Results 111 to 120 of about 80,725 (273)

Studying Tech Diplomacy—Introduction to the Special Issue on Tech Diplomacy

open access: yesGlobal Policy, EarlyView.
ABSTRACT This article serves as an introduction to the special issue on tech diplomacy, exploring its emergence and evolution as a distinct approach to global affairs in the era of the Fourth Industrial Revolution. Originating with Denmark's 2017 “TechPlomacy” initiative, tech diplomacy has gained global momentum, with over two dozen countries adopting
Corneliu Bjola, Markus Kornprobst
wiley   +1 more source

Cyber security: State of the art, challenges and future directions

open access: yesCyber Security and Applications
Cyber security has become a very critical concern that needs the attention of researchers, academicians, and organizations to confidentially ensure the protection and security of information systems. Due to the increasing demand for digitalization, every
Wasyihun Sema Admass   +2 more
doaj   +1 more source

Tech Diplomacy and the Digital International Order: The Case of the EU–U.S. Trade and Technology Council

open access: yesGlobal Policy, EarlyView.
ABSTRACT This article examines the evolving role of the U.S.–EU Trade and Technology Council (TTC) in advancing the EU's digital diplomacy, with a particular focus on its contribution to global digital ordering. Positioned at the intersection of normative engagement and regulatory coordination, the TTC operates as a hybrid mechanism that integrates ...
Corneliu Bjola, Raluca Csernatoni
wiley   +1 more source

Standards-based Cyber Threat Intelligence sharing using private Blockchains [PDF]

open access: yesAnnals of computer science and information systems, 2023
Kimon-Antonios Provatas   +2 more
doaj   +1 more source

Transforming Cybersecurity into Critical Energy Infrastructure: A Study on the Effectiveness of Artificial Intelligence

open access: yesSystems
This work explores the integration and effectiveness of artificial intelligence in improving the security of critical energy infrastructure, highlighting its potential to transform cybersecurity practices in the sector.
Jaime Govea   +2 more
doaj   +1 more source

Incremental Shifts, Strategic Orbits: The Evolution of EU Space Policy Through Gradual Security Linkages

open access: yesGlobal Policy, EarlyView.
ABSTRACT This article examines the evolution of European Union (EU) space policy through the lens of historical institutionalism, highlighting how security and defence considerations have been incrementally integrated into a domain originally framed as civilian and scientific.
Gustavo G. Müller, Philip De Man
wiley   +1 more source

Blockchain-Based Model for Incentivized Cyber Threat Intelligence Sharing

open access: yesApplied Sciences
Sharing cyber threat intelligence (CTI) can significantly improve the security of information technology (IT) in organizations. However, stakeholders and practitioners are not keen on sharing CTI data due to the risk of exposing their private data and ...
Algimantas Venčkauskas   +3 more
doaj   +1 more source

Beyond Manoeuvre Theory for European Defence

open access: yesGlobal Policy, EarlyView.
ABSTRACT This article contributes to the debate about European defence in the light of the Russo‐Ukraine war and growing doubts about US commitment to Europe. It argues that Europeans need to fundamentally relearn the ability to imagine military strategy from a European viewpoint.
Lukas Mengelkamp, Sam Vincent
wiley   +1 more source

Developing a Cybersecurity Training Environment through the Integration of OpenAI and AWS

open access: yesApplied Sciences
Cybersecurity is a critical concern in today’s digital age, where organizations face an ever-evolving cyber threat landscape. This study explores the potential of leveraging artificial intelligence and Amazon Web Services to improve cybersecurity ...
William Villegas-Ch   +2 more
doaj   +1 more source

Western Balkans as the Frontline of Russian Hybrid Warfare

open access: yesGlobal Policy, EarlyView.
ABSTRACT Hybrid warfare (HW) scholarship acknowledges the phenomenon's contextual and temporal specificity, yet its dominant conceptual framing has generated a literature largely centred on identifying and categorising hybrid activities. This focus has left the contextual vulnerabilities that enable hybrid threats (HTs) and shape an adversary's ...
Vesna Bojicic‐Dzelilovic
wiley   +1 more source

Home - About - Disclaimer - Privacy