Academic literature on the topic 'Cybersecurity Espionage'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'Cybersecurity Espionage.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Journal articles on the topic "Cybersecurity Espionage"
Alashi, Shahad A., and Dhuha H. Badi. "The Role of Governance in Achieving Sustainable Cybersecurity for Business Corporations." Journal of Information Security and Cybercrimes Research 3, no. 1 (December 15, 2020): 97–112. http://dx.doi.org/10.26735/eint7997.
Full textHimanshu. "Cybersecurity Law: Challenges and Legal Frameworks for Protecting Digital Assets and Privacy Rights." Indian Journal of Law 2, no. 2 (April 30, 2024): 18–22. http://dx.doi.org/10.36676/ijl.v2.i2.05.
Full textRahul Khanna. "Cybersecurity Law: Challenges and Legal Frameworks for Protecting Digital Assets and Privacy Rights." Indian Journal of Law 2, no. 3 (July 1, 2024): 15–20. http://dx.doi.org/10.36676/ijl.v2.i3.28.
Full textSusila, Muh, and Andi Salim. "Cyber Espionage Policy and Regulation: A Comparative Analysis of Indonesia and Germany." PADJADJARAN Jurnal Ilmu Hukum (Journal of Law) 11, no. 1 (2024): 122–44. http://dx.doi.org/10.22304/pjih.v11n1.a6.
Full textKatzan, Jr., Harry. "Cybersecurity Service Model." Journal of Service Science (JSS) 5, no. 2 (December 28, 2012): 71–78. http://dx.doi.org/10.19030/jss.v5i2.7576.
Full textKatzan, Harry. "Contemporary Issues in Cybersecurity." Journal of Cybersecurity Research (JCR) 1, no. 1 (June 21, 2016): 1–6. http://dx.doi.org/10.19030/jcr.v1i1.9745.
Full textCristani, Federica. "Economic Cyber-Espionage in the Visegrád Four Countries: a Hungarian Perspective." Politics in Central Europe 17, no. 4 (December 1, 2021): 697–721. http://dx.doi.org/10.2478/pce-2021-0037.
Full textBeyer, Jessica L. "The Politics of Cybersecurity and the Global Internet." Perspectives on Politics 21, no. 2 (June 2023): 664–68. http://dx.doi.org/10.1017/s1537592723000361.
Full textPatiño Orozco, Germán Alejandro. "China and Cybersecurity: Espionage, Strategy, and Politics in the Digital Domain." México y la Cuenca del Pacífico 8, no. 24 (September 1, 2019): 141–44. http://dx.doi.org/10.32870/mycp.v8i24.603.
Full textPIERȘINARU, Andreea-Maria. "Preliminary considerations on China's international cooperation in cyber security: legislation, competent authorities, and challenges." BULLETIN OF "CAROL I" NATIONAL DEFENCE UNIVERSITY 13, no. 2 (July 8, 2024): 121–41. http://dx.doi.org/10.53477/2284-9378-24-24.
Full textDissertations / Theses on the topic "Cybersecurity Espionage"
Ferguson, Cody J. "Increasing Effectiveness of U.S. Counterintelligence: Domestic and International Micro-Restructuring Initiatives to Mitigate." Thesis, Monterey, California: Naval Postgraduate School, 2012.
Find full textCyberespionage is a prolific threat that undermines the power projection capacity of the United States through reduced economic prowess and a narrowing of the technical advantage employed by the American military. International attempts to limit hostile cyber activity through the development of institutions, normative patterns of behavior, or assimilation of existing laws do not provide the American national security decision maker with a timely or effective solution to address these threats. Unfortunately, the stove-piped, redundant and inefficient nature of the U.S. counterintelligence community does not deliver a viable alternative to mitigating cyberespionage in an effective manner. Instituting a domestic and international micro-restructuring approach within the Department of Defense (DoD) addresses the need for increased effectiveness within an environment of fiscal responsibility. Domestic restructuring places emphasis on developing a forcing mechanism that compels the DoD counterintelligence services to develop joint approaches for combating cyberespionage by directly addressing the needs of the Combatant Commands. International restructuring places an emphasis on expanding cybersecurity cooperation to like-minded nations and specifically explores the opportunity and challenges for increased cyber cooperation with Taiwan. This approach recognizes that Taiwan and the United States are both negatively affected from hostile cyber activity derived from within the People’s Republic of China.
Books on the topic "Cybersecurity Espionage"
United States. Congress. House. Committee on Homeland Security. Subcommittee on Cybersecurity, Infrastructure Protection, and Security Technologies. Cyber threats from China, Russia, and Iran: Protecting American critical infrastructure : hearing before the Subcommittee on Cybersecurity, Infrastructure Protection, and Security Technologies of the Committee on Homeland Security, House of Representatives, One Hundred Thirteenth Congress, first session, March 20, 2013. Washington: U.S. Government Printing Office, 2013.
