Books on the topic 'Digital threats'

To see the other types of publications on this topic, follow the link: Digital threats.

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the top 50 books for your research on the topic 'Digital threats.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Browse books on a wide variety of disciplines and organise your bibliography correctly.

1

Wood, Theodore A. Understanding recent cyberlaw lawsuits and developments: An in-depth look at new cyber security threats and their impact on digital business. [Boston, Mass.]: Aspatore, 2010.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
2

50 ways to protect your identity in a digital age: New financial threats you need to know and how to avoid them. 2nd ed. Upper Saddle River, N.J: FT Press, 2012.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
3

Programming with POSIX threads. Reading, Mass: Addison-Wesley, 1997.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
4

Capabilities, United States Congress House Committee on Armed Services Subcommittee on Emerging Threats and. Digital warriors: Improving military capabilities for cyber operations : hearing before the Subcommittee on Emerging Threats and Capabilities of the Committee on Armed Services, House of Representatives, One Hundred Twelfth Congress, second session, hearing held July 25, 2012. Washington: U.S. Government Printing Office, 2013.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
5

Operating in the digital domain: Organizing the military departments for cyber operations : hearing before the Subcommittee on Terrorism, Unconventional Threats and Capabilities of the Committee on Armed Services, House of Representatives, One Hundred Eleventh Congress, second session, hearing held September 23, 2010. Washington: U.S. G.P.O., 2010.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
6

Mironov, A., and S. Zubarev. Interaction of law enforcement agencies to ensure national security. ru: INFRA-M Academic Publishing LLC., 2022. http://dx.doi.org/10.12737/1860938.

Full text
Abstract:
The monograph examines the main directions of the organization and legal regulation of the interaction of law enforcement agencies in the activities to ensure the national security of the Russian state. Special attention is paid to the important characteristics of the constituent elements of national security, theoretical and methodological aspects of the formation of the mechanism of interaction of law enforcement agencies to ensure state and public security and law and order, as well as the analysis of improving the effectiveness of the practical activities of law enforcement agencies in the system of measures to protect the rights and freedoms of the individual, the priority interests of society and the state using modern models of network (digital) interaction. The system of ensuring national security, its forces and means is characterized. Extreme threats and risks to national security within the framework of geopolitical changes in the modern world are shown. It is of interest to specialists of various branches of knowledge interested in security issues.
APA, Harvard, Vancouver, ISO, and other styles
7

Sofge, Erik. Popular mechanics who's spying on you?: The looming threat to your privacy, identity, and family in the digital age. Edited by Coburn Davin. New York, NY: Hearst Books, 2012.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
8

3DO Games Secrets: Book Two. Maui, HI: Sandwich Islands Publishing, 1996.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
9

Omar, Marwan, and Maurice Dawson. New Threats and Countermeasures in Digital Crime and Cyber Terrorism. IGI Global, 2015.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
10

Gaufman, Elizaveta. Security Threats and Public Perception: Digital Russia and the Ukraine Crisis. Palgrave Macmillan, 2016.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
11

Quenoy, Irina du, and Neil Kent. Cyber Security Meets National Security: International Perspectives on Digital Era Threats. Academica Press, 2022.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
12

Roslycky, L., B. D. Trump, and I. Linkov. Resilience and Hybrid Threats: Security and Integrity for the Digital World. IOS Press, Incorporated, 2019.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
13

Gaufman, Elizaveta. Security Threats and Public Perception: Digital Russia and the Ukraine Crisis. Palgrave Macmillan, 2018.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
14

Gaufman, Elizaveta. Security Threats and Public Perception: Digital Russia and the Ukraine Crisis. Palgrave Macmillan, 2016.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
15

Johnson, Rhonda. Evaluating Emerging Threats and New Research Opportunities in Digital Crime and Forensics. IGI Global, 2020.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
16

Katz, Sarah. Digital Earth: Cyber Threats, Privacy and Ethics in an Age of Paranoia. IT Governance Ltd, 2022.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
17

