Results 141 to 150 of about 1,175,680 (325)

Big Data in Critical Infrastructures Security Monitoring: Challenges and Opportunities

open access: yes, 2014
Critical Infrastructures (CIs), such as smart power grids, transport systems, and financial infrastructures, are more and more vulnerable to cyber threats, due to the adoption of commodity computing facilities. Despite the use of several monitoring tools,
Aniello, L.   +10 more
core  

Studying Tech Diplomacy—Introduction to the Special Issue on Tech Diplomacy

open access: yesGlobal Policy, EarlyView.
ABSTRACT This article serves as an introduction to the special issue on tech diplomacy, exploring its emergence and evolution as a distinct approach to global affairs in the era of the Fourth Industrial Revolution. Originating with Denmark's 2017 “TechPlomacy” initiative, tech diplomacy has gained global momentum, with over two dozen countries adopting
Corneliu Bjola, Markus Kornprobst
wiley   +1 more source

Cyber security picture 2013 [PDF]

open access: yes
Summary: This report summarises cyber intrusion activity identified by or reported to the Cyber Security Operations Centre (CSOC) during 2013. It provides a broad overview of cyber threats to Australian government networks, as observed by the CSOC.

core  

Exploring School Teachers' Cyber Security Awareness, Experiences, and Practices in the Digital Age

open access: yesJournal of Cybersecurity Education, Research & Practice
This study investigates the awareness and practices of cyber security among school teachers, exploring their understanding of cyber threats, online behaviours, and response mechanisms to cyber incidents.
R Ravichandran, Sonam Singh, P Sasikala
doaj  

Computational approaches for cyber social threats

open access: yesEPJ Data Science
This topical issue, Computational Approaches for Cyber Social Threats, showcases cutting-edge research that employs computational methods to tackle the pressing challenges of cyber social threats—such as fake news, disinformation, cyberbullying, hate ...
Francesco Pierri   +4 more
doaj   +1 more source

Tech Diplomacy and the Digital International Order: The Case of the EU–U.S. Trade and Technology Council

open access: yesGlobal Policy, EarlyView.
ABSTRACT This article examines the evolving role of the U.S.–EU Trade and Technology Council (TTC) in advancing the EU's digital diplomacy, with a particular focus on its contribution to global digital ordering. Positioned at the intersection of normative engagement and regulatory coordination, the TTC operates as a hybrid mechanism that integrates ...
Corneliu Bjola, Raluca Csernatoni
wiley   +1 more source

Downside risk similarity and M&As

open access: yesContemporary Accounting Research, EarlyView.
Abstract Downside risks are ubiquitous and can profoundly impact firm operations and valuation. Failure to adequately assess and manage target firms' downside risks hinders acquirers' ability to integrate and manage these businesses. This article introduces a novel measure of firms' downside risk similarity (DRS) based on risk factor descriptions and ...
Lei Chen   +3 more
wiley   +1 more source

Exploring the Materiality of Data Breach Disclosures on the Australian Stock Exchange

open access: yesAbacus, EarlyView.
This study examines Australian Stock Exchange (ASX) data breach announcements to provide insights into the extent and nature of data breach disclosures, as well as the costs, particularly to stakeholder relationships. Using a dataset of all data breach‐related announcements on the ASX, we identify a lack of data breach disclosure and, where disclosures
Jane Andrew   +3 more
wiley   +1 more source

Home - About - Disclaimer - Privacy