Results 81 to 90 of about 65,320 (256)

Proportionality and its Applicability in the Realm of Cyber Attacks [PDF]

open access: yes, 2019
With an ever-increasing reliance on State cyber-attacks, the need for an international treaty governing the actions of Nation-States in the realm of cyberwarfare has never been greater.
Fenton, Hensey, III
core   +1 more source

Review, Surveillance and Spies in the Civil War: Exposing Confederate Conspiracies in America’s Heartland, by Stephen E. Towne

open access: yesSecrecy and Society, 2018
Review of Stephen E. Towne's Surveillance and Spies in the Civil War: Exposing Confederate Conspiracies in America’s Heartland.
Evan Rothera
doaj  

Investigating the criminology of disclosure of genetic data

open access: yesمطالعات تطبیقی فقه و اصول مذاهب, 2020
"Gene" is one of the most special physical characteristics of individuals and "genetic data" is one of the scientific achievements of the modern age that includes the study of human stem cells and is very important today and in the detection and ...
Seyed Mohammad Amin hosseini   +1 more
doaj  

Agri-Food Traceability Management using a RFID System with Privacy Protection [PDF]

open access: yes, 2007
In this paper an agri-food traceability system based on public key cryptography and Radio Frequency Identification (RFID) technology is proposed. In order to guarantee safety in food, an efficient tracking and tracing system is required.
Bernardi, Paolo   +5 more
core   +2 more sources

National Security Space Launch [PDF]

open access: yes, 2020
The United States Space Force’s National Security Space Launch (NSSL) program, formerly known as the Evolved Expendable Launch Vehicle (EELV) program, was first established in 1994 by President William J.
Zhang, Michelle
core  

Le reti di spionaggio e sabotaggio nazifasciste nell’Italia occupata dagli Alleati (1943-1945) [PDF]

open access: yesDiacronie. Studi di Storia Contemporanea, 2016
The aim of this work is to describe German and Republican Fascists secret services espionage and sabotage networks, their missions and their agents who were sent to the South-Central Italy, between 1943 and 1945, with the goal of obstructing the Allied ...
Nicola Tonietto
doaj  

REVIEW: Defending the right to confidential sources and whistleblowers

open access: yesPacific Journalism Review
Journalists and Confidential Sources: Colliding Public Interests in the Age of the Leak, by Joseph M Fernandez. Routledge Research on Journalism Series. Abingdon, UK: Routledge, 2021. 287 pages.
David Robie
doaj   +1 more source

"Virtual disenfranchisement": cyber election meddling in the grey zones of international law [PDF]

open access: yes, 2018
This Article examines remotely conducted election meddling by cyber means in the context of international law and asks whether such cyber operations qualify as "internationally wrongful acts." An internationally wrongful act requires both a breach of a ...
Schmitt, Michael
core   +2 more sources

İslam Hukuku’nda Özel Hayat Kavramı ve Günümüz Uygulamaları

open access: yesEskişehir Osmangazi Üniversitesi İlahiyat Fakültesi Dergisi, 2016
Küreselleşmenin egemen olduğu ve iletişimin de buna mukabil hızla geliştiği bir çağda yaşıyoruz. Bu gerçeklik neticesinde bireyler ve toplumlar farkında olmadan bir dönüşüm tufanının içerisine girmektedirler. Sosyal bir varlık olan insan da bu değişim ve
Nurullah GÜNGÖR
doaj  

Military counterespionage against Romania executed by the directorate of the independent gendarme corps from Bessarabia

open access: yesBulletin of "Carol I" National Defense University
The Russian Empire, with centuries-old imperial traditions, was based on military force, in which a significant role was played by the accumulation of information about opponents and the fight against foreign espionage inside the country.
Artur LEȘCU
doaj   +1 more source

Home - About - Disclaimer - Privacy