Results 131 to 140 of about 76,134 (287)

Guide to Australia’s national security capability [PDF]

open access: yes
This paper provides a single consolidated picture of the capabilities that enable Australia to achieve national security outcomes in a range of environments, including domestically, at the border, offshore and in cyberspace.

core  

Western Balkans as the Frontline of Russian Hybrid Warfare

open access: yesGlobal Policy, EarlyView.
ABSTRACT Hybrid warfare (HW) scholarship acknowledges the phenomenon's contextual and temporal specificity, yet its dominant conceptual framing has generated a literature largely centred on identifying and categorising hybrid activities. This focus has left the contextual vulnerabilities that enable hybrid threats (HTs) and shape an adversary's ...
Vesna Bojicic‐Dzelilovic
wiley   +1 more source

Cyber Dating Abuse Among Spanish Emerging Adults: The Moderating Role of Resilience in the Association Between Perpetration and Victimization

open access: yesSAGE Open
Cyber dating abuse is a significant issue among emerging adults, with harmful implications for both victims and perpetrators. This study had two main objectives: first, to validate previous findings regarding the association between victimization and ...
Beatriz Víllora   +3 more
doaj   +1 more source

Thai Expectations of the EU's Evolving Security Role: Opportunities and Limitations

open access: yesGlobal Policy, EarlyView.
ABSTRACT This article analyses Thailand's perceptions of the European Union (EU) as an actor in the Indo‐Pacific, based on interviews with 13 government officials and foreign policy influencers conducted under the EU in the Indo‐Pacific (EUIP) Jean Monnet Network. It examines how Thai elites interpret the EU's priorities, geopolitical relevance and the
Natthanan Kunnamas, Heidi Maurer
wiley   +1 more source

Banking on resilience: 20 years of cybersecurity evolution

open access: yesSouth African Journal of Information Management
Background: The rise in cyberattacks, particularly targeting financial institutions, poses significant risks. A shift towards cyber threat resilience, emphasising proactive strategies for recovery and adaptation, is essential.
Ntokozo F. Miya, Nazeer Joseph
doaj   +1 more source

Reforming Export Control Regimes: Addressing Emerging Technologies Through Responsible Innovation

open access: yesGlobal Policy, EarlyView.
ABSTRACT The proliferation of dual‐use emerging technologies—such as artificial intelligence (AI), quantum computing, and additive manufacturing—poses a growing challenge for multilateral export control regimes. Designed for tangible goods and slower innovation cycles, existing arrangements increasingly struggle to govern technologies that are ...
Stella Blumfelde
wiley   +1 more source

Safety Science as a Source of Organizational Cyber Resilience in Incident Response

open access: yesIEEE Access
This paper presents a scoping review of how safety science is being applied in Incident Response (IR) to improve organisational cyber resilience.
Haula Sani Galadima   +3 more
doaj   +1 more source

Airport Cyber Security and Cyber Resilience Controls

open access: yes, 2019
Cyber Security scares are the main areas of demerits associated with the advent and widespread of internet technology. While the internet has improved life and business processes, the levels of security threats have been increasing proportionally. As such, the web and the related cyber systems have exposed the world to the state of continuous vigilance
openaire   +2 more sources

Protecting Critical Infrastructure in the EU [PDF]

open access: yes, 2010
Haemmerli, Bernard, Renda, Andrea
core   +1 more source

Universities as the Next Counterintelligence Battleground in Geopolitical Contests

open access: yesGlobal Policy, EarlyView.
ABSTRACT Globally, universities are increasingly becoming the target of foreign national security actors, engaging in espionage, sabotage, foreign interference and intellectual property theft. Despite that, there has been no examination of the utilisation of counterintelligence approaches by universities to the threats they face from the subordination ...
Brendan Walker‐Munro   +1 more
wiley   +1 more source

Home - About - Disclaimer - Privacy