To see the other types of publications on this topic, follow the link: National Security Agency (NSA).

Journal articles on the topic 'National Security Agency (NSA)'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the top 50 journal articles for your research on the topic 'National Security Agency (NSA).'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.

1

Jean, Guilhem. "NSA. National Security Agency / Claude Delesse, Paris, Tallandier, 2016, 512 p." Revue internationale et stratégique N° 102, no. 2 (2016): V. http://dx.doi.org/10.3917/ris.102.0163e.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Long, Austin. "The Quiet Americans? CIA, NSA, and Counterinsurgency." Journal of Cold War Studies 13, no. 3 (2011): 149–84. http://dx.doi.org/10.1162/jcws_r_00146.

Full text
Abstract:
The contribution of the U.S. intelligence community (IC) to counterinsurgency operations past and present has gone largely underappreciated, in part because of the pervasive secrecy surrounding most of the IC's activities. A review of two recently declassified histories of Central Intelligence Agency (CIA) and National Security Agency (NSA) involvement in Vietnam in the 1960s provides insight into the historical contributions of these agencies to counterinsurgency efforts. This analysis provides a context for understanding available evidence relating to the two agencies' contributions to curre
APA, Harvard, Vancouver, ISO, and other styles
3

문지현. "On the Documents of Record Group 457 U.S. National Archives:U.S. National Security Agency(NSA)/Central Security Serivce(CSS)." EWHA SAHAK YEONGU ll, no. 49 (2014): 297–330. http://dx.doi.org/10.37091/ewhist.2014..49.010.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

ROADY, PETER. "The Ford Administration, the National Security Agency, and the “Year of Intelligence”: Constructing a New Legal Framework for Intelligence." Journal of Policy History 32, no. 3 (2020): 325–59. http://dx.doi.org/10.1017/s089803062000010x.

Full text
Abstract:
Abstract:In the mid-1970s, Congress and the judiciary moved to regulate the National Security Agency (NSA) at a moment when such regulation might have restricted the growth of electronic surveillance. The Ford administration played a crucial role in preventing that from happening. It did so by controlling the flow of intelligence information to Congress and by establishing a flexible new legal framework for intelligence based on broad executive orders, narrow legislation, and legal opinions written by executive branch lawyers. This framework fostered a perception of legality that headed off ca
APA, Harvard, Vancouver, ISO, and other styles
5

Murakami Wood, David, and Steve Wright. "Before and After Snowden." Surveillance & Society 13, no. 2 (2015): 132–38. http://dx.doi.org/10.24908/ss.v13i2.5710.

Full text
Abstract:
This editorial for the Surveillance and Security Intelligence After Snowden issue provides a very brief history of National Security Agency whistleblowers and investigations before Edward Snowden, and sets the current wave of NSA whistleblowing in the context of a growing demand for openness, transparency and accountability opposing the renewed closures and secrecy of the War on Terror. It also provides some links for further research and reading.
APA, Harvard, Vancouver, ISO, and other styles
6

Munkholm, Johan Lau. "The Pursuit of Full Spectrum Dominance: The Archives of the NSA." Surveillance & Society 18, no. 2 (2020): 244–56. http://dx.doi.org/10.24908/ss.v18i2.13266.

Full text
Abstract:
This article explores the archives of the National Security Agency (NSA) and the inherent logic vested in the agency’s management of them. By drawing on Derrida’s conception of the archive and the compulsion to administer and complete it, this article suggests that the data collection practices, as well as the rhetoric, of the NSA indicate a specific logic of gathering and organizing data that presents a fantasy of perfect surveillance and pre-emptive intervention that stretches into the future to cancel emergent threats. To contextualize an understanding of the archival practices of the NSA w
APA, Harvard, Vancouver, ISO, and other styles
7

Sugiyama, Tara, and Marisa Perry. "The NSA Domestic Surveillance Program: An Analysis of Congressional Oversight During an Era of One-Party Rule." University of Michigan Journal of Law Reform, no. 40.1 (2006): 149. http://dx.doi.org/10.36646/mjlr.40.1.nsa.

