Results 11 to 20 of about 79,967 (299)

Building centaur responders: is emergency management ready for artificial intelligence? [PDF]

open access: yesDisasters
Abstract This article examines the preparedness of emergency management (EM) for addressing questions pertaining to artificial intelligence (AI), encompassing its benefits to EM missions, the potential biases, the societal impacts, and more. We pinpoint two key shortcomings in early EM research on AI: (i) insufficient discussion of both AI's history ...
Whyte C, Haupt B'.
europepmc   +2 more sources

The Legal Mechanisms for Information Security in the context of Digitalization [PDF]

open access: yesJournal of Information Technology Management, 2022
As a result of the introduction of digital technologies in all spheres of society, various latest technologically conditioned risks and threats have become various. It requires the formation and implementation of a legal mechanism for further development
Svitlana Bondarenko   +5 more
doaj   +1 more source

Open Data, Grey Data, and Stewardship: Universities at the Privacy Frontier [PDF]

open access: yes, 2018
As universities recognize the inherent value in the data they collect and hold, they encounter unforeseen challenges in stewarding those data in ways that balance accountability, transparency, and protection of privacy, academic freedom, and intellectual
Borgman, Christine L.
core   +3 more sources

“Norm Subsidiarity” or “Norm Diffusion”?

open access: yesThe Journal of Intelligence, Conflict and Warfare, 2021
Cybercrime has been a contentious issue among security actors, vis-à-vis the extent to which international cooperation may be fostered to respond to the accelerating incidence of cyber-attacks.
Hanan Mohamed Ali
doaj   +1 more source

Conceptualizing human resilience in the face of the global epidemiology of cyber attacks [PDF]

open access: yes, 2019
Computer security is a complex global phenomenon where different populations interact, and the infection of one person creates risk for another. Given the dynamics and scope of cyber campaigns, studies of local resilience without reference to global ...
Camp, L. Jean   +5 more
core   +3 more sources

Ecoterrorism and cyberattacks vs. Critical infrastructure: Counterintelligence and security aspects [PDF]

open access: yesNBP: Nauka, bezbednost, policija
Critical infrastructure encompasses systems and resources essential to the functioning of the state and its protection consequently stands at the pinnacle of counterintelligence and security priorities.
Živaljević Dragan, Gavrić Nevena
doaj   +1 more source

Infrastructuring Cyberspace: Exploring China’s Imaginary and Practices of Selective Connectivity

open access: yesInternational Quarterly for Asian Studies, 2022
Connectivity and fragmentation coexist as two interlinked discourses on the relationship between infrastructures and societies. In response to the Digital Silk Road initiated by the Chinese government, Chinese companies have built numerous digital ...
Ying Huang   +2 more
doaj   +1 more source

Cyber governance in Africa: at the crossroads of politics, sovereignty and cooperation

open access: yesPolicy Design and Practice, 2023
Africa has recently focused on an ambition to achieve digital transformation through the pursuit of various flagship initiatives which are aimed at achieving its ‘Agenda 2063’ objectives. Digital transformation will be better achieved through appropriate
Nnenna Ifeanyi-Ajufo
doaj   +1 more source

Security-Informed Safety: Supporting Stakeholders with Codes of Practice [PDF]

open access: yes, 2018
Codes of practice provide principles and guidance on how organizations can incorporate security considerations into their safety engineering lifecycle and become more security ...
Bishop, P. G.   +3 more
core   +1 more source

Regulatory and Legal Enforcement of Cyber Security in Countries of the European Union: The Experience of Germany and France

open access: yesTeisė, 2021
This article is devoted to the study of information security in the EU member states, in particular Germany and France, in the context of the analysis of their national legislation, state, national programs and regulations.
Sviatoslav Kavyn   +2 more
doaj   +1 more source

Home - About - Disclaimer - Privacy