Results 161 to 170 of about 421,220 (341)
ABSTRACT This study investigates the relationship between cybersecurity capabilities (CCs) and cybersecurity performance (CP) across diverse regional contexts, employing ordinary least squares (OLS) and random forest (RF) regression models. The research highlights how economic, political and cultural factors shape CCs and their impact on CP ...
Angélica Pigola +2 more
wiley +1 more source
Who Is the System? On the Externalisation and Depersonalisation of Responsibility for Abuse
ABSTRACT This article examines the externalisation and depersonalisation of responsibility in the institutional communication of the Roman Catholic Church in the context of sexualised violence. Niklas Luhmann's theory of social systems is used to show how semantic constructions such as ‘systemic causes’ rhetorically blur responsibility and contribute ...
Thomas Kron
wiley +1 more source
Semantic Relations in a Categorical Verbal Fluency Test: An Exploratory Investigation in Mild Cognitive Impairment. [PDF]
Quaranta D +5 more
europepmc +1 more source
To address interactionally troublesome exchanges (e.g., bullying, discrimination, or harassment) in the workplace, giving a name to negative personal experiences is crucial. Drawing on discussions of hermeneutical injustice, we explore the emancipatory potential of naming in post‐hoc tellings of these experiences, with particular attention to ...
Minna Leinonen +2 more
wiley +1 more source
Language-minority children's sensitivity to the semantic relations between words. [PDF]
Goodrich JM, Lonigan CJ.
europepmc +1 more source
Identification of Missing Knowledge in MBSE System Models Using Graph‐Based Machine Learning
ABSTRACT The design and development of complex aerospace systems pose significant challenges due to their growing complexity. Iterative design processes, guided by formal specifications, strive to refine initially vague characteristics through multiple stages.
Esma Karagoz +2 more
wiley +1 more source
Composing Semantic Relations among Ontologies with a Description Logics [PDF]
Manel Kolli, Zizette Boufaïda
openalex +1 more source
Mission Aware Cyber‐Physical Security
ABSTRACT Perimeter cybersecurity, while essential, has proven insufficient against sophisticated, coordinated, and cyber‐physical attacks. In contrast, mission‐centric cybersecurity emphasizes finding evidence of attack impact on mission success, allowing for targeted resource allocation to mitigate vulnerabilities and protect critical assets.
Georgios Bakirtzis +3 more
wiley +1 more source

