Results 71 to 80 of about 359,822 (261)

The innocent hill walker [PDF]

open access: yes, 2012
Criminals are going to ever more extreme lengths to get access to company systems and home computers, according to Les Ball and Natalie ...
Ball, Les, Coull, Natalie
core   +3 more sources

Strategies and Process of Trade Secret Misappropriation Mitigation: The Case of UK

open access: yesStrategic Change, EarlyView.
ABSTRACT Trade Secrets (TS) are vital for innovation‐driven companies, and their loss can inflict significant financial and reputational damage, particularly in the absence of established policies to mitigate misappropriation in the UK. The current academic literature lacks detailed strategies for firms to effectively address these threats.
Oleksandra Ozcan, David Pickernell
wiley   +1 more source

Victimización múltiple (bullying y ciberacoso) en la Educación Primaria en España desde una perspectiva de género [PDF]

open access: yes, 2019
Los estudios demuestran que la agresión cara a cara se extiende a otros tipos de comportamientos de acoso escolar a través de tecnologías digitales. La investigación actual es limitada en educación primaria y contradictoria en
Jiménez Cortés, Rocío
core  

A “Tech First” Approach to Foreign Policy? The Three Meanings of Tech Diplomacy

open access: yesGlobal Policy, EarlyView.
ABSTRACT Scholars have recently argued that international politics is plagued by instability as the world rapidly transitions from one crisis to another. This state of “Permacrisis,” or permanent crises between states, is driven by technological innovations which create new kinds of crises and drive competitions between adversarial states.
Ilan Manor
wiley   +1 more source

The Dual‐Use Conundrum of the Lisbon Treaty Regarding Space Governance: Solutions Through International Legal Interpretation?

open access: yesGlobal Policy, EarlyView.
ABSTRACT An inherent divide features within the Lisbon Treaty between civilian and military/security competences; something previously more obvious via the ‘pillar system's’ separations. This division follows the Member States (MS) (natural) protection of their military/defence autonomy; their core sovereign powers.
Charlie J. P. Bennett
wiley   +1 more source

Traditional and digital cyberbulling prevention

open access: yesВестник Мининского университета, 2021
Introduction. The prevalence of information technology and the availability of the Internet have led to the emergence of a new form of bullying – cyberbullying.
A. A. Vikhman   +2 more
doaj   +1 more source

Cyber Aggression-Victimization Among Malaysians Youth

open access: yesAsian Journal of University Education, 2021
The usage of the Internet and other related technologies has never been without any consequences. One such consequence is what commonly referred to as cyber aggression, a new form of abusing someone online, which has become a new growing problem in today's society.
Fazal Rahim Khan   +4 more
openaire   +1 more source

Sharing the Same Playground? An Analysis of the Private Sector's Role in Tech Diplomacy

open access: yesGlobal Policy, EarlyView.
ABSTRACT This article takes the emergence of tech diplomacy as the motivation for an investigation into shifting relationships between traditional diplomatic actors and non‐state actors. The observation that ‘new diplomatic actors’ and new diplomatic venues have led to a ‘new kind of diplomacy’ dates back to at least the 1990s.
Katharina E. Höne
wiley   +1 more source

Bullying in a networked era: a literature review [PDF]

open access: yes, 2012
This research update presents an aggregation and summary of recent academic literature on youth bullying. The purpose of this document is to “translate” scholarly research for a concerned public audience, which may include but is not limited to parents ...
Nathaniel Levy, Sandra Cortesi
core   +1 more source

Incremental Shifts, Strategic Orbits: The Evolution of EU Space Policy Through Gradual Security Linkages

open access: yesGlobal Policy, EarlyView.
ABSTRACT This article examines the evolution of European Union (EU) space policy through the lens of historical institutionalism, highlighting how security and defence considerations have been incrementally integrated into a domain originally framed as civilian and scientific.
Gustavo G. Müller, Philip De Man
wiley   +1 more source

Home - About - Disclaimer - Privacy