Bugging the Bog: Sonic Warfare, Earwitnessing and Eavesdropping in the Works of Seamus Heaney
Although the violence of the Troubles is sometimes directly shown in Seamus Heaney’s poetry, it is far more often indirectly suggested by sounds breaking into the domestic space or natural environment.
Fanny Quément
doaj +1 more source
Doe v. Ashcroft and Its Place in the Judicial Trend: How the Courts Have Advanced Civil Liberties in Step with Advances in Technology [PDF]
As many jurists and scholars have noted, the United States has a long-standing history of encroaching upon the civil liberties of its citizens, especially during times of war or conflict.\ud \ud For instance, during the Civil War, President Lincoln ...
Glasgow, Craig M.
core +3 more sources
A smart configuration of computer as a prevention from hacking and cyber espionage [PDF]
In a modern business world, IT systems are frequently exposed to attacks, business espionage and the other cyber incidents. Many software tools of nowadays got a remote access option to another computer which is suitable for a cyber espionage as well as ...
Đekić Milica D.
doaj +1 more source
Ethical Dilemmas In Management: An African Perspective [PDF]
The modern workplace is composed of people with diverse backgrounds in terms of nationality, culture, religion, age, education and socioeconomic status.
Abiodun, A. J., Oyeniyi, Omotayo
core +2 more sources
Espionage Permission for Political Regime in Shiite Jurisprudence [PDF]
Permission for espionage largely affect security of community and it is one of the challenging and expanded issues in the political system and it is discussed and explored in some scientific corridors. It aims to protect the regime in the face of enemies
seyyed ali asghar alavi
doaj
Competitive Intelligencea Industrial Espionage: a National Security Perspective
Nowadays, companies and nations are being targeted more than ever illegally by actors trying to obtain new technologies, information, and innovations.
Ali Gök, Taner Akçacı
doaj +1 more source
The article analyzes the historical experience of organizing official activities of the gendarmerie police department of the Finnish Railways during the First World War.
Petr A. Kolpakov, Rafael A. Arslanov
doaj +1 more source
Peeling Back the Onion of Cyber Espionage after Tallinn 2.0 [PDF]
Tallinn 2.0 represents an important advancement in the understanding of international law’s application to cyber operations below the threshold of force.
McCarthy, Amy H. +2 more
core +1 more source
Erving Goffman at 100: A Chameleon Seen as a Rorschach Test within a Kaleidoscope
The 100th anniversary of Erving Goffman's birth was in 2022. Drawing on his work, the Goffman archives, the secondary literature, and personal experiences with him and those in his university of Chicago cohort, I reflect on some implications of his work and life, and the inseparable issues of understanding society.
Gary T. Marx
wiley +1 more source
Economic Cyber-Espionage in the Visegrád Four Countries: a Hungarian Perspective
This article explores the regulatory framework of reference of economic cyber-espionage in Europe, with a particular focus on the V4 region (comprising Slovakia, Hungary, Poland and the Czech Republic) and taking Hungary as a case study.
Cristani Federica
doaj +1 more source

