Discover the world's scientific knowledge
With 160+ million publication pages, 25+ million researchers and 1+ million questions, this is where everyone can access science
You can use AND, OR, NOT, "" and () to specify your search.
Question
- Jan 2024
Based on current global issues, the main threats at the international level can be summarized as follows:
1. Particularly, global pandemics can pose serious health threats on an international scale and impact the entire world.
2. Effects of climate change, such as rising temperatures, extreme weather events, and sea-level rise, may be significant threats affecting global security and the economy.
3. Cyber attacks can threaten the security of states, organizations, and individuals on an international scale. Cyber espionage and cybercrime are among significant risks.
4. International terrorist organizations can threaten global stability by organizing violent actions for ideological or political reasons.
5. The proliferation of nuclear weapons can significantly impact international security and lead to regional conflicts.
6. International economic instability can strain relationships between countries and affect the balance of global trade.
Geopolitical factors influence intelligence operations to address these threats. For instance, geographical locations, access to energy resources, geopolitical conflicts, and international relations can be effective in determining the priorities and strategies of intelligence agencies. Understanding the changing dynamics in international relations is crucial in shaping the processes of intelligence collection and analysis.
…
Question
- Jul 2015
I am currently conducting qualitative research on Cyber-bullying, compared to school bullying from the perspective of parents and teachers. However, I am struggling to get to grips with the theoretical and conceptual framework for this study. I believe because the research takes a predominant 'top down' approach and acknowledge the influence of researcher bias, that this would appear to be in line with a post-positivist framework? For the analysis, I begin with a 'bottom up' approach for emergent codes, then provide data extracts and subsequently examine the interpretations against the existing literature. However, because I am using the traditional approach as an a-priori model to assess Cyber-bullying against, does this contradict this conceptual framework?
The theoretical framework I believe is based on the social-cultural model in which I then talk about the shift in youth culture and how this has had an impact on teachers and parents, hence their incorporation in this research and examining level of concern and school responsibility.
Any suggestions on this?
…
Question
- Feb 2025
To what extent does the increasing importance of digital technologies, including artificial intelligence, bring new risks such as cybercrime, disinformation and manipulation of public opinion? How should the development of digital technology applications, including artificial intelligence, be managed in order to significantly reduce the scale of misinformation on online social media and other threats and risks arising from this development?
The results of many studies confirm the thesis that the modern world, dominated by digital technologies, brings not only progress and facilitation, but also new, unprecedented threats. Cybercrime, disinformation and public opinion manipulation are problems that affect an increasing number of people and institutions, undermining trust in technology and weakening democratic processes. Cybercrime, including hacking, data theft and online fraud, poses a serious threat to the security of both individuals and organisations. Disinformation, the deliberate spread of false information, aims to mislead the public and achieve specific goals. The manipulation of public opinion, often using disinformation and other psychological techniques, is used to influence people's attitudes and behaviour. A successful solution to these problems requires a comprehensive approach, including strengthening cybersecurity, combating disinformation, educating people on the safe use of digital technologies, including artificial intelligence technologies, and international cooperation. Research plays an important role in solving these problems by providing the knowledge and analysis necessary to develop effective strategies. In recent years, the importance of digital technologies, including artificial intelligence and other Industry 4.0/5.0 technologies, has increased, with both positive aspects, development opportunities and negative effects, threats and new risks. The development of artificial intelligence applications also brings new risks, such as cybercrime, disinformation and manipulation of public opinion. This raises the following question: How should the development of digital applications, including artificial intelligence, be managed in order to significantly reduce the generation of disinformation on online social media and limit the scale of other threats and risks arising from this development?
I have described the key issues of opportunities and threats to the development of artificial intelligence technology in my article below:
OPPORTUNITIES AND THREATS TO THE DEVELOPMENT OF ARTIFICIAL INTELLIGENCE APPLICATIONS AND THE NEED FOR NORMATIVE REGULATION OF THIS DEVELOPMENT
Deleted research item The research item mentioned here has been deleted
And what is your opinion on this topic?
What do you think about it?
Please reply,
I invite everyone to the discussion,
Thank you very much,
Best regards,
I invite you to scientific cooperation,
Dariusz Prokopowicz
…
Question
- Mar 2023
How should the architecture of an effective computerised platform for detecting fakenews and other forms of disinformation on the internet built using Big Data Analytics, artificial intelligence and other Industry 4.0 technologies be designed?
