Results 151 to 160 of about 1,715,477 (307)

Corporate Governance in a Crypto‐World

open access: yesRegulation &Governance, EarlyView.
ABSTRACT This paper explores the nature of governance both within and by blockchains and the economies they support. There is a widespread assumption that the proper governance model for these economies is political. In this paper, I make an alternative claim, namely that a more accurate model for blockchain governance is as a species of corporate ...
Sinclair Davidson
wiley   +1 more source

Artificial intelligence for risk analysis—A risk characterization perspective on advances, opportunities, and limitations

open access: yesRisk Analysis, EarlyView.
Abstract Artificial intelligence (AI) has seen numerous applications for risk analysis and provides ample opportunities for developing new and improved methods and models for this purpose. In the present article, we conceptualize the use of AI for risk analysis by framing it as an input–algorithm–output process and linking such a setup to three tasks ...
Kaia Stødle   +3 more
wiley   +1 more source

Interconnected and resilient: A CGE analysis of AI‐driven cyberattacks in global trade

open access: yesRisk Analysis, EarlyView.
Abstract The burgeoning interconnectedness of global trade in the digital age not only presents enticing opportunities but also harbors potent vulnerabilities of artificial intelligence (AI)‐driven cyberattacks. This study explores the cascading impacts of these disruptive threats on economies, supply chains, and trade, utilizing the intricate lens of ...
Rehab Osman, Sherif El‐Gendy
wiley   +1 more source

You cannot spell risk without “I‐S”: The disclosure of information systems risks by Fortune 1000 firms

open access: yesRisk Analysis, EarlyView.
Abstract Cybersecurity events can cause business disruptions, health and safety repercussions, financial costs, and negative publicity for large firms, and executives rank cybersecurity as a top operational concern. Although cybersecurity may be the most publicized information systems (IS) risk, large firms face a range of IS risks. Over the past three
Jonathan Whitaker, Shital Thekdi
wiley   +1 more source

On the availability versus transmitted power of wireless sensor networks in Rayleigh multipath fading environments [PDF]

open access: yesThe University Thought: Publication in Natural Sciences, 2017
This paper presents simulation results for full availability of a wireless sensor network depending on the RF output power of the network nodes in Rayleigh multipath fading environment.
Milić Dejan   +3 more
doaj  

Outage Probability Analysis for OTFS in Lossy Communications [PDF]

open access: yesarXiv
This paper analyzes the outage probability of orthogonal time frequency space (OTFS) modulation under a lossy communication scenario. First of all, we introduce the channel model and the vector form representation of OTFS this paper uses. Then, we derive an exact expression of the OTFS outage probability in lossy communication scenarios, using Shannon ...
arxiv  

Identifying power outage hotspots to support risk management planning

open access: yesRisk Analysis, EarlyView.
Abstract Secure and reliable power systems are vital for modern societies and economies. While there is a focus in the literature on predicting power outages caused by severe weather events, relatively little literature exists on identifying hot spots, locations where outages occur repeatedly and at a higher rate than expected.
Kaia Stødle   +2 more
wiley   +1 more source

Outage probability analysis of distributed reception with hard decision exchanges [PDF]

open access: green, 2013
Rui Wang   +4 more
openalex   +1 more source

Water outage predictions for natural hazards using synthetic water distribution systems

open access: yesRisk Analysis, EarlyView.
Abstract Hazards can impact water systems, leading to water outages that result in economic, environmental, and societal losses. Modeling a system's behavior helps develop short‐term restoration strategies and long‐term resilience planning. However, data on the topology and operational characteristics of real water systems are often unavailable outside
Zaira Pagan‐Cajigas   +6 more
wiley   +1 more source

Home - About - Disclaimer - Privacy