• Refine Query
  • Source
  • Publication year
  • to
  • Language
  • 19
  • 8
  • 4
  • 4
  • 3
  • 2
  • 2
  • 1
  • 1
  • 1
  • 1
  • 1
  • Tagged with
  • 62
  • 21
  • 16
  • 10
  • 9
  • 9
  • 8
  • 8
  • 8
  • 8
  • 8
  • 8
  • 7
  • 7
  • 7
  • About
  • The Global ETD Search service is a free service for researchers to find electronic theses and dissertations. This service is provided by the Networked Digital Library of Theses and Dissertations.
    Our metadata is collected from universities around the world. If you manage a university/consortium/country archive and want to be added, details can be found on the NDLTD website.
31

Wirtschaftsspionage in Verhandlungen aus Informationsökonomischer und Wirtschaftsetischer Perspektive : eine Interdisziplinäre Analyse / Industrial espionage in international negotiations

Søilen, Klaus Solberg January 2004 (has links)
The dissertation examines a case of industrial espionage by one of the parties involved in a forthcoming international negotiation. We want to know what consequences a burglary has for the actual negotiation. The dissertation consist of five hypothesis, of which the three first were empirically tested. The discussion of thesis four and five is supported basically by research literature, but have also found indirect support in the empirical study. A game theoretical model of four information sets is used. Thesis 1: Pay-offs do not change significantly from one information set to the other. confirmed Thesis 2: Behavior do not change significantly from one information set to the other. confirmed Thesis 3: The perception of fairness do not change significantly from one information set to the other. confirmed Thesis 4: International negotiations is socially so complex that it only makes sense to study the phenomena from an interdisciplinary angle. confirmed Thesis 5: A descriptive evolutionary approach can be an alternative to neoclassical economic theory in understanding the study of international negotiations. confirmed The study also confirms that economic theory is correct in excluding the ethical dimension from their models, as these factors have little influence on the end price. Fairness plays only a minor role in international negotiations. ** / <p>Forskarens hemsida: http://www.bth.se/iem/kss.nsf Disputerat vid Universität Leipzig, Wirtschaftswissenschaftliche Fakultät, http://www.uni-leipzig.de/ Avhandlingen utgiven av BTH.</p>
32

The Defense Against the latest Cyber Espionage both insider and outsider attacks

Nsambu, Emmanuel, Aziz, Danish January 2012 (has links)
This study was carried out with the intention of examining the defensive mechanism employed against the latest cyber espionage methods including both insider and outsider attacks. The main focus of this study was on web servers as the targets of the cyber attacks. Information in connection to the study was obtained from researchers’ online articles. A survey was also conducted at MidSweden University in order to obtain information about the latest cyber attacks on web servers and about the existing defensive mechanism against such attacks. The existing defensive mechanism was surveyed and a simple design was created to assist in the investigation of the efficiency of the system. Some simple implementations of the existing defensive mechanism were made in order to provide some practical results that were used for the study. The existing defensive mechanism was surveyed and improved upon where possible. The improved defensive mechanism was designed and implemented and its results were compared with the results from the existing defensive mechanism. Due to the fact that the majority of the attackers use defensive mechanisms’ vulnerability in order to find their way into devices such as web servers, it was felt that, even with the most sophisticated improved defensive mechanism in place, it would not be entirely correct to claim that it is possible to fully protect web servers against such attacks.
33

Studien zum politischen Verständnis moderner englischer Unterhaltungsliteratur

Schultze, Bruno. January 1977 (has links)
Habilitationsschrift--Hamburg. / Includes bibliographical references (p. 225-238).
34

Bundesbürger im Dienst der DDR-Spionage : eine analytische Studie /

Herbstritt, Georg. January 2007 (has links)
Zugl.: Berlin, Humboldt-Universiẗat, Diss., 2007.
35

Élaboration d'un système de contrôle de l'espionnage industriel par la fonction contrôle de gestion / Elaboration of a system of control of the industrial espionage by the management control function

