نتایج جستجو برای: espionage
تعداد نتایج: 371 فیلتر نتایج به سال:
We analyze industrial espionage in the context of entry deterrence. We consider a monopoly incumbent, who may expand capacity to deter entry, and a potential entrant who owns an inaccurate Intelligence System. The Intelligence System generates a noisy signal on incumbent's actions and the potential entrant decides whether to enter based on this signal. If the precision of the Intelligence Syste...
The recent emergence of the targeted use of malware in cyber espionage versus industry requires a systematic review for better understanding of its impact and mechanism. This paper proposes a basic taxonomy to document major cyber espionage incidents, describing and comparing their impacts (geographic or political targets, origins and motivations) and their mechanisms (dropper, propagation, typ...
One of the most serious threats to a modern country’s trade, industry and long-term economic development is cyber espionage and insiders. The activities are directed against high-technological industries and companies with advanced basic research. The defence and telecoms sectors are of particular interest, just as biotechnics, medical and material technology. Behind this kind of espionage ther...
During the Cold War the United States developed an espionage style that reflected its love affair with technology (technophilia) whereas the Soviet Union and the East Bloc continued a tradition of using humans to collect intelligence. This essay places the origins and development of these espionage styles during the Cold War in historical and social context, and assesses their strengths and wea...
Technoethical inquiry deals with a variety of social, legal, cultural, economic, political, and ethical implications of new technological applications which can threaten important aspects of contemporary life and society. GhostNet is a large-scale cyber espionage network which has infiltrated important political, economic, and media institutions including embassies, foreign ministries and other...
We consider normal form games in which two players decide on their strategies before the start of play and Player 1 can purchase noisy information about his opponent’s decisions concerning future response policies (i.e., spy on his opponent). We give a full characterization of the set of distributions over the players’ payo¤s that can be induced by such equilibria, as well as describe their wel...
Governments of advanced economies are extremely concerned about the illicit acquisition information on critical technologies employed by their industries, and countering this economic espionage is quickly becoming one top priorities. The present paper advances theoretical analysis interaction between counter-espionage, presents a first approximation to an inquiry into rationale for influence ma...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید