Search Results - "Espionage"
-
1
Conflict and Cyber-espionage: Ridding the World of Cyber War?
Published 2014“…This paper examines the argument that espionage is a distinct framework for evaluating conflict in cyberspace and that it should displace discussions of cyber war in most cases. …”
Get full text
-
2
Addressing the threats of online theft of trade secret and cyber espionage in Malaysia: the legal landscape
Published 2019“…Online theft of trade secrets and commercial cyber espionage are growing threats to businesses and national economy in this digital economy. …”
Get full text
Get full text
Get full text
-
3
Protecting trade secret from theft and corporate espionage: business entity v employee & competitors
Published 2018“…This paper highlights the importance of protecting trade secrets from theft of trade secret and corporate espionage by business entity and to recommend the best practice on how to protect from legal, administrative and technical perspectives. …”
Get full text
Get full text
Get full text
-
4
Legal framework for theft of trade secrets and corporate espionage in Malaysia: adhering to the trans pacific partnership agreement (TPPA)
Published 2019“…Theft of trade secrets and corporate espionage threaten innovation, growth, development and investment of business entities and national economy globally. …”
Get full text
Get full text
-
5
God’s spies: the Spanish Elizabethans and intelligence during the Anglo-Spanish War
Published 2020Subjects: Get full text
-
6
'Death by a Thousand Cuts': Cyberespionage and the Problem of Aggregated Small Harms
Published 2017“…If such behaviour is properly categorised as espionage, how should we respond to theft of sensitive information on a massive scale? …”
Get full text
-
7
Cyber security in the open data: where is the equilibrium?
Published 2017“…Governments in virtually all countries want better cybersecurity against cyber spying, but also seek the capacity for cyber espionage on others. Following reports of mutual cyber espionage between China and the United States, it was proposed that both countries agree to a policy of Mutually Assured Restraint (MAR). …”
Get full text
Get full text
-
8
Business under threat: the criminal liability of trade secret theft in Malaysia?
Published 2020“…Because of this, the trade secret is often subject to various threats ranging from misappropriation, theft and corporate espionage launched by rivals and also the employee. …”
Get full text
Get full text
Get full text
Get full text
-
9
Exploring the use of online social networking among employees in Malaysian organizations: looking potential threats to information security
Published 2013“…The western literature often report incidents of OSN causing malware attacks on corporate networks, leakage of confidential information, identity theft, cyber espionage and sabotage. Thus, this study investigates the use of OSN sites among employees of Malaysia organization including academic and non-academic staff of IIUM…”
Get full text
Get full text
-
10
Rule-Based Approach For Detecting Advanced Persistent Threat Using Behavioral Features Of Credential Dumping Technique
Published 2022“…APT causes enormous damages for data loss, espionage, sabotage, leak, or forceful pay of ransom money to the attackers. …”
Get full text
Get full text
-
11
Official Secrets Act: a commentary / Mohd Ramli Othman
Published 1987“…The English Act, an anti espionage legacy of pre World War 1, was enacted in the wake of hysteria leading up to the outbreak of the war. …”
Get full text
-
12
Competitive Intelligence in Malaysia Pharmaceutical Industry : Effectiveness of Implementation
Published 2004“…Competitive Intelligence has often been related to industrial espionage where some find the border unclear. With recent emphasis on the ethical and legal boundaries, Competitive Intelligence has slowly stand on it own feet. …”
Get full text
-
13
Unexpected Defeat: The Unsuccessful War Crimes Prosecution of Lt Gen Yamawaki Masataka and Others at Manus Island, 1950
Published 2013“…The case was misjudged because of three quite understandable factors: firstly, the presumption, not without some due cause by the end of the war, that the Japanese routinely committed war crimes, including the murder of prisoners-of-war; secondly, the emotionalism that surrounds the executions of soldiers by the enemy and the desire to hold the enemy accountable for their actions; and, thirdly, the shortcomings, ambiguities and conflicting interpretations possible of international law at the time regarding espionage and the punishment of spies and a relatively uncertain grasp of how that law could be applicable to the facts of the case. …”
Get full text
-
14
Analysis of known and unknown malware bypassing techniques
Published 2013“…Malware caused different types of attacks such as denial of service (DoS) attacks,business espionage, extorting money, etc. Therefore, implementing malware defenses for organizations’ internal networks are uttermost important.In this paper, bypassing the well-known and unknown malware through the host-based Anti Viruses (AVs) that are based on signature detection is illustrated, and it is shown that how even a known malware might be bypassed anti viruses and firewalls to be executed in organizations’ internal computer networks. …”
Get full text
Get full text
-
15
Information security awareness through the use of social media
Published 2015“…Despite the benefits of social media to organizations, there were cases of information leakage, malware, identity theft, espionage and sabotage through such use. This paper explores employees' awareness of information security around social media and presents the initial findings of a study on a tertiary education institution in Malaysia. …”
Get full text
Get full text
Get full text
Get full text
-
16
Detecting and preventing unauthorised computer access on a physical network system
Published 2008“…These internal threats may come from disgruntle staffs, hackers, virus attack, or even corporate espionage. At any corporate network, a number of active port are located through out the organization, this could be a loophole for a security breach. …”
Get full text
Get full text
-
17
A perception assessment on security awareness in Malaysian government agencies by Rasch model / Mohd Ismail Ahmad, Azrilah Abdul Aziz and Mohd Saidfudin Masodi
Published 2008“…It is aimed as preventive measures to frustrate sabotage, espionage, prevent damage to the country from subversion and other covert activity; frustrate proliferation of detrimental information, watch out for new or re-emerging types of threat; protect the Government's sensitive information and assets. …”
Get full text
-
18
Efficient kerberos authentication scheme for cross-domain systems in industrial internet of things using ECC
Published 2021“…These cyberattacks against industrial entities, for common attacks examples, Trojan Horses, replay and man-in-the-middle, can lead to security compromises including espionage, sabotage, and ransomware. Solutions for these cyber security problems and threats are still not satisfactory. …”
Get full text
Get full text
-
19
Simulation on Network Security Design Architecture for Server Room in Rwanda Information Technology Agency
Published 2009“…Unprotected organisation’s networks from internet attacks face high risk of data loss and espionage. Network devices that make up network are the most targeted in order to penetrate in companies system as some come with vulnerability from the manufacturer. …”
Get full text
Get full text