-
281
GLOBAL TRENDS IN REPUTATION MANAGEMENT
Published 2024-12-01“…Among the current trends in reputation management, the following are important: the presence of a higher goal of the corporate brand, high-quality communication with various groups of stakeholders as the basis of the business strategy, cybersecurity and data protection, the integration of artificial intelligence into work processes (including communication processes), and the ethics of its use. …”
Get full text
Article -
282
Balancing act: Europeans' privacy calculus and security concerns in online CSAM detection
Published 2025-01-01Get full text
Article -
283
Trust in Intrusion Detection Systems: An Investigation of Performance Analysis for Machine Learning and Deep Learning Models
Published 2021-01-01“…To design and develop AI-based cybersecurity systems (e.g., intrusion detection system (IDS)), users can justifiably trust, one needs to evaluate the impact of trust using machine learning and deep learning technologies. …”
Get full text
Article -
284
Security Risks and Designs in the Connected Vehicle Ecosystem: In-Vehicle and Edge Platforms
Published 2025-01-01“…These advancements, however, have heightened exposure to cybersecurity risks. This work reviews emerging security challenges in the CV ecosystem from a new perspective, focusing on the integration of in-vehicle platforms such as the infotainment system and vehicle-edge platforms. …”
Get full text
Article -
285
-
286
Digital maturity of business: Technological gap and limitations of digital transformation
Published 2023-06-01“…As a result of the study, it was found that the main reasons for the unsystematic processes of digitalization of Russian business are the low quality of business digitalization with high digital activity and low technological capabilities for implementing Industry 4.0 technologies due to the limited use of the Internet mobile network in business, business cybersecurity tools, Internet communications and cloud services. …”
Get full text
Article -
287
Market Trends in 2024 in the IT Project Management Industry
Published 2024-11-01“…The increasing importance of cybersecurity and data privacy is influencing project management practices, with a heightened focus on risk management and compliance. …”
Get full text
Article -
288
Proactive Detection of Malicious Webpages Using Hybrid Natural Language Processing and Ensemble Learning Techniques
Published 2024-01-01“…With accuracy rates exceeding 98%, this framework achieves a robust, scalable solution for real-time web content analysis, providing a critical tool for cybersecurity professionals to detect and block malicious webpages before they can cause harm. …”
Get full text
Article -
289
Examining the integration of artificial intelligence in supply chain management from Industry 4.0 to 6.0: a systematic literature review
Published 2025-01-01“…However, challenges such as cybersecurity risks and workforce skill gaps need to be addressed to fully leverage AI’s potential.ConclusionIntegrating AI in SCM not only improves operational efficiency and sustainability but also promotes resilience against disruptions. …”
Get full text
Article -
290
Peculiarities of legal regulation of activities of the National Police of Ukraine in the field of ensuring information security in Ukraine
Published 2020-12-01“…It has been stated that the modern system of ensuring information security and cybersecurity in Ukraine should be one effective system, consisting of such mandatory components as legal, educational and technical. …”
Get full text
Article -
291
Robust ensemble of handcrafted and learned approaches for DNA-binding proteins
Published 2025-01-01Get full text
Article -
292
A Federated Learning Framework for Enhanced Data Security and Cyber Intrusion Detection in Distributed Network of Underwater Drones
Published 2025-01-01“…By preserving privacy and enabling collaborative anomaly detection, FL addresses key cybersecurity challenges in the Internet of Underwater Things (IoUT).…”
Get full text
Article -
293
Bilateral Reference for High-Resolution Dichotomous Image Segmentation
Published 2024-12-01Get full text
Article -
294
The Role of Women in Community Development: Reenacting Digital Activism in Improving Education for All Children, Lesson Learned from Tulungagung and Semarang
Published 2024-12-01“…The concepts of Women in Development and Digital Literacy empowers women to contribute to development, cybersecurity, and children's rights. The results highlight structural issues like poverty and gender inequality as barriers to educational quality across regions, further emphasizing the need for women educators in designing digital literacy programs. …”
Get full text
Article -
295
Anomaly detection of adversarial cyber attacks on electric vehicle charging stations
Published 2025-03-01“…However, the increasing deployment of EV charging infrastructures (EVCI) introduces cybersecurity challenges, particularly concerning the different vulnerabilities associated with them, leading to cyberattacks. …”
Get full text
Article -
296
THE IMPACT OF COVID-19 ON THE IT SECTOR: WAS THE ADJUSTMENT AS EASY AS IT SEEMED? THE CASE OF CROATIA
Published 2022-05-01“…In addition, this paper answers whether and to what extent IT companies had to adapt their business models and what other challenges (cybersecurity, new platforms, etc.) they had to respond to. …”
Get full text
Article -
297
DIGITAL SECURITY IN EDUCATIONAL TRAINING PROGRAMS: A STUDY BASED ON FUTURE TEACHERS’ PERCEPTIONS
Published 2023-06-01“…The specific intention is to determine their perception of the instruction they receive on digital matters, concretely on cybersecurity during their phase of pre-service. To carry out the project, the study resorted to a descriptive method by submitting the participants to a specifically designed questionnaire entitled “Digital Security Competence Required for Teachers”. …”
Get full text
Article -
298
The politics of digital sovereignty and the European Union’s legislation: navigating crises
Published 2025-02-01“…These crises manifest themselves in various forms, including cybersecurity threats, privacy issues and the economic dominance of global technology companies. …”
Get full text
Article -
299
Possibilities of using of hardware accelerators for intrusion detection and prevention systems
Published 2024-11-01“…The subject of this study is the capabilities of FPGA technology for cybersecurity solutions with the network interface accelerators of SmartNIC, as well as the technologies for building, deploying, supporting, and accelerating intrusion detection systems and intrusion prevention systems. …”
Get full text
Article -
300