Fear over facts: how preconceptions explain perceptions of threat following cyberattacks DOI Creative Commons
Gal Dor, Ryan Shandler, Miguel Alberto Gomez

et al.

Journal of Information Technology & Politics, Journal Year: 2024, Volume and Issue: unknown, P. 1 - 16

Published: Nov. 2, 2024

Why do cyberattacks elevate perceptions of threat even as they fail to generate truly destructive effects? We argue that people employ motivated reasoning align with their preconceptions. Fielding a two-wave panel survey immediately before and after cyberattack on an Israeli hospital, we confirm plays crucial role in how interpret cyber events. Results show already predisposed perceive threatening experience significant increase threat, while those initially viewing harmless also have beliefs reinforced. The data reveals minor incidents bolster doom convictions.

Language: Английский

Introduction: Cyber-conflict – Moving from speculation to investigation DOI
Ryan Shandler, Daphna Canetti

Journal of Peace Research, Journal Year: 2024, Volume and Issue: 61(1), P. 3 - 9

Published: Jan. 1, 2024

Investigating cyber conflict is enormously difficult. The domain complex, quality data are sparse, international affairs shrouded in secrecy, and despite its seeming ubiquity, power has only recently entered the battlefield. In face of these challenges, we must rise to meet challenges cybersecurity research by deploying creative methods that collect verifiable probatory data, which allow for predictive models behavior. Against this backdrop, our special issue offers a vision embraces culture rigorous inquiry based on theoretically robust, policy relevant investigation. We highlight two key features. First, at intersection political science incorporate human dimension conflict. A security approach places people as primary objects recognizes individual-level analyses can shed light macro-level trends. Second, adopt rigorous, empirical methods. embrace broad tent collection techniques – spanning qualitative quantitative, experimental, observational research. What integral all scholarship abides highest standards replicability falsifiability. articles contained collectively form proof concept expands horizons from substantive viewpoint (adding prevalent military/strategic analyses), methodological perspective (propounding importance scrutiny). Together, 10 pieces affirm there now critical mass substantively diverse empirically field cybersecurity, community capable making bold, grounded, tested claims verify how or not altering nature peace, relations.

Language: Английский

Citations

15

THE RELATIONSHIP BETWEEN E-GOVERNMENT AND THE DIGITALIZATION OPPORTUNITIES OFFERED BY THE ICT SECTOR: AN ANALYSIS AT THE LEVEL OF THE MEMBER COUNTRIES OF THE EUROPEAN UNION AND THE EEA DOI Creative Commons

Alexandra MIRONESCU,

Cezar-Petre Simion,

Mădălina MAZĂRE

et al.

BUSINESS EXCELLENCE AND MANAGEMENT, Journal Year: 2024, Volume and Issue: 14(2), P. 24 - 39

Published: June 1, 2024

The research presented in this article had as objectives carrying out a review of the specialized literature field E-government and opportunities digitization from perspective IC&T sector, study relations between E-governance (expressed activities via websites) evolution sector analysis obtained results, verification confirmation formulated hypotheses contextualization results by referring to other literature. To highlight relationship digitalization offered correlation analyzes were carried using secondary data made available Eurostat databases. Three first hypothesis, one regarding strong positive number enterprises active IC&T, is validated case most European countries. two hypotheses, also close share staff total employees, have been confirmed only fewer

Language: Английский

Citations

0

Fear over facts: how preconceptions explain perceptions of threat following cyberattacks DOI Creative Commons
Gal Dor, Ryan Shandler, Miguel Alberto Gomez

et al.

Journal of Information Technology & Politics, Journal Year: 2024, Volume and Issue: unknown, P. 1 - 16

Published: Nov. 2, 2024

Why do cyberattacks elevate perceptions of threat even as they fail to generate truly destructive effects? We argue that people employ motivated reasoning align with their preconceptions. Fielding a two-wave panel survey immediately before and after cyberattack on an Israeli hospital, we confirm plays crucial role in how interpret cyber events. Results show already predisposed perceive threatening experience significant increase threat, while those initially viewing harmless also have beliefs reinforced. The data reveals minor incidents bolster doom convictions.

Language: Английский

Citations

0