Search Results - "Espionage"

  • Showing 1 - 19 results of 19
Refine Results
  1. 1

    Conflict and Cyber-espionage: Ridding the World of Cyber War? by Ford, Shannon

    Published 2014
    “…This paper examines the argument that espionage is a distinct framework for evaluating conflict in cyberspace and that it should displace discussions of cyber war in most cases. …”
    Get full text
  2. 2

    Addressing the threats of online theft of trade secret and cyber espionage in Malaysia: the legal landscape by Abd. Jalil, Juriah

    Published 2019
    “…Online theft of trade secrets and commercial cyber espionage are growing threats to businesses and national economy in this digital economy. …”
    Get full text
    Get full text
    Get full text
  3. 3

    Protecting trade secret from theft and corporate espionage: business entity v employee & competitors by Abd. Jalil, Juriah, Hassan, Halyani

    Published 2018
    “…This paper highlights the importance of protecting trade secrets from theft of trade secret and corporate espionage by business entity and to recommend the best practice on how to protect from legal, administrative and technical perspectives. …”
    Get full text
    Get full text
    Get full text
  4. 4

    Legal framework for theft of trade secrets and corporate espionage in Malaysia: adhering to the trans pacific partnership agreement (TPPA) by Abd Jalil, Juriah, Mohamed, Duryana, Abdul Rahman, Nasarudin, Raja Mohd Ali, Raja Badrol Hisham, Hassan, Halyani

    Published 2019
    “…Theft of trade secrets and corporate espionage threaten innovation, growth, development and investment of business entities and national economy globally. …”
    Get full text
    Get full text
  5. 5
  6. 6

    'Death by a Thousand Cuts': Cyberespionage and the Problem of Aggregated Small Harms by Ford, Shannon

    Published 2017
    “…If such behaviour is properly categorised as espionage, how should we respond to theft of sensitive information on a massive scale? …”
    Get full text
  7. 7

    Cyber security in the open data: where is the equilibrium? by Zulhuda, Sonny

    Published 2017
    “…Governments in virtually all countries want better cybersecurity against cyber spying, but also seek the capacity for cyber espionage on others. Following reports of mutual cyber espionage between China and the United States, it was proposed that both countries agree to a policy of Mutually Assured Restraint (MAR). …”
    Get full text
    Get full text
  8. 8

    Business under threat: the criminal liability of trade secret theft in Malaysia? by Abd. Jalil, Juriah, Hassan, Halyani, Abdul Rahman, Nasarudin, Raja Mohd Ali, Raja Badrol Hisham, Mohamed, Duryana, Najib, Ahmad

    Published 2020
    “…Because of this, the trade secret is often subject to various threats ranging from misappropriation, theft and corporate espionage launched by rivals and also the employee. …”
    Get full text
    Get full text
    Get full text
    Get full text
  9. 9

    Exploring the use of online social networking among employees in Malaysian organizations: looking potential threats to information security by Abdul Molok , Nurul Nuha

    Published 2013
    “…The western literature often report incidents of OSN causing malware attacks on corporate networks, leakage of confidential information, identity theft, cyber espionage and sabotage. Thus, this study investigates the use of OSN sites among employees of Malaysia organization including academic and non-academic staff of IIUM…”
    Get full text
    Get full text
  10. 10

    Rule-Based Approach For Detecting Advanced Persistent Threat Using Behavioral Features Of Credential Dumping Technique by Ali Mohamed, Nachaat Abdelatif

    Published 2022
    “…APT causes enormous damages for data loss, espionage, sabotage, leak, or forceful pay of ransom money to the attackers. …”
    Get full text
    Get full text
  11. 11

    Official Secrets Act: a commentary / Mohd Ramli Othman by Othman, Mohd Ramli

    Published 1987
    “…The English Act, an anti espionage legacy of pre World War 1, was enacted in the wake of hysteria leading up to the outbreak of the war. …”
    Get full text
  12. 12

    Competitive Intelligence in Malaysia Pharmaceutical Industry : Effectiveness of Implementation by Ooi, Hooi Min

