Results 121 to 130 of about 359,822 (261)

The Impact of TikTok on Elections: (Mis)information and Regulatory Challenges

open access: yesKyklos, EarlyView.
ABSTRACT TikTok's algorithm‐driven feed is reshaping electoral communication, yet a clear understanding of its effects is lacking. This study synthesizes and appraises evidence on how the platform's design and governance shape political (dis)information and may affect electoral dynamics.
Michele Giuseppe Giuranno   +1 more
wiley   +1 more source

The national security argument for protection of domestic industries

open access: yes, 2019
Tracing the origin of the national security argument for protection of domestic industries to Adam Smith, Alexander Hamilton, and Friedrich List, we study its post-GATT applications with reference to Article XXI of the WTO.
CHENG, Kwok Hon, Leonard   +2 more
core  

Individual Criminal Responsibility for Cyber Aggression

open access: yesJournal of Conflict and Security Law, 2016
A computer network attack (CNA) will hardly amount to a crime of aggression since Article 8bis ICC Statute requires that it is carried out by a State and, more importantly, establishes a two fold threshold, which is difficult to pass. Assuming, arguendo, that a State-led CNA amounts to a crime of aggression, the question arises who may be held ...
openaire   +2 more sources

Iran's Forward Defense in Sub‐Saharan Africa

open access: yesMiddle East Policy, EarlyView.
Abstract This article examines Iran's security and defense initiatives in sub‐Saharan Africa between 1990 and 2024 and how they reflect the extraterritorial application of the regime's forward defense doctrine. In response to the long‐term erosion of its homeland defense capabilities since the Iran‐Iraq War of the 1980s—driven by infrastructure ...
Ariel Limanya Limbu, Ronen A. Cohen
wiley   +1 more source

Cyber-Deception and Attribution in Capture-the-Flag Exercises

open access: yes, 2015
Attributing the culprit of a cyber-attack is widely considered one of the major technical and policy challenges of cyber-security. The lack of ground truth for an individual responsible for a given attack has limited previous studies.
Kulkarni, Nimish   +4 more
core   +1 more source

Adaptasi cyber-aggression typology questionnaire (CATQ) ke dalam bahasa Indonesia

open access: yesActa Psychologica
Salah satu dampak negatif yang ditimbulkan dari perkembangan teknologi yaitu munculnya perilaku agresi di internet atau cyber-aggression. Oleh karena itu, diperlukan pengembangan instrumen untuk mengukur cyber-aggression.
Marindni Dewi Aprillia
semanticscholar   +1 more source

Signals, Red Lines, and Collision: The Israel‐Iran Spiral and US Intervention

open access: yesMiddle East Policy, EarlyView.
Abstract The Iran War erupted in February 2026 without UN authorization, and Washington's rationales—Iranian nuclear ambitions, missile capacity, and proxy threats—map more closely onto Israeli than US security interests. Why have we seen two major conflicts between these belligerents in less than one year?
Buğra Sari
wiley   +1 more source

Problematic Social Media Use and Cyber Aggression in Italian Adolescents: The Remarkable Role of Social Support. [PDF]

open access: yesInt J Environ Res Public Health, 2022
Borraccino A   +8 more
europepmc   +1 more source

The Tension Between Privacy and Security [PDF]

open access: yes, 2016
A Review of President’s Review Group on Intelligence and Communications Technologies, Liberty and Security in a Changing World, 2013 and United Nations Office of the High Commissioner, Report of the Special Rapporteur on the Right to Privacy, Joseph A ...
De Baets, Antoon, Maret, Susan
core   +2 more sources

Home - About - Disclaimer - Privacy