Intelligence agency threats to computer security
In: International journal of intelligence and counterintelligence, Band 6, Heft 4, S. 413-488
ISSN: 1521-0561
28584 Ergebnisse
Sortierung:
In: International journal of intelligence and counterintelligence, Band 6, Heft 4, S. 413-488
ISSN: 1521-0561
In: International journal of intelligence and counterintelligence, Band 6, S. 413-488
ISSN: 0885-0607
Examines technical capabilities and agencies dedicated to state-sponsored espionage activities directed against computer networks. Actual and potential penetrations conducted by specialized units in former Soviet and Warsaw Pact nations, Germany, France, Great Britain, the US, Denmark, Norway, Australia, Israel, South Africa, Japan, Iraq, China, India, and others.
In: Marine corps gazette: the Marine Corps Association newsletter, Band 85, Heft 11, S. 48-52
ISSN: 0025-3170
In: Security dialogue, Band 54, Heft 5, S. 455-474
ISSN: 1460-3640
How can we make sense of tensions and contradictions in digitally mediated practices of anonymity and identification? This article calls for foregrounding computer protocols as key sites for locating how agency amongst increasingly complex sets of relations between human and non-human actors is impacting contemporary (in)security. We distinguish agency within and between contemporary finance/security infrastructures by tracing the development, application and updating of a particular set of computer protocols – blockchains. Locating agency at the site of these and other computer protocols, we argue, exposes security politics that have largely remained overlooked in the ongoing engagement of critical security studies with science and technology studies. Widening engagements with security devices, this article also broadens the interdisciplinary engagements of critical security studies with new media and software studies.
In: CRS report for Congress
World Affairs Online
Testimony issued by the General Accounting Office with an abstract that begins "Pursuant to a congressional request, GAO discussed the "ILOVEYOU" computer virus, focusing on the need for agency and governmentwide improvements in information security."
BASE
In: International affairs, Band 24, Heft 4, S. 582-582
ISSN: 1468-2346
In: Communication research, Band 32, Heft 6, S. 683-725
ISSN: 1552-3810
This study explores three issues regarding the use of multiple workplace communication technologies: the relationships between distinct forms of apprehension (computer, communication, and writing) and use, the relative contribution of computer-mediated communication (CMC) apprehension for predicting use, and changes in these relationships over time. A trend study, which consisted of the collection of data from two samples (N= 205) separated by a 5-year interval, suggests full or partial support for the hypotheses involving computer and communication apprehension. Although apprehension levels remain stable, usage frequency changed for several of the technologies examined—resulting in stronger relationships between apprehensions and those technologies for which use has changed the most in the past 5 years. Most notably, a new measure of CMC apprehension generally predicts communication technology use—especially text-based and conferencing tools—more strongly than do more traditional apprehension types.
In: Military technology: Miltech, Band 29, Heft 12, S. 85-89
ISSN: 0722-3226
World Affairs Online
In: The journal of conflict resolution: journal of the Peace Science Society (International), Band 58, Heft 3, S. 429-454
ISSN: 1552-8766
As Iran continues its apparent pursuit of a nuclear weapons breakout capability and North Korea resists efforts to roll back its proliferation, policy makers in Washington eager to prevent further proliferation in both regions regard security guarantees to allies as crucial tools. But recent scholarship calls into question whether security guarantees ameliorate proliferation risks. Relying on a combination of large-N quantitative analysis and a case study of South Korea from the late 1960s to the mid-1980s, this article argues that, consistent with policy makers' conventional wisdom, security guarantees significantly reduce proliferation proclivity among their recipients. [Reprinted by permission of Sage Publications Inc., copyright holder.]
In: The journal of conflict resolution: journal of the Peace Science Society (International), Band 58, Heft 3, S. 429-454
ISSN: 0022-0027, 0731-4086
In: The journal of conflict resolution: journal of the Peace Science Society (International), Band 58, Heft 3, S. 429-454
ISSN: 1552-8766
As Iran continues its apparent pursuit of a nuclear weapons breakout capability and North Korea resists efforts to roll back its proliferation, policy makers in Washington eager to prevent further proliferation in both regions regard security guarantees to allies as crucial tools. But recent scholarship calls into question whether security guarantees ameliorate proliferation risks. Relying on a combination of large- N quantitative analysis and a case study of South Korea from the late 1960s to the mid-1980s, this article argues that, consistent with policy makers' conventional wisdom, security guarantees significantly reduce proliferation proclivity among their recipients.