Evolution of Business in the Cyber Age: Digital Transformation, Threats, and Security. Apple Academic Press, Incorporated, 2020.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
18

Johnson, Rhonda. Evaluating Emerging Threats and New Research Opportunities in Digital Crime and Forensics. IGI Global, 2020.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
19

Verma, Rahul, Divya Gupta Chowdhry, and Manisha Mathur. Evolution of Business in the Cyber Age: Digital Transformation, Threats, and Security. Apple Academic Press, Incorporated, 2020.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
20

Verma, Rahul, Divya Gupta Chowdhry, and Manisha Mathur. Evolution of Business in the Cyber Age: Digital Transformation, Threats, and Security. Apple Academic Press, Incorporated, 2020.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
21

Verma, Rahul, Divya Gupta Chowdhry, and Manisha Mathur. Evolution of Business in the Cyber Age: Digital Transformation, Threats, and Security. Apple Academic Press, Incorporated, 2020.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
22

Perakslis, Eric D., Martin Stanley, and Erin Brodwin. Digital Health. Oxford University Press, 2021. http://dx.doi.org/10.1093/oso/9780197503133.001.0001.

Full text
Abstract:
Digital health has been touted as a true transformation of health care, but all medical interventions have associated risks that must be understood and quantified. The Internet has brought many advancements, which quickly jumped from our computers into our pockets via powerful and completely connected mobile devices that are now being envisioned as devices for medical diagnostics and care delivery. As health care struggles with cost, inequity, value, and rapid virtualization, solid models of benefit-risk determination, new regulatory approaches for biomedical products, and clear risk-based conversations with all stakeholders are essential. Detailed examination of emerging digital health technologies has revealed 10 categories of digital side effects or “toxicities” that must be understood, prevented when possible, and managed when not. These toxicities include cyberthreat, loss of privacy, cyberchondria and cyber addiction, threats to physical security, charlatanism, overdiagnosis and overtreatment, medical/user error, and the plague of medical misinformation. For digital health to realize its promise, these toxicities must be understood, measured, warned against, and managed as concurrent side effects, in the same fashion as any other medical side effect.
APA, Harvard, Vancouver, ISO, and other styles
23

Feldstein, Steven. The Rise of Digital Repression. Oxford University Press, 2021. http://dx.doi.org/10.1093/oso/9780190057497.001.0001.

Full text
Abstract:
This book documents the rise of digital repression—how governments are deploying new technologies to counter dissent, maintain political control, and ensure regime survival. The emergence of varied digital technologies is bringing new dimensions to political repression. At its core, the expanding use of digital repression reflects a fairly simple motivation: states are seeking and finding new ways to control, manipulate, surveil, or disrupt real or perceived threats. This book investigates the goals, motivations, and drivers of digital repression. It presents case studies in Thailand, the Philippines, and Ethiopia, highlighting how governments pursue digital strategies based on a range of factors: ongoing levels of repression, leadership, state capacity, and technological development. But a basic political motive—how to preserve and sustain political incumbency—remains a principal explanation for their use. The international community is already seeing glimpses of what the frontiers of repression look like, such as in China, where authorities have brought together mass surveillance, online censorship, DNA collection, and artificial intelligence to enforce their rule in Xinjiang. Many of these trends are going global. This has major implications for democratic governments and civil society activists around the world. The book also presents innovative ideas and strategies for civil society and opposition movements to respond to the digital autocratic wave.
APA, Harvard, Vancouver, ISO, and other styles
24

Digital Forensics and Incident Response: Incident response techniques and procedures to respond to modern cyber threats, 2nd Edition. Packt Publishing, 2020.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
25

Casey, William, Julie Hood, Jeffrey R. Greene, Steve Krouskos, and Harsha Basnayake. Stress Test Every Business Needs: A Capital Agenda for Confidently Facing Digital Disruption, Difficult Investors, Recessions and Geopolitical Threats. Wiley & Sons, Incorporated, John, 2018.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
26

