Showing 61 - 70 of 196,763
Persistent link: https://www.econbiz.de/10014304352
The application of securitization theory to cybersecurity is useful since it subjects the emotive rhetoric of threat construction to critical scrutiny. Floyd’s just securitization theory (JST) constitutes a mixture of securitization theory and just war theory. Unlike traditional securitization...
Persistent link: https://www.econbiz.de/10014262972
The political debate over implementing qualified majority voting (QMV) into the Common Foreign and Security Policy (CFSP) is of high political relevance, especially given the shifting geopolitical landscape in Europe, including Russia’s aggression against Ukraine and uncertainties regarding...
Persistent link: https://www.econbiz.de/10014526762
Persistent link: https://www.econbiz.de/10013392020
In today's litigious business world, cyber-related matters could land you in court. As a computer security professional, you are protecting your data, but are you protecting your company? While you know industry standards and regulations, you may not be a legal expert. Fortunately, in a few...
Persistent link: https://www.econbiz.de/10012686866
Persistent link: https://www.econbiz.de/10015056967
Persistent link: https://www.econbiz.de/10011988914
Persistent link: https://www.econbiz.de/10003639481
Persistent link: https://www.econbiz.de/10000362910
Persistent link: https://www.econbiz.de/10003641307