نتایج جستجو برای: espionage
تعداد نتایج: 371 فیلتر نتایج به سال:
Recent advances in information and communication technologies have increased the incentives for firms to acquire about rivals. These may major implications market entry because they make it easier potential entrants gather valuable about, example, an incumbent’s cost structure. However, little theoretical research has actually analyzed this question. This paper literature by extending a one-sid...
Quantum cryptography is an approach to securing communications by applying the phenomena of quantum physics. Quantum cryptography provides secure communication whose security depends only on the validity of quantum theory. Interesting characteristics of quantum mechanics includes the existence of indivisible quanta and of entangled systems, both of which lie at the root of the quantum cryptogra...
Do narratives shape how humans process other minds or do they presuppose an existing theory of mind? This study experimentally investigated this problem by assessing subject responses to systematic alterations in the genre, levels of intentionality, and linguistic complexity of narratives. It showed that the interaction of genre and intentionality level are crucial in determining how narratives...
Should the Federal Reserve or any other government agency make precise statements about its policy objectives? Determining the proper amount of secrecy in government generates controversy whether the agency involved undertakes espionage, banking, or monetary policy. Between the broad areas of agreement (classifying military strategies, publishing legislation) lie equally broad areas of contenti...
Palm sized legged robots show promise for military and civilian applications, including exploration of hazardous or difficult to reach places, search and rescue, espionage, and battlefield reconnaissance. However, they also face many technical obstacles, includingbut not limited toactuator performance, weight constraints, processing power, and power density. This paper presents an overview of s...
In the wake of controversy over allegations of espionage by Wen Ho Lee, a nuclear scientist at the Department of Energy’s Los Alamos National Laboratory, the department ordered that polygraph tests be given to scientists working in similar positions. Soon thereafter, at the request of Congress, the department asked the National Research Council (NRC) to conduct a thorough study of polygraph tes...
It's possible to manipulate the headphones, earphones, and simple earbuds connected to a computer, silently turning them into a pair of eavesdropping microphones. This paper focuses on the cyber security threat this behavior poses. We introduce 'SPEAKE(a)R,' a new type of espionage malware that can covertly turn the headphones, earphones, or simple earbuds connected to a PC into microphones whe...
Various existing and pending legislation can be used to force individuals and organisations to disclose confidential information. Courts may order a wide variety of data to be turned over by either party in civil and criminal cases. Government agencies are explicitly tasked with protecting “national economic security.” And organised crime will target information just like any other valuable ass...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید