Showing 1 - 10 of 3,968
Persistent link: https://www.econbiz.de/10015056967
The book examines the extent to which Chinese cyber and network security laws and policies act as a constraint on the emergence of Chinese entrepreneurialism and innovation. Specifically, how the contradictions and tensions between data localisation laws (as part of Network Sovereignty policies)...
Persistent link: https://www.econbiz.de/10013272576
Persistent link: https://www.econbiz.de/10010441411
Persistent link: https://www.econbiz.de/10013547722
Cyber sovereignty means that states have authority within a fixed boundary to devise rules, laws, and norms about behaviour of individuals, institutions, applications, and other actors and factors in the cyberspace. This idea is intrinsically associated with information security propagated by...
Persistent link: https://www.econbiz.de/10014361320
Persistent link: https://www.econbiz.de/10011441328
Do elderly workers retire early voluntarily, or are they induced (or even forced) by their employees? To establish the relevance of the labor demand component in retirement decisions, we consider a trade liberalization between Switzerland and the EU - the Mutual Recognition Agreement (MRA). A...
Persistent link: https://www.econbiz.de/10011406562
Do elderly workers retire early voluntarily, or are they induced (or even forced) by their employees? To establish the relevance of the labor demand component in retirement decisions, we consider a trade liberalization between Switzerland and the EU – the Mutual Recognition Agreement (MRA). A...
Persistent link: https://www.econbiz.de/10013000428
Persistent link: https://www.econbiz.de/10012293016
Persistent link: https://www.econbiz.de/10011803410