Catalogue Search | MBRL
Search Results Heading
Explore the vast range of titles available.
MBRLSearchResults
-
DisciplineDiscipline
-
Is Peer ReviewedIs Peer Reviewed
-
Series TitleSeries Title
-
Reading LevelReading Level
-
YearFrom:-To:
-
More FiltersMore FiltersContent TypeItem TypeIs Full-Text AvailableSubjectCountry Of PublicationPublisherSourceDonorLanguagePlace of PublicationContributorsLocation
Done
Filters
Reset
95,717
result(s) for
"government networks"
Sort by:
Difusión y redes en la cooperación regional: la institucionalidad comercial de la Alianza del Pacífico
2022
Objective/Context: This article examines regional cooperation from the perspective of literature on networking and diffusion literature aiming to explain how the Pacific Alliance’s trade institutions were formed in the period 2010-2019. Additionally, it analyses why, within this process, the bloc has been losing dynamism. Methodology: The qualitative analysis of four case studies is interlinked with process tracking to emphasize the connections and interactions between the actors identified in the decision-making process. Conclusions: The analysis reveals that the identification of shared principles between transnational and trans-government networks and political actors has facilitated the decision-making process whenever there have been pre-negotiation agreements that articulate their interests and harmonize their differences. This process shows that the institutional design adopted by the Pacific Alliance is the result of disseminating multiple regional references, in which the networks facilitated the transfer of knowledge to a regional organization. Originality: The article shows that it is possible to overcome the state-centric vision of regional cooperation and explains that regionalism does not emerge in isolation from other regional references.
Journal Article
Innovation and deadlock in global financial governance: transatlantic coordination failure in OTC derivatives regulation
2015
The institutional arrangement chosen by the leading nations in order to address financial regulatory reform in the wake of the 2007-2009 crisis exhibits two key features of global economic governance innovation. First, it employs a minilateral approach, restricting the participants that negotiate new regulatory standards to a few, highly involved stakeholders. Second, it relies heavily on government networks that operate on the basis of soft law. The arrangement circumvents the traditional intergovernmental model that has proven overly rigid and ineffective in addressing the problems that arise from highly interconnected and fast-changing global markets. Current theories of global economic governance predict that this twofold innovation enhances the effectiveness of financial regulatory reform. Yet a study of the evolution in over-the-counter (OTC) derivatives regulation shows that this is not the case. The paper then exposes three obstacles to cross-border regulatory cooperation between the two dominant players, the European Union and the United States. Authorities on both sides of the Atlantic are concerned about the distributive consequences of regulation, legislators and legislation hinder cross-border harmonization, and government networks are weak and incomplete. The paper concludes with suggestions of how to overcome coordination failure and theoretical implications for the political economy of networked governance.
Journal Article
At the Nexus of Cybersecurity and Public Policy
by
Clark, David
,
Sciences, Division on Engineering and Physical
,
Board, Computer Science and Telecommunications
in
Computer security
2014
We depend on information and information technology (IT) to make many of our day-to-day tasks easier and more convenient. Computers play key roles in transportation, health care, banking, and energy. Businesses use IT for payroll and accounting, inventory and sales, and research and development. Modern military forces use weapons that are increasingly coordinated through computer-based networks. Cybersecurity is vital to protecting all of these functions. Cyberspace is vulnerable to a broad spectrum of hackers, criminals, terrorists, and state actors. Working in cyberspace, these malevolent actors can steal money, intellectual property, or classified information; impersonate law-abiding parties for their own purposes; damage important data; or deny the availability of normally accessible services. Cybersecurity issues arise because of three factors taken together - the presence of malevolent actors in cyberspace, societal reliance on IT for many important functions, and the presence of vulnerabilities in IT systems. What steps can policy makers take to protect our government, businesses, and the public from those would take advantage of system vulnerabilities?
At the Nexus of Cybersecurity and Public Policy offers a wealth of information on practical measures, technical and nontechnical challenges, and potential policy responses. According to this report, cybersecurity is a never-ending battle; threats will evolve as adversaries adopt new tools and techniques to compromise security. Cybersecurity is therefore an ongoing process that needs to evolve as new threats are identified. At the Nexus of Cybersecurity and Public Policy is a call for action to make cybersecurity a public safety priority. For a number of years, the cybersecurity issue has received increasing public attention; however, most policy focus has been on the short-term costs of improving systems. In its explanation of the fundamentals of cybersecurity and the discussion of potential policy responses, this book will be a resource for policy makers, cybersecurity and IT professionals, and anyone who wants to understand threats to cyberspace.
Examining Municipal Procurement and Cooperation Networks in Smart Land Use Planning: The Yangtze River Delta Case
2025
Smart Land Use Planning (SLUP) has gained increasing attention in urban development, yet few studies examine its implementation from an urban governance perspective. This study investigates municipal SLUP project characteristics, their spatial distribution, and intercity cooperation networks by analyzing 3689 SLUP government procurement contracts in China’s Yangtze River Delta urban agglomeration. Using the Latent Dirichlet Allocation model, this study identified four main SLUP project types: real estate management, land resource protection, land use planning, and geographic information services. Spatial analysis revealed significant imbalances across cities, with SLUP projects concentrated in central cities while other cities heavily depend on intercity cooperation for technical support and services. Network analysis showed a core–periphery structure, with industrial structure and institution similarities significantly facilitating cooperation, while geographic distance and cultural similarity had limited impact. Future research should expand data sources to enable cross-regional comparative analysis. This study offers empirical evidence for policymaking in the implementation of SLUP and regional coordinated development.
Journal Article
Cybersecurity public policy : SWOT analysis conducted on 43 countries
\"This research evaluates 43 countries' cybersecurity public policy utilizing a SWOT analysis, to deliver transparency of the strengths, weaknesses, opportunities, and threats encompassing each of these countries' cybersecurity public policy. This book seeks to become the gateway to understanding what approaches can best serve the needs of the public and private sector, educating the public, and partnering with governments, parliaments, ministries, and cybersecurity public policy analysts, to help mitigate vulnerabilities currently woven into public and private sector information systems, software, hardware, and web interface applications relied upon for daily business activities\"-- Provided by publisher.
Exploratory and Exploitative Internationalization: Effects of Social Capital Antecedents and Fit Moderators of Innovation Consequence
2021
Implementing international strategy is essential to enhance corporate innovation and achieve sustainable development. Existing research has theoretically illustrated the concept and importance of carrying out both exploratory and exploitative internationalization, yet our understanding of the antecedents and consequences of both activities remains unclear. Based on the data of Chinese international manufacturing firms, this paper examines the differential effects of business, government and knowledge network capital on exploratory and exploitative internationalization, and probes into how organizational, strategic, and environmental factors moderate the innovation effectiveness of exploratory and exploitative internationalization. Results indicate that business network capital has the same positive impact on exploratory and exploitative internationalization; government network capital influences the implementation of exploratory internationalization, whereas knowledge network capital influences the execution of exploitative internationalization. Furthermore, our findings reveal that, to maximize innovation performance, pursuing exploratory internationalization is more beneficial for firms with older age, firms entering into countries with low host–home country similarity, and operating in a more dynamic international environment. By contrast, pursuing exploitative internationalization is more effective for younger firms, firms entering into countries with high host–home country similarity, and in more stable international environment. Theoretical and managerial implications are discussed.
Journal Article