the UN Sustainable Development Goals (SDGs) across EU member states. Using partial correlation, regression analysis with interaction terms and cluster analysis, the research examines the moderating effects of governance and
Luis Fonseca   +4 more
wiley   +1 more source

Hybrid and cybersecurity threats and the European Union’s financial system. Bruegel Policy Contribution Issue n˚10 | September 2019. Bruegel [PDF]

open access: yes, 2019
Increasing cyber and hybrid risks will test the European Union’s system of fragmentation on issues of security but centralisation on financial and other economic issues.
Demertzis, Maria, Wolff, Guntram B.
core  

A Method for Assessing the Risks to Sustainability Posed by Process Operations

open access: yesSustainable Development, EarlyView.
ABSTRACT We present a framework for assessing the risks to sustainability posed by any given set of processes. The objective is to improve sustainability by enabling better decision‐making in policy and business contexts. The framework can be applied to any system of processes where available information supports discovery and quantification of ...
Richard C. Darton, Colin J. Axon
wiley   +1 more source

Digitalization and Cyber Security Policies in Uzbekıstan's Institutions and Sectors in One Belt One Road Project

open access: yesİmgelem
The diffusion of information and communication technologies (ICT) into a rapidly growing area of global trade has contributed significantly to the gains made by companies and governments.
Mithat Baştuğ, Muhammed Ali Yetgin
doaj   +1 more source

Cyber Security Awareness among Social Media Users: Case Study in German-Malaysian Institute (GMI)

open access: yesAsia-Pacific Journal of Information Technology & Multimedia, 2018
The use of social media has increased among the Malaysian. The most popular social media sites that are currently being used are Facebook, Youtube, Whatsapp and Instagram. The existence of this unlimited boundless social site has also been associated with an increase in cyber crime rates.
Zakiah Saizan, Dalbir Singh
openaire   +1 more source

Home - About - Disclaimer - Privacy