ABSTRACT This study investigates how ordinary Taiwanese netizens perform linguistic authority by policing others’ use of Mainland Chinese expressions in everyday online interactions not originally intended to be political and how such policing is subsequently supported, resisted, or (de)legitimized in the context of Taiwan–China relations. Three orders
Hsi‐Yao Su
wiley +1 more source
Do deepfakes, digital replicas and human digital twins justify personality rights?
Abstract Unauthorised deepfakes are deeply problematic, from the spreading of misinformation to non‐consensual pornographic content. This paper asks whether deepfakes, digital replicas and human digital twins justify personality rights. To address this question, it examines the harms that deepfakes can cause through disinformation, demeaning content ...
Hayleigh Bosher
wiley +1 more source
Nation-States and Their Operations in Planting of Malware in Other Countries: Is It Legal Under International Law [PDF]
Chung, John J.
core +1 more source
Artificial intelligence driven multi agent framework for adaptive cyber attack simulation and automated incident response in cyber range environments. [PDF]
Agrawal A +3 more
europepmc +1 more source
Regulating critical technologies: National security and intellectual property
Abstract In recent years, claims of ‘national security’ have surged internationally to protect various security interests including public health, economic security and cybersecurity. National industrial strategies for building critical technologies challenge the scope of ‘national security’ in international intellectual property (IP) protection ...
Phoebe Li, Atilla Kasap
wiley +1 more source
Empowering the nursing workforce for cyber-resilience: Strategic preparedness and care management during hospital cyberattacks. [PDF]
Dorosti AM +3 more
europepmc +1 more source
The Impact of TikTok on Elections: (Mis)information and Regulatory Challenges
ABSTRACT TikTok's algorithm‐driven feed is reshaping electoral communication, yet a clear understanding of its effects is lacking. This study synthesizes and appraises evidence on how the platform's design and governance shape political (dis)information and may affect electoral dynamics.
Michele Giuseppe Giuranno +1 more
wiley +1 more source
Football cybersecurity threat severity prediction using multi-head transformer-based deep learning models. [PDF]
Hassan BM +5 more
europepmc +1 more source
Iran's Forward Defense in Sub‐Saharan Africa
Abstract This article examines Iran's security and defense initiatives in sub‐Saharan Africa between 1990 and 2024 and how they reflect the extraterritorial application of the regime's forward defense doctrine. In response to the long‐term erosion of its homeland defense capabilities since the Iran‐Iraq War of the 1980s—driven by infrastructure ...
Ariel Limanya Limbu, Ronen A. Cohen
wiley +1 more source

