Results 161 to 170 of about 697,637 (332)

Situation Awareness for Cyber Resilience: A review

open access: yesInt. J. Crit. Infrastructure Prot.
Emanuele Bellini   +3 more
semanticscholar   +1 more source

Tech Diplomacy and the Digital International Order: The Case of the EU–U.S. Trade and Technology Council

open access: yesGlobal Policy, EarlyView.
ABSTRACT This article examines the evolving role of the U.S.–EU Trade and Technology Council (TTC) in advancing the EU's digital diplomacy, with a particular focus on its contribution to global digital ordering. Positioned at the intersection of normative engagement and regulatory coordination, the TTC operates as a hybrid mechanism that integrates ...
Corneliu Bjola, Raluca Csernatoni
wiley   +1 more source

Western Balkans as the Frontline of Russian Hybrid Warfare

open access: yesGlobal Policy, EarlyView.
ABSTRACT Hybrid warfare (HW) scholarship acknowledges the phenomenon's contextual and temporal specificity, yet its dominant conceptual framing has generated a literature largely centred on identifying and categorising hybrid activities. This focus has left the contextual vulnerabilities that enable hybrid threats (HTs) and shape an adversary's ...
Vesna Bojicic‐Dzelilovic
wiley   +1 more source

Thai Expectations of the EU's Evolving Security Role: Opportunities and Limitations

open access: yesGlobal Policy, EarlyView.
ABSTRACT This article analyses Thailand's perceptions of the European Union (EU) as an actor in the Indo‐Pacific, based on interviews with 13 government officials and foreign policy influencers conducted under the EU in the Indo‐Pacific (EUIP) Jean Monnet Network. It examines how Thai elites interpret the EU's priorities, geopolitical relevance and the
Natthanan Kunnamas, Heidi Maurer
wiley   +1 more source

Exploring the Materiality of Data Breach Disclosures on the Australian Stock Exchange

open access: yesAbacus, EarlyView.
This study examines Australian Stock Exchange (ASX) data breach announcements to provide insights into the extent and nature of data breach disclosures, as well as the costs, particularly to stakeholder relationships. Using a dataset of all data breach‐related announcements on the ASX, we identify a lack of data breach disclosure and, where disclosures
Jane Andrew   +3 more
wiley   +1 more source

How to Imagine Educational AI: The Filling of a Pail or the Lighting of a Fire?

open access: yesEducational Theory, EarlyView.
Abstract Recent advances in artificial intelligence (e.g., machine learning, generative AI) have led to increased interest in its application in educational settings. AI companies hope to revolutionize teaching and learning by tailoring material to the individual needs of students, automating parts of teachers' jobs, or analyzing educational data to ...
Michał Wieczorek, Alberto Romele
wiley   +1 more source

From products to smart solutions: A value‐creation approach

open access: yesEuropean Management Review, EarlyView.
Abstract Smart solutions comprise a synergy of products, services, software, connectivity, data, and intelligence. This study examines the evolution of a manufacturer into a smart solution provider, highlighting the role of value‐creation capabilities, activities, and practices. Through a longitudinal, in‐depth single‐case study of a leading technology
Tayyab Warraich   +4 more
wiley   +1 more source

Home - About - Disclaimer - Privacy