Casey, William, Julie Hood, Jeffrey R. Greene, Steve Krouskos, and Harsha Basnayake. Stress Test Every Business Needs: A Capital Agenda for Confidently Facing Digital Disruption, Difficult Investors, Recessions and Geopolitical Threats. Wiley & Sons, Incorporated, John, 2018.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
27

The stress test every business needs: A capital agenda for confidently facing digital disruption, difficult investors, recessions and geopolitical threats. 2018.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
28

Weisman, Steve. 50 Ways to Protect Your Identity in a Digital Age: New Financial Threats You Need to Know and How to Avoid Them. Financial Times/Prentice Hall, 2012.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
29

Simon, Robert, ed. Il giornalismo sotto attacco. Nomos Verlagsgesellschaft mbH & Co. KG, 2019. http://dx.doi.org/10.5771/9783748904977.

Full text
Abstract:
Is journalism under threat? The image of journalists, as helmeted war correspondents protected by bullet-proof vests and armed only with cameras and microphones, springs to mind. Physical threats are only the most visible dangers, however. Journalists and journalism itself are facing other threats such as censorship, political and economic pressure, intimidation, job insecurity and attacks on the protection of journalists’ sources. Social media and digital photography mean that anyone can now publish information, which is also upsetting the ethics of journalism. How can these threats be tackled? In this book, 10 experts from different backgrounds analyse the situation from various angles. At a time when high-quality, independent journalism is more necessary than ever – and yet when the profession is facing many different challenges – they explore the issues surrounding the role of journalism in democratic societies. With contributions by Onur Andreotti, Nils Muižnieks, Tarlach McGonagle, Sejal Parmar, Başak Çalı, Dirk Voorhoof , Kerem Altıparmak, Yaman Akdeniz, Katharine Sarikakis, Aidan White, Eugenia Siapera, Pierre Haski
APA, Harvard, Vancouver, ISO, and other styles
30

Wall, David S. Crime, Security, and Information Communication Technologies. Edited by Roger Brownsword, Eloise Scotford, and Karen Yeung. Oxford University Press, 2017. http://dx.doi.org/10.1093/oxfordhb/9780199680832.013.65.

Full text
Abstract:
Networked digital technologies have transformed crime to a point that ‘cybercrime’ is here to stay. In the future, society will be forced to respond to a broad variety of networked crimes that will increase both the complexity of crime investigation and prevention, whilst also deepening the regulative challenges. As cybercrime has become an inescapable feature of the Internet landscape, constructive management and system development to mitigate cybercrime threats and harms are imperatives. This chapter explores the changing cybersecurity threat landscape and its implications for regulation and policing. It considers how networked and digital technologies have affected society and crime; it identifies how the cybersecurity threat and crime landscape have changed and considers how digital technologies affect our ability to regulate them. It also suggests how we might understand cybercrime before outlining both the technological developments that will drive future cybercrime and also the consequences of failing to respond to those changes.
APA, Harvard, Vancouver, ISO, and other styles
31

Sobieraj, Sarah. Credible Threat. Oxford University Press, 2020. http://dx.doi.org/10.1093/oso/9780190089283.001.0001.

Full text
Abstract:
This book argues that the rampant hate-filled attacks against women online are best understood as patterned resistance to women’s political voice and visibility. This abuse and harassment coalesces into an often-unrecognized form of gender inequality that constrains women’s use of digital public spaces, much as the pervasive threat of sexual intimidation and violence constrain women’s freedom and comfort in physical public spaces. What’s more, the abuse exacerbates inequality among women, those from racial, ethnic, religious, and/or other minority groups, are disproportionately targeted. Drawing on in-depth interviews with women who have been on the receiving end of digital hate, Credible Threat shows that the onslaught of epithets and stereotypes, rape threats, and unsolicited commentary about their physical appearance and sexual desirability come at great professional, personal, and psychological costs for the women targeted—and also with underexplored societal level costs that demand attention. When effective, identity-based attacks undermine women’s contributions to public discourse, create a climate of self-censorship, and at times, push women out of digital publics altogether. Given the uneven distribution of toxicity, those women whose voices are already most underrepresented (e.g., women in male-dominated fields, those from historically undervalued groups) are particularly at risk. In the end, identity-based attacks online erode civil liberties, diminish public discourse, limit the knowledge we have to inform policy and electoral decision making, and teach all women that activism and public service are unappealing, high-risk endeavors to be avoided.
APA, Harvard, Vancouver, ISO, and other styles
32

