Results 61 to 70 of about 1,932,514 (209)

Managing cyberattacks in wartime: The case of Ukraine

open access: yesPublic Administration Review, Volume 85, Issue 3, Page 619-627, May/June 2025.
Abstract Cybersecurity specialists face continual challenges in protecting organizations and societies from ever‐evolving cyberattacks. These challenges intensify dramatically in the context of war, yet our understanding of cyberattacks during wartime is limited.
Iryna Fyshchuk   +2 more
wiley   +1 more source

Australia's U‐Turn on Chinese Investment: A Neoclassical Realist Perspective

open access: yesPacific Focus, Volume 40, Issue 1, Page 37-68, April 2025.
The late 2010s saw a rise in restrictive foreign direct investment (FDI) policies, especially in developed nations. This research uses Australia's 2018 regulation as a case study to explore the political drivers behind the trend. Drawing on a neoclassical realist (NCR) framework, it focuses on the threat perceptions of the foreign policy executive ...
Rei Koga
wiley   +1 more source

Reality Winners

open access: yes
Critical Quarterly, Volume 67, Issue 4, Page 153-195, December 2025.
Lee Grieveson
wiley   +1 more source

Interconnected and resilient: A CGE analysis of AI‐driven cyberattacks in global trade

open access: yesRisk Analysis, Volume 45, Issue 4, Page 846-862, April 2025.
Abstract The burgeoning interconnectedness of global trade in the digital age not only presents enticing opportunities but also harbors potent vulnerabilities of artificial intelligence (AI)‐driven cyberattacks. This study explores the cascading impacts of these disruptive threats on economies, supply chains, and trade, utilizing the intricate lens of ...
Rehab Osman, Sherif El‐Gendy
wiley   +1 more source

Commodities and Power: Tracking Europe's Relations With Asia in the Classroom

open access: yesHistory Compass, Volume 23, Issue 3, March 2025.
ABSTRACT From their high point in the early 2000s, commodity histories seem to be in decline. If the publishing world has retreated, it is also the case that teaching with commodities has never been more rewarding. For the past few years, I have been experimenting with different variants of a class that aims to use recent scholarship on a half dozen ...
Adam Clulow
wiley   +1 more source

A Survey on Security and Privacy of Industry 4.0 and Beyond: Technical Aspects, Use Cases, Challenges, and Research Directions

open access: yesIEEE Open Journal of the Communications Society
Industry 4.0 and 5.0 offer a promising framework for connecting electro-mechanical systems to cyberspace, enabling real-time access, telecontrol, human-machine collaboration, and intelligent automation of industrial operations.
Gurjot Singh Gaba   +5 more
doaj   +1 more source

Framing algorithmic management: Constructed antagonism on HR technology websites

open access: yesNew Technology, Work and Employment, Volume 40, Issue 1, Page 102-123, March 2025.
Abstract Algorithmic management has been emerging in workplaces through human resource (HR) management technologies that allocate tasks, monitor work activity, and manage the productivity of employees. Growth of HR technologies has coincided with the rise of remote work, yet the role of technology providers in driving demand is under‐researched ...
Penny Williams, Maria Hameed Khan
wiley   +1 more source

I was wrong when I studied Russian nuclear weapons scientists

open access: yesAmerican Ethnologist, Volume 52, Issue 1, Page 58-63, February 2025.
Abstract Having successfully completed fieldwork in a US nuclear weapons community, I went to Russia to interview a handful of the country's nuclear weapons scientists. Epistemologically, I made the mistake of viewing them more as variant weapons designers rather than as Russians. More seriously, I failed to think through in advance the risks to myself
Hugh Gusterson
wiley   +1 more source

China's Use of Cyber Warfare: Espionage Meets Strategic Deterrence

open access: yesJournal of Strategic Security, 2011
This article presents three reasons for states to use cyber warfare and shows that cyberspace is—and will continue to be—a decisive element in China's strategy to ascend in the international system.
Magnus Hjortdal
doaj  

Górnictwo i przemysł Górnego Śląska w dobie Fridricha Antona von Heynitza i Fridricha Wilhelma von Redena, współtwórców potęgi gospodarczej Prus (1777-1807)

open access: yesKwartalnik Historii Kultury Materialnej, 2016
MINING AND INDUSTRY IN UPPER SILESIA IN THE TIMES OF FRIDRICH ANTON VON HEYNITZ AND FRIDRICH WILHELM VON REDEN, CO-CREATORS OF THE ECONOMIC POWER OF PRUSSIA (1777-1807) The article addresses the growth of the economic power of Prussia under the rule ...
Rafał Wiktor Kowalczyk
doaj  

Home - About - Disclaimer - Privacy