This book is an open access book. Many scholars have wondered if a non-Western theory of international politics founded on different premises, be it from Asia or from the “Global South,” could release international relations from the grip of a Western, “Westphalian” model. This book argues that a Buddhist approach to international relations could provide a genuine alternative. Because o…
Use the guidance in this comprehensive field guide to gain the support of your top executives for aligning a rational cybersecurity plan with your business. You will learn how to improve working relationships with stakeholders in complex digital businesses, IT, and development environments. You will know how to prioritize your security program, and motivate and retain your team. Misalignment…
This book provides a fresh, updated and science-based perspective on the current status and prospects of the diverse array of topics related to the potato, and was written by distinguished scientists with hands-on global experience in research aspects related to potato. The potato is the third most important global food crop in terms of consumption. Being the only vegetatively propagated specie…
This open access book features various studies on democratization, transformation, political and economic development, and security issues in the Organization for Security and Cooperation in Europe (OSCE) geographical region and beyond. Written by experts and academics in the fields of human rights, security, transformation and development, particularly in post-soviet and communist countries, i…
This open access book discusses the current role of smallholders in connection with food security and poverty reduction in developing countries. It addresses the opportunities they enjoy, and the constraints they face, by analysing the availability, access to and utilization of production factors. Due to the relevance of smallholder farms, enhancing their production capacities and economic and…
This open access book brings together perspectives from multiple disciplines including psychology, law, IS, and computer science on data privacy and trust in the cloud. Cloud technology has fueled rapid, dramatic technological change, enabling a level of connectivity that has never been seen before in human history. However, this brave new world comes with problems. Several high-profile cases o…
Sebelum terjun ke bisnis online, pelaku bisnis sebaiknya mengenali dan memetakan ranah bisnis yang makin ramai ini. Selain strategi memilih model bisnis, trik marketing, dan memilih platform yang tepat, masih ada isu ancaman keamanan siber yang penting diwaspadai, baik oleh pelapak maupun pembeli. Tidak kalah penting, pelaku e-commerce perlu memahami payung hukum terkait transaksi elektronik (U…
Kompleksnya isu cybersecurity hingga keberagaman multistakeholder yang terlibat dalam cybersecurity memberikan tantangan tersendiri dalam upaya menghadapi cybersecurity. Mulai dari belum adanya definisi yang ajeg, hingga ancaman terkait cybersecurity yang mempengaruhi pembuatan kebijakan, serta upaya yang diambil untuk menghadapi ancaman-ancaman tersebut. Dilengkapi dengan studi kasus, buku ini…
This is the first full-length study of digital identity in a transactional context, from a legal perspective. Clare Sullivan's analysis reveals the emergence of a distinct, new legal concept of identity. This concept is particularly clear under a national identity scheme such as the United Kingdom and Indian schemes. However, its emergence is evident even in jurisdictions, like Australia, which…
This study reviews policy developments in recent years and, in the light of that, explores ways in which further consensus might be reached among WTO members to reduce farm trade distortions — and thereby also progress the multilateral trade reform agenda. Particular attention is given to ways that would boost well-being in developing countries, especially for those food-insecure households s…