The scale of the development of disinformation on the Internet including, among other things, fakenews has been growing in recent years mainly in social media. Disinformation is mainly developing on social media sites that are popular among young people, children and teenagers. The growing scale of disinformation is particularly socially damaging in view of the key objective of its pursuit by cybercriminals and certain organisations using, for example, the technique of publishing posts and banners using fake profiles of fictitious Internet users containing fakenews. The aim is to try to influence public opinion in society, to shape the general social awareness of citizens, to influence the assessment of the activities of specific policies of the government, national and/or international organisations, public or other institutions, to influence the ratings, credibility, reputation, recognition of specific institutions, companies, enterprises, their product and service offerings, individuals, etc., to influence the results of parliamentary, presidential and other elections, etc. In addition to this, the scale of cybercriminal activity and the improvement of cyber security techniques have also been growing in parallel on the Internet in recent years. Therefore, as part of improving techniques to reduce the scale of disinformation spread deliberately by specific national and/or international organisations, computerised platforms are being built to detect fake news and other forms of disinformation on the internet built using Big Data Analytics, artificial intelligence and other Industry 4.0 technologies. Since cybercriminals and organisations generating disinformation use new Industry 4.0 technologies in the creation of fake profiles on popular social networks, new information technologies, Industry 4.0, including but not limited to Big Data Analytics, artificial intelligence, deep learning, machine learning, etc., should also be used to reduce the scale of such harmful activities to citizens.
In view of the above, I address the following question to the esteemed community of scientists and researchers:
How should the architecture of an effective computerised platform for detecting factoids and other forms of disinformation on the Internet built using Big Data Analytics, artificial intelligence and other Industry 4.0 technologies be designed?
And what do you think about it?
What is your opinion on this subject?
Please respond,
I invite you all to discuss,
Thank you very much,
Best wishes,
Dariusz Prokopowicz
…
Question
- May 2020
The Industry 4.0 program provides for the straightthrough digitalization of all physical as-sets and their integration into the digital ecosystem together with partners involved in the value-added chain. Cyber-physical integration is an important prerequisite for smart manufacturing. Also, the transfer of control and decision-making functions to intelligent systems and algorithms lead to a change in the paradigm of technological development of enterprises. Cyber-physical systems (CPS) and digital twins (DT) are the preferred means of such integration. DT are a software analogue of a physical device or process that models the behavior of a phys-ical object under the influence of interference and disturbances, as well as the environment and the human factor. DT creates high-quality virtual models of physical objects in virtual space to simulate their behavior in the real world and provide feedback.
How do You think in which processes and operations it is possible to reduce energy consumption and increase energy efficiency by introducing "Digital Twin" technology?
…
Question
- May 2020
The Industry 4.0 program provides for the straightthrough digitalization of all physical as-sets and their integration into the digital ecosystem together with partners involved in the value-added chain. Cyber-physical integration is an important prerequisite for smart manufacturing. Also, the transfer of control and decision-making functions to intelligent systems and algorithms lead to a change in the paradigm of technological development of enterprises. Cyber-physical systems (CPS) and digital twins (DT) are the preferred means of such integration. DT are a software analogue of a physical device or process that models the behavior of a phys-ical object under the influence of interference and disturbances, as well as the environment and the human factor. DT creates high-quality virtual models of physical objects in virtual space to simulate their behavior in the real world and provide feedback.
How do You think in which processes and operations it is possible to reduce energy consumption and increase energy efficiency by introducing "Digital Twin" technology?
…
Question
- Jul 2020
The UK government led by the seemingly Sinophile Boris Johnson has less than a week ago rescinded a previous trade decision to allow Huawei to supply 35% of the UK's 5G equipment. A turn of event enthusiastically hailed by Tory rebels led by Iain Duncan Smith as well as President Trump, the president of a nation which is a key ally of the UK. Several factors indubitably have played into the somewhat sudden retreat by the UK. Whatever extent geopolitics account for UK's new stance, thus having swayed to the side of its close ally, international trade hangs in the balance as both the US and China (a nation that has been the biggest contributor to global GDP in the last 20 years) wield strong influence in post-Brexit British market.
There is then the inclination to ask whether it is the power of loyalty to a very close ally in which case UK to US that has trumped the power of international trade in UK's trade abrogation with Huawei or it is a genuine security concerns as raised by UK's National Cyber Security Centre?
…
Question
- Dec 2023
I conduct research in the area of security of a telecommunications enterprise. I am interested in obtaining expert opinions as part of an expert interview on contemporary enterprise security risks, with particular emphasis on corporate espionage. As part of the study, I would like to obtain the opinions of experts and researchers in the fields of management, security, cyber security and information technology. I therefore ask you to answer the following questions:
- What factors influence the security of a telecommunications company?
- How do legal regulations and internal policies impact the security of a telecommunications company?
- What are the most commonly observed threats to the security of a telecommunications company?
- In what manner should a telecommunications company assess the information security-related risks?
- What key aspects are crucial for an information security policy that should be implemented in a telecommunications company?
- How should a telecommunications company manage access to confidential information and data?
- Which tools and technologies are most effective in preventing information security attacks?
- How can a telecommunications company effectively monitor and detect potential cases of corporate espionage, both within its own organization and from external entities?
- What role do government agencies and law enforcement bodies play in preventing and responding to cases of corporate espionage?
- What changes should be made in terms of legal regulations?
- What adjustments should be made in the training and development of telecommunications company employees?
