Results 41 to 50 of about 65,320 (256)
ABSTRACT Amid shifting geopolitical tensions, the notion of “research security” has become an increasingly prominent concern in science policy. This paper analyzes how research security is framed and operationalized in Germany and the United States using discourse analysis and securitization theory.
Nicolas V. Rüffin +3 more
wiley +1 more source
Investigation of the Problem of IT Espionage Using Causal Diagrams
This article deals with the problem of IT espionage. Basing on the analysis of espionage incidents and existing insider models a system dynamics model of internal intruder realizing the threat of espionage has been constructed.
Ekaterina Romanovna Knyazeva +1 more
doaj
Samuli Haataja reviews This Is How They Tell Me the World Ends: The Cyberweapons Arms Race by Nicole ...
Samuli Haataja
doaj +1 more source
What\u27s It Worth to Keep a Secret? [PDF]
This article is the first major study of protection and valuation of trade secrets under federal criminal law. Trade secrecy is more important than ever as an economic complement and substitute for other intellectual property protections, particularly ...
Reid, Gavin C. +2 more
core +2 more sources
Brook no compromise: How to negotiate a united front
Abstract Negotiating factional conflict is crucial to successful coordination: Political parties, rebel alliances, and authoritarian elites must all overcome internal disagreements to survive and achieve collective aims. Actors in these situations sometimes employ hardball tactics to block outcomes they dislike, but at the risk of causing coordination ...
Elaine Yao
wiley +1 more source
This article delves into the intriguing case of Juan Pedro Antonio Aladro, a Spanish individual whose claims of being rightful heir to the throne of Albania captivated European newspapers in 1902.
Atdhe Thaçi
doaj +1 more source
What's it worth to keep a secret? [PDF]
This article is the first major study of protection and valuation of trade secrets under federal criminal law. Trade secrecy is more important than ever as an economic complement and substitute for other intellectual property protections, particularly ...
Reid, Gavin C. +2 more
core +2 more sources
Security and the shaping of identity for nuclear specialists [PDF]
Atomic energy developed from 1940 as a subject shrouded in secrecy. Identified successively as a crucial element in military strategy, national status and export aspirations, the research and development of atomic piles (nuclear chain-reactors) were ...
Johnston, Sean F.
core +1 more source
Abstract This paper develops a historical and political geographical analysis of the UK Foreign Office's Information Research Department (IRD). Empirically it is grounded in archival study of IRD files concerning operations in Ghana and South Africa during the Cold War and specifically the 1960s and 1970s.
Ben Gowland
wiley +1 more source
France, which had had good relations with the Ottoman Empire, occupied Egypt in 1798. Meanwhile, Napoleon’s contact with Paris was cut off when the French Navy was burned by the British Navy in Abukir.
Seydi Vakkas Toprak
doaj +1 more source

