Results 1 to 10 of about 65,320 (256)

The ontology of espionage in reality and fiction: A case study on iconicity

open access: diamondSign Systems Studies, 2003
A basic form of iconicity in literature is the correspondence between basic conceptual schemata in literary semantics on the one hand and in factual treatments on the other.
Frederik Stjernfelt
doaj   +3 more sources

Writing About Espionage Secrets [PDF]

open access: diamond, 2018
This article describes the author’s experiences researching three books on espionage history in three different countries and on three different topics.
Macrakis, Kristie
core   +4 more sources

Soviet Union Spionage Arrest In Indonesia 1982

open access: yesJurnal Historica, 2023
The purpose of this study is to analyze the events of the Soviet Union's espionage arrest in Indonesia in 1982. The formulation of the problem in this research is (1) The Soviet Union's Efforts to Steal Indonesian Maritime Data, (2) The Process of the ...
Syifa Surya Ukasyah   +4 more
doaj   +1 more source

Analisis Investigasi Cyber Espionage Pada Facebook Menggunakan Digital Forensics Research Workshop (DFRWS)

open access: yesTechno, 2022
Media sosial sangat bermanfaat untuk mendapatkan informasi atau data dengan mudah dan cepat seiring dengan peningkatan jumlah pengguna smartphone terutama pada Android.
Joko Triyanto, Sunardi, Imam Riadi
doaj   +1 more source

Russia and China expected to renew their espionage vigour

open access: yesJournal on Baltic Security, 2023
This article argues that both Russia and China will re-invigorate and expand their international espionage activities. Russia’s renewed vigour in engaging in aggressive espionage campaigns is due to the current setbacks that it is facing as a result of ...
Dries Putter, Sascha-Dominik Bachmann
doaj   +1 more source

Australia’s Policy Successes in Timor-Leste

open access: yesEstudios de Asia y África, 2022
An independent Timor-Leste posed a dilemma for Australian foreign policy. On the one hand, Australia led the multinational military coalition that restored peace in 1999, and had an obvious interest in ensuring that its newest neighbour was self-reliant
Clinton Fernandes
doaj   +1 more source

Deans of humanitarianism and perfidy. The collaboration of the Diplomatic Missions of Argentina and Chile with the Francoist cause during the Spanish Civil War (and after), 1936-1969

open access: yesCulture & History Digital Journal, 2021
During the Spanish Civil War of 1936-1939, some thirty Diplomatic Missions opened their doors and create new sites for the reception of persecution victims under the protection of the right of asylum.
Carlos Píriz
doaj   +1 more source

Hiding in Plain Sight: Minoritarian Approaches to Espionage, Forensic Architecture, and In_Visible Co-Producers

open access: yesOn_Culture, 2022
Minoritarian approaches to current manifestations of espionage and hegemony-critical uses of intelligence unsettle both the common distinction in ‘spying’ (as active intentionality) and ‘witnessing’ (as passive incidentality) as well as the association ...
Lisa Stuckey
doaj   +1 more source

Investigating the dimensions of hard influence in Ferdowsi Shahnameh with an approach to espionage [PDF]

open access: yesمجله مطالعات ایرانی, 2022
Introduction One of the manifestations of the traditional influence paradigm in political science discussions is espionage, which, because of its tangibility and visibility, falls under the category of hard influence.
omolbanin dashti rahmat Abadi   +3 more
doaj   +1 more source

The Role of Malware in Reported Cyber Espionage: A Review of the Impact and Mechanism

open access: yesInformation, 2015
The recent emergence of the targeted use of malware in cyber espionage versus industry requires a systematic review for better understanding of its impact and mechanism.
Gaute Wangen
doaj   +1 more source

Home - About - Disclaimer - Privacy