Full text
Abstract:
On December 16, 2005, the New York Times sounded a fire alarm when it revealed that, in response to the September 11, 2001 attacks, President George W Bush had issued a secret executive order permitting the National Security Agency (NSA) to conduct warrantless surveillance on individuals to unearth nascent terrorist activity. Congress responded to the disclosure of the NSA domestic surveillance program largely by shirking its oversight duties. This Note argues that when a single party controls both the executive and the legislative branches, the fire-alarm model fails to provide sufficient con
APA, Harvard, Vancouver, ISO, and other styles
8

Khan, Zmarak. "The National Security Agency (NSA) eavesdropping on Americans A programme that is neither legal nor necessary." Utrecht Law Review 2, no. 2 (2006): 61. http://dx.doi.org/10.18352/ulr.26.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Dawson, Maurice, Robert Bacius, Luis Borges Gouveia, and Andreas Vassilakos. "Understanding the Challenge of Cybersecurity in Critical Infrastructure Sectors." Land Forces Academy Review 26, no. 1 (2021): 69–75. http://dx.doi.org/10.2478/raft-2021-0011.

Full text
Abstract:
Abstract The cybersecurity of critical infrastructures is an essential topic within national and international security as 16 critical infrastructure sectors touch various aspects of American society. Because the failure to provide adequate cybersecurity controls within the critical infrastructure sectors renders the country open to an attack that could have a debilitating effect on security, national public health, safety, and economic security, this matter is so vital that there is the Presidential Policy Directive (PPD) 21 Critical Infrastructure Security and Resilience advances a national
APA, Harvard, Vancouver, ISO, and other styles
10

Wang, Ping, Maurice Dawson, and Kenneth L. Williams. "Improving Cyber Defense Education through National Standard Alignment." International Journal of Hyperconnectivity and the Internet of Things 2, no. 1 (2018): 12–28. http://dx.doi.org/10.4018/ijhiot.2018010102.

Full text
Abstract:
There has been a fast-growing demand for cybersecurity professionals to defend cyber space and information systems. With more and more programs and course offerings in cybersecurity popping up in higher education, it is important to have a consistent and reliable quality standard to guide and evaluate the training and preparation of qualified cyber defense workforce. The national Centers of Academic Excellence in Cyber Defense Education (CAE-CDE) designation program jointly sponsored by the US National Security Agency (NSA) and Department of Homeland Security (DHS) is a rigorous national stand
APA, Harvard, Vancouver, ISO, and other styles
11

Carroll, Jami. "The U.S. National Cybersecurity Strategy: A Vehicle with an International Journey." European Conference on Cyber Warfare and Security 23, no. 1 (2024): 107–15. http://dx.doi.org/10.34190/eccws.23.1.2300.

Full text
Abstract:
The U.S. National Cybersecurity Strategy is focused on the five pillars of defending critical infrastructure: detect, disrupt, and dismantle threat actors; improve market resilience and security; invest in future resilience; and create international partnerships with shared goals. The National Cybersecurity Strategy Implementation Plan is focused on critical infrastructure supporting energy, financial, healthcare, information technology, and manufacturing sectors. In the U.S. alone, the SolarWinds supply chain attack affected nine federal agencies and about 100 companies. Ransomware attacks su
APA, Harvard, Vancouver, ISO, and other styles
12

Renita J, Edna Elizabeth N, and Suganya Annadurai. "From Inception to Realization: NIST's Post-Quantum Cryptography Standardization." Indian Journal of Cryptography and Network Security 5, no. 1 (2025): 8–19. https://doi.org/10.54105/ijcns.a1437.05010525.

Full text
Abstract:
Cryptography is a term that safeguards the security of electronic banking transactions, and emails, and most importantly our country relies on cryptography for national security purposes. Post Quantum Cryptography (PQC) has a major aim of developing newer cryptographic schemes that make the cryptosystem secure against quantum computers. This is a state-of-the-art research topic, and it is encouraged by some security agencies like the National Security Agency (NSA). This paper presents a concise and up-to-date review of post-quantum cryptographic (PQC) algorithms submitted to the National Insti
APA, Harvard, Vancouver, ISO, and other styles
13

Lucas, George R. "NSA Management Directive #424: Secrecy and Privacy in the Aftermath of Edward Snowden." Ethics & International Affairs 28, no. 1 (2014): 29–38. http://dx.doi.org/10.1017/s0892679413000488.

