Results 161 to 170 of about 697,637 (332)
Situation Awareness for Cyber Resilience: A review
Emanuele Bellini +3 more
semanticscholar +1 more source
ABSTRACT This article examines the evolving role of the U.S.–EU Trade and Technology Council (TTC) in advancing the EU's digital diplomacy, with a particular focus on its contribution to global digital ordering. Positioned at the intersection of normative engagement and regulatory coordination, the TTC operates as a hybrid mechanism that integrates ...
Corneliu Bjola, Raluca Csernatoni
wiley +1 more source
Western Balkans as the Frontline of Russian Hybrid Warfare
ABSTRACT Hybrid warfare (HW) scholarship acknowledges the phenomenon's contextual and temporal specificity, yet its dominant conceptual framing has generated a literature largely centred on identifying and categorising hybrid activities. This focus has left the contextual vulnerabilities that enable hybrid threats (HTs) and shape an adversary's ...
Vesna Bojicic‐Dzelilovic
wiley +1 more source
Smart Airport Cybersecurity: Threat Mitigation and Cyber Resilience Controls. [PDF]
Lykou G, Anagnostopoulou A, Gritzalis D.
europepmc +1 more source
Thai Expectations of the EU's Evolving Security Role: Opportunities and Limitations
ABSTRACT This article analyses Thailand's perceptions of the European Union (EU) as an actor in the Indo‐Pacific, based on interviews with 13 government officials and foreign policy influencers conducted under the EU in the Indo‐Pacific (EUIP) Jean Monnet Network. It examines how Thai elites interpret the EU's priorities, geopolitical relevance and the
Natthanan Kunnamas, Heidi Maurer
wiley +1 more source
Exploring the Materiality of Data Breach Disclosures on the Australian Stock Exchange
This study examines Australian Stock Exchange (ASX) data breach announcements to provide insights into the extent and nature of data breach disclosures, as well as the costs, particularly to stakeholder relationships. Using a dataset of all data breach‐related announcements on the ASX, we identify a lack of data breach disclosure and, where disclosures
Jane Andrew +3 more
wiley +1 more source
How to Imagine Educational AI: The Filling of a Pail or the Lighting of a Fire?
Abstract Recent advances in artificial intelligence (e.g., machine learning, generative AI) have led to increased interest in its application in educational settings. AI companies hope to revolutionize teaching and learning by tailoring material to the individual needs of students, automating parts of teachers' jobs, or analyzing educational data to ...
Michał Wieczorek, Alberto Romele
wiley +1 more source
From products to smart solutions: A value‐creation approach
Abstract Smart solutions comprise a synergy of products, services, software, connectivity, data, and intelligence. This study examines the evolution of a manufacturer into a smart solution provider, highlighting the role of value‐creation capabilities, activities, and practices. Through a longitudinal, in‐depth single‐case study of a leading technology
Tayyab Warraich +4 more
wiley +1 more source
Integrating CTI and threat modeling for cyber resilience: An AHP assessment. [PDF]
Podlesnik L, Bernik I, Mihelič A.
europepmc +1 more source

