Results 21 to 30 of about 79,967 (299)

Institutional, technological, and financial drivers of national cyber resilience under armed conflict and post-conflict recovery [PDF]

open access: yesProblems and Perspectives in Management
Type of the article: Research Article Abstract Military and economic turbulence transform the relationships between factors shaping national cyber resilience.
Inna Shkolnyk   +4 more
doaj   +1 more source

Between Hype and Understatement: Reassessing Cyber Risks as a Security Strategy [PDF]

open access: yes, 2011
Most of the actions that fall under the trilogy of cyber crime, terrorism,and war exploit pre-existing weaknesses in the underlying technology.Because these vulnerabilities that exist in the network are not themselvesillegal, they tend to be overlooked ...
Guinchard, Audrey
core   +3 more sources

Threat Artificial Intelligence and Cyber Security in Health Care Institutions [PDF]

open access: yes, 2021
In this work we go beyond what is called unsupervised learning, a decision-making method that results in large numbers of false positives and negatives. The study was carried out in cryopreservation laboratories and aims to gain access to the General Data Protection Regulation (GDPR) implementation.
Ana Fernandes   +4 more
openaire   +1 more source

EU cybersecurity capacity building in the Mediterranean and the Middle East [PDF]

open access: yes, 2020
Cyberthreats on the Rise The 2008 Report on the implementation of the European Security Strategy included “cybersecurity” for the first time among the priorities of the EU’s external action, stating that: “modern economies are heavily reliant on critical
Lannon, Erwoan
core  

Kurumsal Siber Güvenliğe Yönelik Tehditler ve Önlemleri

open access: yesDüzce Üniversitesi Bilim ve Teknoloji Dergisi, 2015
Günümüzde bilgi ve iletişim teknolojilerinde çeşitli uygulamaların artarak kişilerin günlük yaşantılarının vazgeçilmez bir parçası haline gelmesiyle birlikte gerek kamu gerekte özel sektörde birçok kurum hizmet sunumlarını siber ortamda ...
Hüseyin ÇAKIR, Hakan YAŞAR
doaj   +6 more sources

Artificial Intelligence in Pakistan’s Cyberspace: Governance Gaps, Dual-Use Dilemmas, and Strategic Vulnerabilities

open access: yesObrana a Strategie
This article examines Pakistan’s evolving cyber governance as a critical case of how artificial intelligence (AI) intersects with dual-use security and fragile institutional design.
Sajjad Ahmed   +2 more
doaj   +1 more source

Hybrid warfare and information operations as contemporary threats to national and international security [PDF]

open access: yesMegatrend Revija
Contemporary security challenges are increasingly shaped through hybrid warfare and information operations, which change traditional understandings of conflict and threaten national and international security without a formal declaration of war.
Azdejković Miloš   +2 more
doaj   +1 more source

Legal support for information security of legal entities under Lithuanian and Ukrainian legislation

open access: yesLaw and Safety, 2023
In the rapidly evolving digital landscape, the safeguarding of information security for legal entities has emerged as a critical concern. This article investigates and compares the legal frameworks governing information security for legal entities in ...
M. Pleskach, I. Tumasoniene
doaj   +1 more source

NATIONAL SECURITY IN THE ERA OF DIGITAL THREATS: A CASE STUDY OF THE NIGERIAN ARMY CYBERWARFARE COMMAND

open access: yesInternational Studies Journal
Research Problem: Nigeria faces escalating cyber threats with direct implications for national security, yet its cyber defence architecture remains underdeveloped.
IFEANYI ANAENUGWU JUSTIN
doaj   +1 more source

Governing in the Anthropocene: What Future Systems Thinking in Practice? [PDF]

open access: yes, 2016
The revealing and concealing features of the metaphor ‘earth as Anthropocene’ are explored in an inquiry that asks: In the Anthropocene what possible futures emerge for systems thinking in practice? Framing choice, so important yet so poorly realised, is
Alstyne   +55 more
core   +1 more source

Home - About - Disclaimer - Privacy