Results 81 to 90 of about 14,082 (218)
"Virtual disenfranchisement": cyber election meddling in the grey zones of international law [PDF]
This Article examines remotely conducted election meddling by cyber means in the context of international law and asks whether such cyber operations qualify as "internationally wrongful acts." An internationally wrongful act requires both a breach of a ...
Schmitt, Michael
core +2 more sources
Downside risk similarity and M&As
Abstract Downside risks are ubiquitous and can profoundly impact firm operations and valuation. Failure to adequately assess and manage target firms' downside risks hinders acquirers' ability to integrate and manage these businesses. This article introduces a novel measure of firms' downside risk similarity (DRS) based on risk factor descriptions and ...
Lei Chen +3 more
wiley +1 more source
Vulnerability assessment of high-voltage direct current transmission systems to cyberattacks
High-voltage direct current (HVDC) transmission systems demonstrate significant advantages in long-distance and high-capacity power transmission. Voltage-source converter-based HVDC (VSC-HVDC), with its flexible power flow control and independent active ...
Guo Rong, Liu Mengxiang, Deng Ruilong
doaj +1 more source
From Open Banking Regulation to Platform Orchestration: The Evolution of Digital Platform Governance
ABSTRACT This study contributes to information systems (IS) scholarship by extending platform governance theory to regulatory contexts, explaining how regulatory forces co‐evolve with technological architectures to shape openness and control. This research examines the evolution of platform governance in the context of open banking, where regulatory ...
Priyadharshini Muthukannan +3 more
wiley +1 more source
On 23 March 2025, a large-scale technical failure was recorded in the IT system of JSC «Ukrzaliznytsia», which led to the temporary unavailability of online ticketing services, blocking of service communication channels and loss of access to critical ...
D.I. Prokopovych-Tkachenko +4 more
doaj +1 more source
Countering Cyberattacks: Gaps in International Law and Prospects for Overcoming them
Objective: to categorize cyber attacks in the national and international legal sytems and to define legal measures to counter them at the international level.Methods: include doctrinal legal analysis, formal legal, comparative legal methods, synthesis ...
M. M. Rahman, T. K. Das
doaj +1 more source
Best Before? Expiring Central Bank Digital Currency and Loss Recovery
Abstract Physical cash enables payments in the absence of electricity or network coverage. Such offline payment functionality promotes the operational resilience and, particularly in developing countries, the accessibility of payments. Central banks are exploring issuing digital cash substitutes with similar offline payment functionality.
CHARLES M. KAHN +2 more
wiley +1 more source
Governance of Dual-Use Technologies: Theory and Practice [PDF]
The term dual-use characterizes technologies that can have both military and civilian applications. What is the state of current efforts to control the spread of these powerful technologies—nuclear, biological, cyber—that can simultaneously advance ...
Elisa D. Harris +2 more
core
War as a Phenomenon of Inquiry in Management Studies
Abstract We argue that war as a phenomenon deserves more focused attention in management. First, we highlight why war is an important and relevant area of inquiry for management scholars. We then integrate scattered conversations on war in management studies into a framework structured around three building blocks – (a) the nature of war from an ...
Fabrice Lumineau, Arne Keller
wiley +1 more source
Proportionality and its Applicability in the Realm of Cyber Attacks [PDF]
With an ever-increasing reliance on State cyber-attacks, the need for an international treaty governing the actions of Nation-States in the realm of cyberwarfare has never been greater.
Fenton, Hensey, III
core +1 more source

