She has been exploring (i) the roles played by technology in social theories about modernity and (ii) the sociological nature of the technical and social development of the Internet. Her latest research projects involve: (i) techno-social theories as conceptual tools to understand cyberspace and its security issues (ii) a general formal theory of digital identity and surveillance (iii) formal methods for monitoring, data collection and interventions (iv) cyberbullying and (v) cyber security and crime in Nigeria and Vietnam, the criminal Darknet, and converged security threats and management measures in organisations. Her current research ranges over cyber security and crime, surveillance studies, social theory, technological developments and online research methods. Victoria Wang is a Reader on Security and Cybercrime in the Institute of Criminal Justice Studies, University of Portsmouth. Navigate Left Previous article in issue.Further, based on our findings, we call for more multi-disciplinary/multi-agency research on IE in order to construct a comprehensive framework to combat IE. 7.22 A person engaged in gathering intelligence and captured in an aircraft or vessel while dressed in civilian clothes may only be charged with espionage if. Particularly, we systematically: i) identify key features of IE by analysing its current definitions, and coin our own working definition ii) discuss the current state of research on IE from different academic disciplines iii) highlight some key challenges in the current state of research on IE and iv) identify some possible trends in its future development. Any individual or spy ring (a cooperating group of spies), in the service of a government, company or independent operation, can commit espionage. Spies help agencies uncover secret information. In this paper, we report a comprehensive Systematic Literature Review (SLR) of current English literature on IE. Espionage or spying, is the act of obtaining secret or confidential information without the permission of the holder of the information. Thus, an in-depth understanding of IE is necessary. Currently, techniques generated by rapid developments of Internet of Things (IOTs) and Data Science are enabling a massive increase of both frequency and power of IE related activities in our increasingly challenging global commercial environment. Industrial Espionage (IE) is an umbrella term covering a complicated range of activities performed to gain competitive advantages, resulting in a huge amount of financial loss annually.
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |