Designing Deliberative Lobbying: Three Institutional Solutions for an Open Lobby Democracy
Abstract Debates on lobbying regulation have focused overwhelmingly on transparency, yet disclosure alone does little to address the deeper democratic challenges of unequal power, narrow representation and public distrust. This article argues that lobbying regulation should be designed not only to make influence visible, but also to make it fairer and ...
Alberto Bitonti
wiley +1 more source
A unified low-carbon cybersecurity framework integrating energy-efficient intrusion detection, lightweight cryptography, and carbon-aware scheduling for edge-cloud architectures. [PDF]
Alshammari A.
europepmc +1 more source
The Insurance Data Security Model Law: Strengthening Cybersecurity Insurer-Policyholder Relationships and Protecting Consumers [PDF]
Idowu, Koyejo-Isaac
core +1 more source
Human + AI in Accounting: Early Evidence from the Field
ABSTRACT This paper provides early evidence on the integration and impact of generative artificial intelligence (GenAI) in accounting at the accountant and task levels. Using survey data from 277 professional accountants, we document substantial heterogeneity in adoption patterns, perceived benefits, and concerns about GenAI.
Jung Ho Choi, Chloe L. Xie
wiley +1 more source
A Cybersecurity NER Method Based on Hard and Easy Labeled Training Data Discrimination. [PDF]
Ye L, Wu Y, Zhang H, Ge M.
europepmc +1 more source
Abstract We investigate how the affordances of an online context shape the processes of social learning. Using a dataset of more than 11,000 posts from the fraud subdread on the dark web forum Dread, we examine how affordances of platform governance, connectivity, anonymity, invisibility, asynchronicity, and limited oversight influence the components ...
Fangzhou Wang, Timothy Dickinson
wiley +1 more source
AI-based intelligent sensing detection of cybersecurity threats using multimodal sensor data in smart devices. [PDF]
Latif M +6 more
europepmc +1 more source
It’s time for governments to help their citizens deal with cybersecurity [PDF]
Renaud, Karen
core
Technology for Whom and for What? A Global South View of Tech Diplomacy
ABSTRACT International politics is linked to its technical‐social character. Also, technology is socially constructed and thereby not entirely neutral or impartial. A tech‐driven geopolitical landscape has been a defining feature of contemporary world politics.
Eugenio V. Garcia
wiley +1 more source
AI-enabled cybersecurity framework for future 5G wireless infrastructures. [PDF]
Alam A, Umer A, Ullah I, Alsayat A.
europepmc +1 more source

