Results 81 to 90 of about 14,082 (218)

"Virtual disenfranchisement": cyber election meddling in the grey zones of international law [PDF]

open access: yes, 2018
This Article examines remotely conducted election meddling by cyber means in the context of international law and asks whether such cyber operations qualify as "internationally wrongful acts." An internationally wrongful act requires both a breach of a ...
Schmitt, Michael
core   +2 more sources

Downside risk similarity and M&As

open access: yesContemporary Accounting Research, EarlyView.
Abstract Downside risks are ubiquitous and can profoundly impact firm operations and valuation. Failure to adequately assess and manage target firms' downside risks hinders acquirers' ability to integrate and manage these businesses. This article introduces a novel measure of firms' downside risk similarity (DRS) based on risk factor descriptions and ...
Lei Chen   +3 more
wiley   +1 more source

Vulnerability assessment of high-voltage direct current transmission systems to cyberattacks

open access: yesSecurity and Safety
High-voltage direct current (HVDC) transmission systems demonstrate significant advantages in long-distance and high-capacity power transmission. Voltage-source converter-based HVDC (VSC-HVDC), with its flexible power flow control and independent active ...
Guo Rong, Liu Mengxiang, Deng Ruilong
doaj   +1 more source

From Open Banking Regulation to Platform Orchestration: The Evolution of Digital Platform Governance

open access: yesInformation Systems Journal, EarlyView.
ABSTRACT This study contributes to information systems (IS) scholarship by extending platform governance theory to regulatory contexts, explaining how regulatory forces co‐evolve with technological architectures to shape openness and control. This research examines the evolution of platform governance in the context of open banking, where regulatory ...
Priyadharshini Muthukannan   +3 more
wiley   +1 more source

Cognitive methods of countering insider and sophisticated cyber attacks: analysis of an incident in the IT infrastructure of JSC «Ukrzaliznytsia»

open access: yesТехнічна інженерія
On 23 March 2025, a large-scale technical failure was recorded in the IT system of JSC «Ukrzaliznytsia», which led to the temporary unavailability of online ticketing services, blocking of service communication channels and loss of access to critical ...
D.I. Prokopovych-Tkachenko   +4 more
doaj   +1 more source

Countering Cyberattacks: Gaps in International Law and Prospects for Overcoming them

open access: yesJournal of Digital Technologies and Law
Objective: to categorize cyber attacks in the national and international legal sytems and to define legal measures to counter them at the international level.Methods: include doctrinal legal analysis, formal legal, comparative legal methods, synthesis ...
M. M. Rahman, T. K. Das
doaj   +1 more source

Best Before? Expiring Central Bank Digital Currency and Loss Recovery

open access: yesJournal of Money, Credit and Banking, EarlyView.
Abstract Physical cash enables payments in the absence of electricity or network coverage. Such offline payment functionality promotes the operational resilience and, particularly in developing countries, the accessibility of payments. Central banks are exploring issuing digital cash substitutes with similar offline payment functionality.
CHARLES M. KAHN   +2 more
wiley   +1 more source

Governance of Dual-Use Technologies: Theory and Practice [PDF]

open access: yes, 2016
The term dual-use characterizes technologies that can have both military and civilian applications. What is the state of current efforts to control the spread of these powerful technologies—nuclear, biological, cyber—that can simultaneously advance ...
Elisa D. Harris   +2 more
core  

War as a Phenomenon of Inquiry in Management Studies

open access: yesJournal of Management Studies, EarlyView.
Abstract We argue that war as a phenomenon deserves more focused attention in management. First, we highlight why war is an important and relevant area of inquiry for management scholars. We then integrate scattered conversations on war in management studies into a framework structured around three building blocks – (a) the nature of war from an ...
Fabrice Lumineau, Arne Keller
wiley   +1 more source

Proportionality and its Applicability in the Realm of Cyber Attacks [PDF]

open access: yes, 2019
With an ever-increasing reliance on State cyber-attacks, the need for an international treaty governing the actions of Nation-States in the realm of cyberwarfare has never been greater.
Fenton, Hensey, III
core   +1 more source

Home - About - Disclaimer - Privacy