- What changes should be implemented in the organizational domain of the company?
…
Question
- Jan 2025
•NATO's strategic deterrence in Eastern Flank faces growing challenges in the aftermath of the Ukraine conflict, as the security environment becomes increasingly complex and volatile. The Russian full-scale invasion of Ukraine in February 2022 underscored the limitations of traditional deterrence methods, which rely heavily on conventional military capabilities and nuclear deterrence. These methods, while effective during the Cold War, are less suited to counter the multifaceted threats posed by hybrid warfare tactics and the rapid advancement of emerging technologies.
•Emerging technologies, such as artificial intelligence (AI), autonomous systems, advanced surveillance tools and cyber capabilities are transforming the nature of modern conflict. While these innovations hold significant potential to enhance NATO’s deterrence posture, their integration presents critical challenges. Interoperability among NATO member states, ethical considerations surrounding AI and autonomous weaponry and the adaptation of traditional military doctrines to these new paradigms remain unresolved issues.
•Furthermore, the growing prominence of cognitive warfare—strategies designed to manipulate perceptions, influence decision-making, and destabilize adversaries—adds another layer of complexity to NATO’s security landscape. Russia's use of disinformation campaigns and psychological operations has highlighted NATO’s vulnerabilities in this domain. Despite its significance, cognitive warfare remains underexplored in NATO’s strategic frameworks, leaving a critical gap in its deterrence strategy.
•The central problem is the lack of a comprehensive approach that effectively integrates emerging technologies and counter-cognitive warfare measures into NATO’s deterrence strategy for Eastern Flank. This deficiency raises concerns about NATO’s ability to adapt to modern security threats and maintain stability in the region. Addressing this issue requires not only technological innovation but also coordinated policy development, enhanced interoperability, and a reevaluation of existing strategic doctrines to account for the evolving nature of warfare.
…
Question
- Jan 2024
Twin Transition and Entrepreneurial Behavior: Navigating the Path to Green and Digital Transformation for Sustainable Entrepreneurship
Antonio Crupi, University of Messina (crupi.antonio@unime.it)
Gianluca Elia, University of Salento (gianluca.elia@unisalento.it)
Federico Pigni, Grenoble Ecole de Management (federico.pigni@grenoble-em.com)
Elisabetta Ragusei, Polytechnic of Turin (elisabetta.raguseo@polito.it)
Gianluca Solazzo, University of Salento (gianluca.solazzo@unisalento.it)
The digital and green transitions represent transformative shifts that are reshaping
the economic, social, and environmental landscapes in the 21st century. These
shifts intertwine profoundly, giving rise to emerging spaces for nurturing new
entrepreneurial opportunities.
The green transformation sets the strategic direction for the change and innovation
process, while the digital transformation equips us with the tools to effectively
implement the strategy and take action.
The convergence of the digital and green transformation combines the advantages
of digital technologies adoption with the principles of social and environmental
sustainability, and this represents a new frontier for entrepreneurship, enabling
streamlined operations and the emergence of sustainable and regenerative business
models. This convergence has also garnered increased research and policy
attention, and is at the center of the recovery and resilience plans to relaunch the
economy after the Covid19 crisis. In such scenario, entrepreneurs need to navigate
the tensions between digital and green transformations, address the environmental
impact of digital technologies and bridge the potential digital divide in sustainable
innovation.
Also universities play a central role in this context by redesigning curricula and
adopting new practices that incorporate digital innovations and sustainable
development principles and guidelines, thus evolving towards a fourth generation.
This special issue aims to stimulate a discussion on how the twin transition
influences entrepreneurial action, promoting the development of sustainable
businesses and contributing to a greener and more digitally connected future.
Suggested topics are, but not limited to:
o Strategies for integrating environmental sustainability and digital transformation in entrepreneurial ventures
o The role of entrepreneurial behavior in driving green and digital transformation
o Entrepreneurial mindset and capabilities in navigating the twin transition
o The impact of digital technologies on sustainable business models and practices
o The fourth-generation of universities engaged in combining digital innovation and sustainable development
o The role of policy and regulatory frameworks in shaping entrepreneurial actions towards the twin transition
o Case studies showcasing successful integration of green and digital initiatives for
entrepreneurship
o The challenges and opportunities of the twin transition for start-ups and established
businesses
o The role of entrepreneurial ecosystems in facilitating the twin transition
o The influence of stakeholder perspectives on entrepreneurial decisions in the twin transition
o Methodological advancements and novel approaches in researching the twin transition and entrepreneurial behavior
o The dark side of the twin transition: e-waste, energy consumption, digital divide, cyber-
threats, greenwashing
Submission Process:
Please prepare the manuscript according to IEEE-TEM’s guidelines and submit to the journal’s Manuscript Central site (https://mc.manuscriptcentral.com/tem-ieee).
Papers will be evaluated on a rolling basis.
Deadline is February 29th, 2024
…
© 2008-2025 ResearchGate GmbH. All rights reserved.