Results 81 to 90 of about 291,363 (254)

FROM CYBER WARFARE TO CYBER PEACE [PDF]

open access: yesAnnals: Series on Military Sciences
In current peace and security issues, a paradigm shift has occurred in the sense that the role of technological and scientific progress has increased explosively, especially the rapid development of information technology (IT) and artificial ...
Gheorghe BOARU
doaj   +1 more source

How and Why EU Institutions Promote the Digital Euro: The Politics of a Central Bank Digital Currency (CBDC)

open access: yesJCMS: Journal of Common Market Studies, EarlyView.
Abstract The future of money is a crucial issue in the digital age, and the emergence of central bank digital currencies (CBDCs) is widely recognised as a transformative development. However, despite its significant implications for monetary sovereignty, regulatory governance and strategic autonomy, we know relatively little about the political ...
Sebastian Heidebrecht
wiley   +1 more source

CODE-SMASH: Source-Code Vulnerability Detection Using Siamese and Multi-Level Neural Architecture

open access: yesIEEE Access
The rapid evolution of software development, propelled by competitive demands and the continuous integration of new features, frequently leads to inadvertent security oversights.
Sungmin Han   +5 more
doaj   +1 more source

The Intersection of Law and Ethics in Cyberwar: Some Reflections [PDF]

open access: yes, 2012
The purpose of this short essay is to reflect upon a few issues that illustrate how legal and ethical issues intersect in the cyber realm. Such an intersection should not be especially surprising., Historian Geoffrey Best insists, “[I]t must never be ...
Dunlap, Charles J., Jr.
core   +1 more source

War as a Phenomenon of Inquiry in Management Studies

open access: yesJournal of Management Studies, EarlyView.
Abstract We argue that war as a phenomenon deserves more focused attention in management. First, we highlight why war is an important and relevant area of inquiry for management scholars. We then integrate scattered conversations on war in management studies into a framework structured around three building blocks – (a) the nature of war from an ...
Fabrice Lumineau, Arne Keller
wiley   +1 more source

Thoughts about a General Theory of Influence in a DIME/PMESII/ASCOP/IRC2 Model [PDF]

open access: yes, 2019
The leading question of this paper is: “How would influence warfare (“iWar”) work and how can we simulate it?” The paper discusses foundational aspects of a theory and model of influence warfare by discussing a framework built along the DIME/PMESII/ASCOP
Kodalle, Thorsten   +3 more
core  

Smart Contracts and SME Resilience: Business Model Adaptation and International Considerations

open access: yesCanadian Journal of Administrative Sciences / Revue Canadienne des Sciences de l'Administration, Volume 43, Issue 1, March 2026.
ABSTRACT Smart contracts (SCs), appended to a blockchain, protect digital environments and their resources, processes and structures, reducing mismatches between legal and actual rights and ownership. They enhance digital resilience by improving transparency, traceability and trust in digital transactions.
Araz Zirar   +2 more
wiley   +1 more source

Cyber-Deception and Attribution in Capture-the-Flag Exercises

open access: yes, 2015
Attributing the culprit of a cyber-attack is widely considered one of the major technical and policy challenges of cyber-security. The lack of ground truth for an individual responsible for a given attack has limited previous studies.
Kulkarni, Nimish   +4 more
core   +1 more source

When DA VINCI Met Wallas: Extended Modeling of the Creative Process

open access: yesThe Journal of Creative Behavior, Volume 60, Issue 1, March 2026.
ABSTRACT By positing the centrality of process‐oriented definitions of creativity, the article revisits Graham Wallas's The Art of Thought, showing that its legacy extends beyond the canonical four‐stage model for the creative process. We first extract from Wallas's book some lesser known details that are proxies of metacognitive and emotional control.
Giovanni Emanuele Corazza, Sergio Agnoli
wiley   +1 more source

The Third World War? In The Cyberspace. Cyber Warfare in the Middle East.

open access: yesActa Informatica Pragensia, 2014
This article aims to provide a brief and comprehensive introduction to the issue of cyber warfare and to display the recent development in this area.
Martina, Eva
doaj  

Home - About - Disclaimer - Privacy