Results 61 to 70 of about 2,569 (184)
Do deepfakes, digital replicas and human digital twins justify personality rights?
Abstract Unauthorised deepfakes are deeply problematic, from the spreading of misinformation to non‐consensual pornographic content. This paper asks whether deepfakes, digital replicas and human digital twins justify personality rights. To address this question, it examines the harms that deepfakes can cause through disinformation, demeaning content ...
Hayleigh Bosher
wiley +1 more source
Regulating critical technologies: National security and intellectual property
Abstract In recent years, claims of ‘national security’ have surged internationally to protect various security interests including public health, economic security and cybersecurity. National industrial strategies for building critical technologies challenge the scope of ‘national security’ in international intellectual property (IP) protection ...
Phoebe Li, Atilla Kasap
wiley +1 more source
Cyber Crime – Der digitalisierte Täter
Der vorliegende Kommentar bezieht sich auf den Beitrag „Cyber Crime – der digitalisierte Täter“ von Susanne Reindl-Krauskopf (ALJ 2/2017, 110). Die Computerkriminalität ist aktuell wohl eines der am schnellsten wachsenden, aber auch unterschätztesten ...
Bergauer, Christian
doaj +3 more sources
Technology Intercepts for Cyber Security Applied to Critical Infrastructures [PDF]
The implementation of a cyber security system for critical infrastructures requires the extensive use and the targeted application of the most modern computer and communication technologies.
Mario La Manna
doaj
Cyber security in the age of COVID-19: A timeline and analysis of cyber-crime and cyber-attacks during the pandemic. [PDF]
Lallie HS +6 more
europepmc +1 more source
ABSTRACT Background The association between adverse childhood experiences (ACEs) and metabolic syndrome (MetS) across life course and its components (abdominal obesity, elevated blood pressure, dyslipidemia, and hyperglycemia) is poorly understood. Methods Three databases were screened for studies published January 2000–February 2024 that examined the ...
Joohan Kim +4 more
wiley +1 more source
Abstract This article seeks to assess the extent to which climatic considerations may be integrated into international humanitarian law (IHL). With evidence of significant greenhouse gas emissions from military actions in conflicts such as Gaza and Ukraine, the article highlights the climate impacts of armed conflict, showing how military activities ...
Mario Pasquale Amoroso
wiley +1 more source
Mathematical Model for Determining the Degree of Propensity to Be Exposed to Cybercrime
Objective. The aim of the study is to develop a mathematical model for determining the relationship between cyber victimhood and the character traits inherent in victims of cyber fraud.
I. V. Karpasyuk, A. I. Karpasyuk
doaj +1 more source
PERTANGGUNGJAWABAN LEMBAGA PERBANKAN TERHADAP PENCURIAN DATA NASABAH
Cyber crime or cyber crime is basically an impact of technological developments that have changed the habit of the community that was originally conventional into a more modern habits or can be called a high technology society.
Lukmanul Hakim
doaj +1 more source
Export controls and the energy transition: Aligning security and sustainability
Abstract This article examines how the accelerating use of export controls, once motivated by narrow security interests, can now affect the pace and success of the global energy transition. As strategic rivalry intensifies among the US, the EU and China, export controls increasingly target access to critical and emerging technologies such as advanced ...
Olga Hrynkiv
wiley +1 more source

