Results 81 to 90 of about 79,039 (285)
ABSTRACT This study investigates the relationship between cybersecurity capabilities (CCs) and cybersecurity performance (CP) across diverse regional contexts, employing ordinary least squares (OLS) and random forest (RF) regression models. The research highlights how economic, political and cultural factors shape CCs and their impact on CP ...
Angélica Pigola +2 more
wiley +1 more source
The role of computer forensics in the fight against terrorism [PDF]
In this paper, the authors examine the adequacy of the counter-terrorism concept, which does not envisage institutional responsibility for collecting, processing, and fixing traces of cyber-related terrorist activities.
Stevanović Miroslav D. +1 more
doaj
Cyber Security Awareness for Education Institutions
Alaa Ridha, Meshal AlDhamen AlDhamen
openaire +1 more source
Metaverse and Artificial Intelligence as Web 4.0: The Next Generation of the Internet
ABSTRACT This study utilizes systems thinking to explore and entwine an evolving metaverse scholarship to a relatively underexplored phenomenon of Web 4.0. We adopt a soft systems thinking framework to guide the interpretation of complex and evolving metaverse scholarship, using bibliometric mapping of 5587 publications sourced from Scopus.
Anton Klarin +3 more
wiley +1 more source
Europe ́s Coherence Gap in External Crisis and Conflict Management The EU’s Integrated Approach between Political Rhetoric and Institutional Practice. November 2019 [PDF]
The European Union (EU) aspires to play a part in conflict prevention, crisis management and post-conflict peace- building through civil and/or military operations, through stabilisation efforts, and by building resilience at home and abroad.
Blockmans, Steven, Debuysere, Loes
core
ABSTRACT System of Systems (SoS) environments are inherently complex, involving numerous operationally and managerially independent component systems with hidden interdependencies and frequent interactions based on unstructured data. In this paper, we propose using graphical Retrieval‐Augmented Generation (GraphRAG), a tool that combines large language
Yinchien Huang +2 more
wiley +1 more source
CYBERCRIME AND FORENSIC EXAMINATION IN NIGERIA: HOW RELEVANT IS THE DETERENT THEORY
Cybercrime has emerged as a profound threat to Nigeria’s economic security, undermining financial stability, investor confidence, and long-term development prospects.
Prof. Akintoye Ishola Rufus +2 more
doaj
Non-Technical Cyber-Attacks and International Cybersecurity: The Case of Social Engineering
This paper aims to provide an overview of social engineering attacks, and their impacts on cybersecurity, including national and international security, and figures out detection techniques, and major methods for countermeasure. How do social engineering
Amal Alhosban, Nezir Akyeşilmen
doaj +1 more source
Russian Election Interference and Race-Baiting
Russian interference in the 2016 United States presidential election exposed the nation’s vulnerability to targeted campaign disruption by foreign intelligence actors through social media.
Darin E.W. Johnson
doaj +1 more source
A Stronger Europe in the World: Major Challenges for EU Trade Policy. College of Europe EU Diplomacy Paper 02/2020 [PDF]
On 29 January 2020, Dr. Sabine Weyand, Director-General for Trade at the European Commission, gave a lecture on “‘A stronger Europe in the world’: Major challenges for EU trade policy” at the College of Europe in Bruges.
Weyand, Sabine
core

