Anthony Burke and Rita Parker: Global Insecurities: Futures of Global Chaos and Governance.
This innovative volume gathers some of the world’s best scholars to analyse the world’s collective international efforts to address globalised threats through global security governance.
Michaela Zemanová
doaj +5 more sources
Infrastructuring Cyberspace: Exploring China’s Imaginary and Practices of Selective Connectivity
Connectivity and fragmentation coexist as two interlinked discourses on the relationship between infrastructures and societies. In response to the Digital Silk Road initiated by the Chinese government, Chinese companies have built numerous digital ...
Ying Huang +2 more
doaj +1 more source
Institutional Foundations for Cyber Security: Current Responses and New Challenges [PDF]
Abstract : This paper profiles institutions that are responsible for addressing threats to cyber security. Rather than focusing primarily on the private sector, we analyze key organizations at the national, international, and intergovernmental level.
Stuart Madnick +2 more
openaire +2 more sources
Cyber governance in Africa: at the crossroads of politics, sovereignty and cooperation
Africa has recently focused on an ambition to achieve digital transformation through the pursuit of various flagship initiatives which are aimed at achieving its ‘Agenda 2063’ objectives. Digital transformation will be better achieved through appropriate
Nnenna Ifeanyi-Ajufo
doaj +1 more source
Understanding the Institutional Landscape of Cyber Security [PDF]
The decentralized architecture of the Internet, which has been key to its development and worldwide deployment, is making it challenging to secure Internet user experience. Many organizations claim to be playing a role in improving Internet security. If anything, the space of security-related institutions seems on first inspection to be over-populated ...
openaire +1 more source
Security-Informed Safety: Supporting Stakeholders with Codes of Practice [PDF]
Codes of practice provide principles and guidance on how organizations can incorporate security considerations into their safety engineering lifecycle and become more security ...
Bishop, P. G. +3 more
core +1 more source
This article is devoted to the study of information security in the EU member states, in particular Germany and France, in the context of the analysis of their national legislation, state, national programs and regulations.
Sviatoslav Kavyn +2 more
doaj +1 more source
Threat Artificial Intelligence and Cyber Security in Health Care Institutions [PDF]
In this work we go beyond what is called unsupervised learning, a decision-making method that results in large numbers of false positives and negatives. The study was carried out in cryopreservation laboratories and aims to gain access to the General Data Protection Regulation (GDPR) implementation.
Ana Fernandes +4 more
openaire +1 more source
Open Data, Grey Data, and Stewardship: Universities at the Privacy Frontier [PDF]
As universities recognize the inherent value in the data they collect and hold, they encounter unforeseen challenges in stewarding those data in ways that balance accountability, transparency, and protection of privacy, academic freedom, and intellectual
Borgman, Christine L.
core +3 more sources
STOP-IT: strategic, tactical, operational protection of water infrastructure against cyberphysical threats [PDF]
Water supply and sanitation infrastructures are essential for our welfare, but vulnerable to several attack types facilitated by the ever-changing landscapes of the digital world.
Bonet Gil, Enrique +2 more
core +1 more source

