Results 71 to 80 of about 359,822 (261)
The innocent hill walker [PDF]
Criminals are going to ever more extreme lengths to get access to company systems and home computers, according to Les Ball and Natalie ...
Ball, Les, Coull, Natalie
core +3 more sources
Strategies and Process of Trade Secret Misappropriation Mitigation: The Case of UK
ABSTRACT Trade Secrets (TS) are vital for innovation‐driven companies, and their loss can inflict significant financial and reputational damage, particularly in the absence of established policies to mitigate misappropriation in the UK. The current academic literature lacks detailed strategies for firms to effectively address these threats.
Oleksandra Ozcan, David Pickernell
wiley +1 more source
Victimización múltiple (bullying y ciberacoso) en la Educación Primaria en España desde una perspectiva de género [PDF]
Los estudios demuestran que la agresión cara a cara se extiende a otros tipos de comportamientos de acoso escolar a través de tecnologías digitales. La investigación actual es limitada en educación primaria y contradictoria en
Jiménez Cortés, Rocío
core
A “Tech First” Approach to Foreign Policy? The Three Meanings of Tech Diplomacy
ABSTRACT Scholars have recently argued that international politics is plagued by instability as the world rapidly transitions from one crisis to another. This state of “Permacrisis,” or permanent crises between states, is driven by technological innovations which create new kinds of crises and drive competitions between adversarial states.
Ilan Manor
wiley +1 more source
ABSTRACT An inherent divide features within the Lisbon Treaty between civilian and military/security competences; something previously more obvious via the ‘pillar system's’ separations. This division follows the Member States (MS) (natural) protection of their military/defence autonomy; their core sovereign powers.
Charlie J. P. Bennett
wiley +1 more source
Traditional and digital cyberbulling prevention
Introduction. The prevalence of information technology and the availability of the Internet have led to the emergence of a new form of bullying – cyberbullying.
A. A. Vikhman +2 more
doaj +1 more source
Cyber Aggression-Victimization Among Malaysians Youth
The usage of the Internet and other related technologies has never been without any consequences. One such consequence is what commonly referred to as cyber aggression, a new form of abusing someone online, which has become a new growing problem in today's society.
Fazal Rahim Khan +4 more
openaire +1 more source
Sharing the Same Playground? An Analysis of the Private Sector's Role in Tech Diplomacy
ABSTRACT This article takes the emergence of tech diplomacy as the motivation for an investigation into shifting relationships between traditional diplomatic actors and non‐state actors. The observation that ‘new diplomatic actors’ and new diplomatic venues have led to a ‘new kind of diplomacy’ dates back to at least the 1990s.
Katharina E. Höne
wiley +1 more source
Bullying in a networked era: a literature review [PDF]
This research update presents an aggregation and summary of recent academic literature on youth bullying. The purpose of this document is to “translate” scholarly research for a concerned public audience, which may include but is not limited to parents ...
Nathaniel Levy, Sandra Cortesi
core +1 more source
ABSTRACT This article examines the evolution of European Union (EU) space policy through the lens of historical institutionalism, highlighting how security and defence considerations have been incrementally integrated into a domain originally framed as civilian and scientific.
Gustavo G. Müller, Philip De Man
wiley +1 more source

