Articles published on Security governance
Authors
Select Authors
Journals
Select Journals
Duration
Select Duration
6833 Search results
Sort by Recency
- New
- Abstract
- 10.1093/jacamr/dlaf230.083
- Dec 4, 2025
- JAC-Antimicrobial Resistance
- Sin Hang Phoenix Hui
BackgroundAntimicrobial resistance (AMR) poses a major threat to public health globally, with carbapenem-resistant Klebsiella pneumoniae (CRKP) of particular concern in the UK. Carbapenems are also classified as ‘Reserve’ antibiotics under the WHO AWaRe framework, reflecting their critical role as last-line agents where few alternatives exist. Rising resistance in these agents is therefore a priority target for stewardship and surveillance. England is a hub of international mobility, with passenger flows concentrated in London and major regional airports. While case reports have linked resistant infections to travel, quantitative evidence on how fluctuations in passenger volumes influence resistance at the regional level remains limited. Addressing this gap is essential to support UKHSA surveillance priorities and inform infection-prevention strategies in high-mobility settings.ObjectivesThe objective of this study was to quantify the relationship between international passenger mobility and AMR, using CRKP as a case study across English regions from 2021 to 2024. Specifically, we aimed to determine whether increases in passenger flows were followed by measurable changes in resistance levels, and to assess the temporal lag of this association.MethodsWe constructed a panel dataset of nine English regions (2021–2024) combining monthly Civil Aviation Authority passenger volumes with UK Health Security Agency (UKHSA) surveillance of CRKP. The primary outcome was the percentage of resistant isolates per region-month. Fixed-effects linear regression models were estimated, with resistance as the dependent variable and passenger volumes (millions) as the predictor. Specifications included pooled ordinary least squares, region and month fixed effects, and lag structures of 1–6 months. Standard errors were clustered at the regional level to account for autocorrelation.ResultsAnalysis of 432 monthly observations (nine English regions, 2021–2024) was performed, linking Civil Aviation Authority passenger flows with UKHSA surveillance of CRKP. In pooled ordinary least squares, each additional million passengers were associated with a 0.13 percentage-point increase in CRKP resistance (95% CI 0.09–0.17, P<0.001; R²=0.51). In two-way fixed-effects models controlling for regional heterogeneity and month-specific shocks, the association persisted (β=0.19, 95% CI 0.09–0.29, P=0.003). Lagged models indicated that the effect was strongest at one month (β=0.18, 95% CI 0.07–0.29, P=0.01) and weaker at three months (β=0.16, 95% CI −0.01–0.33, P=0.06), while no association was detected at six months. In distributed lag models including contemporaneous and lagged flows simultaneously, coefficients were imprecise, reflecting multicollinearity between successive traffic measures.ConclusionsIncreases in passenger mobility were associated with higher CRKP resistance within 1–3 months, consistent with importation and early dissemination of resistant strains. These findings underline the importance of strengthening AMR surveillance systems in regions with high travel volumes and suggest that monitoring mobility data could provide an early signal for emerging resistance trends. More broadly, this approach provides a transferable framework for analysing other AMR pathogens and drug-resistance combinations.
- New
- Research Article
- 10.69554/hqqa9393
- Dec 1, 2025
- Cyber Security: A Peer-Reviewed Journal
- Margaret Mavins Johnson
Previous research on corporate governance and cyber security risk management has focused primarily on large for-profit organisations. Although this paper includes a focus on cyber resilience strategies non-profit organisation leaders use, a significant aspect of the research exploration is applicable to the growing need for both for-profit and non-profit businesses to develop cyber resilience guidelines to sustain their organisations’ abilities to detect, withstand and recover from cyberattacks and threats. Despite the growing awareness of the importance of cyber resilience, the problem addressed was that a considerable number of organisation senior executives continue to demonstrate an unpreparedness to address information security cybercrime issues and cyber resilience decisions. As a consequence, a single set of standard cyber security risk management procedures related to non-profit organisation cyber resilience decisions did not exist to justify how nonprofit organisation leaders addressed existing network security procedures, implemented strategies or achieved cyber resilience success. This is and has been arguably the most significant threat non-profit organisation leaders have experienced. The goal of this paper is to provide an understanding of non-profit organisation leaders — board chairman, board of directors, executive directors and other executives — cyber security risk management procedures and strategies for cyber resilience board governance in an urban metropolitan city area in the southeastern US. Emerging cyber resilience network security trends and technologies are identified to include the ways non-profit organisation leaders responded to the COVID-19 pandemic health crisis.