    Published 2004
    “…Competitive Intelligence has often been related to industrial espionage where some find the border unclear. With recent emphasis on the ethical and legal boundaries, Competitive Intelligence has slowly stand on it own feet. …”
    Get full text
  13. 13

    Unexpected Defeat: The Unsuccessful War Crimes Prosecution of Lt Gen Yamawaki Masataka and Others at Manus Island, 1950 by Morris, Narrelle

    Published 2013
    “…The case was misjudged because of three quite understandable factors: firstly, the presumption, not without some due cause by the end of the war, that the Japanese routinely committed war crimes, including the murder of prisoners-of-war; secondly, the emotionalism that surrounds the executions of soldiers by the enemy and the desire to hold the enemy accountable for their actions; and, thirdly, the shortcomings, ambiguities and conflicting interpretations possible of international law at the time regarding espionage and the punishment of spies and a relatively uncertain grasp of how that law could be applicable to the facts of the case. …”
    Get full text
  14. 14

    Analysis of known and unknown malware bypassing techniques by Daryabar, Farid, Dehghantanha, Ali, Udzir, Nur Izura, Mohd Sani, Nor Fazlida, Shamsuddin, Solahuddin, Norouzizadeh, Farhood

    Published 2013
    “…Malware caused different types of attacks such as denial of service (DoS) attacks,business espionage, extorting money, etc. Therefore, implementing malware defenses for organizations’ internal networks are uttermost important.In this paper, bypassing the well-known and unknown malware through the host-based Anti Viruses (AVs) that are based on signature detection is illustrated, and it is shown that how even a known malware might be bypassed anti viruses and firewalls to be executed in organizations’ internal computer networks. …”
    Get full text
    Get full text
  15. 15

    Information security awareness through the use of social media by Abdul Molok, Nurul Nuha, Md Ali, Asma, Talib, Shuhaili, Mahmud, Murni

    Published 2015
    “…Despite the benefits of social media to organizations, there were cases of information leakage, malware, identity theft, espionage and sabotage through such use. This paper explores employees' awareness of information security around social media and presents the initial findings of a study on a tertiary education institution in Malaysia. …”
    Get full text
    Get full text
    Get full text
    Get full text
  16. 16

    Detecting and preventing unauthorised computer access on a physical network system by Mohd. Shariff, Muhammad Reza

    Published 2008
    “…These internal threats may come from disgruntle staffs, hackers, virus attack, or even corporate espionage. At any corporate network, a number of active port are located through out the organization, this could be a loophole for a security breach. …”
    Get full text
    Get full text
  17. 17

    A perception assessment on security awareness in Malaysian government agencies by Rasch model / Mohd Ismail Ahmad, Azrilah Abdul Aziz and Mohd Saidfudin Masodi by Ahmad, Mohd Ismail, Abdul Aziz, Azrilah, Masodi, Mohd Saidfudin

    Published 2008
    “…It is aimed as preventive measures to frustrate sabotage, espionage, prevent damage to the country from subversion and other covert activity; frustrate proliferation of detrimental information, watch out for new or re-emerging types of threat; protect the Government's sensitive information and assets. …”
    Get full text
  18. 18

    Efficient kerberos authentication scheme for cross-domain systems in industrial internet of things using ECC by Ismail, Haqi Khalid

    Published 2021
    “…These cyberattacks against industrial entities, for common attacks examples, Trojan Horses, replay and man-in-the-middle, can lead to security compromises including espionage, sabotage, and ransomware. Solutions for these cyber security problems and threats are still not satisfactory. …”
    Get full text
    Get full text
  19. 19

    Simulation on Network Security Design Architecture for Server Room in Rwanda Information Technology Agency by Eric, Karerangabo

    Published 2009
    “…Unprotected organisation’s networks from internet attacks face high risk of data loss and espionage. Network devices that make up network are the most targeted in order to penetrate in companies system as some come with vulnerability from the manufacturer. …”
    Get full text
    Get full text