Full text
Abstract:
Whatever else one might say concerning the legality, morality, and prudence of his actions, Edward Snowden, the former U.S. National Security Agency (NSA) contractor, is right about the notion of publicity and informed consent, which together constitute the hallmark of democratic public policy. In order to be morally justifiable, any strategy or policy involving the body politic must be one to which it would voluntarily assent when fully informed about it. This, in essence, was Snowden's argument for leaking, in June 2013, the documents that revealed the massive NSA surveillance program:So lon
APA, Harvard, Vancouver, ISO, and other styles
14

Lamin Saidy, Abraham Ayodeji Abayomi, Abel Chukwuemeke Uzoka, and Bolaji Iyanu Adekunle. "The API Integrity and Access Control Framework (AIACF): A Zero-Trust Security Model for U.S.-Connected Consumer Platforms." International Journal of Scientific Research in Computer Science, Engineering and Information Technology 10, no. 2 (2024): 897–904. https://doi.org/10.32628/cseit24102140.

Full text
Abstract:
The rapid proliferation of consumer Internet of Things (IoT) devices has exponentially increased the attack surface for cyber adversaries, with Application Programming Interfaces (APIs) serving as critical yet vulnerable integration points within smart ecosystems. This paper introduces the API Integrity and Access Control Framework (AIACF), a comprehensive zero-trust security model designed to fortify API governance for U.S.-connected consumer platforms. AIACF integrates multi-layer authentication, real-time anomaly detection, and role-based access controls to establish continuous, context-awa
APA, Harvard, Vancouver, ISO, and other styles
15

Renita, J. "From Inception to Realization: NIST's Post-Quantum Cryptography Standardization." Indian Journal of Cryptography and Network Security (IJCNS) 5, no. 1 (2025): 8–19. https://doi.org/10.54105/ijcns.A1437.05010525.

Full text
Abstract:
<strong>Abstract: </strong>Cryptography is a term that safeguards the security of electronic banking transactions, and emails, and most importantly our country relies on cryptography for national security purposes. Post Quantum Cryptography (PQC) has a major aim of developing newer cryptographic schemes that make the cryptosystem secure against quantum computers. This is a state-of-the-art research topic, and it is encouraged by some security agencies like the National Security Agency (NSA). This paper presents a concise and up-to-date review of post-quantum cryptographic (PQC) algorithms subm
APA, Harvard, Vancouver, ISO, and other styles
16

Keiber, Jason. "Surveillance Hegemony." Surveillance & Society 13, no. 2 (2015): 168–81. http://dx.doi.org/10.24908/ss.v13i2.5299.

Full text
Abstract:
The National Security Agency activity disclosed by Edward Snowden plugs into a larger information ecology made possible by U.S. surveillance hegemony. While the revelations of the NSA’s international spying ambitions have astonished, there is more to U.S. surveillance than secretive programs carried out by its intelligence community. The U.S. also assiduously conducts surveillance on individuals abroad through public programs negotiated with other states. These more public efforts are made possible by institutions and hortatory norms that support international surveillance. This triad of capab
APA, Harvard, Vancouver, ISO, and other styles
17

Clement, Andrew, and Jonathan A. Obar. "Keeping Internet Users in the Know or in the Dark: An Analysis of the Data Privacy Transparency of Canadian Internet Carriers." Journal of Information Policy 6, no. 1 (2016): 294–331. http://dx.doi.org/10.5325/jinfopoli.6.2016.294.

Full text
Abstract:
Abstract In the wake of Snowden's revelations about National Security Agency (NSA) surveillance, demands that Internet carriers be more forthcoming about their handling of personal information have intensified. Responding to this concern, this report evaluates the data privacy transparency of forty-three Internet carriers serving the Canadian public. Carriers are awarded up to ten stars based on the public availability of information satisfying ten transparency criteria. Carriers earn few stars overall, just 92.5 out of 430, an average of two of ten possible stars. A variety of policy recommen
APA, Harvard, Vancouver, ISO, and other styles
18

Altheide, David L. "The Triumph of Fear." International Journal of Cyber Warfare and Terrorism 4, no. 1 (2014): 1–7. http://dx.doi.org/10.4018/ijcwt.2014010101.

Full text
Abstract:
Edward Snowden was castigated by government officials and mainstream mass media as a traitor, spy, and international criminal when he released information about the National Security Agency (NSA) secret and massive surveillance of virtually all U.S. electronic communication. More than “wiretapping” is involved in the spin being put on Snowden's revelations. A lot of institutional duplicity has been revealed. The reaction of United States officials can be seen as a dramatic performance to demonstrate their moral resolve and complete power (even as Snowden challenged it) in order to dissuade oth
APA, Harvard, Vancouver, ISO, and other styles
19

Rosso, Mark, ABM Nasir, and Mohsen Farhadloo. "Chilling effects and the stock market response to the Snowden revelations." New Media & Society 22, no. 11 (2020): 1976–95. http://dx.doi.org/10.1177/1461444820924619.