- New
- Research Article
- 10.1016/j.jhin.2025.08.013
- Dec 1, 2025
- The Journal of hospital infection
- A Salzmann + 7 more
Inclusion of emergency department attendance on classification of Clostridioides difficile infection-onset status: a revised definition.
- New
- Research Article
- 10.1007/s41125-025-00107-2
- Nov 27, 2025
- European Journal for Security Research
- Monika Gabriela Bartoszewicz
Abstract This article examines the strategic implications of conceptual inflation in the evolving discourse of hybrid warfare, with particular focus on its consequences for critical infrastructure protection. Drawing a parallel with the post-9/11 securitisation of terrorism, it argues that the increasingly elastic use of the term “hybrid threat” has created a condition of perpetual preparedness that paradoxically undermines operational readiness. As diverse threat phenomena, from cyber intrusions and disinformation to sabotage and proxy violence, are collapsed under a single hybrid rubric, crisis planning becomes generalised and detached from actor-specific threat logic. Through a comparative analysis of Norway and Taiwan, two advanced but geopolitically exposed democracies, the article demonstrates how national security systems, though resilient, remain conceptually unprepared for deniable, adaptive threats posed by state-backed terrorist proxies. Both countries possess sophisticated infrastructure protection frameworks; yet both continue to treat disruption as accidental or technical, rather than as strategically curated. Drawing on contemporary scholarship, fieldwork, and recent incidents, the article makes the case for a reconceptualisation of infrastructure as a strategic domain vulnerable to intelligent exploitation. It calls for a shift from resilience-based preparedness to anticipatory governance, underpinned by attacker modelling, red-teaming, and clearer typological distinctions. In doing so, it contributes to the growing debate on how to move beyond the rhetoric of hybrid warfare and towards a more operationally grounded framework for future security governance.
- New
- Research Article
- 10.38035/jgsp.v3i4.557
- Nov 26, 2025
- Jurnal Greenation Sosial dan Politik
- Moch Abdan Salam + 1 more
This study examines the effectiveness of cooperation between the Directorate of Water and Air Police (Polairud) and other institutions in addressing illegal fishing in Indonesian waters. The phenomenon of illegal fishing, particularly by foreign vessels in the Exclusive Economic Zone (EEZ), has caused significant economic, social, and ecological losses. Polairud, as a maritime law enforcement agency, plays a crucial role in patrolling, investigating, and securing maritime areas. However, its effectiveness relies heavily on synergy with other institutions such as the Ministry of Maritime Affairs and Fisheries (KKP), the Indonesian Navy, and the Maritime Security Agency (Bakamla). This study uses a juridical-empirical approach with qualitative analysis of statutory data, institutional documents, interviews, and reports of joint patrol activities. The results indicate that inter-agency cooperation has been implemented through integrated patrols, information exchange, and technical training, but still faces obstacles such as overlapping authority, sectoral egos, and limited patrol and communication facilities. Regulatory harmonization increased inter-agency coordination, and the establishment of a Joint Command Center as a joint control center for maritime law enforcement are needed. Strong institutional synergy will strengthen efforts to eradicate illegal fishing and guarantee protection of the sovereignty and sustainability of Indonesia's marine resources.
