Results 81 to 90 of about 291,363 (254)
FROM CYBER WARFARE TO CYBER PEACE [PDF]
In current peace and security issues, a paradigm shift has occurred in the sense that the role of technological and scientific progress has increased explosively, especially the rapid development of information technology (IT) and artificial ...
Gheorghe BOARU
doaj +1 more source
Abstract The future of money is a crucial issue in the digital age, and the emergence of central bank digital currencies (CBDCs) is widely recognised as a transformative development. However, despite its significant implications for monetary sovereignty, regulatory governance and strategic autonomy, we know relatively little about the political ...
Sebastian Heidebrecht
wiley +1 more source
CODE-SMASH: Source-Code Vulnerability Detection Using Siamese and Multi-Level Neural Architecture
The rapid evolution of software development, propelled by competitive demands and the continuous integration of new features, frequently leads to inadvertent security oversights.
Sungmin Han +5 more
doaj +1 more source
The Intersection of Law and Ethics in Cyberwar: Some Reflections [PDF]
The purpose of this short essay is to reflect upon a few issues that illustrate how legal and ethical issues intersect in the cyber realm. Such an intersection should not be especially surprising., Historian Geoffrey Best insists, “[I]t must never be ...
Dunlap, Charles J., Jr.
core +1 more source
War as a Phenomenon of Inquiry in Management Studies
Abstract We argue that war as a phenomenon deserves more focused attention in management. First, we highlight why war is an important and relevant area of inquiry for management scholars. We then integrate scattered conversations on war in management studies into a framework structured around three building blocks – (a) the nature of war from an ...
Fabrice Lumineau, Arne Keller
wiley +1 more source
Thoughts about a General Theory of Influence in a DIME/PMESII/ASCOP/IRC2 Model [PDF]
The leading question of this paper is: “How would influence warfare (“iWar”) work and how can we simulate it?” The paper discusses foundational aspects of a theory and model of influence warfare by discussing a framework built along the DIME/PMESII/ASCOP
Kodalle, Thorsten +3 more
core
Smart Contracts and SME Resilience: Business Model Adaptation and International Considerations
ABSTRACT Smart contracts (SCs), appended to a blockchain, protect digital environments and their resources, processes and structures, reducing mismatches between legal and actual rights and ownership. They enhance digital resilience by improving transparency, traceability and trust in digital transactions.
Araz Zirar +2 more
wiley +1 more source
Cyber-Deception and Attribution in Capture-the-Flag Exercises
Attributing the culprit of a cyber-attack is widely considered one of the major technical and policy challenges of cyber-security. The lack of ground truth for an individual responsible for a given attack has limited previous studies.
Kulkarni, Nimish +4 more
core +1 more source
When DA VINCI Met Wallas: Extended Modeling of the Creative Process
ABSTRACT By positing the centrality of process‐oriented definitions of creativity, the article revisits Graham Wallas's The Art of Thought, showing that its legacy extends beyond the canonical four‐stage model for the creative process. We first extract from Wallas's book some lesser known details that are proxies of metacognitive and emotional control.
Giovanni Emanuele Corazza, Sergio Agnoli
wiley +1 more source
The Third World War? In The Cyberspace. Cyber Warfare in the Middle East.
This article aims to provide a brief and comprehensive introduction to the issue of cyber warfare and to display the recent development in this area.
Martina, Eva
doaj