Lercari, Nicola, Willeke Wendrich, Benjamin W. Porter, Margie M. Burton, and Thomas E. Levy, eds. Preserving Cultural Heritage in the Digital Age: Sending Out an S.O.S. Equinox Publishing Ltd., 2022. http://dx.doi.org/10.1558/isbn.9781800501263.

Full text
Abstract:
In late August 2015, international media outlets and cultural institutions reported that the Islamic State beheaded the Syrian scholar Khaled al-Asaad and destroyed the 1st-century CE Temple of Bel in Palmyra, Syria. The world was horrorstruck. Apart from the human tragedy, archaeologists and the international communities were shocked by the wanton destruction of ancient remains that had survived for millennia. However, warfare and ideological destruction contribute just a fraction of the ongoing devastation of our forebears’ traces. This book brings attention to the magnitude of the silent loss of cultural heritage occurring worldwide and the even more insidious loss of knowledge due to the lack of publication and preservation of original data, notes, plans, and photographs of excavated archaeological sites. Highlighting a growing sense of urgency to intervene in whatever way possible, this book provides readers with a non-technical overview of how archaeologists and other stakeholders are increasingly turning to digital methods to mitigate some of the threats to at-risk cultural heritage. This volume is a gateway to enhancing the scale and reach of capturing, analyzing, managing, curating, and disseminating cultural heritage knowledge in sustainable ways and promoting collaboration among scholars and stakeholder communities.
APA, Harvard, Vancouver, ISO, and other styles
33

High Tech Trash: Digital Devices, Hidden Toxics, and Human Health. Island Press, 2006.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
34

Grossman, Elizabeth. High Tech Trash: Digital Devices, Hidden Toxics, and Human Health. 2nd ed. Shearwater, 2007.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
35

Archibald, Robert B. Technological Threat. Oxford University Press, 2017. http://dx.doi.org/10.1093/acprof:oso/9780190251918.003.0008.

Full text
Abstract:
This chapter explores the rapid growth of online education. It evaluates the likelihood that distance learning will break the rise in college cost and disrupt the traditional model of campus-based programming. There are many ways that the rapid entrepreneurial development of digital learning can change how higher education is provided, and there are many ways that online education may work in the labor market of the future. Although digital techniques will continue to improve and develop, this chapter does not forecast an upheaval in the way higher education is delivered to students in the traditional age range of eighteen to twenty-four. Online education will continue to expand the opportunities for older and returning students, while traditional campus-based programming will continue to offer the best alternative for younger first-time students.
APA, Harvard, Vancouver, ISO, and other styles
36

Cottingham, Marci D. Practical Feelings. Oxford University Press, 2022. http://dx.doi.org/10.1093/oso/9780197613689.001.0001.