- New
- Research Article
- 10.70818/pjbis.v02i04.0138
- Nov 25, 2025
- Pacific Journal of Business Innovation and Strategy
- Md Saiful Abedin
Bangladesh faces an increasingly complex landscape of transnational security threats including drug trafficking, human trafficking, money laundering, terrorism, and cross-border smuggling that undermine national stability and strain existing governance structures. These evolving threats also impede progress toward selected Sustainable Development Goals (SDGs), particularly SDG 16 (Peace, Justice, and Strong Institutions), SDG 5 (Gender Equality), SDG 8 (Decent Work and Economic Growth), and SDG 10 (Reduced Inequalities), although SDG considerations remain a secondary analytical dimension. This study employs a mixed-methods approach combining survey data (N = 200), focus group discussions, and document review to assess public perceptions of threat severity and identify key institutional weaknesses within Bangladesh’s security governance framework. Findings indicate that drug trafficking and human trafficking are perceived as the most significant transnational threats, followed by financial crimes and terrorism. Respondents widely emphasized governance gaps, including weak inter-agency coordination, limited border and maritime surveillance capacity, and insufficient cyber-financial intelligence capabilities. The study argues that addressing these challenges requires a targeted Security Sector Reform (SSR) agenda oriented toward institutional restructuring, improved coordination mechanisms, and enhanced operational readiness, with SDG alignment serving as a complementary development lens. Key recommendations include establishing an integrated transnational crime command, enhancing maritime and border surveillance, and improving regional intelligence cooperation. Overall, the findings contribute to the evolving discourse on national security governance in Bangladesh and highlight the urgency of institutional reform in mitigating transnational threats.
- New
- Research Article
- 10.1080/21622671.2025.2583056
- Nov 25, 2025
- Territory, Politics, Governance
- Veera Juntunen + 1 more
ABSTRACT This article discusses how security becomes socio-spatially reorganised through governance networks that aim to improve resilience in peripheral areas. The empirical focus is on northeastern Finland. The article argues that even though security governance networks are rationalised in many ways, the rationalities are not uniformly executed in practice, leading to tensions between actors and spatial scales. The views of rural actors about the real security situation may be disregarded, producing experiences of neglect reflecting the relationship between the state's peripheries and centres. The article concludes that supporting rural living conditions can increase national resilience by producing satisfaction towards the state.
- New
- Research Article
- 10.64753/jcasc.v10i2.2249
- Nov 25, 2025
- Journal of Cultural Analysis and Social Change
- Azrul Azlan Abd Rahman + 6 more
This study investigates the multifaceted security dynamics along the Malaysia–Thailand border, focusing on Southern Thailand's traditional and non-traditional threats. These include insurgency, economic disparity, human trafficking, education inequity, and cross-border crime, all of which significantly impact Malaysia’s border governance and socio-economic development. Employing a qualitative research approach through interviews and document analysis, the study highlights the need for holistic strategies integrating military, economic, and social responses. It also explores bilateral mechanisms such as the General Border Committee (GBC), Malaysia-Thai Border Coordination Office (MTBCO), and Southern Border Provinces Administrative Centre (SBPAC) as critical instruments of cooperation. The findings suggest that sustainable peace and development require a balanced approach between decentralisation, inclusive policies, and socio-cultural recognition. Malaysia’s role as a peace facilitator and economic partner emerges as vital to conflict resolution and long-term regional stability. This research contributes to understanding borderland security governance and regional collaboration in Southeast Asia.
- New
- Research Article
- 10.70619/vol5iss2pp26-37-701
- Nov 24, 2025
- Journal of Public Policy and Governance
- Khadija Fumo Khalifa + 1 more
In Lamu County, the tourist industry is a critical source of economic earnings. Still, it faces significant challenges due to security risks such as terrorist incidences, land disputes, environmental degradation, and socio-economic instability. These threats not only disrupt tourist arrivals and revenue generation but also pose long-term sustainability concerns for the region. The study covered the period from 2014 to 2024 and examined the effects of terrorism incidences on sustainable tourism in Lamu County. Grounded in Crisis Management and Sustainable Development Theories, the descriptive design was used, drawing data from a target population of 497 stakeholders, including security agencies, hotel operators, and tourism entities sample of 105 respondents was eventually used. Descriptive and inferential statistical methods were used to analyze the data. The study found that terrorism incidences are a critical factor influencing sustainable tourism. The study therefore concluded that terrorism incidences are measurable drivers of tourism outcomes. The study recommended that security collaboration be strengthened through enhanced community policing, intelligence sharing, and coordination between government agencies and local communities.