Full text
Abstract:
This study analyzes the changes in individuals’ Internet search behavior and economic variables following Edward Snowden’s revelation of National Security Agency (NSA) surveillance activities of global Internet communications. We refer to the abrupt changes in individual search behavior beginning in June 2013 following Snowden’s revelations as the “Snowden effect.” The “Snowden effect” is a form of chilling effect. Using data from a unique search engine, DuckDuckGo, we show that chilling effects indeed exist. However, further analysis including the stock prices of the largest cybersecurity com
APA, Harvard, Vancouver, ISO, and other styles
20

Gibson, Elizabeth. "Digital Rights Ireland Ltd. v. Minister for Communications & Google Spain SL v. Agencia Española De Protección De Datos (C.J.E.U.)." International Legal Materials 53, no. 5 (2014): 889–926. http://dx.doi.org/10.5305/intelegamate.53.5.0889.

Full text
Abstract:
In April and May of 2014, the Court of Justice of the European Union (CJEU), sitting as a Grand Chamber, issued two preliminary rulings with dramatic implications for internet privacy—a topic of increasing global concern following Edward Snowden’s leaks on the data surveillance programs run by the U.S. National Security Agency (NSA) and its allies. The first case, Digital Rights Ireland Ltd. v. Minister for Communications, Marine and Natural Resources and others joined with Kärtner Landesregierung and others, found an unacceptable interference in the rights to privacy and data protection in a
APA, Harvard, Vancouver, ISO, and other styles
21

Adzanas, Adrian, and Bambang Ipto. "EDWARD SNOWDEN"S COMMUNICATION STRATEGY AGAINST INFORMATION DOMINATION GOVERNMENT OF THE UNITED STATES." dia 20, no. 01 (2022): 121–35. http://dx.doi.org/10.30996/dia.v20i01.6295.

Full text
Abstract:
This research explains how Edward Snowden disseminates data from the National Security Agency (NSA) secret program. As a result of Edward Snowden’s espionage action, Snowden received sanction from the United States Department of Justice to file criminal charges against Snowden. In its implementation, the results of the leakage have an important on distrust between the allies and the United States government. Allied countries and the international public are asking the United States government to reform the NSA to be more transparent. This research focuses on qualitative research methods. Data
APA, Harvard, Vancouver, ISO, and other styles
22

Damayanti, Oseani Umi, and Ahmad Toni. "ANALISIS SEMIOTIKA FILM DOKUMENTER CITIZENFOUR KARYA LAURA POITRAS." Jurnal Ilmiah LISKI (Lingkar Studi Komunikasi) 4, no. 2 (2018): 145. http://dx.doi.org/10.25124/liski.v4i2.1508.

Full text
Abstract:
Penelitian ini membahas tentang semiotika yang berada di dalam film „Citizenfour‟ dimana dalam film tersebut terdapat adanya makna dari sebuah tanda yang diantaranya yaitu Sign, Object, dan Interpretant. Hasil penelitian menunjukkan bahwa menjadi seorang jurnalis yang berani mengungkap sebuah kebenaran. Dimana kebenaran tersebut sangatlah berbahaya karena menyangkut sebuah keamanan negara. Dalam film ini banyak sekali makna yang dapat diungkap dari seorang jurnalis yang sangat cermat dalam menjalani profesi dan sekaligus dalam mencari berita yang merupakan sebuah kebenaran dari rahasia ska
APA, Harvard, Vancouver, ISO, and other styles
23

Joseph, Mabin, Gautham Sekar, and R. Balasubramanian. "Side channel analysis of SPECK." Journal of Computer Security 28, no. 6 (2020): 655–76. http://dx.doi.org/10.3233/jcs-200021.