Find full textReveron, Derek S., Jon R. Lindsay, and Tai Ming Cheung. China and Cybersecurity: Espionage, Strategy, and Politics in the Digital Domain. Oxford University Press, Incorporated, 2015.
Find full textReveron, Derek S., Jon R. Lindsay, and Tai Ming Cheung. China and Cybersecurity: Espionage, Strategy, and Politics in the Digital Domain. Oxford University Press, Incorporated, 2015.
Find full textChina and Cybersecurity: Espionage, Strategy, and Politics in the Digital Domain. Oxford University Press, Incorporated, 2015.
Find full textChina and Cybersecurity: Espionage, Strategy, and Politics in the Digital Domain. Oxford University Press, Incorporated, 2015.
Find full textThe Intelligence Technology and Big Eye Secrets: Navigating the Complex World of Cybersecurity and Espionage. 49books, 2023.
Find full textThe Intelligence Technology and Big Eye Secrets: Navigating the Complex World of Cybersecurity and Espionage. Sweden: 49books, 2023.
Find full textCornish, Paul, ed. The Oxford Handbook of Cyber Security. Oxford University Press, 2021. http://dx.doi.org/10.1093/oxfordhb/9780198800682.001.0001.
Full textBuchanan, Ben. How Network Intrusions Threaten. Oxford University Press, 2017. http://dx.doi.org/10.1093/acprof:oso/9780190665012.003.0005.
Full textBook chapters on the topic "Cybersecurity Espionage"
Fidler, David P. "Introduction: Cybersecurity and cybersecurity law." In Cyber espionage, 2–10. Edward Elgar Publishing, 2022. http://dx.doi.org/10.4337/9781800883352.ch001.
Full textFidler, David P. "Conclusion: Cybersecurity law in a divided world." In Cyber espionage, 142–51. Edward Elgar Publishing, 2022. http://dx.doi.org/10.4337/9781800883352.ch007.
Full textWilliquette, Joel F. "Cybersecurity Concerns in International Business." In Corporate Espionage, Geopolitics, and Diplomacy Issues in International Business, 59–71. IGI Global, 2017. http://dx.doi.org/10.4018/978-1-5225-1031-4.ch004.
Full textMingo, Horace C. "The Emerging Cybersecurity Challenges With Artificial Intelligence." In Multisector Insights in Healthcare, Social Sciences, Society, and Technology, 163–85. IGI Global, 2024. http://dx.doi.org/10.4018/979-8-3693-3226-9.ch010.
Full textMingo, Horace C. "How Emerging Technologies Spawn New Social Engineering Paradigms." In Transformational Interventions for Business, Technology, and Healthcare, 31–44. IGI Global, 2023. http://dx.doi.org/10.4018/979-8-3693-1634-4.ch003.
Full textLee, Jaeung, Anu Mary Eapen, Md Shamim Akbar, and H. Raghav Rao. "An Exploration Regarding Issues in Insider Threat." In Cybersecurity Breaches and Issues Surrounding Online Threat Protection, 1–23. IGI Global, 2017. http://dx.doi.org/10.4018/978-1-5225-1941-6.ch001.
Full textSaharan, Sameer, Shailja Singh, Ajay Kumar Bhandari, and Bhuvnesh Yadav. "The Future of Cyber-Crimes and Cyber War in the Metaverse." In Advances in Digital Crime, Forensics, and Cyber Terrorism, 126–48. IGI Global, 2023. http://dx.doi.org/10.4018/979-8-3693-0220-0.ch007.
Full textEdelman, R. David. "Defining and Studying Cyberattacks." In Rethinking Cyber Warfare, 11–52. Oxford University PressNew York, NY, 2024. http://dx.doi.org/10.1093/9780197509715.003.0003.
Full textConference papers on the topic "Cybersecurity Espionage"
Frost, James. "Dealing with the risk of organizational espionage." In CyberSec '18: Fifth Cybersecurity Symposium. New York, NY, USA: ACM, 2018. http://dx.doi.org/10.1145/3212687.3212869.
Full textPärn, Erika. "Cybersecurity of Digital Twins in the Built Environment." In Construction Blockchain Conference 2021. Design Computation, 2021. http://dx.doi.org/10.47330/cbc.2021.wbnf3640.
Full textOnescu, Dragos ionut. "EU AND CYBER SECURITY." In eLSE 2016. Carol I National Defence University Publishing House, 2016. http://dx.doi.org/10.12753/2066-026x-16-063.
Full text