نتایج جستجو برای: espionage

تعداد نتایج: 371  

Journal: : 2023

The scientific article is devoted to the study of concept «commercial secret», which acts as a process or tool for constant using in business operations; and it an important component economic system functioning. First all, these are technical technological secrets production. A n effective enterprise can protect against loosing commercial secrecy, instance, by adoption non-disclosure contracts...

2013

Today’s industry and government organizations are highlighting cyber security and information assurance as one of their top IT priorities. Cyber threats are presented by both individuals and nation-sponsored groups with intentions spanning the theft of trade secrets, “hacktivism” (the invasion or disruption of systems for activist purposes) and espionage. Similarly, new problems are rising arou...

2010
Jean Monnet Enrico Mattei Carlo Carraro Christophe Bravard

We consider a multimarket framework where a set of firms compete on two interrelated oligopolistic markets. Prior to competing in these markets, firms can spy on others in order to increase the quality of their product. We characterize the equilibrium espionage networks and networks that maximize social welfare under the most interesting scenario of diseconomies of scope. We find that in some s...

Journal: :IEEE Pervasive Computing 2014
Mary Baker Justin Manweiler

Published by the IEEE CS n 1536-1268/14/$31.00 © 2014 IEEE W elcome to the latest column of Notes from the Community. We start by thanking Jason Hong for his past authorship of this column and introducing Justin Manweiler as the new department coeditor. Members of our Reddit community submitted many fascinating items this quarter. This issue’s topics include the various ways we try to translate...

2009
P. Billand Jean Monnet C. Bravard S. Chakrabarti Sudipta Sarangi

We consider a multimarket framework where a set of firms compete on two interrelated oligopolistic markets. Prior to competing in these markets, firms can spy on others in order to increase the quality of their product. We characterize the equilibrium espionage networks and networks that maximize social welfare under the most interesting scenario of diseconomies of scope. We find that in some s...

2016
Mithil Parekh Yuan Gao Deeksha Gupta Christian Luschmann

Industrial automation and control systems (IACS) are more and more a combination of standardized hardware and software components that are respectively linked. A continuous increase in digital Instrumentation and Control (I&C) in production lines and critical infrastructures lead to a remarkable increase in computer-based digital security risk [IE10]. The Internet of Things, services, data and ...

2004
B N Raveesh Sanjay Pande

The explosive growth of computer and communications technology raises new legal and ethical challenges that reflect tensions between individual rights and societal needs. For instance, should cracking into a computer system be viewed as a petty prank, as trespassing, as theft, or as espionage? Should placing copyrighted material onto a public file server be treated as freedom of expression or a...

2012
Agata McCormac Kathryn Parsons Marcus Butavicius

This report examines previous research on malicious insiders with particular emphasis on the social and psychological factors that may have influenced the attacker and their behaviours. This research also draws on corresponding studies into fraud and espionage in non IT scenarios. A range of preventative measures is presented that approach the problem from personnel, policy and technical perspe...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید