Die folgenden Links führen aus den jeweiligen lokalen Bibliotheken zum Volltext:
Alternativ können Sie versuchen, selbst über Ihren lokalen Bibliothekskatalog auf das gewünschte Dokument zuzugreifen.
Bei Zugriffsproblemen kontaktieren Sie uns gern.
62 Ergebnisse
Sortierung:
In: Crime Law and Social Change
Cybercrime is rising rapidly in India. Developing economies such as India face unique cybercrime risks. This paper examines cybercrime and cybersecurity in India. The literature on which this paper draws is diverse, encompassing the work of economists, criminologists, institutionalists and international relations theorists. We develop a framework that delineates the relationships of formal and informal institutions, various causes of prosperity and poverty and international relations related aspects with cybercrime and cybersecurity and apply it to analyze the cybercrime and cybersecurity situations in India. The findings suggest that developmental, institutional and international relations issues are significant to cybercrime and cybersecurity in developing countries.
In: East Asia
In this paper, we argue that the two Koreas' intentions and actions on the cyber front point toward the possibility that they have engaged in cyber warfare against each other. From South Korea's standpoint, a key concern has been North Korea's advanced cyber warfare capabilities and alleged involvement of its substantial workforce in the Internet's dark side activities. These issues need to be looked at the backdrop of the North's nuclear and ballistic missile capabilities. This paper draws principally upon theories and concepts from military strategy and warfare to examine the contexts, mechanisms, and processes associated with the cyber warfare in the Korean peninsula. We also compare the two Koreas in terms of various forms of asymmetries in cyber warfare and cyber attacks. Also highlighted in the paper are South Korea's recent initiatives and actions to enhance cyber-offense and cyber-defense capabilities.
In: Crime Law and Social Change
Some economies in the Former Soviet Union and Central and Eastern Europe (FSU&CEE) are known as cybercrime hotspots. FSU&CEE economies have shown complex and varied responses to cybercrimes due partly to the differential incentives and pressures they face. This study builds upon literatures on white-collar crime, institutional theory and international relations (IR)/international political economy (IPE) perspectives to examine the low rates of prosecution and conviction of suspected cybercriminals in some economies in the FSU&CEE and variation in such rates across these economies. The findings indicate that cybercrime cases are more likely to be prosecuted and sanctions are imposed in economies that are characterized by a higher degree of cooperation and integration with the West. Cybercriminals are less likely to be jurisdictionally shielded in such economies. Our findings also suggest that a high degree of cooperation and integration with the West would lead to access to resources to enhance system capacity and law enforcement performance to fight cybercrimes.
Products and services based on advanced technologies such as artificial intelligence and blockchain are normally considered to be for rich consumers in advanced countries. Fourth Revolution and the Bottom Four Billion demonstrates how marginalized and vulnerable groups with limited resources can also benefit from these technologies. Nir Kshetri suggests that the falling costs and the increased ease of developing and deploying applications based on these technologies are making them more accessible. He illustrates how key emerging technologies are transforming major industries and application areas such as healthcare and pandemic preparedness, agriculture, finance, banking, and insurance. The book also looks at how these transformations are affecting the lives of low-income people in low- and middle-income countries and highlights the areas needing regulatory attention to adequately protect marginalized and vulnerable groups from the abuse and misuse of these technologies. Kshetri discusses how various barriers such as the lack of data, low resource languages, underdeveloped technology infrastructures, lack of computing power and shortage of skill and talent have hindered the adoption of these technologies among marginalized and vulnerable groups. Fourth Revolution and the Bottom Four Billion suggests that it is the responsibility of diverse stakeholders—governments, NGOs, international development organizations, academic institutions, the private sector, and others—to ensure that marginal groups also benefit from these transformative innovations.
Global entrepreneurship: the current status, definitions, types and measures -- The entrepreneurial ecosystem and its components -- Sources of entrepreneurial finances and their variation across the world -- Entrepreneurship in oecd economies -- Entrepreneurship in post-socialist economies in former Soviet Union and Central and Eastern Europe -- Entrepreneurship in the gulf cooperation council economies -- Entrepreneurship in Africa -- Entrepreneurship in china -- Entrepreneurship in India -- Entrepreneurship in Latin America -- IC1: mPedigree's innovative solution to fight counterfeit drugs -- IC2: the impacts of big data, cloud computing and the internet things in farm entrepreneurship: TH milk in Vietnam -- Appendix 2: Online sources of global entrepreneurship-related data and statistics -- Appendix 3: Preparing an international business plan (IBP)
In: CABI Books
This book aims at identifying and understanding the key factors and mechanisms involved in the diffusion and utilization of big data (BD) in key policy areas such as agriculture, health care and the environment in developing countries. The book has eight chapters and covers: (1) the current status, opportunities and challenges of big data in developing countries; (2) the big data ecosystem in developing countries; (3) big data in environmental protection and resource conservation; (4) big data in health-care delivery and outcomes; (5) big data in agriculture; (6) big data's role in increasing smallholder farmers' access to finance; and (7) data privacy and security issues facing smallholder farmers and poor communities in developing countries.
This book explains how major world economies are recognizing the need for a major push in cyber policy environments. It helps readers understand why these nations are committing substantial resources to cybersecurity, and to the development of standards, rules and guidelines in order to address cyber-threats and catch up with global trends and technological developments. A key focus is on specific countries' engagement in cyberattacks and the development of cyber-warfare capabilities. Further, the book demonstrates how a nation's technological advancement may not necessarily lead to cyber-superiority. It covers cybersecurity issues with regard to conflicts that shape relationships between major economies, and explains how attempts to secure the cyber domain have been hampered by the lack of an international consensus on key issues and concepts. The book also reveals how some economies are now facing a tricky trade-off between economically productive uses of emerging technologies and an enhanced cybersecurity profile. In the context of current paradigms related to the linkages between security and trade/investment, it also delves into new perspectives that are being brought to light by emerging cybersecurity issues
In: International political economy series
This book is about the global cybercrime industry, which according to some estimates, is a US$1 trillion industry and is growing rapidly. It examines economic and institutional processes in the cybercrime industry, provides insights into the entrepreneurial aspect of firms engaged in cyber-criminal activities, takes a close look at cybercrime business models, explains the global variation in the pattern of cybercrimes and seeks to understand threats and countermeasures taken by key actors in this industry. This book's distinguishing features include the newness, importance, controversiality and complexity of the topic, cross-disciplinary focus, orientation and scope, theory-based but practical and accessible to the wider audience, and illustration of various qualitative and quantitative aspects of the global cybercrime industry.
In: Chandos Asian studies series
In: Journal of global information technology management: JGITM, Band 27, Heft 2, S. 95-99
ISSN: 2333-6846
In: Journal of contemporary China, Band 32, Heft 139, S. 87-105
ISSN: 1469-9400
This article highlights the key motivations behind China's plan to launch the digital yuan and reviews the potential impacts on China and abroad. The article analyzes the digital yuan's benefits to consumers, such as a reliable low-risk, low cost, and high-efficiency payment solution and the potential to promote financial inclusion. It compares the digital yuan with its most prominent competitors. Also discussed is how the digital yuan is expected to provide the Chinese Communist Party with a new powerful tool to monitor and control its economy and people. The article provides a critical evaluation of the potential of the digital yuan's internationalization. This article also provides a perspective on the digital yuan to set global standards for the development of national digital currencies. (J Contemp China/GIGA)
World Affairs Online
In: Journal of contemporary China, Band 32, Heft 139, S. 87-105
ISSN: 1469-9400
In: Third world quarterly, Band 43, Heft 2, S. 371-392
ISSN: 1360-2241