Fane, Oumar 12 November 2018 (has links)
Plusieurs problèmes accablent les organisations, mais l’espionnage industriel occupe de plus en plus une place grandissante. Ses conséquences sont catastrophiques, allant des pertes de sommes colossales à la faillite de certaines entreprises. Ce travail de recherche, s’inscrivant dans le champ disciplinaire des Sciences de Gestion, particulièrement du contrôle de gestion, a pour finalité d’appréhender le processus de contrôle de l’espionnage industriel dans les organisations, en élaborant un système de contrôle de l’espionnage industriel par la fonction contrôle de gestion. Après une revue de littérature et une première vague d’entretiens semi-directifs, qui ont montré les limites des protections juridiques et les vides de gestion des protections techniques contre l’espionnage industriel, nous avons construit un modèle théorique du processus de contrôle de l’espionnage industriel par la fonction contrôle de gestion, qui met en interaction les figures imposées / libres, les leviers de contrôle diagnostic / interactif et leurs outils, et les six dimensions d’analyse réajustées. Ensuite, nous avons élaboré un système de contrôle de l’espionnage industriel, en déterminant ses outils et en spécifiant son instrumentation dans les organisations. Une deuxième vague d’entretiens semi-directifs a été effectuée pour justifier la pertinence dudit système auprès des spécialistes professionnels et universitaires du contrôle de gestion. / Several problems overwhelm organizations, but industrial espionage is becoming more and more important. Its consequences are catastrophic, ranging from the loss of colossal sums to the bankruptcy of certain companies. This research work, which is part of the disciplinary field of Management Sciences, particularly management control, aims to understand the process of controlling industrial espionage in organizations by developing a control system of industrial espionage by the management control function. After a literature review and a first wave of semi-directive interviews, which showed the limits of legal protections and management gaps of technical protections against industrial espionage, we constructed a theoretical model of the control process of industrial espionage by the management control function, which puts into interaction the imposed / free figures, the diagnostic / interactive control levers and their tools, and the six readjusted analysis dimensions. Then we developed a system of control of the industrial espionage by determining its tools and specifying its instrumentation in organizations. A second wave of semi-directive interviews was conducted to justify the relevance of this system with professional and academic management control specialists.
36

Novas fronteiras para a comunicação ativista em rede = um olhar sobre o centro de mídia independente / New frontiers for activist communication networks : a look on the independent media center

Batalha, Marcelo da Luz 18 August 2018 (has links)
Orientador: Thomas Patrick Dwyer / Dissertação (mestrado) - Universidade Estadual de Campinas, Instituto de Filosofia e Ciências Humanas / Made available in DSpace on 2018-08-18T01:14:15Z (GMT). No. of bitstreams: 1 Batalha_MarcelodaLuz_M.pdf: 4525323 bytes, checksum: 7b2582c21c2f00cec1d2766cab1a8c28 (MD5) Previous issue date: 2010 / Resumo: Esta pesquisa resulta de uma investigação sobre os repertórios de ação política do Centro de Mídia Independente, uma rede de ativista organizada e distribuída através da rede mundial de computadores. A proposta de investigação dirige-se à relação entre os movimentos sociais e a mídia, no que conforma uma nova estrutura de comunicação e recurso material com o advento da Internet e a sua apropriação pelos movimentos sociais e grupos ativistas. Através do Centro de Mídia Independente se teoriza sobre a cultura hacker, seus fundamentos e orientações morais e éticas de acesso, abertura e compartilhamento coletivo do conhecimento e informação, fundamentados pelo movimento do software livre. Esses princípios éticos e a prática ativista para fins políticos colocam desafios às instituições estabelecidas como os Estados e a mídia de massa. Sobremaneira, essas instituições estão a reorientar a geopolítica do ciberespaço, se justificando principalmente pelos acontecimentos do 11 de setembro, em que se declarou um estado de suspeita e vigilância total sob a ameaça iminente de uma ciberguerra declarada por grupos étnicos e políticos aos Estados. No entanto, as fronteiras do ciberespaço estão mais do que abertas, estão em constante expansão, como atesta os repertórios de segurança e privacidade dos grupos ativistas frente à tentativa de controle das suas atividades online / Abstract: This research stems from an investigation into the repertoires of political action of the Independent Media Center, a network of activist organizations and distributed through a worldwide network of computers. The proposed research addresses the relationship between social movements and the media, which conforms to a new structure of communication and resource material with the advent of the Internet and its appropriation by social movements and activist groups. Through the Independent Media Center is theorizes about the hacker culture, its foundations and moral and ethical guidelines for access, openness and sharing of collective knowledge and information, substantiated by the free software movement. These ethical principles and practice for political activist pose challenges to established institutions like the States and mass media. Overwhelmingly, these institutions are to reorient the geopolitics of cyberspace, is justified mainly by the events of September 11, which declared a state of total surveillance and suspicion under the imminent threat of cyberwar declared by ethnic and political groups to states. However, the boundaries of cyberspace are more than open, they are constantly expanding, as evidenced by the repertoires of security and privacy advocacy groups before the attempt to control their online activities / Mestrado / Movimentos Sociais, Cultura e Política / Mestre em Ciência Política
37

Open-source environmental scanning and risk assessment in the statutory counterespionage milieu