- New
- Research Article
- 10.22610/imbr.v17i4(i).4770
- Nov 23, 2025
- Information Management and Business Review
- Roshima Haji Said + 1 more
This study explores the continuing challenge of ensuring food security in an era of growing climate uncertainty and environmental decline. Weak coordination among institutions and inefficiencies within food supply chains have often limited the success of sustainable initiatives, despite an increasing commitment to climate-smart policies. The purpose of this study is to understand how climate-smart governance can improve food security through the influence of sustainable supply chain practices. Using a narrative review approach, data were gathered from the Scopus database and examined through an integrative thematic analysis to identify common ideas and relationships linking governance, sustainability, and the resilience of food systems. The review shows that effective climate-smart governance contributes to stronger food security when supported by sustainable supply chain practices such as green logistics, reduced food loss, digital innovation, and collaboration among stakeholders. These practices make governance efforts more effective by improving how resources are managed, reducing environmental pressure, and helping supply chains adapt to change. As a result, they support better food availability, access, and stability. The study makes a theoretical contribution by proposing a framework that positions sustainable supply chain practices as the connecting element between governance structures and food security outcomes. Practically, the findings provide valuable guidance for policymakers, supply chain professionals, and agricultural organizations to create more integrated and responsive governance systems that can promote sustainability, encourage innovation, and build resilient food networks capable of adapting to future global challenges.
- New
- Research Article
- 10.24144/2307-3322.2025.91.4.59
- Nov 22, 2025
- Uzhhorod National University Herald. Series: Law
- D Rybka
The article proves that OSINT is an advanced method of collecting and analyzing information from open sources, which is actively used by security agencies. This is a concept, methodology and technology of obtaining and using military, political, economic and other information from open sources without violating laws - to support decision-making in the field of national defense and security. It is emphasized that OSINT accounts for 80-95% of all data used by the intelligence community worldwide. Its use allows for a more comprehensive approach to solving national security tasks, more optimal use of human and financial resources, speed up the process of making organizational decisions, increase the effectiveness of the fight against crime, etc. The OSINT methodology is analyzed, which includes: information search, registration and accounting of information, information analysis and synthesis of messages from various open sources, information administration and dissemination and has a number of advantages: availability of information sources; volume of information sources; versatility; speed of receipt; ease of further use; cost of obtaining information. The positive aspects of OSINT are also outlined: the global nature of information processing and its use in real time; facilitating understanding of the context of events to be analyzed; its use does not require additional financial costs for the purchase of special equipment; does not require long- term training of certain specialists; its sources are freely available, and therefore can be used not only by law enforcement agencies (representatives of state authorities), but also by private detectives, volunteers, etc.; its use (under certain conditions) does not violate the rights of citizens. It has been proven that the effectiveness of OSINT is determined by its rational planning, strict adherence to certain principles, the involvement of qualified employees in its implementation, the prompt formulation of the conclusions obtained and their timely transfer to interested parties, as well as the development of optimal measures to ensure national security on their basis.
- New
- Research Article
- 10.53982/ajsd.2025.1702.01-j
- Nov 20, 2025
- African Journal of Stability and Development (AJSD)
- Dantawaye Gajere Miller
Kogi State, like many regions in Nigeria, grapples with persistent insecurity, community mistrust, and underdevelopment. Armed robbery, kidnapping, communal clashes, and political violence continue to undermine grassroots peace efforts and economic progress. In response to these challenges, community-based policing has emerged as an alternative approach aimed at improving security outcomes by fostering collaboration between law enforcement and local stakeholders. This study explores the role of community policing in promoting development and stability across selected communities in Kogi State. Adopting a qualitative research design, the study utilised data from key informant interviews, focus group discussions, and official reports from community policing units and civil society organisations. The analysis focused on local perspectives, policing strategies, and collaborative frameworks involving vigilantes, neighbourhood watch groups, and traditional authorities. Findings reveal that effective community policing has led to increased public trust in security agencies, improved information flow, and more proactive responses to crime. The involvement of local actors, particularly through neighbourhood security groups and multi-stakeholder dialogue platforms, has enhanced social cohesion and contributed to a decline in petty crimes and communal disputes. However, persistent challenges such as inadequate funding, poor training, and political interference continue to limit the impact. The study concludes that community-based policing, when properly structured and supported, can significantly contribute to grassroots stability, promote participatory governance, and foster long-term local development. It recommends strengthening institutional frameworks, enhancing community-police relations, and ensuring inclusive security planning at the local government level.