Full text
Abstract:
SPECK is a family of lightweight block ciphers developed by Beaulieu et al. of the US National Security Agency (NSA) for the Internet of Things (IoT). It is an ARX-based design with a Feistel-like structure which supports keys of size ranging from 64 bits to 256 bits. SPECK has been standardised by ISO/IEC for radio frequency identification (RFID) devices. It has drawn the attention of many cryptanalysts and several cryptanalysis results have been published. In this paper, carry flag attacks on the full SPECK ciphers are presented. Depending on the key size and block size, the complexities of
APA, Harvard, Vancouver, ISO, and other styles
24

Aiken, Juliet R., and Paul J. Hanges. "Teach an I-O To Fish: Integrating Data Science Into I-O Graduate Education." Industrial and Organizational Psychology 8, no. 4 (2015): 539–44. http://dx.doi.org/10.1017/iop.2015.80.

Full text
Abstract:
Big data is becoming a buzzword in today's corporate language and lay discussions. From individually targeting advertising based on previous consumer behavior or Internet searches to debates by Congress concerning National Security Agency (NSA) access to phone metadata, the era of big data has arrived. Thus, the Guzzo, Fink, King, Tonidandel, and Landis (2015) discussion of the challenges (e.g., confidentiality, informed consent) that big data projects present to industrial and organizational (I-O) psychologists is timely. If the hype associated with these techniques is warranted, then our fie
APA, Harvard, Vancouver, ISO, and other styles
25

Ingiriis, Mohamed Haji. "Predatory politics and personalization of power: The abuses and misuses of the National Intelligence and Security Agency (NISA) in Somalia." African Affairs 119, no. 475 (2020): 251–74. http://dx.doi.org/10.1093/afraf/adz027.

Full text
Abstract:
Abstract This article investigates the security sector in Somalia, with a focus on the National Intelligence and Security Agency (NISA), a government security unit, involved in the fight against the Al-Shabaab insurgency. This article argues that the historically traumatic legacy of autocratic oppression of the former military regime gives the Somali intelligence agency an infamous reputation that survives today and plays a significant role in the operations of the intelligence agency. Intelligence agents employ tactics from the late Cold War era military regime’s intelligence services, sugges
APA, Harvard, Vancouver, ISO, and other styles
26

Ahmad, Mahvish, and Rabia Mehmood. "Surveillance, Authoritarianism and ‘Imperial Effects’ in Pakistan." Surveillance & Society 15, no. 3/4 (2017): 506–13. http://dx.doi.org/10.24908/ss.v15i3/4.6721.

Full text
Abstract:
To speak of ‘Surveillance and the Global Turn to Authoritarianism’ presupposes a moment with little connection to that which has gone before, or places outside of North America and Europe. While Trump and Brexit inaugurate a consequential shift, even rupture, in the political terrain, we must not lose sight of places and peoples where American Wars – with European support – were overtly and covertly waged in the decades preceding this ‘global turn’, nor the fate of these places today. We argue that the sustained transfer of sophisticated surveillance technologies, as part and parcel of both di
APA, Harvard, Vancouver, ISO, and other styles
27

Cihan, Ulas Serhat Sahin Emir Memisoglu Ulas Asık Canturk Karadeniz Bilal Kılıc Ugur Sarac. "AUTOMATIC TEMPEST TEST AND ANALYSIS SYSTEM DESIGN." International Journal on Cryptography and Information Security ( IJCIS) 4, no. 3 (2014): 1–12. https://doi.org/10.5281/zenodo.7256302.

Full text
Abstract:
Today, it is clearly known that the electronic devices generate electromagnetic radiations unintentionally, which may contain critical information called compromising emanations (CE). CE is also known as TEMPEST radiation, which is a code name firstly used by an U.S government program. Every developed country has a TEMPEST Test Laboratory (TTL) connected to their National Security Agency (NSA). The main objective of these laboratories is to investigate equipment, systems, and platforms processing cryptographic information in terms of CE. TEMPEST tests might take very long time depending on the
APA, Harvard, Vancouver, ISO, and other styles
28

Cihan, Ulas Serhat Sahin Emir Memisoglu Ulas Asık Canturk Karadeniz Bilal Kılıc Ugur Sarac. "AUTOMATIC TEMPEST TEST AND ANALYSIS SYSTEM DESIGN." International Journal on Cryptography and Information Security (IJCIS) 4, no. 3 (2014): 1–12. https://doi.org/10.5281/zenodo.7276694.