Duvenage, Petrus Carolus 23 May 2011 (has links)
The research focuses on the utilisation of open-source information in augmentation of the all-source counterespionage endeavour. The study has the principal objective of designing, contextualising and elucidating a micro-theoretical framework for open-source environmental scanning within the civilian, statutory counterespionage sphere. The research is underpinned by the central assumption that the environmental scanning and the contextual analysis of overt information will enable the identification, description and prioritisation of espionage risks that would not necessarily have emerged through the statutory counterespionage process in which secretly collected information predominates. The environmental scanning framework is further assumed to offer a theoretical foundation to surmount a degenerative counterespionage spiral driven by an over-reliance on classified information. Flowing from the central assumption, five further assumptions formulated and tested in the research are the following: (1) A methodically demarcated referent premise enables the focusing and structuring of the counterespionage environmental scanning process amid the exponential proliferation of overt information. (2) Effective environmental scanning of overt information for counterespionage necessitates a distinctive definition of ‘risk’ and ‘threat’, as these are interlinked yet different concepts. It is therefore asserted that current notions of ‘threat’ and ‘risk’ are inadequate for feasible employment within an overt counterespionage environmental scanning framework. (3) A framework for overt counterespionage environmental scanning has as its primary requirement the ability to identify diverse risks, descriptively and predicatively, on a strategic as well as a tactical level. (4) The degree of adversity in the relationship between a government and an adversary constitutes the principal indicator and determinant of an espionage risk. (5) The logical accommodation of a framework for overt counterespionage environmental scanning necessitates a distinctive counterintelligence cycle, as existing conceptualisations of the intelligence cycle are inadequate. The study’s objective and the testing of these five assumptions are pursued on both the theoretical and pragmatic-utilitarian levels. The framework for counterespionage, open-source environmental scanning and risk assessment is presented as part of a multilayered unison of alternative theoretical propositions on the all-source intelligence, counterintelligence and counterespionage processes. It is furthermore advanced from the premise of an alternative proposition on an integrated approach to open-source intelligence. On a pragmatic-utilitarian level, the framework’s design is informed and its application elucidated through an examination of the 21st century espionage reality confronting the nation state, contemporary statutory counterintelligence measures and the ‘real-life’ difficulties of open-source intelligence confronting practitioners. Although with certain qualifications, the assumptions are in the main validated by the research. The research furthermore affirms this as an exploratory thesis in a largely unexplored field. / Thesis (Ph.D)--University of Pretoria, 2010. / Political Sciences / Unrestricted
38

Espionagem corporativa por meio da internet e segurança da informação nas empresas brasileiras / Corporative espionage through internet and security of information in brazilian companies

Freitas, Vitor Hugo das Dores 12 December 2015 (has links)
Submitted by Nadir Basilio (nadirsb@uninove.br) on 2016-05-13T19:31:23Z No. of bitstreams: 1 Vitor Hugo das Dores Freitas.pdf: 4490734 bytes, checksum: b281b5be1f7b51ff13fac3c9abcb43b3 (MD5) / Made available in DSpace on 2016-05-13T19:31:23Z (GMT). No. of bitstreams: 1 Vitor Hugo das Dores Freitas.pdf: 4490734 bytes, checksum: b281b5be1f7b51ff13fac3c9abcb43b3 (MD5) Previous issue date: 2015-12-12 / To achieve your goals in a highly competitive market companies use strategic confidential information, which constitute most valuable asset, which travels over the Internet and internal computer networks. This asset is targeted for corporate espionage practiced through the Internet, whose activity is growing on a global scale. The aim of this study is whether there are legal, standardized safety standards and technology for Brazilian companies dealing with corporate espionage and security of your confidential information. For this we used the hypothetical-deductive method, analysis of legal literature on trade secrets, technical literature on espionage, Internet, cyberspace, methods of attacks by the World Wide Web, malicious programs, statistics and specific cases. The results showed that: a) there are legal, standardized safety standards and technology for the prevention of corporate espionage and protection of confidential business information; b) due to cultural and financial factors, among others, companies are not giving the real importance in their strategic asset protection, confidential information; c) that adoption of physical and virtual barriers to preventive protection of confidential information constitutes a key element for business activities and their disregard not only imply negative factor for the sustainability and corporate social responsibility as well as that information loses its character confidentiality. It must be the creation of a public agency, nationwide, that has the objective of developing concrete and effective awareness policies, awareness and prevention of security incidents on the Internet as well as public forums. It is suggested that future research should be made to investigate any need for implementation in the curriculum of educational institutions, specific matters aimed at information security as a means of developing and consolidating culture on the subject. / Para a consecução de seus objetivos em mercado altamente competitivo as empresas utilizam informações confidenciais estratégicas, que se constituem em seu ativo mais valioso, as quais trafegam pela Internet e redes internas de computadores. Este ativo é visado pela espionagem corporativa praticada por meio da Internet, cuja atividade vem crescendo em escala global. O objetivo deste estudo consiste em saber se existem condições legais, normas de segurança padronizadas e tecnologia para as empresas brasileiras lidarem com a espionagem corporativa e a segurança de suas informações confidenciais. Para tanto foi utilizado o método hipotético-dedutivo, a análise da literatura jurídica sobre segredo comercial, literatura técnica sobre espionagem, Internet, ciberespaço, métodos de ataques pela rede mundial de computadores, programas maliciosos, estatísticas e casos concretos. Dos resultados obtidos se conclui que: a) existem condições legais, normas de segurança padronizadas e tecnologia para a prevenção contra a espionagem corporativa e a proteção das informações confidenciais da empresa; b) em razão de fatores culturais e financeiros, dentre outros, as empresas ainda não estão dando a devida importância na proteção de seu ativo estratégico, a informação confidencial; c) que a adoção de barreiras físicas e virtuais para a proteção preventiva da informação confidencial se constitui elemento chave para as atividades empresariais e sua desconsideração não só implica em fator negativo para a sustentabilidade e responsabilidade social corporativa como também que a informação perde seu caráter de confidencialidade. Impõe-se a criação de órgão público, de âmbito nacional, que tenha por objetivo desenvolver políticas concretas e efetivas de conscientização, sensibilização e prevenção de incidentes de segurança na Internet além de fóruns públicos. Sugere-se que futuramente sejam efetuadas pesquisas que visem apurar eventual necessidade de implementação, na grade curricular de instituições de ensino, de matéria específica voltada à segurança da informação como forma de desenvolver e consolidar cultura a respeito do assunto.
39

The Spy and the State: The History and Theory of American Civil-Intelligence Relations

Rogg, Jeffrey Pela January 2020 (has links)
No description available.
40

Renseignement et diplomatie de la SDN à l'ONU : histoire des pratiques de l'espionnage dans les organisations internationales / Intelligence and diplomacy from the League of Nations to the United Nations : history of espionage practices in international organizations

Florent, Julien 03 October 2014 (has links)
Les Etats sont amenés à espionner les organisations internationales, les structures comme les membres qui les composent, car ces organisations ont déterminé depuis 1920 la place et la puissance des Etats dans l’ordre international. Cette recherche traite de la dynamique du renseignement dans la relation diplomatique de l’Etat à la Société des Nations et aux Nations Unies, de son articulation avec la diplomatie dans l’élaboration d’une politique étrangère à la SDN et à l’ONU. L’enjeu est de définir les leviers théoriques de l’articulation stratégique entre les services diplomatiques et les services de renseignement au cours de moments historiques précis et marquants des appréhensions, des objectifs, des moyens de mise en œuvre et de conduite des politiques d’influence des Etats dans les organisations internationales. A la SDN puis à l’ONU, nous étudierons le renseignement par le biais de son évolution vis-à-vis de ces nouveaux cadres internationaux, des figures et des jeux d’espions qui entourent les activités des organisations internationales, puis au cours de temps diplomatiques forts qui ont renforcé son rôle dans les organismes internationaux. Cette étude revisite l’histoire des relations internationales et des grandes institutions multilatérales telle qu’elle a été appréciée par les services de renseignement. Nous verrons ainsi que le renseignement à la SDN et à l’ONU se construit en fonction des impératifs diplomatiques comme un outil traditionnel de puissance et d’influence, un instrument de force et d’intégration de la politique étrangère des Etats. Il permettra de se projeter dans une actualité très contemporaine avec toute la profondeur de l’Histoire. / States are encouraged to spy on international organizations, as much on the structures themselves as on the members who compose them, because these organizations have determined since 1920 the role and power of states in the international order. This research deals with the intelligence process in the State diplomatic relation with the League of Nations (LN) and the United Nations (UN), and its coordination with diplomacy in developing a foreign policy within the LN and the UN. What is a stake is to define the theoretical levers of strategic coordination between the diplomatic and intelligence services during specific historical moments of apprehensions, objectives, means of implementation and conduct of policies of influence of states within international organizations. In the LN then in the UN, we will study intelligence through its evolution with regard to the new international frameworks, figures and spy games around the activities of international organizations and during strong diplomatic times which strengthened its role in international bodies. This study revisits the history of international relations and major multilateral institutions as it was appreciated by the intelligence services. We will see therefore that Intelligence in the LN and the UN is built depending on the diplomatic imperatives, as a traditional tool of power and influence, an instrument of strength and integration of the foreign policy of States. It will throw us in very contemporary affairs with all the depth of History.

Page generated in 0.051 seconds