Results 141 to 150 of about 79,967 (299)

OPERATION OF CYBER SECURITY IN TERTIARY INSTITUTION IN NIGERIA: PROBLEMS AND WAY FORWARD

open access: yesAcademic Journal Research
Objective: This study examines the challenges affecting the operation of cybersecurity systems in Nigerian tertiary institutions and proposes strategic solutions to enhance cybersecurity resilience in higher education. Method: This position paper is based on a comprehensive review of secondary data sourced from print and online publications, focusing ...
Bintu Yunisa   +2 more
openaire   +1 more source

Western Balkans as the Frontline of Russian Hybrid Warfare

open access: yesGlobal Policy, EarlyView.
ABSTRACT Hybrid warfare (HW) scholarship acknowledges the phenomenon's contextual and temporal specificity, yet its dominant conceptual framing has generated a literature largely centred on identifying and categorising hybrid activities. This focus has left the contextual vulnerabilities that enable hybrid threats (HTs) and shape an adversary's ...
Vesna Bojicic‐Dzelilovic
wiley   +1 more source

Thai Expectations of the EU's Evolving Security Role: Opportunities and Limitations

open access: yesGlobal Policy, EarlyView.
ABSTRACT This article analyses Thailand's perceptions of the European Union (EU) as an actor in the Indo‐Pacific, based on interviews with 13 government officials and foreign policy influencers conducted under the EU in the Indo‐Pacific (EUIP) Jean Monnet Network. It examines how Thai elites interpret the EU's priorities, geopolitical relevance and the
Natthanan Kunnamas, Heidi Maurer
wiley   +1 more source

Countering cyber threats to Ukraine’s national security: institutional and preventive capability

open access: yesUzhhorod National University Herald. Series: Law
The article analyzes the mechanism of countering cyber threats to national security through the lens of developing the institutional and preventive capability of Ukraine. The relevance of the topic is driven by the intensified use of cyberspace as a tool of hybrid warfare, which necessitates a transition from fragmented security measures to special ...
openaire   +3 more sources

Reaching the Summit or a Plateau? The EU–New Zealand Relationship in the Indo‐Pacific

open access: yesGlobal Policy, EarlyView.
ABSTRACT This article examines New Zealand's perceptions of the European Union's Indo‐Pacific Strategy through interviews with government officials and foreign policy influencers. Despite viewing the EU positively as a like‐minded partner committed to the rule‐based international order, New Zealand respondents demonstrated limited understanding of the ...
Matthew Castle   +4 more
wiley   +1 more source

Reforming Export Control Regimes: Addressing Emerging Technologies Through Responsible Innovation

open access: yesGlobal Policy, EarlyView.
ABSTRACT The proliferation of dual‐use emerging technologies—such as artificial intelligence (AI), quantum computing, and additive manufacturing—poses a growing challenge for multilateral export control regimes. Designed for tangible goods and slower innovation cycles, existing arrangements increasingly struggle to govern technologies that are ...
Stella Blumfelde
wiley   +1 more source

Towards effective regional security architecture for the Asia Pacific [PDF]

open access: yes
The proliferation of multilateral security processes and institutions in the Asia Pacific in the wake of the Cold War is a testament to the region\u27s constructive and collegial spirit toward addressing security challenges.

core  

A Framework for Evaluating Global AI Governance Initiatives

open access: yesGlobal Policy, EarlyView.
ABSTRACT Efforts to develop global governance initiatives for artificial intelligence (AI) have increased significantly in recent years. However, these initiatives have generally had a limited impact due to their vagueness, lack of authority and repetition.
Huw Roberts   +2 more
wiley   +1 more source

Universities as the Next Counterintelligence Battleground in Geopolitical Contests

open access: yesGlobal Policy, EarlyView.
ABSTRACT Globally, universities are increasingly becoming the target of foreign national security actors, engaging in espionage, sabotage, foreign interference and intellectual property theft. Despite that, there has been no examination of the utilisation of counterintelligence approaches by universities to the threats they face from the subordination ...
Brendan Walker‐Munro   +1 more
wiley   +1 more source

Collaborating Across Boundaries: Toward an Integrated Cyber Risk Assessment by Internal Auditors and Cybersecurity Professionals Collaboration interprofessionnelle : vers une évaluation intégrée des cyberrisques par les auditeurs internes et les spécialistes en cybersécurité

open access: yesContemporary Accounting Research, EarlyView.
ABSTRACT Although cyber risk is widely recognized as a critical organizational threat, how firms configure internal roles and practices to address it remains poorly understood. This study offers insights into that question. In practice, two professional roles share the job of cyber risk assessment and assurance: cybersecurity specialists, who focus on ...
Sergeja Slapničar   +3 more
wiley   +1 more source

Home - About - Disclaimer - Privacy