Full text
Abstract:
Practical Feelings develops and applies a theory of emotion practice to the domains of work, leisure, social media, and politics. Chapter 1 theorizes an emotion practice approach by synthesizing symbolic interactionist and poststructural approaches to emotion using their shared lineage of pragmatism. Within this approach, the concepts of emotional capital, habitus, and social location together help us examine emotion as effort, energy, and embodied resource. Chapters 2 through 5 apply an emotion practice approach to the social arenas of work, leisure, social media, and politics. The empirical chapters move from the intimate sphere of nursing to the sphere of public health threats while illustrating the strengths of an emotion practice approach. Audio diaries from nurses capture how they use and conserve emotional resources within hierarchies of social class and race. In examining sports fans, we see how they use and invest in the emotional power of sports symbols, but a hierarchy of racial inequality underlies this economy of emotion that connects communities and corporations. Social media users connect with others during health threats by relying on engrained digital habits of frivolity and humor. Turning to the political sphere, rhetoric from leaders reinforces a view of emotions as irrational, converting their emotional capital of stoicism into political capital during public health threats (Ebola and COVID-19). The final chapter develops the relevance of homophily for connecting emotions with social inequality and theorizes mechanisms for social change.
APA, Harvard, Vancouver, ISO, and other styles
37

Archibald, Robert B., and David H. Feldman. The Road Ahead for America's Colleges and Universities. Oxford University Press, 2017. http://dx.doi.org/10.1093/acprof:oso/9780190251918.001.0001.

Full text
Abstract:
This book evaluates the threats—real and perceived—that American colleges and universities must confront over the next thirty years. Those threats include rising costs endemic to personal services like higher education, growing income inequality in the United States that affects how much families can pay, demographic changes that will affect demand, and labor market changes that could affect the value of a degree. The book also evaluates changing patterns of state and federal support for higher education, and new digital technologies rippling through the entire economy. Although there will be great challenges ahead for America’s complex mix of colleges and universities, this book’s analysis is an antidote to the language of crisis that dominates contemporary public discourse. The bundle of services that four-year colleges and universities provide likely will retain their value for the traditional age range of college students. The division between in-person education for most younger students and online coursework for older and returning students appears quite stable. This book provides a view that is less pessimistic about the present, but more worried about the future. The diverse American system of four-year institutions is resilient and adaptable. But the threats this book identifies will weigh most heavily on the schools that disproportionately serve America’s most at-risk students. The future could cement in place a bifurcated higher education system, one for the children of privilege and great potential and one for the riskier social investment in the children of disadvantage.
APA, Harvard, Vancouver, ISO, and other styles
38

O’Grady, Nathaniel. Mobility, circulation, and homeomorphism: data becoming risk information. Manchester University Press, 2017. http://dx.doi.org/10.7228/manchester/9781526107459.003.0005.

Full text
Abstract:
This chapter analyses the British Fire and Rescue Services, in particular how data travel through their digital infrastructures until it is finally computed into risk assessments that intend to predict future occurrences of fire and thereby serve as a means of government. The chapter points to the contingent nature of data, and how it changes both form and content as it becomes mobilised from one department to another. The emphasis is on the mobile as well as the immobile parts of this journey at the end of which stands a novel technique of intervention into one of the most archaic and yet up-to-date threats, that of fire.
APA, Harvard, Vancouver, ISO, and other styles
39

Torrione, Peter A., Jr Kenneth D. Morton, and Leslie Marie Collins. Ground Penetrating Radar: Signal Processing for Buried Threat Detection. Taylor & Francis Group, 2020.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
40

Clarke, Richard A., and Ray A. Rothrock. Digital Resilience: Is Your Company Ready for the Next Cyber Threat? AMACOM, 2018.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
41

Digital Resilience: Is Your Company Ready for the Next Cyber Threat? AMACOM, 2018.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
42

Parasram, Shiva V. N. Digital Forensics with Kali Linux: Perform data acquisition, digital investigation, and threat analysis using Kali Linux tools. Packt Publishing - ebooks Account, 2017.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
43

Stewart, Andrew J. A Vulnerable System. Cornell University Press, 2021. http://dx.doi.org/10.7591/cornell/9781501758942.001.0001.