Full text
Abstract:
Today, it is clearly known that the electronic devices generate electromagnetic radiations unintentionally, which may contain critical information called compromising emanations (CE). CE is also known as TEMPEST radiation, which is a code name firstly used by an U.S government program. Every developed country has a TEMPEST Test Laboratory (TTL) connected to their National Security Agency (NSA). The main objective of these laboratories is to investigate equipment, systems, and platforms processing cryptographic information in terms of CE. TEMPEST tests might take very long time depending on the
APA, Harvard, Vancouver, ISO, and other styles
29

Mathur, Raaghav, Ashish Khanna, and Abhijeet Singh. "Early Detection of Ransomware Exploits Using Snort." Innovative Computing and Communication: An International Journal 1, no. 1 (2019): 35–45. https://doi.org/10.5281/zenodo.4743527.

Full text
Abstract:
We live in a fast-evolving internet age where opportunities are limitless, but so are the risks and chances of security breaches. In 2017, &lsquo;The Shadow Brokers&rsquo;, a self-proclaimed group of hackers, released several hacking tools and zero day exploits from the intelligence arsenal of USA&rsquo;s National Security Agency (NSA). Chief amongst these exploits were - Eternal Blue, Eternal Romance, Eternal Synergy and Eternal Champion. These, along with Eternal Red, were collectively titled the &lsquo;Eternal Series Exploits&rsquo;. These exploits were subsequently used to make potential c
APA, Harvard, Vancouver, ISO, and other styles
30

Fatma, Yulia, Soni, and Mikdad Amseno. "Perbandingan Algoritma SIMON dan SPECK Dalam Pengamanan Citra Digital." Jurnal CoSciTech (Computer Science and Information Technology) 5, no. 2 (2024): 250–59. http://dx.doi.org/10.37859/coscitech.v5i2.7619.

Full text
Abstract:
Cryptography is a data security technique by encoding data that is to be kept secret so that the original meaning of the data can no longer be understood. SIMON and SPECK are modern cryptographic algorithms issued by the National Security Agency (NSA). SIMON and SPECK are said to be algorithms that are known for their efficiency and strong security. This research will compare the performance of the SIMON and SPECK algorithms in securing digital images. Comparisons were made by testing time performance, changes in file size, and the level of randomness of image files using the Unified Average C
APA, Harvard, Vancouver, ISO, and other styles
31

Klehr, Harvey. "REFLECTIONS ON ESPIONAGE." Social Philosophy and Policy 21, no. 1 (2004): 141–66. http://dx.doi.org/10.1017/s0265052504211074.

Full text
Abstract:
In 1995 the United States National Security Agency (NSA), the Central Intelligence Agency (CIA), and the Federal Bureau of Investigation (FBI) made public the story of a forty-year American intelligence operation code-named Venona. Shortly after the Nazi-Soviet Pact in 1939, American military intelligence had ordered companies that were sending and receiving coded cables overseas, such as Western Union, to turn over copies to the U.S. government. Hundreds of thousands of cables were sent or received by Soviet government bodies. Beginning in 1943, spurred by rumors and concerns that Stalin migh
APA, Harvard, Vancouver, ISO, and other styles
32

Poggio Teixeira, Carlos Gustavo, and Mark William Datysgeld. "Os clientes diplomáticos e econômicos da espionagem digital estadunidense: Análise das ações contra o Conselho de Segurança da ONU e a Petrobras." Estudos Internacionais: revista de relações internacionais da PUC Minas 4, no. 1 (2017): 71–87. http://dx.doi.org/10.5752/p.2317-773x.2016v4n1p71.

Full text
Abstract:
Esse trabalho tem por objetivo fazer uso da análise documental e contextual para estudar uma parcela das informações tornadas públicas em junho 2013 pelo especialista em segurança digital Edward Snowden, que detalhavam o projeto PRISM, uma iniciativa de espionagem global e sistemática dos meios de comunicação que estava sendo praticada pela National Security Agency (NSA) sob ordens do governo dos Estados Unidos. Abordamos incialmente como se configurou a montagem do sistema de espionagem, prosseguindo então para a observação de dois casos distintos, um deles proveniente da esfera diplomática e
APA, Harvard, Vancouver, ISO, and other styles
33

Hasyimi, Valid, Utomo Sarjono Putro, Santi Novani, and Agung Hendriadi. "Promoting value co-creation in food security in Indonesia with the lens of service-dominant logic." Journal of Infrastructure, Policy and Development 8, no. 13 (2024): 6461. http://dx.doi.org/10.24294/jipd6461.

