Results 61 to 70 of about 1,180 (196)
Incumbent‐Born B2B Platforms: Organizational Boundary Dynamics in Platform Creation
ABSTRACT This study examines the dynamics of organizational boundaries in B2B industry platform creation through an in‐depth single‐case study. Specifically, we address the question: How do B2B firms redefine their organizational boundaries when shifting from a pipeline model to an industry platform?
Khaled Abed Alghani +2 more
wiley +1 more source
Service Outsourcing Character Oriented Privacy Conflict Detection Method in Cloud Computing
Cloud computing has provided services for users as a software paradigm. However, it is difficult to ensure privacy information security because of its opening, virtualization, and service outsourcing features.
Changbo Ke +4 more
doaj +1 more source
Security of text data outsourcing in cloud computing
loud computing is a computing based on internet. Demand of cloud computing is increasing day by day. Cloud computing is on demand service with lower cost. Many researches are going on cloud computing. Security breaches are one of the active areas among them.
Shristi Bhute, Siddhartha Kumar Arjaria
openaire +1 more source
ABSTRACT New research argues that robust governance based on flexible adaptation and proactive innovation is needed in order to uphold core public functions, purposes, and values in times of societal turbulence. However, we have limited knowledge of the conditions for enhancing robust governance.
Jacob Torfing +9 more
wiley +1 more source
ABSTRACT This article pursues two objectives. First, it aims to trace the genealogy of data protection regulation in major liberal democracies. To do so, it examines the evolution of this regulation in the United States, France, and Germany, among others, and relies on the policy actors' triangle framework.
Nicolas Bocquet
wiley +1 more source
Toxic Entanglements: Asylum and Extraction in the Republic of Nauru
ABSTRACT Recent years have seen a dramatic increase in the outsourcing of asylum processing and resettlement from Global North to South. Many of these containment practices retrace the fault lines of more typically thought‐of colonial extractive regimes. This article draws on long‐term ethnographic research conducted in the Republic of Nauru, the world'
Julia Morris
wiley +1 more source
CPP-ELM: Cryptographically Privacy-Preserving Extreme Learning Machine for Cloud Systems
The training techniques of the distributed machine learning approach replace the traditional methods with a cloud computing infrastructure and provide flexible computing services to clients.
Ferhat Özgür Çatak +1 more
doaj +1 more source
An actionable framework for AI‐ready data
Abstract Data is the foundation of AI. Poor‐quality data drive up costs and can lead to hidden problems for AI models, especially in complex fields such as healthcare and manufacturing. Meanwhile, biased data negatively affect the performance of AI models, and untested evaluation datasets can result in false positives or overestimates of model accuracy.
Neil Majithia +3 more
wiley +1 more source
Practical and Secure Outsourcing of Matrix Computations to the Cloud
Cloud computing enables a cost effective outsourcing of storage and resource-intensive computations. Secure outsourcing of data and computation is challenging in this emerging computing model. In particular, outsourcing of sensitive computations should be assured in terms of input privacy and cheating detection. Existing approaches use either expensive
Nassar, Mohamed +2 more
openaire +2 more sources
ABSTRACT This study provides an extensive review of modern slavery practises within the global supply chain, highlighting it as a significant human rights violation that affects both the well‐being of victims and the overall supply chain performance of organisations.
Kingsley Kofi Arthur +5 more
wiley +1 more source

