Results 51 to 60 of about 10,182 (242)

How Changing Narratives About the Future Shape Policymaking for the Long Term

open access: yesEuropean Policy Analysis, EarlyView.
ABSTRACT How can we explain decisions by governments to engage in policy investments—accepting short‐term costs in return for anticipated gains in the longer term—after previously sustaining the status quo? Our article examines the role of narratives in changing expectations about the future as a key driver of intertemporal policymaking. In light of an
Pieter Tuytens, Charlotte Haberstroh
wiley   +1 more source

Policy Spandrels: How Design Decisions Can Open Up Spaces for Unintended Policy Change

open access: yesEuropean Policy Analysis, EarlyView.
ABSTRACT This article introduces the concept of policy spandrels to make sense of public policies producing second‐order effects that are unintentional from the perspective of policy design and yet are fraught with consequences. By analogy with architectural spandrels—leftover spaces that can be used for unforeseen purposes—policy change can be enabled
Martino Maggetti
wiley   +1 more source

A smart configuration of computer as a prevention from hacking and cyber espionage [PDF]

open access: yesTehnika, 2016
In a modern business world, IT systems are frequently exposed to attacks, business espionage and the other cyber incidents. Many software tools of nowadays got a remote access option to another computer which is suitable for a cyber espionage as well as ...
Đekić Milica D.
doaj   +1 more source

Constructive Memory in Truth‐Telling for Reconciliation

open access: yesJournal of Applied Philosophy, EarlyView.
ABSTRACT Truth‐telling has, in diverse contexts, been conceptualised as a vehicle for achieving reconciliation following injustice. As a social and political phenomenon, it involves the communication of narratives grounded in episodic memory. Such narratives may fail to reproduce the details of past events and may even include details that were not ...
Alberto Guerrero‐Velázquez   +1 more
wiley   +1 more source

Intention to Hack? Applying the Theory of Planned Behaviour to Youth Criminal Hacking

open access: yesForensic Sciences
Adolescents are currently the most digitally connected generation in history. There is an ever-growing need to understand how typical adolescent risk-taking intersects with the vastly criminogenic potential of digital technology.
Mary P. Aiken   +5 more
doaj   +1 more source

Ethical Hacking

open access: yes, 2019
How will governments and courts protect civil liberties in this new era of hacktivism? Ethical Hacking discusses the attendant moral and legal issues. The first part of the 21st century will likely go down in history as the era when ethical hackers opened governments and the line of transparency moved by force.
openaire   +4 more sources

Major Cybersecurity Breaches: Shaping Corporate Cybersecurity Policies and Closing the Gaps

open access: yesJournal of Corporate Accounting &Finance, EarlyView.
ABSTRACT As digitalization accelerates, cybercrime has intensified in both scale and impact over the past two decades. This study aims to critically examine major cybersecurity events, assess them through the lens of routine activity theory, examine insight from three other established criminological and organizational theories, and address central ...
Laura K. Rickett, Deborah Smith
wiley   +1 more source

Digital Security in Human Security: A Case Study of the Bjorka Hacking Incident

open access: yesPoliticos
The issue of human security in the digital era has garnered attention in line with technological advancements. The threats to individual privacy and security have become increasingly evident, particularly following the hacking incident by Bjorka in ...
Nadia Varayandita Ingrida, Dody Wibowo
doaj   +1 more source

A Comprehensive Overview of Government Hacking Worldwide

open access: yesIEEE Access, 2018
There has been an ongoing and heated public policy debate on the appropriate role of and limitations to government hacking in maintaining a proper balance of national security and privacy. Asserting that they are compelled to use government hacking tools
Chen-Yu Li   +4 more
doaj   +1 more source

The Role of Knowledge‐Based Resources in Leveraging Business Analytics

open access: yesKnowledge and Process Management, EarlyView.
ABSTRACT Business analytics enhances managerial decision‐making. To this end, previous research guides firms to combine their tangible business analytics resources, such as data and technology, with intangible knowledge‐based business analytics resources to enable that business analytics supports decision‐making.
Johanna Orjatsalo   +2 more
wiley   +1 more source

Home - About - Disclaimer - Privacy