Showing 111 - 120 of 50,963
Digital technologies have changed the way supply chain operations are structured. In this article, we conduct systematic syntheses of literature on the impact of new technologies on supply chains and the related cyber risks. A taxonomic/cladistic approach is used for the evaluations of progress...
Persistent link: https://www.econbiz.de/10014107710
Although one segment of the proactive cybersecurity debate—e.g., hack back—has long been derided as a policy option carrying with it great risks of escalation, among other concerns, elements within the U.S. Congress and abroad are actively pushing to give companies a freer hand at defending...
Persistent link: https://www.econbiz.de/10014109417
In 2018, Congress tasked the U.S. Coast Guard with developing a Risk Assessment Model for Maritime Cybersecurity. The Act requires the Coast Guard to consult with the National Maritime Security Advisory Committee in developing the Model. This paper collects relevant background information on the...
Persistent link: https://www.econbiz.de/10014109443
The Convention on Cybercrime of the Council of Europe ("Convention") serves as a valuable guidance to many nations whose national legislative framework on cybercrimes require regulatory provisions on legal issues relating to cybercrimes. This article provides an overview of the Convention and...
Persistent link: https://www.econbiz.de/10014109940
Many cities around the world are increasingly embedding technological infrastructure in urban spaces. These infrastructures aim to collect vast amounts of data from citizens with an apparent purpose of improving public services. This article discusses privacy concerns generated by China's...
Persistent link: https://www.econbiz.de/10014110783
There is a great deal of buzz surrounding the Internet of Things (IoT), which is the notion, simply put, that nearly everything not currently connected to the Internet from gym shorts to factories soon will be. The Industrial Internet of Things (IIoT) is one application of this trend and...
Persistent link: https://www.econbiz.de/10014111232
Online hacking from China, Iran, North Korea, Russia, and other parts of the world has caught the attention of U.S. policymakers, commentators, and the American public. For example, the discussion of the systematic attacks launched by potentially government-sponsored Chinese hackers reinforces...
Persistent link: https://www.econbiz.de/10014134100
This Article analyzes State involvement in cybersecurity, particularly policies aimed at mitigating cyber threats below the armed attack threshold — cybercrime and espionage. Although the focus is on national cybersecurity strategies, related domestic follow-up initiatives are also considered,...
Persistent link: https://www.econbiz.de/10014134237
Cyber crime covers a wide range of activities that includes theft, fraud and harassment; stealing valuable intellectual property as part of industrial espionage; committing financial fraud and credit card theft; and disrupting internet services for ideological goals (“hacktivism”). The crimes...
Persistent link: https://www.econbiz.de/10014134844
Beyond doubt the humanity has entered an age of data dominance. As the need for safety and predictability grows, it becomes increasingly difficult to balance security and individual civil liberties. Therefore, the balance between security and these liberties is not constant and perfect, given...
Persistent link: https://www.econbiz.de/10014135875