Results 131 to 140 of about 142,803 (291)

Computational approaches for cyber social threats

open access: yesEPJ Data Science
This topical issue, Computational Approaches for Cyber Social Threats, showcases cutting-edge research that employs computational methods to tackle the pressing challenges of cyber social threats—such as fake news, disinformation, cyberbullying, hate ...
Francesco Pierri   +4 more
doaj   +1 more source

The Dual‐Use Conundrum of the Lisbon Treaty Regarding Space Governance: Solutions Through International Legal Interpretation?

open access: yesGlobal Policy, EarlyView.
ABSTRACT An inherent divide features within the Lisbon Treaty between civilian and military/security competences; something previously more obvious via the ‘pillar system's’ separations. This division follows the Member States (MS) (natural) protection of their military/defence autonomy; their core sovereign powers.
Charlie J. P. Bennett
wiley   +1 more source

EU Space Governance at the Threshold of A New Era

open access: yesGlobal Policy, EarlyView.
ABSTRACT This introductory article to the special issue “EU Space Governance at the Threshold of a New Era” explores the European Union's evolving role as a strategic actor in space. It argues that the EU is undergoing a fundamental shift from a regulatory to a security‐oriented approach, driven by institutional consolidation, technological ambition ...
Philip De Man, Jan Wouters
wiley   +1 more source

Studying Tech Diplomacy—Introduction to the Special Issue on Tech Diplomacy

open access: yesGlobal Policy, EarlyView.
ABSTRACT This article serves as an introduction to the special issue on tech diplomacy, exploring its emergence and evolution as a distinct approach to global affairs in the era of the Fourth Industrial Revolution. Originating with Denmark's 2017 “TechPlomacy” initiative, tech diplomacy has gained global momentum, with over two dozen countries adopting
Corneliu Bjola, Markus Kornprobst
wiley   +1 more source

Tech Diplomacy and the Digital International Order: The Case of the EU–U.S. Trade and Technology Council

open access: yesGlobal Policy, EarlyView.
ABSTRACT This article examines the evolving role of the U.S.–EU Trade and Technology Council (TTC) in advancing the EU's digital diplomacy, with a particular focus on its contribution to global digital ordering. Positioned at the intersection of normative engagement and regulatory coordination, the TTC operates as a hybrid mechanism that integrates ...
Corneliu Bjola, Raluca Csernatoni
wiley   +1 more source

Incremental Shifts, Strategic Orbits: The Evolution of EU Space Policy Through Gradual Security Linkages

open access: yesGlobal Policy, EarlyView.
ABSTRACT This article examines the evolution of European Union (EU) space policy through the lens of historical institutionalism, highlighting how security and defence considerations have been incrementally integrated into a domain originally framed as civilian and scientific.
Gustavo G. Müller, Philip De Man
wiley   +1 more source

From Tweets to Threats: A Survey of Cybersecurity Threat Detection Challenges, AI-Based Solutions and Potential Opportunities in X

open access: yesApplied Sciences
The pervasive use of social media platforms, such as X (formerly Twitter), has become a part of our daily lives, simultaneously increasing the threat of cyber attacks.
Omar Alsodi   +4 more
doaj   +1 more source

Beyond Manoeuvre Theory for European Defence

open access: yesGlobal Policy, EarlyView.
ABSTRACT This article contributes to the debate about European defence in the light of the Russo‐Ukraine war and growing doubts about US commitment to Europe. It argues that Europeans need to fundamentally relearn the ability to imagine military strategy from a European viewpoint.
Lukas Mengelkamp, Sam Vincent
wiley   +1 more source

Western Balkans as the Frontline of Russian Hybrid Warfare

open access: yesGlobal Policy, EarlyView.
ABSTRACT Hybrid warfare (HW) scholarship acknowledges the phenomenon's contextual and temporal specificity, yet its dominant conceptual framing has generated a literature largely centred on identifying and categorising hybrid activities. This focus has left the contextual vulnerabilities that enable hybrid threats (HTs) and shape an adversary's ...
Vesna Bojicic‐Dzelilovic
wiley   +1 more source

Home - About - Disclaimer - Privacy