Results 61 to 70 of about 1,932,514 (209)
Managing cyberattacks in wartime: The case of Ukraine
Abstract Cybersecurity specialists face continual challenges in protecting organizations and societies from ever‐evolving cyberattacks. These challenges intensify dramatically in the context of war, yet our understanding of cyberattacks during wartime is limited.
Iryna Fyshchuk +2 more
wiley +1 more source
Australia's U‐Turn on Chinese Investment: A Neoclassical Realist Perspective
The late 2010s saw a rise in restrictive foreign direct investment (FDI) policies, especially in developed nations. This research uses Australia's 2018 regulation as a case study to explore the political drivers behind the trend. Drawing on a neoclassical realist (NCR) framework, it focuses on the threat perceptions of the foreign policy executive ...
Rei Koga
wiley +1 more source
Critical Quarterly, Volume 67, Issue 4, Page 153-195, December 2025.
Lee Grieveson
wiley +1 more source
Interconnected and resilient: A CGE analysis of AI‐driven cyberattacks in global trade
Abstract The burgeoning interconnectedness of global trade in the digital age not only presents enticing opportunities but also harbors potent vulnerabilities of artificial intelligence (AI)‐driven cyberattacks. This study explores the cascading impacts of these disruptive threats on economies, supply chains, and trade, utilizing the intricate lens of ...
Rehab Osman, Sherif El‐Gendy
wiley +1 more source
Commodities and Power: Tracking Europe's Relations With Asia in the Classroom
ABSTRACT From their high point in the early 2000s, commodity histories seem to be in decline. If the publishing world has retreated, it is also the case that teaching with commodities has never been more rewarding. For the past few years, I have been experimenting with different variants of a class that aims to use recent scholarship on a half dozen ...
Adam Clulow
wiley +1 more source
Industry 4.0 and 5.0 offer a promising framework for connecting electro-mechanical systems to cyberspace, enabling real-time access, telecontrol, human-machine collaboration, and intelligent automation of industrial operations.
Gurjot Singh Gaba +5 more
doaj +1 more source
Framing algorithmic management: Constructed antagonism on HR technology websites
Abstract Algorithmic management has been emerging in workplaces through human resource (HR) management technologies that allocate tasks, monitor work activity, and manage the productivity of employees. Growth of HR technologies has coincided with the rise of remote work, yet the role of technology providers in driving demand is under‐researched ...
Penny Williams, Maria Hameed Khan
wiley +1 more source
I was wrong when I studied Russian nuclear weapons scientists
Abstract Having successfully completed fieldwork in a US nuclear weapons community, I went to Russia to interview a handful of the country's nuclear weapons scientists. Epistemologically, I made the mistake of viewing them more as variant weapons designers rather than as Russians. More seriously, I failed to think through in advance the risks to myself
Hugh Gusterson
wiley +1 more source
China's Use of Cyber Warfare: Espionage Meets Strategic Deterrence
This article presents three reasons for states to use cyber warfare and shows that cyberspace is—and will continue to be—a decisive element in China's strategy to ascend in the international system.
Magnus Hjortdal
doaj
MINING AND INDUSTRY IN UPPER SILESIA IN THE TIMES OF FRIDRICH ANTON VON HEYNITZ AND FRIDRICH WILHELM VON REDEN, CO-CREATORS OF THE ECONOMIC POWER OF PRUSSIA (1777-1807) The article addresses the growth of the economic power of Prussia under the rule ...
Rafał Wiktor Kowalczyk
doaj

