Results 121 to 130 of about 80,725 (273)

Reforming Export Control Regimes: Addressing Emerging Technologies Through Responsible Innovation

open access: yesGlobal Policy, EarlyView.
ABSTRACT The proliferation of dual‐use emerging technologies—such as artificial intelligence (AI), quantum computing, and additive manufacturing—poses a growing challenge for multilateral export control regimes. Designed for tangible goods and slower innovation cycles, existing arrangements increasingly struggle to govern technologies that are ...
Stella Blumfelde
wiley   +1 more source

Analysis and Characterization of Cyber Threats Leveraging the MITRE ATT&CK Database

open access: yesIEEE Access
MITRE ATT&CK is a comprehensive knowledge-base of adversary tactics, techniques, and procedures (TTP) based on real-world attack scenarios. It has been used in different sectors, such as government, academia, and industry, as a foundation for ...
Bader Al-Sada   +2 more
doaj   +1 more source

A Framework for Evaluating Global AI Governance Initiatives

open access: yesGlobal Policy, EarlyView.
ABSTRACT Efforts to develop global governance initiatives for artificial intelligence (AI) have increased significantly in recent years. However, these initiatives have generally had a limited impact due to their vagueness, lack of authority and repetition.
Huw Roberts   +2 more
wiley   +1 more source

Universities as the Next Counterintelligence Battleground in Geopolitical Contests

open access: yesGlobal Policy, EarlyView.
ABSTRACT Globally, universities are increasingly becoming the target of foreign national security actors, engaging in espionage, sabotage, foreign interference and intellectual property theft. Despite that, there has been no examination of the utilisation of counterintelligence approaches by universities to the threats they face from the subordination ...
Brendan Walker‐Munro   +1 more
wiley   +1 more source

A GPT-Based Approach for Cyber Threat Assessment

open access: yesAI
Background: The increasing prevalence of cyber threats in industrial cyber–physical systems (ICPSs) necessitates advanced solutions for threat detection and analysis.
Fahim Sufi
doaj   +1 more source

Collaborating Across Boundaries: Toward an Integrated Cyber Risk Assessment by Internal Auditors and Cybersecurity Professionals Collaboration interprofessionnelle : vers une évaluation intégrée des cyberrisques par les auditeurs internes et les spécialistes en cybersécurité

open access: yesContemporary Accounting Research, EarlyView.
ABSTRACT Although cyber risk is widely recognized as a critical organizational threat, how firms configure internal roles and practices to address it remains poorly understood. This study offers insights into that question. In practice, two professional roles share the job of cyber risk assessment and assurance: cybersecurity specialists, who focus on ...
Sergeja Slapničar   +3 more
wiley   +1 more source

Redefining Cyber Threat Intelligence with Artificial Intelligence: From Data Processing to Predictive Insights and Human–AI Collaboration

open access: yesApplied Sciences
The increasing complexity and scale of cyber threats have pushed Cyber Threat Intelligence (CTI) beyond the capabilities of traditional rule-based systems.
Mateo Barrios-González   +3 more
doaj   +1 more source

Exploring the Materiality of Data Breach Disclosures on the Australian Stock Exchange

open access: yesAbacus, EarlyView.
This study examines Australian Stock Exchange (ASX) data breach announcements to provide insights into the extent and nature of data breach disclosures, as well as the costs, particularly to stakeholder relationships. Using a dataset of all data breach‐related announcements on the ASX, we identify a lack of data breach disclosure and, where disclosures
Jane Andrew   +3 more
wiley   +1 more source

Cybersecurity: mapping the ethical terrain [PDF]

open access: yes
This edited collection examines the ethical trade-offs involved in cybersecurity: between security and privacy; individual rights and the good of a society; and between the types of burdens placed on particular groups in order to protect others ...
Adam C. Gastineau   +5 more
core  

The ethics of responding to democratic backsliding abroad

open access: yesAmerican Journal of Political Science, EarlyView.
Abstract The past decade has seen a marked shift as many previously liberal democratic states have backslidden, taking authoritarian turns. How should liberal actors respond to democratic backsliding by others? Although it might seem that it is vital for liberal actors to react robustly to avoid complicity or to maintain their liberal integrity, this ...
James Pattison
wiley   +1 more source

Home - About - Disclaimer - Privacy