A Perspective on Software Intelligence for Autonomous Transformations in Biomedical Data and Knowledge. [PDF]
ABSTRACT Introduction Persistent knowledge is essential for propagating the learning health system (LHS) cycle. Integral to the cycle are iterative transformations of data into knowledge. However, human efforts to undertake these transformations are increasingly challenged when dealing with larger data scales and complexities.
Navale V.
europepmc +2 more sources
Chemical Warfare Through the Ages: A Systematic Review From Antiquity to the Present. [PDF]
Chemical warfare means the use of chemical agents that have direct toxic effects on animals, plants and humans, as weapons. The first documented use of a chemical agent for warfare purposes occurred in ancient times around 10,000 BCE in South Africa when weapons were dipped in chemicals and then used to attack and defend from enemies.
Honeyman DA +3 more
europepmc +2 more sources
Shining a Light on Policing of the Dark Web: An analysis of UK investigatory Powers [PDF]
The dark web and the proliferation of criminals who have exploited its cryptographic protocols to commit crimes anonymously has created major challenges for law enforcement around the world. Traditional policing techniques have required amendment and new
Davies, Gemma
core +2 more sources
Open source intelligence in UN peacekeeping operations: An insight into perceptions and realities [PDF]
After the end of the Cold War and the entry into the new millennium, the UN organization is entering a period of major reforms of their activities, while the domain of intelligence activity and the application of OSINT, although substantially supported ...
Nikolić Slavimir S.
doaj +1 more source
Shining a light on AIS Blackouts with maritime OSINT
Maritime open source intelligence (maritime OSINT) can be used to capture information, critical to business operations, including when electronic systems like Automatic Identification Systems (AIS) fail.
Emerald Cara Sage
doaj +1 more source
Implications of regulatory policy for building secure agile software in Nigeria: A grounded theory
Abstract Nigeria is ranked second worldwide, after India, in reported incidences of cyberattacks. Attackers usually exploit vulnerabilities in software which may not have adequately considered security features during the development process. Agile methods have the potential to increase productivity and ensure faster delivery of software, although they
Abdulhamid A. Ardo +2 more
wiley +1 more source
Ontogenetic variability of the intertympanic sinus distinguishes lineages within Crocodylia
We recognised the usefulness of the paratympanic sinuses in distinguishing major lineages within Crocodylia. 3D geometric morphometric approaches allow us to quantify the ontogeny and variability of the intertympanic sinus within one of the largest dataset of modern species, including one of the largest specimens ever scanned at such a high resolution.
Gwendal Perrichon +10 more
wiley +1 more source
Emotional Reactions to the Perception of Risk in the Pompeii Archaeological Park [PDF]
The assessment of perceived risk by people is extremely important for safety and security management. Each person is based on the opinion of others to make a choice and the Internet represents the place where these opinions are mostly researched, found ...
B. Russo, Simona +5 more
core +2 more sources
Digital transformation with the adoption of cloud technologies, outsourcing, and working‐from‐home possibilities permits flexibility for organizations and persons. At the same time, it makes it more difficult to secure the IT infrastructure as the IT team needs to keep track of who is accessing what data from where and when on which device.
Daniela Pöhn +2 more
wiley +1 more source
How opposing ideological groups use online interactions to justify and mobilise collective action
Abstract The purpose of this pre‐registered study was to investigate how different ideological groups justified and mobilised collective action online. We collected 6878 posts from the social media accounts of pro‐Black Lives Matter (n = 13) and anti‐Black Lives Matter (n = 9) groups who promoted collective action in the month after George Floyd's ...
Olivia Brown +2 more
wiley +1 more source

