Results 141 to 150 of about 142,803 (291)
Reaching the Summit or a Plateau? The EU–New Zealand Relationship in the Indo‐Pacific
ABSTRACT This article examines New Zealand's perceptions of the European Union's Indo‐Pacific Strategy through interviews with government officials and foreign policy influencers. Despite viewing the EU positively as a like‐minded partner committed to the rule‐based international order, New Zealand respondents demonstrated limited understanding of the ...
Matthew Castle +4 more
wiley +1 more source
Advancing cybersecurity: a comprehensive review of AI-driven detection techniques
As the number and cleverness of cyber-attacks keep increasing rapidly, it's more important than ever to have good ways to detect and prevent them.
Aya H. Salem +3 more
doaj +1 more source
Reforming Export Control Regimes: Addressing Emerging Technologies Through Responsible Innovation
ABSTRACT The proliferation of dual‐use emerging technologies—such as artificial intelligence (AI), quantum computing, and additive manufacturing—poses a growing challenge for multilateral export control regimes. Designed for tangible goods and slower innovation cycles, existing arrangements increasingly struggle to govern technologies that are ...
Stella Blumfelde
wiley +1 more source
A Framework for Evaluating Global AI Governance Initiatives
ABSTRACT Efforts to develop global governance initiatives for artificial intelligence (AI) have increased significantly in recent years. However, these initiatives have generally had a limited impact due to their vagueness, lack of authority and repetition.
Huw Roberts +2 more
wiley +1 more source
Modeling Cyber Threat Intelligence
Siri Bromander +4 more
openaire +1 more source
Universities as the Next Counterintelligence Battleground in Geopolitical Contests
ABSTRACT Globally, universities are increasingly becoming the target of foreign national security actors, engaging in espionage, sabotage, foreign interference and intellectual property theft. Despite that, there has been no examination of the utilisation of counterintelligence approaches by universities to the threats they face from the subordination ...
Brendan Walker‐Munro +1 more
wiley +1 more source
ABSTRACT Although cyber risk is widely recognized as a critical organizational threat, how firms configure internal roles and practices to address it remains poorly understood. This study offers insights into that question. In practice, two professional roles share the job of cyber risk assessment and assurance: cybersecurity specialists, who focus on ...
Sergeja Slapničar +3 more
wiley +1 more source
Exploring the Materiality of Data Breach Disclosures on the Australian Stock Exchange
This study examines Australian Stock Exchange (ASX) data breach announcements to provide insights into the extent and nature of data breach disclosures, as well as the costs, particularly to stakeholder relationships. Using a dataset of all data breach‐related announcements on the ASX, we identify a lack of data breach disclosure and, where disclosures
Jane Andrew +3 more
wiley +1 more source
Abstract This study explores the practical impact of blockchain technology (BCT), which contrasts strongly with literature that has predominantly hypothesised BCT's potential to disrupt accounting practice. We interviewed 44 practitioners and academics with knowledge of BCT across 13 countries and industries.
Musbaudeen Titilope Oladejo +3 more
wiley +1 more source
The ethics of responding to democratic backsliding abroad
Abstract The past decade has seen a marked shift as many previously liberal democratic states have backslidden, taking authoritarian turns. How should liberal actors respond to democratic backsliding by others? Although it might seem that it is vital for liberal actors to react robustly to avoid complicity or to maintain their liberal integrity, this ...
James Pattison
wiley +1 more source

