{"title":"Normative Diagrams as a Tool for Representing Legal Systems","authors":"Diogo Sasdelli, A. Trivisonno","doi":"10.1007/s12626-023-00144-0","DOIUrl":"https://doi.org/10.1007/s12626-023-00144-0","url":null,"abstract":"","PeriodicalId":75184,"journal":{"name":"The review of socionetwork strategies","volume":" ","pages":""},"PeriodicalIF":0.0,"publicationDate":"2023-08-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"44863341","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Role of Regulatory Sandboxes and MLOps for AI-Enabled Public Sector Services","authors":"Ana Paula Gonzalez Torres, Nitin Sawhney","doi":"10.1007/s12626-023-00146-y","DOIUrl":"https://doi.org/10.1007/s12626-023-00146-y","url":null,"abstract":"","PeriodicalId":75184,"journal":{"name":"The review of socionetwork strategies","volume":" ","pages":""},"PeriodicalIF":0.0,"publicationDate":"2023-08-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"48570725","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Tetsuya Kawamura, Yusuke Osaki, Go Ohtani, Ryuji Saito
{"title":"Reciprocity is Different: Experimental Evidence from a Trust Game Between Japanese Domestic and International Students","authors":"Tetsuya Kawamura, Yusuke Osaki, Go Ohtani, Ryuji Saito","doi":"10.1007/s12626-023-00143-1","DOIUrl":"https://doi.org/10.1007/s12626-023-00143-1","url":null,"abstract":"","PeriodicalId":75184,"journal":{"name":"The review of socionetwork strategies","volume":"17 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-07-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134918888","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Discrete Choice Analysis of Japanese 5G Mobile Demand","authors":"Naoki Takano","doi":"10.1007/s12626-023-00142-2","DOIUrl":"https://doi.org/10.1007/s12626-023-00142-2","url":null,"abstract":"","PeriodicalId":75184,"journal":{"name":"The review of socionetwork strategies","volume":" ","pages":""},"PeriodicalIF":0.0,"publicationDate":"2023-07-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"43741050","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"The Impact of Changing Political Positions on Charitable Donations: A Case Study of a Political Scandal in South Korea","authors":"Youngrok Kim, H. Jung","doi":"10.1007/s12626-023-00141-3","DOIUrl":"https://doi.org/10.1007/s12626-023-00141-3","url":null,"abstract":"","PeriodicalId":75184,"journal":{"name":"The review of socionetwork strategies","volume":"1 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2023-07-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"43588031","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Revolutionizing Cloud Security: Leveraging Quantum Computing and Key Distribution for Enhanced Protection","authors":"Ashutosh Kumar, G. Verma","doi":"10.1007/s12626-023-00140-4","DOIUrl":"https://doi.org/10.1007/s12626-023-00140-4","url":null,"abstract":"","PeriodicalId":75184,"journal":{"name":"The review of socionetwork strategies","volume":" ","pages":""},"PeriodicalIF":0.0,"publicationDate":"2023-06-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"44595455","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Review and Comparison of US, EU, and UK Regulations on Cyber Risk/Security of the Current Blockchain Technologies: Viewpoint from 2023","authors":"Petar Radanliev","doi":"10.1007/s12626-023-00139-x","DOIUrl":"https://doi.org/10.1007/s12626-023-00139-x","url":null,"abstract":"Abstract The first cryptocurrency was invented in 2008/09, but the Blockchain-Web3 concept is still in its infancy, and the cyber risk is constantly changing. Cybersecurity should also be adapting to these changes to ensure security of personal data and continuation of operations. This article starts with a comparison of existing cybersecurity standards and regulations from the National Institute of Standards and Technology (NIST) and the International Organisation for Standardisation (ISO)—ISO27001, followed by a discussion on more specific and recent standards and regulations, such as the Markets in Crypto-Assets Regulation (MiCA), Committee on Payments and Market Infrastructures and the International Organisation of Securities Commissions (CPMI-IOSCO), and more general cryptography (and post-quantum cryptography), in the context of cybersecurity. These topics are followed up by a review of recent technical reports on cyber risk/security and a discussion on cloud security questions. Comparison of Blockchain cyber risk is also performed on the recent EU standards on cyber security, including European Cybersecurity Certification Scheme (EUCS)—cloud, and US standards—The National Vulnerability Database (NVD) Common Vulnerability Scoring System (CVSS). The study includes a review of Blockchain endpoint security, and new technologies e.g., IoT. The research methodology applied is a review and case study analysing secondary data on cybersecurity. The research significance is the integration of knowledge from the United States (US), the European Union (EU), the United Kingdom (UK), and international standards and frameworks on cybersecurity that can be alighted to new Blockchain projects. The results show that cybersecurity standards are not designed in close cooperation between the two major western blocks: US and EU. In addition, while the US is still leading in this area, the security standards for cryptocurrencies, internet-of-things, and blockchain technologies have not evolved as fast as the technologies have. The key finding from this study is that although the crypto-market has grown into a multi-trillion industry, the crypto-market has also lost over 70% since its peak, causing significant financial loss for individuals and cooperation’s. Despite this significant impact to individuals and society, cybersecurity standards and financial governance regulations are still in their infancy, specifically in the