منابع مشابه
The Dragon and the Computer: Why Intellectual Property Theft is Compatible with Chinese Cyber-Warfare Doctrine
Along with the USA and Russia, China is often considered one of the leading cyberpowers in the world. In this excerpt, we explore how Chinese military thought, developed in the 1990’s, influenced their cyber-operations in the early 2000’s. In particular, we examine the ideas of Unrestricted Warfare and Active Offense and discuss how they can permit for the theft of intellectual property. We the...
متن کاملAn Analysis of the Factors That Contribute to Intellectual Property Theft
Mary Hoffschwelle (faculty) History A new learning community consisting of two required general education classes, Tennessee History and Tennessee Science, is being offered for the first time at Middle Tennessee State University. This collaboration is catching the interests of non-major students who are sometimes nervous about taking a required science class and companion laboratory. The learni...
متن کاملInsider Theft of Intellectual Property for Business Advantage: A Preliminary Model
A study conducted by the CERT Program at Carnegie Mellon University’s Software Engineering Institute analyzed hundreds of insider cyber crimes across U.S. critical infrastructure sectors. Follow-up work involved detailed group modeling and analysis of 35 cases of insider theft of intellectual property. In the context of this paper, insider theft of intellectual property for business advantage i...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: Civil Engineering Magazine Archive
سال: 2020
ISSN: 2381-0688,2381-0688
DOI: 10.1061/ciegag.0001498