Cybersecurity and Economic Espionage: The Case of Chinese Investments in the Middle East (original) (raw)

Enter the Cyber Dragon Understanding Chinese intelligence agencies' cyber capabilities

Toby Feakin

View PDFchevron_right

Critical Issues in Foreign Intelligence Threat/Cyber Espionage

Mansur Ya'u, Mansur Ya'u

View PDFchevron_right

Cyber Warfare: An Era of Nation-State Actors and Global Corporate Espionage

Joab Kose

2021

View PDFchevron_right

Breaching Protocol: The Threat of Cyberespionage

Tim Stevens

View PDFchevron_right

The Coming Cyber Storm: Examining the Russia-US-China Hacking Nexus, Ed. by Matthew Crosston, A Modern Diplomacy Geopolitical Handbook, No. 2

Dr. Matthew Crosston

View PDFchevron_right

China s cyber espionage operations

pradyot mallick

View PDFchevron_right

The U.S.-China Cyber Warfare in the 21 st Century: Implications for International Security

Saira N Abbasi

Research Article, 2023

View PDFchevron_right

Cyber espionage

Timothy Gr

Cyber espionage , 2019

View PDFchevron_right

China's Engagement in Cyberspace

Francis C . Domingo

Journal of Asian Security and International Affairs, 2016

View PDFchevron_right

On the strategic consequences of digital espionage

Tim Stevens

Journal of Cyber Policy, 2021

View PDFchevron_right

Economic Cyber Espionage: The Need for an Amalgamation of WTO Rules and International Law

Elizabeth Lahiff

View PDFchevron_right

Economic Espionage and Economic Security

IOANNIS KONSTANTOPOULOS

View PDFchevron_right

The Use of Cyber Warfare and its Impact on International Security

Mohammed Saaida

Science For All Publications, 2023

View PDFchevron_right

Soft Spying: Leveraging Globalization as Proxy Military Rivalry, International Journal of Intelligence and Counterintelligence, Vol. 28, No. 1, Spring 2015

Dr. Matthew Crosston

View PDFchevron_right

International Cyber Conflict and National Security

Ryan C Maness

View PDFchevron_right

Countering State-Sponsored Cyber Economic Espionage under International Law

Catherine Lotrionte

North Carolina Journal of International Law and Commercial Regulation, 2015

View PDFchevron_right

China's Three Warfares Strategy Mitigates Fallout From Cyber Espionage Activities

Emilio Iasiello

View PDFchevron_right

Spying and Fighting in Cyberspace: What is Which

Gary Brown

View PDFchevron_right

Economic Espionage in International Relations

Mehdi Serghini

2018

View PDFchevron_right

COMPARING AND CONTRASTING HOW THE UNITED STATES AND CHINA ADDRESS CYBERSECURITY

Timothy Gr

COMPARING AND CONTRASTING HOW THE UNITED STATES AND CHINA ADDRESS CYBERSECURITY, 2019

View PDFchevron_right

An Assessment of International Law on the Use of Cyber-Espionage as a Substitute for Traditional Spying

Ayobamidele Joshua

European Journal of Law and Political Science

View PDFchevron_right

The “Cyber Weapons Gap.” The Assessment of the China’s Cyber Warfare Capabilities and Its Consequences for Regional Security System

Andrzej Kozlowski

The “Cyber Weapons Gap.” The Assessment of the China’s Cyber Warfare Capabilities and Its Consequences for Regional Security System, 2014

View PDFchevron_right

Porteous, Holly_Cybersecurity & Intelligence_The US Approach

Holly Porteous

2011

View PDFchevron_right

Cyber Espionage: What's the Big Deal

Mark Thomas, Mark Thomas

National Intelligence Journal, 2009

View PDFchevron_right

What are the main differences between the economic and military dimensions of the United States and China’s cybersecurity policies?

Rajveer Batra

International Journal of Advance Research, Ideas and Innovations in Technology, 2021

View PDFchevron_right

Review of Chinese Industrial Espionage: Technology Acquisition and Military Modernization by William C. Hannas, James Mulvenon and Anna B. Puglisi

Francis C . Domingo

View PDFchevron_right

China and The Latent Cyber Threat

Jayadeva Ranade

View PDFchevron_right

US-China Cyber Warfare

Saira N Abbasi

View PDFchevron_right

Cyber Threats and International Security

Dr. Ehab Khalifa

View PDFchevron_right

Chinese Technology Platforms Operating in the United States: Assessing the Threat (Originally Published as a Joint Report of the National Security, Technology, and Law Working Group at the Hoover Institution at Stanford University and the Tech, Law & Security Program at American University Washin...

Chris Inglis

2021

View PDFchevron_right

The Need for Cooperation: National Security and the Effort of Indonesia and China to Maintain Cyber Security

Ali Rokhman

Presented at the First High Level Forum on China-Indonesia People-to -People Exchange among Universities, Central China Normal University, Wuhan, Hubei, China, 2018

View PDFchevron_right

Critical Role of Cyber Security in Global Economy

Emile Mbungu kala

Open Journal of Safety Science and Technology, 2022

View PDFchevron_right

COVERT CYBER CAPABILITIES OF THE US

Dr. E. Dilipraj

Air Power Journal, 2015

View PDFchevron_right

Cybersecurity and International Relations

Nekhoroshikh Angelina

Research Paper, 2024

View PDFchevron_right

Why can't we be friends? Challenges to international cyberwarfare cooperation efforts and the way ahead

Gil Baram

Comparative Strategy, 2019

View PDFchevron_right