Results 131 to 140 of about 1,657,998 (333)

Cyber-attacks and International Law of Armed Conflicts; a “Jus Ad Bellum†Perspective [PDF]

open access: yes, 2013
This article highlights legal problems of cyber attacks from a ‘jus ad bellum’ perspective (International dispositions regarding the justification for entering a war). Since no International instrument whatsoever cover the cyber attacks the analogies
Remus, T. (Titiriga)
core  

The Relationship Between Premorbid Weight Status and Eating Disorder Onset in Adolescents: A Longitudinal Study

open access: yesInternational Journal of Eating Disorders, EarlyView.
ABSTRACT Objective Adolescents with higher weight status (HWS; body mass index > 85th percentile adjusted for age and sex) are at greater risk of eating disorders (ED). This study examined factors associated with HWS adolescents' increased risk and how weight status interacts with other risk factors to influence ED onset. Method Australian adolescents (
Gabriela Tavella   +5 more
wiley   +1 more source

CHALLENGES OF GRANTING THE STATUS OF CASUS BELLI TO A CYBERATTACK ON A NATO MEMBER STATE

open access: yesПравовое государство: теория и практика
The article analyzes the problems associated with recognizing a cyberattack on a NATO member state as a reason to declare war (casus belli). The article reveals the evolution of the Alliance's approaches to the issues of cyber threats and cyber defense ...
KHODANOV Andrei Ivanovich
doaj   +1 more source

“On target”: precision and balance in the contemporary law of targeting [PDF]

open access: yes, 2014
The law of targeting lies at the heart of international humanitarian law (IHL). As such it is the fulcrum around which discussion of combat operations revolves.
Schmitt, Michael N., Widmar, Eric
core  

EU Policy‐Making in the Digital Age: Major Trends and Insights From Public Policy Research

open access: yesEuropean Policy Analysis, EarlyView.
ABSTRACT Has digitalization changed policy‐making dynamics at the European Union (EU) level? To investigate this issue, this article presents a scoping review of the literature on EU digital policy‐making. While much scholarship adopts a ‘Governance’ approach, two conceptually rich strands emerge: critical approaches, and digital sovereignty.
Chloé Bérut
wiley   +1 more source

Human Trafficking and Terrorism: Utilizing National Security Resources to Prevent Human Trafficking in the Islamic State [PDF]

open access: yes, 2014
This is a report of a Master’s thesis done in behalf of the local network in Stockholm, under Fortum Distribution AB. The thesis was to conduct a review of a distribution station named Fs Myrängen located in Täby.
Welch, Shannon A.
core   +1 more source

Data‐Driven Dual‐Channel Dynamic Event‐Triggered Load Frequency Control for Multiarea Power Systems Under DoS Attacks

open access: yesEnergy Science &Engineering, EarlyView.
ABSTRACT System dynamics uncertainties and cyberattacks pose significant challenges to load frequency control in power systems. This paper presents a data‐driven load frequency control strategy for interconnected multi‐area power systems subject to denial‐of‐service attacks that disrupt both feedforward and feedback communication channels.
Yuhao Chen   +4 more
wiley   +1 more source

The war of attrition in cyber-space or "cyber-attacks", "cyber-war" and "cyber-terrorism"

open access: yes, 2013
Nos últimos anos tornou-se óbvio que o mundo virtual das bases de dados e do software – popularmente denominado como ciberespaço – tem um lado negro. Este lado negro tem várias dimensões, nomeadamente perda de produtividade, crime financeiro, furto de propriedade intelectual, de identidade, bullying e outros.
openaire   +1 more source

The Role of Digital Twin Technology in Enhancing Energy Efficiency in Buildings: A Systematic Literature Review

open access: yesEnergy Science &Engineering, EarlyView.
Digital Twin (DT) technology enhances building energy efficiency by enabling continuous monitoring, predictive maintenance, and operational optimization within Building Energy Management Systems. Through real‐time data integration and simulation, DTs provide dynamic feedback loops that optimize performance, reduce operational costs, and improve ...
Suqi Wang   +6 more
wiley   +1 more source

CYBER RISK MANAGEMENT IN THE BUSINESS STRATEGIES OF HEALTHCARE INSTITUTIONS AND COMPLIANCE WITH DIGITAL PATIENTS' RIGHTS: EU EXPERIENCE AND PROPOSALS FOR UKRAINE IN WARTIME

open access: yesBaltic Journal of Economic Studies
The article examines the issues of cyber risk management in the business strategies of healthcare institutions operating in the European Union, in order to ensure the digital protection of patients and reduce potential negative economic losses.
Oleh Zaiarnyi
doaj   +1 more source

Home - About - Disclaimer - Privacy