UK.","PeriodicalId":75184,"journal":{"name":"The review of socionetwork strategies","volume":"27 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-05-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134923120","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Review and Comparison of US, EU, and UK Regulations on Cyber Risk/Security of the Current Blockchain Technologies: Viewpoint from 2023","authors":"P. Radanliev","doi":"10.2139/ssrn.4406430","DOIUrl":"https://doi.org/10.2139/ssrn.4406430","url":null,"abstract":"The first cryptocurrency was invented in 2008/09, but the Blockchain-Web3 concept is still in its infancy, and the cyber risk is constantly changing. Cybersecurity should also be adapting to these changes to ensure security of personal data and continuation of operations. This article starts with a comparison of existing cybersecurity standards and regulations from the National Institute of Standards and Technology (NIST) and the International Organisation for Standardisation (ISO)—ISO27001, followed by a discussion on more specific and recent standards and regulations, such as the Markets in Crypto-Assets Regulation (MiCA), Committee on Payments and Market Infrastructures and the International Organisation of Securities Commissions (CPMI-IOSCO), and more general cryptography (and post-quantum cryptography), in the context of cybersecurity. These topics are followed up by a review of recent technical reports on cyber risk/security and a discussion on cloud security questions. Comparison of Blockchain cyber risk is also performed on the recent EU standards on cyber security, including European Cybersecurity Certification Scheme (EUCS)—cloud, and US standards—The National Vulnerability Database (NVD) Common Vulnerability Scoring System (CVSS). The study includes a review of Blockchain endpoint security, and new technologies e.g., IoT. The research methodology applied is a review and case study analysing secondary data on cybersecurity. The research significance is the integration of knowledge from the United States (US), the European Union (EU), the United Kingdom (UK), and international standards and frameworks on cybersecurity that can be alighted to new Blockchain projects. The results show that cybersecurity standards are not designed in close cooperation between the two major western blocks: US and EU. In addition, while the US is still leading in this area, the security standards for cryptocurrencies, internet-of-things, and blockchain technologies have not evolved as fast as the technologies have. The key finding from this study is that although the crypto-market has grown into a multi-trillion industry, the crypto-market has also lost over 70% since its peak, causing significant financial loss for individuals and cooperation’s. Despite this significant impact to individuals and society, cybersecurity standards and financial governance regulations are still in their infancy, specifically in the UK.","PeriodicalId":75184,"journal":{"name":"The review of socionetwork strategies","volume":"1 1","pages":"1-25"},"PeriodicalIF":0.0,"publicationDate":"2023-05-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"47173862","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Y. Ueki, M. Tsuji, Nuchjarin Intalar, S. Komolavanij
{"title":"Effects of Quality Control Activities and Customers’ ICT Investment on Digitalization in Manufacturing Firms in Southeast Asia","authors":"Y. Ueki, M. Tsuji, Nuchjarin Intalar, S. Komolavanij","doi":"10.1007/s12626-023-00135-1","DOIUrl":"https://doi.org/10.1007/s12626-023-00135-1","url":null,"abstract":"","PeriodicalId":75184,"journal":{"name":"The review of socionetwork strategies","volume":"17 1","pages":"25-53"},"PeriodicalIF":0.0,"publicationDate":"2023-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"43048076","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"On the Lost Property of Telework During the COVID-19 Pandemic in Japan: From the Perspective of Sociomateriality and Organizational Citizenship Behaviour.","authors":"Hiroshi Koga","doi":"10.1007/s12626-023-00134-2","DOIUrl":"https://doi.org/10.1007/s12626-023-00134-2","url":null,"abstract":"<p><p>When telework was discussed in Japan during the COVID-19 pandemic, the context of staying home was strongly considered. As a result, the primary focus has been on carrying out one's assigned work at home. In other words, people tend to focus on the fact that they can carry out their work without being restricted by location. However, the networked aspect of telework is important. In other words, to realize telework, it is necessary to fully consider the aspect of making one's own work visible and collaborating with others. In this paper, the author clarifies the significance of the \"connection\" that information systems engender by examining the mechanism of inducing organizational citizenship behaviour from the perspective of \"sociomateriality\" proposed by Wanda Orlikowski et al. in information systems research. Furthermore, we warn against \"discretionary bias,\" a tendency to \"free oneself from the constraints of time and place,\" which appears, because telework was introduced as a measure to prevent the spread of infection. In addition, this paper examines the case of intranets in the 1990s to clarify the nature of connection through information systems and to find new insights in old cases, just as the Industrial Revolution is referenced in discussions of whether AI will take away jobs.</p>","PeriodicalId":75184,"journal":{"name":"The review of socionetwork strategies","volume":"17 1","pages":"73-86"},"PeriodicalIF":0.0,"publicationDate":"2023-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://www.ncbi.nlm.nih.gov/pmc/articles/PMC10123583/pdf/","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"9375234","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}