Building centaur responders: is emergency management ready for artificial intelligence? [PDF]
Abstract This article examines the preparedness of emergency management (EM) for addressing questions pertaining to artificial intelligence (AI), encompassing its benefits to EM missions, the potential biases, the societal impacts, and more. We pinpoint two key shortcomings in early EM research on AI: (i) insufficient discussion of both AI's history ...
Whyte C, Haupt B'.
europepmc +2 more sources
The Legal Mechanisms for Information Security in the context of Digitalization [PDF]
As a result of the introduction of digital technologies in all spheres of society, various latest technologically conditioned risks and threats have become various. It requires the formation and implementation of a legal mechanism for further development
Svitlana Bondarenko +5 more
doaj +1 more source
Open Data, Grey Data, and Stewardship: Universities at the Privacy Frontier [PDF]
As universities recognize the inherent value in the data they collect and hold, they encounter unforeseen challenges in stewarding those data in ways that balance accountability, transparency, and protection of privacy, academic freedom, and intellectual
Borgman, Christine L.
core +3 more sources
“Norm Subsidiarity” or “Norm Diffusion”?
Cybercrime has been a contentious issue among security actors, vis-à-vis the extent to which international cooperation may be fostered to respond to the accelerating incidence of cyber-attacks.
Hanan Mohamed Ali
doaj +1 more source
Conceptualizing human resilience in the face of the global epidemiology of cyber attacks [PDF]
Computer security is a complex global phenomenon where different populations interact, and the infection of one person creates risk for another. Given the dynamics and scope of cyber campaigns, studies of local resilience without reference to global ...
Camp, L. Jean +5 more
core +3 more sources
Ecoterrorism and cyberattacks vs. Critical infrastructure: Counterintelligence and security aspects [PDF]
Critical infrastructure encompasses systems and resources essential to the functioning of the state and its protection consequently stands at the pinnacle of counterintelligence and security priorities.
Živaljević Dragan, Gavrić Nevena
doaj +1 more source
Infrastructuring Cyberspace: Exploring China’s Imaginary and Practices of Selective Connectivity
Connectivity and fragmentation coexist as two interlinked discourses on the relationship between infrastructures and societies. In response to the Digital Silk Road initiated by the Chinese government, Chinese companies have built numerous digital ...
Ying Huang +2 more
doaj +1 more source
Cyber governance in Africa: at the crossroads of politics, sovereignty and cooperation
Africa has recently focused on an ambition to achieve digital transformation through the pursuit of various flagship initiatives which are aimed at achieving its ‘Agenda 2063’ objectives. Digital transformation will be better achieved through appropriate
Nnenna Ifeanyi-Ajufo
doaj +1 more source
Security-Informed Safety: Supporting Stakeholders with Codes of Practice [PDF]
Codes of practice provide principles and guidance on how organizations can incorporate security considerations into their safety engineering lifecycle and become more security ...
Bishop, P. G. +3 more
core +1 more source
This article is devoted to the study of information security in the EU member states, in particular Germany and France, in the context of the analysis of their national legislation, state, national programs and regulations.
Sviatoslav Kavyn +2 more
doaj +1 more source

