Results 21 to 30 of about 79,967 (299)
Institutional, technological, and financial drivers of national cyber resilience under armed conflict and post-conflict recovery [PDF]
Type of the article: Research Article Abstract Military and economic turbulence transform the relationships between factors shaping national cyber resilience.
Inna Shkolnyk +4 more
doaj +1 more source
Between Hype and Understatement: Reassessing Cyber Risks as a Security Strategy [PDF]
Most of the actions that fall under the trilogy of cyber crime, terrorism,and war exploit pre-existing weaknesses in the underlying technology.Because these vulnerabilities that exist in the network are not themselvesillegal, they tend to be overlooked ...
Guinchard, Audrey
core +3 more sources
Threat Artificial Intelligence and Cyber Security in Health Care Institutions [PDF]
In this work we go beyond what is called unsupervised learning, a decision-making method that results in large numbers of false positives and negatives. The study was carried out in cryopreservation laboratories and aims to gain access to the General Data Protection Regulation (GDPR) implementation.
Ana Fernandes +4 more
openaire +1 more source
EU cybersecurity capacity building in the Mediterranean and the Middle East [PDF]
Cyberthreats on the Rise The 2008 Report on the implementation of the European Security Strategy included “cybersecurity” for the first time among the priorities of the EU’s external action, stating that: “modern economies are heavily reliant on critical
Lannon, Erwoan
core
Kurumsal Siber Güvenliğe Yönelik Tehditler ve Önlemleri
Günümüzde bilgi ve iletişim teknolojilerinde çeşitli uygulamaların artarak kişilerin günlük yaşantılarının vazgeçilmez bir parçası haline gelmesiyle birlikte gerek kamu gerekte özel sektörde birçok kurum hizmet sunumlarını siber ortamda ...
Hüseyin ÇAKIR, Hakan YAŞAR
doaj +6 more sources
This article examines Pakistan’s evolving cyber governance as a critical case of how artificial intelligence (AI) intersects with dual-use security and fragile institutional design.
Sajjad Ahmed +2 more
doaj +1 more source
Hybrid warfare and information operations as contemporary threats to national and international security [PDF]
Contemporary security challenges are increasingly shaped through hybrid warfare and information operations, which change traditional understandings of conflict and threaten national and international security without a formal declaration of war.
Azdejković Miloš +2 more
doaj +1 more source
Legal support for information security of legal entities under Lithuanian and Ukrainian legislation
In the rapidly evolving digital landscape, the safeguarding of information security for legal entities has emerged as a critical concern. This article investigates and compares the legal frameworks governing information security for legal entities in ...
M. Pleskach, I. Tumasoniene
doaj +1 more source
Research Problem: Nigeria faces escalating cyber threats with direct implications for national security, yet its cyber defence architecture remains underdeveloped.
IFEANYI ANAENUGWU JUSTIN
doaj +1 more source
Governing in the Anthropocene: What Future Systems Thinking in Practice? [PDF]
The revealing and concealing features of the metaphor ‘earth as Anthropocene’ are explored in an inquiry that asks: In the Anthropocene what possible futures emerge for systems thinking in practice? Framing choice, so important yet so poorly realised, is
Alstyne +55 more
core +1 more source

