• Refine Query
  • Source
  • Publication year
  • to
  • Language
  • 19
  • 8
  • 4
  • 4
  • 3
  • 2
  • 2
  • 1
  • 1
  • 1
  • 1
  • 1
  • Tagged with
  • 62
  • 21
  • 16
  • 10
  • 9
  • 9
  • 8
  • 8
  • 8
  • 8
  • 8
  • 8
  • 7
  • 7
  • 7
  • About
  • The Global ETD Search service is a free service for researchers to find electronic theses and dissertations. This service is provided by the Networked Digital Library of Theses and Dissertations.
    Our metadata is collected from universities around the world. If you manage a university/consortium/country archive and want to be added, details can be found on the NDLTD website.
11

Covert action : a useful tool for United States foreign policy?

Uram, Derek Andrew. 10 April 2008 (has links)
No description available.
12

George Washington, America's first director of military intelligence / Identification and resolution of problems with methodology used in selection of technological concepts for research and development support

Prather, Michael S. 06 1900 (has links)
Thesis: George Washington, as Commander-in-Chief of the Continental Army led this nation to victory and independence in the American War for Independence. Victory was facilitated by his direct and effective use of intelligence sources and methods. Discussion: During the American War for Independence, intelligence information regarding location, movement, and disposition of British forces allowed the Continental Army to fight on its own terms and stymie British efforts to quell the revolution. General George Washington, as Commanding General of the Continental Army, was aware of the value of intelligence in the proper conduct of military operations. Washington literally became America's first director of military intelligence. He directed the intelligence operations that were conducted, and performed his own analysis. The Continental Army's effectiveness in intelligence includes examples of the proper use of espionage, counterintelligence, communications security, codebreaking, deception, operational security, surveillance, reconnaissance, reporting and analysis. Time after time, the Americans were properly prepared with good intelligence ultimately resulting in independence from the British. These intelligence successes can be directly attributed to the direction of General George Washington and the actions of his operatives.
13

...among other things...

Tisdale, Michael 01 May 2017 (has links)
Essay about the play by the author Production Notes Acknowledgements Full Text of "...among other things..." by Michael Tisdale
14

George Washington, America's first director of military intelligence

Prather, Michael S. January 2002 (has links) (PDF)
Thesis (master's)--United States Marine Corps Command and Staff College, 2002. Thesis--George Washington, as Commander-in-Chief of the Continental Army led this nation to victory and independence in the American War for Independence. Victory was facilitated by his direct and effective use of intelligence sources and methods. Discussion: During the American War for Independence, intelligence information regarding location, movement, and disposition of British forces allowed the Continental Army to fight on its own terms and stymie British efforts to quell the revolution. General George Washington, as Commanding General of the Continental Army, was aware of the value of intelligence in the proper conduct of military operations. Washington literally became America's first director of military intelligence. He directed the intelligence operations that were conducted, and performed his own analysis. The Continental Army's effectiveness in intelligence includes examples of the proper use of espionage, counterintelligence, communications security, codebreaking, deception, operational security, surveillance, reconnaissance, reporting and analysis. Time after time, the Americans were properly prepared with good intelligence ultimately resulting in independence from the British. These intelligence successes can be directly attributed to the direction of General George Washington and the actions of his operatives. / Mentor(s): John B. Matthews, David A. Kelley. Includes bibliographical references (p. 52-54). Also available online.
15

Cyberespionage 2010 : is the current status of espionage under international law applicable in cyberspace? /

Romero, Jorge H. January 2001 (has links) (PDF)
Thesis (L.L.M.)--Georgetown University, Law Center, 2001. / "30 April 2001." Includes bibliographical references. Also available via the Internet.
16

The ethical resister's last resort news coverage over the allegations of a national security whistleblower /

Amundson, Ryan. Lo, Clarence Y. H. January 2009 (has links)
The entire thesis text is included in the research.pdf file; the official abstract appears in the short.pdf file; a non-technical public abstract appears in the public.pdf file. Title from PDF of title page (University of Missouri--Columbia, viewed on October 14, 2009). Thesis advisor: Dr. Clarence Lo. Includes bibliographical references.
17

To Catch a Thief: Protecting Proprietary Information Including Trade Secrets From Corporate Espionage

Koen, Clifford M., London, Wm Brian 01 October 2019 (has links)
Corporate espionage is a multifaceted problem causing hundreds of billions of dollars in losses to businesses each year. Health care managers have a wide variety of options available to prevent theft of their organizations' trade secrets and other proprietary information. Organizations should protect their confidential and trade secret information by taking various security measures to limit access to protected material and by using appropriate types of restrictive covenants such as nondisclosure, noncompetition, and nonsolicitation agreements. This article provides helpful guidance for managers to maximize protection against theft of proprietary information.
18

Three essays on international cyber threats: Target nation characteristics, international rivalry, and asymmetric information exchange

Mauslein, Jacob A. January 1900 (has links)
Doctor of Philosophy / Security Studies / Jeffrey J. Pickering / As the Internet is progressively integrated into industrial and defense-related networks around the globe, it is becoming increasingly important to understand how state and sub-state groups can use Internet vulnerabilities as a conduit of attack. The current social science literature on cyber threats is largely dominated by descriptive, U.S.-centric research. While this scholarship is important, the findings are not generalizable and fail to address the global aspects of network vulnerabilities. As a result, this dissertation employs a unique dataset of cyber threats from around the world, spanning from 1990 to 2011. This dataset allows for three diverse empirical studies to be conducted. The first study investigates the political, social, and economic characteristics that increase the likelihood of a state being targeted for cyber threats. The results show that different state characteristics are likely to influence the forms of digital attack targeting. For example, states that experience increases in GDP per capita and military size are more likely to be targeted for cyber attacks. Inversely, states that experience increases in GDP per capita and those that are more democratic are less likely to be targeted for cyber terrorism. The second study investigates the role that international rivalries play in cyber threat targeting. The results suggest that states in rivalries may have more reason to strengthen their digital security, and rival actors may be cautious about employing serious, threatening forms of cyber activity against foes because of concerns about escalation. The final study, based upon the crisis bargaining theory, seeks to determine if cyber threat targeting decreases private information asymmetry and therefore decreases conflict participation. Empirical results show that the loss of digital information via cyber means may thus illicit a low intensity threat or militarized action by a target state, but it also simultaneously increases the likelihood that a bargain may be researched, preventing full scale war by reducing the amount of private information held between parties.
19

Constructing a Cyber Preparedness Framework (CPF): The Lockheed Martin Case Study

Beyer, Dawn Marie 01 January 2014 (has links)
The protection of sensitive data and technologies is critical in preserving United States (U.S.) national security and minimizing economic losses. However, during a cyber attack, the operational capability to constrain the exfiltrations of sensitive data and technologies may not be available. A cyber preparedness methodology (CPM) can improve operational capability and cyber security. The CPM enables a corporation to (a) characterize cyber threats; (b) determine the level of preparedness necessary to ensure mission success; (c) facilitate strategic planning for cyber security (CS); and (d) establish priorities for CS investment planning and management decisions. The cyber preparedness framework (CPF) underlies the CPM. A corporation's leadership articulates its fundamental approach to risk management (RM) and mission assurance, and determines its target level of preparedness. Typically, corporations utilize the CPF to (a) characterize the caliber of the threat; (b) assess the technical and operational capabilities to counter the threat; and (c) develop the governance and processes necessary to achieve its cyber preparedness level. The problem that was investigated in this case study was how to construct a CPF for Lockheed Martin (LM) that works in conjunction with a risk management process (RMP). The goal was to extend the CPF into an RMP to construct a risk management framework (RMF) paradigm that can aid similarly large-sized private sector U.S. Government (USG) contractors in implementing the CPM. In this investigation, the author identified the corporate (a) security categorization, (b) cyber threats, (c) cyber threat level, (d) cyber preparedness level, (e) capabilities the corporation should utilize to counter cyber threats, and (f) governance and processes necessary to achieve the cyber preparedness level for a large-sized private sector USG contractor. The results of this investigation were organized in terms of RMP phases. Based on the results, the author constructed an RMF paradigm that can aid similarly large-sized USG contractors in implementing a CPM.
20

Mapping New Jerusalem : space, national identity and power in British espionage fiction 1945-79

Goodman, Samuel Geoffrey January 2012 (has links)
This thesis argues that the espionage fiction of Graham Greene, Ian Fleming and John le Carré published between 1945 and 1979 illustrates a number of discontinuities, disjunctions and paradoxes related to space, sovereignty and national identity in post-war Britain. To this effect, the thesis has three broad aims. Firstly, to approach the representations of space and sovereign power in the work of these authors published during the period 1945-1979, examining the way in which sovereign power produces space, and then how that power is distributed and maintained. Secondly, to analyse the effect that sovereign power has on a variety of social and cultural environments represented within spy fiction and how the exercise of power affects the response of individuals within them. Thirdly, to establish how the intervention of sovereign power within environments relates to the creation, propagation and exclusion of national identities within each author’s work. By mapping the application of sovereign power throughout various environments, the thesis demonstrates that the control of environment is inextricably linked to the sovereign control of British subjects in espionage fiction. Moreover, the role of the spy in the application of sovereign power reveals a paradox integral to the espionage genre, namely that the maintenance of sovereign power exists only through the undermining of its core principles. Sovereignty, in these texts, is maintained only by weakening the sovereign control of other nations.

Page generated in 0.0422 seconds