Full text
Abstract:
As threats to the security of information pervade the fabric of everyday life, this book describes how, even as the demand for information security increases, the needs of society are not being met. The result is that the confidentiality of our personal data, the integrity of our elections, and the stability of foreign relations between countries are increasingly at risk. The book convincingly shows that emergency software patches and new security products cannot provide the solution to threats such as computer hacking, viruses, software vulnerabilities, and electronic spying. Profound underlying structural problems must first be understood, confronted, and then addressed. This book delivers a long view of the history of information security, beginning with the creation of the first digital computers during the Cold War. From the key institutions of the so-called military industrial complex in the 1950s to Silicon Valley start-ups in the 2020s, the relentless pursuit of new technologies has come at great cost. The absence of knowledge regarding the history of information security has caused the lessons of the past to be forsaken for the novelty of the present, and has led us to be collectively unable to meet the needs of the current day. From the very beginning of the information age, claims of secure systems have been crushed by practical reality. The myriad risks to technology, the book reveals, cannot be addressed without first understanding how we arrived at this moment. The book is an enlightening and sobering history of a topic that affects crucial aspects of our lives.
APA, Harvard, Vancouver, ISO, and other styles
44

Axworthy, Lloyd. Resetting the Narrative on Peace and Security. Edited by Alex J. Bellamy and Tim Dunne. Oxford University Press, 2016. http://dx.doi.org/10.1093/oxfordhb/9780198753841.013.52.

Full text
Abstract:
In little more than a decade, the responsibility to protect (R2P) has evolved from a concept that grew out of early discussions on human security to become an accepted part of global security considerations. Its adoption by the UN World Summit in 2005 introduced a different lens for looking at the threats to people and the need for international action to prevent atrocities. This chapter looks at how to broaden the scope of R2P in the next decade, as a way of responding to the multiple global risks faced by people and as an antidote to the present limitations of the Westphalian, national sovereignty based system. Innovative digital technologies and reformed global governance are especially important in driving the enhanced utility of R2P. A case is made that there are political trends that can aid in advancing such changes, using R2P as lever in reshaping global order and security.
APA, Harvard, Vancouver, ISO, and other styles
45

Valeriano, Brandon. Introduction. Oxford University Press, 2018. http://dx.doi.org/10.1093/oso/9780190618094.003.0001.

Full text
Abstract:
This chapter evaluates the efficacy of modern cyber strategies and how states coerce rivals in the digital domain. It argues that these campaigns are neither as revolutionary nor as novel as they seem. It finds that cyber disruptions, short-term and long-term espionage, and degradation operations all usually fail to produce concessions. When states do compel a rival, which is measured as a change in behavior in the target that is strategically advantageous to the initiator, the cyber operation tends to occur alongside more traditional coercive instruments such as diplomatic pressure, economic sanctions, and military threats and displays. Cyber capabilities complement, but do not replace traditional statecraft. Theoretical and empirical investigation of cyber strategies and their efficacy should therefore precede development of suggestions for sound foreign policy responses to state-backed cyber intrusions or craft international frameworks that constrain the proliferation of politically motivated malware. This book is a critical first step.
APA, Harvard, Vancouver, ISO, and other styles
46

Valeriano, Brandon. The Correlates of Cyber Strategy. Oxford University Press, 2018. http://dx.doi.org/10.1093/oso/9780190618094.003.0003.

Full text
Abstract:
This chapter explores the effects of cyber strategy and coercion through an empirical lens. It addresses this empirical gap and conducts a series of quantitative tests to answer key questions based on data collected covering the years 2000–2014. The results of the data analyses suggest cyber operations rarely produce concessions. The digital domain demonstrates minimal coercive utility to date. A state’s latent cyber capacity, as a proxy measure of potential cyber power in a state, is not a significant predictor of coercive potential. The analysis demonstrates more traditional arbiters of strategic competition such as military or economic power are likely better predictors for explaining rival behavior. Finally, it examines escalation in cyber incidents, which lead to some form of escalation 53.65% of the time. When the Russia-Georgia and Russia-Ukraine dyads are removed, all military escalation involved only threats and displays of force. Escalation observed after cyber incidents tends to be limited and consistent with rivalry dynamics.
APA, Harvard, Vancouver, ISO, and other styles
47

Oliveira, Claudio Luis Cruz de. Criação de valor estratégico através de digital analytics. Brazil Publishing, 2020. http://dx.doi.org/10.31012/978-65-5861-150-9.

Full text
Abstract:
Internet has changed the competition, shifting products, supply-chains and even markets. Its democratization gives more weight to the consumers; this change could be considered a threat to corporations. Although, the emergent knowledge derived from Digital Analytics brings a lot of benefits: delivering personalized services, fostering innovation and promoting the dialogue with the consumer in a real time basis. The concept of Digital Analytics includes the measurement, collection, analysis and reporting of digital data for the purposes of understanding and optimizing business performance. This book aims to understand why and how the companies implement Digital Analytics in order to achieve business goals and thus support the competitive advantage.
APA, Harvard, Vancouver, ISO, and other styles
48

Pickard, Victor. Democracy without Journalism? Oxford University Press, 2019. http://dx.doi.org/10.1093/oso/9780190946753.001.0001.

Full text
Abstract:
Democracy without Journalism? is about the ongoing journalism crisis and the policies we need to confront it. It exposes the historical roots, market failures, and policy inaction that led to the loss of local journalism and the proliferation of misinformation through both social media and mainstream news. In underscoring these threats to democracy, the book also draws attention to the growing problem of monopoly control over digital infrastructures in general and the rise of platform monopolies in particular, especially the “Facebook problem.” The book proposes that now is an opportune moment to address core weaknesses in US news and information systems and push for alternatives. Above all, the book argues that to understand the underlying pathologies in our news media and the reforms that are needed, we must penetrate to the roots of systemic problems. Toward this aim, Democracy without Journalism? emphasizes the structural nature of journalism’s collapse. The book concludes with an in-depth discussion of new models for journalism, emphasizing the need for a publicly owned and democratically governed media system. Ultimately, the goal is to reinvent journalism.
APA, Harvard, Vancouver, ISO, and other styles
49

Underwood, Doug. New Challenges, New Treatments. University of Illinois Press, 2017. http://dx.doi.org/10.5406/illinois/9780252036408.003.0006.

Full text
Abstract:
This epilogue considers the lessons that might be taken from the lives of journalist–literary figures that would be helpful to psychologists, journalists, and the researchers who study the impact of trauma, stress, and risk-taking experiences on today's journalists and their emotional well-being. It also examines some of the challenges confronting contemporary journalists and writers in the face of various economic, demographic, and technological pressures. In particular, it discusses the ways that digital computing is altering the traditional culture of journalism—for instance, the world of the newsroom and the activities of the professional journalist. It also looks at the implications of a host of other factors that assault our psyches, such as threats of terrorism, video and televised violence, fear of crime, increases in divorce and broken families, and illegal drug use and gang hostilities. Finally, it evaluates the prospects for new treatment options available to journalist–literary figures suffering from mental health disorders and other psychological effects of traumatic experience, including psychotropic drugs that combat depression and anxiety.
APA, Harvard, Vancouver, ISO, and other styles
50

Tham, Joo-cheong. How Might Digital Campaigning Affect the Problems of Political Finance? International Institute for Democracy and Electoral Assistance, 2021. http://dx.doi.org/10.31752/idea.2021.57.

Full text
Abstract:
This lecture deals with the intersection between three sets of challenges, each of which constitutes an existential threat to democracies across the world. The first is linked to money in politics, which poses the danger not only of ‘policy capture’ but also, in worse-case scenarios, of state capture by monied interests. The principal question addressed by this lecture is poised at the meeting place between these sets of challenges: How might digital campaigning affect the problems of political finance? Also integrated into the analysis is a third set of challenges: those which arise from the Covid-19 pandemic. This lecture reflects on how the pandemic might shape the impact of digital campaigning on the problems of political finance. Follow the lecture for the conclusion and read also the paper for more details.
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!

To the bibliography