Results 11 to 20 of about 79,039 (285)

Anthony Burke and Rita Parker: Global Insecurities: Futures of Global Chaos and Governance.

open access: yesCzech Journal of International Relations, 2019
This innovative volume gathers some of the world’s best scholars to analyse the world’s collective international efforts to address globalised threats through global security governance.
Michaela Zemanová
doaj   +5 more sources

Infrastructuring Cyberspace: Exploring China’s Imaginary and Practices of Selective Connectivity

open access: yesInternational Quarterly for Asian Studies, 2022
Connectivity and fragmentation coexist as two interlinked discourses on the relationship between infrastructures and societies. In response to the Digital Silk Road initiated by the Chinese government, Chinese companies have built numerous digital ...
Ying Huang   +2 more
doaj   +1 more source

Institutional Foundations for Cyber Security: Current Responses and New Challenges [PDF]

open access: yesSSRN Electronic Journal, 2011
Abstract : This paper profiles institutions that are responsible for addressing threats to cyber security. Rather than focusing primarily on the private sector, we analyze key organizations at the national, international, and intergovernmental level.
Stuart Madnick   +2 more
openaire   +2 more sources

Cyber governance in Africa: at the crossroads of politics, sovereignty and cooperation

open access: yesPolicy Design and Practice, 2023
Africa has recently focused on an ambition to achieve digital transformation through the pursuit of various flagship initiatives which are aimed at achieving its ‘Agenda 2063’ objectives. Digital transformation will be better achieved through appropriate
Nnenna Ifeanyi-Ajufo
doaj   +1 more source

Understanding the Institutional Landscape of Cyber Security [PDF]

open access: yesSSRN Electronic Journal, 2016
The decentralized architecture of the Internet, which has been key to its development and worldwide deployment, is making it challenging to secure Internet user experience. Many organizations claim to be playing a role in improving Internet security. If anything, the space of security-related institutions seems on first inspection to be over-populated ...
openaire   +1 more source

Security-Informed Safety: Supporting Stakeholders with Codes of Practice [PDF]

open access: yes, 2018
Codes of practice provide principles and guidance on how organizations can incorporate security considerations into their safety engineering lifecycle and become more security ...
Bishop, P. G.   +3 more
core   +1 more source

Regulatory and Legal Enforcement of Cyber Security in Countries of the European Union: The Experience of Germany and France

open access: yesTeisė, 2021
This article is devoted to the study of information security in the EU member states, in particular Germany and France, in the context of the analysis of their national legislation, state, national programs and regulations.
Sviatoslav Kavyn   +2 more
doaj   +1 more source

Threat Artificial Intelligence and Cyber Security in Health Care Institutions [PDF]

open access: yes, 2021
In this work we go beyond what is called unsupervised learning, a decision-making method that results in large numbers of false positives and negatives. The study was carried out in cryopreservation laboratories and aims to gain access to the General Data Protection Regulation (GDPR) implementation.
Ana Fernandes   +4 more
openaire   +1 more source

Open Data, Grey Data, and Stewardship: Universities at the Privacy Frontier [PDF]

open access: yes, 2018
As universities recognize the inherent value in the data they collect and hold, they encounter unforeseen challenges in stewarding those data in ways that balance accountability, transparency, and protection of privacy, academic freedom, and intellectual
Borgman, Christine L.
core   +3 more sources

STOP-IT: strategic, tactical, operational protection of water infrastructure against cyberphysical threats [PDF]

open access: yes, 2018
Water supply and sanitation infrastructures are essential for our welfare, but vulnerable to several attack types facilitated by the ever-changing landscapes of the digital world.
Bonet Gil, Enrique   +2 more
core   +1 more source

Home - About - Disclaimer - Privacy