The ‘Geopolitical Commission’: 40 Years in the Making?
Abstract In 2019, European Commission President Ursula von der Leyen promised MEPs she would deliver a ‘Geopolitical Commission’ during the five years of her term in office, unbeknown that the COVID‐19 pandemic and the Russian invasion of Ukraine were around the corner.
Robert Kissack
wiley +1 more source
AI-Driven intrusion detection and prevention systems to safeguard 6G networks from cyber threats. [PDF]
Chinnasamy P +7 more
europepmc +1 more source
Cyberattacks on Small Banks and the Impact on Local Banking Markets
Abstract Cyberattacks on small banks have direct and spillover effects in local markets. Following successful cyberattacks, hacked small banks experience a decline in deposit growth rates. This effect of cyberattacks is not observed in hacked large banks.
FABIAN GOGOLIN +2 more
wiley +1 more source
War as a Phenomenon of Inquiry in Management Studies
Abstract We argue that war as a phenomenon deserves more focused attention in management. First, we highlight why war is an important and relevant area of inquiry for management scholars. We then integrate scattered conversations on war in management studies into a framework structured around three building blocks – (a) the nature of war from an ...
Fabrice Lumineau, Arne Keller
wiley +1 more source
Evolving Zero Trust Architectures for AI-Driven Cyber Threats in Healthcare and Other High-Risk Data Environments: A Systematic Review. [PDF]
Zakhmi K +5 more
europepmc +1 more source
Do deepfakes, digital replicas and human digital twins justify personality rights?
Abstract Unauthorised deepfakes are deeply problematic, from the spreading of misinformation to non‐consensual pornographic content. This paper asks whether deepfakes, digital replicas and human digital twins justify personality rights. To address this question, it examines the harms that deepfakes can cause through disinformation, demeaning content ...
Hayleigh Bosher
wiley +1 more source
An AI-Driven Model to Enhance Sustainability for the Detection of Cyber Threats in IoT Environments. [PDF]
Alsulami MH.
europepmc +1 more source
Regulating critical technologies: National security and intellectual property
Abstract In recent years, claims of ‘national security’ have surged internationally to protect various security interests including public health, economic security and cybersecurity. National industrial strategies for building critical technologies challenge the scope of ‘national security’ in international intellectual property (IP) protection ...
Phoebe Li, Atilla Kasap
wiley +1 more source
A Comprehensive Survey of Privacy-Enhancing and Trust-Centric Cloud-Native Security Techniques Against Cyber Threats. [PDF]
Arif T, Jo B, Park JH.
europepmc +1 more source

