نتایج جستجو برای: espionage
تعداد نتایج: 371 فیلتر نتایج به سال:
Digital espionage has Cold War origins, but states are still determining how to respond when they found be its latest victims. In multilateral discussions about norms of responsible state behaviour in cyberspace, digital political is the elephant room. Like other aspects inter-state intelligence competition, ‘business as usual’ can also lead tensions, particularly operations become public. The ...
The Ottoman expansion into the Western Mediterranean in sixteenth century created an intense rivalry with Habsburg. This article examines this conflict from a different perspective, i.e. that of espionage. While on one hand analysing political changes Mare Nostrum 1530s, other, it scrutinizes Neapolitan intelligence, most important information-gathering service Emperor Charles V. Furthermore, s...
A key security challenge facing government agencies is prevention of insider threat attacks associated with trusted government employees, military personnel, and contractors. These attacks can take on a variety of forms, including espionage, terrorism and violence, compromise of information technology networks, and security incidents involving failure to adequately protect sensitive information...
Insider attack and espionage on computer-based information is a major problem for business organizations and governments. Knowledge Management Systems (KMSs) are not exempt from this threat. Prior research presented the Congenial Access Control Model (CAC), a relationship-based access control model, as a better access control method for KMS because it reduces the adverse effect of stringent sec...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید