The concept of human based Espionage has grown between nation-states since the time of ancient civilisations thus the same is not a new phenomenon, but in the last few decades the globe has moved into an absolutely new dimension of spying through artificial intelligence and internet system aptly known as cyber espionage. This futuristic form of espionage has brought the global sphere into their control tackling national security, affecting the economic and political relationships between nation-states as well as changing the shape of modern warfare. Therefore, in spite of the advantages brought about by modern technology, there is a whole new set of problems as well. This paper provides some background on cyber espionage, including what it ...
Contemporary security is increasingly concerned with and affected by actions undertaken via cyberspa...
This chapter examines the use of Social Networks for Surveillance and Security in relation to the de...
This project investigates the use of cyber technology as a political tool through the investigation ...
The concept of human based Espionage has grown between nation-states since the time of ancient civil...
Espionage between countries dates back hundreds of years. Since the Internet was released for commer...
New information technologies have contributed to the emergence of new lifestyles and modern strategi...
The paper aims to analyse how information warfare can be conducted in cyberspace and to look at this...
In this paper, the authors undertake a study of cyber warfare reviewing theories, law, policies, act...
The Internet and the cyberenvironment offer an unprecedented opportunity for intelligence and espion...
This paper is devoted to the analysis of modern trends in economic cybersecurity. We analysed the dy...
Improvements in cybernetics have made likely far reaching shifts in all areas of life. Thus, the sci...
This paper examines some of the most widely researched trends and developments within the phenomenon...
Nowadays, an old fiction known as cyber warfare is coming true. US Pentagon declared Cyber Warfare a...
Based on democratic principles that encourage creation and transmission of information and knowledge...
In this paper, the authors undertake a study of cyber warfare reviewing theories, law, policies, act...
Contemporary security is increasingly concerned with and affected by actions undertaken via cyberspa...
This chapter examines the use of Social Networks for Surveillance and Security in relation to the de...
This project investigates the use of cyber technology as a political tool through the investigation ...
The concept of human based Espionage has grown between nation-states since the time of ancient civil...
Espionage between countries dates back hundreds of years. Since the Internet was released for commer...
New information technologies have contributed to the emergence of new lifestyles and modern strategi...
The paper aims to analyse how information warfare can be conducted in cyberspace and to look at this...
In this paper, the authors undertake a study of cyber warfare reviewing theories, law, policies, act...
The Internet and the cyberenvironment offer an unprecedented opportunity for intelligence and espion...
This paper is devoted to the analysis of modern trends in economic cybersecurity. We analysed the dy...
Improvements in cybernetics have made likely far reaching shifts in all areas of life. Thus, the sci...
This paper examines some of the most widely researched trends and developments within the phenomenon...
Nowadays, an old fiction known as cyber warfare is coming true. US Pentagon declared Cyber Warfare a...
Based on democratic principles that encourage creation and transmission of information and knowledge...
In this paper, the authors undertake a study of cyber warfare reviewing theories, law, policies, act...
Contemporary security is increasingly concerned with and affected by actions undertaken via cyberspa...
This chapter examines the use of Social Networks for Surveillance and Security in relation to the de...
This project investigates the use of cyber technology as a political tool through the investigation ...