Results 61 to 70 of about 2,569 (184)

Do deepfakes, digital replicas and human digital twins justify personality rights?

open access: yesThe Journal of World Intellectual Property, EarlyView.
Abstract Unauthorised deepfakes are deeply problematic, from the spreading of misinformation to non‐consensual pornographic content. This paper asks whether deepfakes, digital replicas and human digital twins justify personality rights. To address this question, it examines the harms that deepfakes can cause through disinformation, demeaning content ...
Hayleigh Bosher
wiley   +1 more source

Regulating critical technologies: National security and intellectual property

open access: yesThe Journal of World Intellectual Property, EarlyView.
Abstract In recent years, claims of ‘national security’ have surged internationally to protect various security interests including public health, economic security and cybersecurity. National industrial strategies for building critical technologies challenge the scope of ‘national security’ in international intellectual property (IP) protection ...
Phoebe Li, Atilla Kasap
wiley   +1 more source

Cyber Crime – Der digitalisierte Täter

open access: yesAustrian Law Journal, 2017
Der vorliegende Kommentar bezieht sich auf den Beitrag „Cyber Crime – der digitalisierte Täter“ von Susanne Reindl-Krauskopf (ALJ 2/2017, 110). Die Computerkriminalität ist aktuell wohl eines der am schnellsten wachsenden, aber auch unterschätztesten ...
Bergauer, Christian
doaj   +3 more sources

Technology Intercepts for Cyber Security Applied to Critical Infrastructures [PDF]

open access: yesJournal of Systemics, Cybernetics and Informatics, 2017
The implementation of a cyber security system for critical infrastructures requires the extensive use and the targeted application of the most modern computer and communication technologies.
Mario La Manna
doaj  

Cyber security in the age of COVID-19: A timeline and analysis of cyber-crime and cyber-attacks during the pandemic. [PDF]

open access: yesComput Secur, 2021
Lallie HS   +6 more
europepmc   +1 more source

Association of Adverse Childhood Experiences and Metabolic Syndrome: A Systematic Review and Meta‐Analysis

open access: yesObesity Reviews, EarlyView.
ABSTRACT Background The association between adverse childhood experiences (ACEs) and metabolic syndrome (MetS) across life course and its components (abdominal obesity, elevated blood pressure, dyslipidemia, and hyperglycemia) is poorly understood. Methods Three databases were screened for studies published January 2000–February 2024 that examined the ...
Joohan Kim   +4 more
wiley   +1 more source

Fighting in a warming world: The emergence of climatic considerations in the conduct of hostilities under international humanitarian law

open access: yesReview of European, Comparative &International Environmental Law, EarlyView.
Abstract This article seeks to assess the extent to which climatic considerations may be integrated into international humanitarian law (IHL). With evidence of significant greenhouse gas emissions from military actions in conflicts such as Gaza and Ukraine, the article highlights the climate impacts of armed conflict, showing how military activities ...
Mario Pasquale Amoroso
wiley   +1 more source

Mathematical Model for Determining the Degree of Propensity to Be Exposed to Cybercrime

open access: yesВестник Дагестанского государственного технического университета: Технические науки
Objective. The aim of the study is to develop a mathematical model for determining the relationship between cyber victimhood and the character traits inherent in victims of cyber fraud.
I. V. Karpasyuk, A. I. Karpasyuk
doaj   +1 more source

PERTANGGUNGJAWABAN LEMBAGA PERBANKAN TERHADAP PENCURIAN DATA NASABAH

open access: yesDialogia Iuridica, 2018
Cyber crime or cyber crime is basically an impact of technological developments that have changed the habit of the community that was originally conventional into a more modern habits or can be called a high technology society.
Lukmanul Hakim
doaj   +1 more source

Export controls and the energy transition: Aligning security and sustainability

open access: yesReview of European, Comparative &International Environmental Law, EarlyView.
Abstract This article examines how the accelerating use of export controls, once motivated by narrow security interests, can now affect the pace and success of the global energy transition. As strategic rivalry intensifies among the US, the EU and China, export controls increasingly target access to critical and emerging technologies such as advanced ...
Olga Hrynkiv
wiley   +1 more source

Home - About - Disclaimer - Privacy