- New
- Research Article
- 10.54957/educoretax.v5i8.1848
- Nov 16, 2025
- Educoretax
- Joko Sumantri + 4 more
This paper explores the macroeconomic determinants shaping the composition of Indonesia’s sovereign debt portfolio, distinguishing between foreign loans, government securities, and sukuk instruments. Using quarterly data from 2010 to 2025 and a Vector Error Correction Model (VECM), the study reveals robust long-run cointegration between key macro variables and debt composition. Exchange rate stability, global interest rate dynamics, and fiscal policy adjustments emerge as dominant drivers. Policy implications underscore the importance of active debt diversification and macroprudential coordination to enhance fiscal resilience. Employing the Vector Error Correction Model (VECM), the analysis examines the impact of the exchange rate (X1), LIBOR (X2), SIBOR (X3), U.S. Prime Rate (X4), Japan Prime Rate (X5), foreign exchange reserves (X6), inflation rate (X7), and GDP growth rate (X8) on the allocation of foreign loans (Y1), government debt securities (Y2), and state sharia securities (Y3) over the period 2010–2025. The findings reveal that the relationships between the dependent variables (Y1, Y2, Y3) and the macroeconomic indicators (X1–X8) are both dynamic and heterogeneous in the short and long term. These results underscore that the effectiveness of economic policy is not solely dependent on direct interventions targeting debt instruments, but also on the government's ability to manage long-term adjustment mechanisms and short-term transmission channels, particularly through key variables such as X5, X3, and X2.
- New
- Research Article
- 10.31305/rrijm.2025.v10.n11.006
- Nov 15, 2025
- RESEARCH REVIEW International Journal of Multidisciplinary
- Himanshu Yadav + 1 more
This paper uses time series Co-Integration methodology and Granger Causality to check the status of financial market interconnectedness in India after the implementation of External Benchmark linked Lending Rate (EBLR) since October 2019 to July 2024. The markets used in the study are Money Market, Foreign Exchange Market, Government Securities Market and Stock Market. The results indicates that the stock market, despite having long-run relationship with all markets had stable relation only with foreign exchange market. Similarly, many pairs of market showed unstable long-run relationship. Causality test demonstrated causality from money market to foreign exchange market and government securities market demonstrating the independence of robust domestic liquidity operation. There is also causality from foreign exchange market to stock market and government securities market. Rest of pairs did not show any causality, showing the necessity of policy reforms to remove the barriers of free capital flow in the financial market. JEL Classification Code: C01, E44, F36
- New
- Research Article
- 10.1099/jmm.0.002097
- Nov 13, 2025
- Journal of Medical Microbiology
- Ching-Ying J Poh + 5 more
Introduction. Following two large foodborne outbreaks of the gastrointestinal pathogen, enteroaggregative Escherichia coli (EAEC), in Germany in 2011 and the UK in 2014, the UK Health Security Agency (UKHSA) implemented enhanced surveillance strategies for EAEC.Gap Statement. The surveillance of diarrhoeagenic E. coli in England focuses on Shiga toxin-producing E. coli (STEC), and the true clinical and community burden of EAEC is unknown. This gap extends globally, as many countries lack the infrastructure, diagnostic tools and healthcare facilities to resource surveillance programmes for EAEC.Aim. The aim of the study was to review the microbiological typing data and demographic data linked to isolates and cases diagnosed from 2016 to 2023 and to assess the risk to public health.Methodology. Faecal samples that tested positive by PCR for diarrhoeagenic E. coli at local microbiology diagnostic laboratories were referred to the UKHSA for confirmation and culture. Isolates identified as EAEC were sequenced on the Illumina HiSeq and NextSeq platforms. Sequence type, serotype and antimicrobial resistance (AMR) profile were derived from the genome sequence. Age, sex and travel histories were linked to the typing data.Results. There was a total of 1,402 notifications of EAEC, exhibiting a fivefold increase in diagnoses from 93 in 2016 to 524 in 2023. The most common sequence types (STs) were ST34 (n=202/1,402, 14.4%), ST10 (n=185/1,402, 13.2%), ST200 (n=183/1,402, 13.1%) and ST678 (n=101/1,402, 7.2%), and the most common serotypes were O92:H33 (n=130/1,402, 9.3%), O175:H31 (n=78/1,402, 5.6%) and O99:H10 (n=78/1,402, 5.6%). Most cases were female (n=748/1,372, 54.5%) and/or were aged <10 (n=387/1,372, 28.2%), within which 299 out of 387 (77.3%) were <5 years old. Of the 756 out of 1,386 (54%) cases that had a travel history, 597 out of 756 (79%) reported foreign travel within 7 days of onset of symptoms. AMR was detected in 1,030 out of 1,402 (73.5%) isolates with resistance to fluoroquinolone (n=810/1,402, 57.8%) and beta-lactam (n=807/1,402, 57.6%) antibiotics being the most common.Conclusion. Given the burden of disease caused by EAEC in the community, the high proportion of infections in children and travellers, the risk of the emergence of hybrid STEC/EAEC pathotypes and the high proportion of AMR, we recommend that EAEC should be part of the diagnostic algorithm in the UK.
- New
- Research Article
- 10.63332/joph.v4i1.3653
- Nov 12, 2025
- Journal of Posthumanism
- Mohammad Ali Almiftah + 14 more
Contemporary health security is a multi-dimensional discipline challenged by acute biological crises and persistent digital vulnerabilities, demanding a critical re-evaluation of current operational strategies and systemic weaknesses. This systematic review aimed to categorize the converging threats, critically appraise the systemic challenges, and evaluate the efficacy of management strategies in this critical domain. Analysis confirmed a crucial convergence of biological threats (e.g., infectious diseases) with digital vulnerabilities (e.g., cyber-attacks on e-health infrastructure), underscoring the need for a unified defense posture. Major findings revealed systemic deficits, including an inadequate conceptual and practical linkage between health security efforts and health systems strengthening, persistent governance fragmentation in operationalizing One Health, and an implementation gap in global frameworks. Furthermore, the adoption of advanced technologies like Blockchain is significantly constrained by technical and regulatory hurdles. The review concludes that failures in health security are largely attributable to systemic and political deficits, not technical flaws, implying the urgent necessity for a paradigm shift from reactive crisis response to proactive, integrated investment. Key recommendations include mandating the full integration of health security within Universal Health Coverage strategies and establishing a robust digital health security governance framework to manage technological risks effectively.
- New
- Research Article
- 10.18829/2317-921x.2025.e60053
- Nov 12, 2025
- RP3 - Revista de Pesquisa em Políticas Públicas
- Isadora Gomes Da Silveira + 1 more
Abstract This research critically analyzes the impacts of the European Union Deforestation-Free Regulation (EUDR) on the Brazilian agri-food system. From this perspective, the EUDR, embedded into the European Green Deal, emerges as a potential mechanism for global governance of both the climate and the global agri-food system. The study discusses its potential impacts on the strategic supply chains of soybeans, beef, cocoa, and coffee, covering the regulatory, commercial, and political dimensions of the legislation. The central argument of this work is that, although anchored in legitimate environmental commitments, the EUDR reflects a use of extraterritorial regulatory power by the European Union that may reinforce North-South asymmetries and limit Brazil's regulatory autonomy, intensifying disputes along global value chains. This work articulates debates on climate justice, regulatory sovereignty, and environmental barriers by examining how the EUDR reconfigures the intersections between global food security governance and international climate regimes in the Global South. By adopting the EUDR as a case study, the research seeks to understand how changes in environmental governance emerge in response to global challenges and how they can reconfigure the role of exporting countries in the international sustainability regime. The study contributes to the debate on climate justice, international cooperation, and the challenges of building collaborative arrangements that are sensitive to environmental conservation and the diversity of contexts in global food trade.
- New
- Research Article
- 10.1186/s40537-025-01294-4
- Nov 7, 2025
- Journal of Big Data
- Yanni Liang + 5 more
Abstract In the context of rapid digital transformation and the burgeoning field of big data, the management of data providers has emerged as a critical element, heavily dependent on robust regulatory frameworks. This paradigm shift warrants a comprehensive investigation within the domain of public management. Based on the policy review, literature analysis, and conceptual clarification, this study utilizes CiteSpace for a quantitative bibliometric analysis to discern key research hotspots, emerging trends, and the historical development of the field. The findings indicate an ascending trajectory in data provider research, with significant contributions from both international and domestic scholars. Nevertheless, there exists an urgent need for enhanced collaboration across teams and institutions. Predominant countries such as the USA, Australia, and China underscore the global and collaborative nature of this research. Central themes addressed include data production, cloud computing, and data security, each varying regionally in emphasis. A notable transition is observed from foundational and academic research to practical applications and advanced technologies. Moving forward, to standardize data markets, academia should establish theoretical frameworks, integrate security governance, and refine evaluation systems. Governments should enhance legal oversight, foster cross-sector collaboration, and accelerate ecosystem development for public management modernization. Data vendors require end-to-end security compliance, technical standardization, and market-driven innovation to maintain competitive sustainability. These insights provide both theoretical and practical guidance, promoting comprehensive research and sustainable evolution in this dynamic sector.
- Research Article
- 10.1002/poi3.70018
- Nov 6, 2025
- Policy & Internet
- Ausma Bernot
ABSTRACT WeChat exemplifies a unique entanglement of private and public data infrastructures. As China's “super app,” WeChat (微信) integrates seamlessly into daily life, enabling communication, shopping, utility payments, and access to government services. Prior research has thoroughly explored how WeChat has supported the information censorship regime in China. However, WeChat's impact on public security capabilities and services has not been previously examined. To address this gap, this article traces how Tencent (腾讯)—the company behind WeChat and one of the biggest communications companies in China—began working with public security agencies in China to develop public security WeChat and even supply WeChat‐supported policing services. This article draws on a multi‐modal data set of government procurement records ( n = 53), supplemented with digitally archived news articles. Integrated into profitable surveillance assemblages, public security WeChat and WeChat policing have evolved into a plug‐and‐play components of digital public‐private infrastructures. The analysis shows how WeChat went from supporting the Party‐state's information control efforts to becoming an integrated module of China's public security technologies.
- Research Article
- 10.12688/wellcomeopenres.25027.1
- Nov 5, 2025
- Wellcome Open Research
- Kaitlyn E Johnson + 11 more
Background Up-to-date real-time disease surveillance data can provide critical public health insights, however reporting delays can create downward bias in the latest data. Nowcasting methods designed to correct for this bias remain underused in public health practice due to their complexity, lack of tailored documentation, or technical barriers. Methodological advances in nowcasting are also hampered by the absence of standardised benchmarks for evaluating new methods. Methods To address these needs, we developed a family of nowcasting methods and an accompanying R package, baselinenowcast . We validated our method against the baseline method that was used in the German COVID-19 Nowcast Hub and on which our approach was based. Using this data, we conducted an analysis to compare different specifications of our method which were designed to address common issues in epidemiology such as weekday patterns in reporting and the ability to share estimates across different strata. We used our approach on norovirus surveillance data from the United Kingdom Health Security Agency (UKHSA) and compared the performance of three of our method specifications against three methods evaluated in a previous study. Results Our baseline method improved estimates compared to unadjusted data across all case studies. We found that the optimal choice of baseline method specification depends on context but that our default method specification performed well in a range of settings. Applied to UKHSA norovirus data, our method helped us understand the performance of the model currently used in public health practice. Conclusions Our method and software can be used both as a straightforward nowcasting method and provides a benchmark for nowcasting model development.