-
221
Danmarks retningslinjer for internationalt forskningssamarbejde: En balancegang mellem politisk pragmatik og risikostyring
Published 2024-04-01“…This article tracks how Danish research collaboration with China has changed from peaceable, to China being perceived as a threat that implied Danish research institutions were both targets of espionage and key players in Danish foreign and security policy, to that threat being one that must be weighed against the benefits of economic relations. …”
Get full text
Article -
222
Detecting ulterior motives from verbal cues in group deliberations
Published 2023-05-01“…Because these real-world interviews often lack experimental control and ground truth, this investigation explored whether results of non-forensic interviews generalize to forensic ones.MethodsOrganizational espionage was simulated to determine (1) what verbal signals distinguish truth from deception, (2) whether deception in groups aligns with deception in dyads, and (3) whether non-forensic venues can be generalized to forensic ones. …”
Get full text
Article -
223
Current problems of international information security
Published 2023-06-01“…The trend is also a further increase in the number and scope of cyber-attacks for any political purpose, be it espionage, subversion or destruction. At the same time, it is expected that more countries will join the list of those participating in offensive cyber operations, and that these operations will become more daring, persistent and disruptive, with more serious consequences. …”
Get full text
Article -
224
Cyber conflicts in international relations: Framework and case studies
Published 2022“…Cuckoo's Egg, Morris Worm, Solar Sunrise, Electronic Disturbance Theater, ILOVEYOU, Chinese Espionage, Estonia, Russo-Georgian war, Conficker, NSA-Snowden, WikiLeaks and Stuxnet are some of the major cases included.…”
Get full text
Working Paper -
225
-
226
Efficient kerberos authentication scheme for cross-domain systems in industrial internet of things using ECC
Published 2021“…These cyberattacks against industrial entities, for common attacks examples, Trojan Horses, replay and man-in-the-middle, can lead to security compromises including espionage, sabotage, and ransomware. Solutions for these cyber security problems and threats are still not satisfactory. …”
Get full text
Thesis -
227
Sociological Analysis of the Story Khishkhaneh Herat from Tarikh Beyhaqi Based on the Theory of Symbolic Interaction
Published 2023-03-01“…A collective culture that is based more than anything on false shows, control, idealization, concealment, lies, espionage, team collusion, investigation, and interference in people's private lifestyles.…”
Get full text
Article