Counter-intelligence in a command economy

نویسندگان
چکیده

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

The Wheels of A Command Economy: Allocating Soviet Vehicles

This paper traces the formal and informal allocation of vehicles by the Soviet administrative-command economy in the early and mid 1930s using the very same documents as did the Soviet dictator some 70 years earlier. Vehicles should present Soviet resource allocation in its most favorable light, since their production and allocation was highly centralized and tightly monitored. This case study,...

متن کامل

Plan, Siphoning, and Corruption in the Soviet Command Economy

This paper reconsiders Andrei Shleifer and Robert Vishny’s suggestion that a socialist industry will always prefer to cut both price and output relative to a market– clearing equilibrium in order to maximise bribe income. The evidence from recent archival studies of the Soviet economy does not support this conjecture. To understand the evidence we present an analytical framework within which a ...

متن کامل

political economy of china in central asia

this research is about the political economy of china in central asia. in this research the political & economic interactions affected on chinas political economy in central asia are examined. chinas goal of presence in central asia including political-security, economic and energy goals is described in one part. in another part, the trade relations between china and central asian countries ar...

15 صفحه اول

Counter Intelligence and the Semantic Web

It is our hypothesis that appropriate use of semantics, and particularly Semantic Web technologies, can have a significant impact on improving the speed of intelligence processing and sharing of intelligence process. For example, analysts within the intelligence community are often tasked as small teams in ad hoc ways to deal with emerging threats (this is sometimes referred to as “surge proces...

متن کامل

Revealing Botnet Membership Using DNSBL Counter-Intelligence

Botnets—networks of (typically compromised) machines—are often used for nefarious activities (e.g., spam, click fraud, denial-of-service attacks, etc.). Identifying members of botnets could help stem these attacks, but passively detecting botnet membership (i.e., without disrupting the operation of the botnet) proves to be difficult. This paper studies the effectiveness of monitoring lookups to...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: The Economic History Review

سال: 2015

ISSN: 0013-0117

DOI: 10.1111/ehr.12113