Full text
Abstract:
Food security presents a complex challenge that spans multiple sectors and levels, involving diverse stakeholders. Such a challenge necessitates collaborative efforts and the creation of shared value among participants. Through the lens of service-dominant logic (S-D logic), food security can be redefined to achieve a more comprehensive understanding and sheds light on the dynamic interplay among stakeholders, enabling the realization of potential value co-creation. As a theoretical contribution, this research addresses the gap in explaining stakeholder interactions. This aspect is crucial for
APA, Harvard, Vancouver, ISO, and other styles
34

P., Anjaneyulu, and S. Srinivasa Reddy Mr. "Cloud Computing Adoption Approach towards Securing Data in Cloud Computing." International Journal of Trend in Scientific Research and Development 2, no. 4 (2018): 390–93. https://doi.org/10.31142/ijtsrd12995.

Full text
Abstract:
Present or late investigation on cloud security communicates that the security of customers data has the most astonishing need and furthermore concern. Customers store colossal measures of delicate data on a cloud. Sharing sensitive data will empower attempts to reduce the cost of giving customers redid advantages and offer some motivating force included data organizations. Regardless, secure data sharing is risky. Security is a champion among the most troublesome errand to realize in cloud computing. Assorted sorts of strikes in the application side and in the gear parts. This paper proposes
APA, Harvard, Vancouver, ISO, and other styles
35

KAI Putri, Ni Made, Bambang JS, and Sovian Aritonang. "URANIUM AND THORIUM POTENTIAL FOR INDONESIA'S FUTURE ENERGY SECURITY." International Journal of Education and Social Science Research 05, no. 01 (2022): 235–51. http://dx.doi.org/10.37500/ijessr.2022.5120.

Full text
Abstract:
Uranium and Thorium are natural elements known for their radioactive properties that can be used as a source of nuclear power. Both Uranium and Thorium are new energy sources, and are classified as alternative nuclear fuels, they are known as green nuclear. Uranium is not a rare metal, it is estimated that there are 5.7 million tons of uranium reserves in the world in 2015 in the Red Book of The Organization for Economic Co-operation and Development-Nuclear Energy Agency (OECD-NEA). As for Thorium, which is a heavy metal content in the earth's crust, it has reserves of 6.3 million tons in the
APA, Harvard, Vancouver, ISO, and other styles
36

Ingiriis, Mohamed Haji. "Insurgency and international extraversion in Somalia: the National Intelligence and Security Agency (NISA) and Al-Shabaab's Amniyat." African Security Review 29, no. 2 (2020): 125–51. http://dx.doi.org/10.1080/10246029.2020.1740752.

Full text
APA, Harvard, Vancouver, ISO, and other styles
37

Bożek, Martin. "AKTYWNOŚĆ SŁUŻB SPECJALNYCH W SFERZE CYBERBEZPIECZEŃSTWA. ASPEKTY NORMATYWNE." International Journal of New Economics and Social Sciences 23, no. 7 (2023): 319–34. http://dx.doi.org/10.5604/01.3001.0054.8360.

Full text
Abstract:
W artykule charakteryzowano kluczowe regulacje prawne stanowiące podstawę działania służb specjalnych w obszarze cyberbezpieczeństwa. Analizie poddano zarówno rozwiązania zawarte w ustawach kompetencyjnych, na podstawie których działają służby specjalne, jak i normy prawne zawarte w ustawach szczególnych, w tym w ustawie o krajowym systemie cy-berbezpieczeństwa. Efekty stosowania tych regulacji w praktyce zilustrowano danymi wynikającymi z corocznych raportów o stanie bezpieczeństwa cyberprzestrzeni RP, publikowanymi przez CSIRT GOV prowadzony przez Szefa Agencji Bezpieczeństwa Wewnętrznego. A
APA, Harvard, Vancouver, ISO, and other styles
38

Sinkó, Gábor. "Different times, same methods." Journal of Central and Eastern European African Studies 1, no. 1-2 (2024): 112–23. https://doi.org/10.59569/jceeas.2021.1.1-2.6.

Full text
Abstract:
This article examines the impact of the National Security Service (NSS) on the operations on the National Intelligence and Security Agency (NISA). It begins with the short history of Somalia between 1960 and 1991 and then the article analyzes the activities of the NSS, the main intelligence apparatus of the Siad Barre regime, and the NISA, the primary intelligence service of the Federal Government of Somalia (FGS). It contends that instead of reestablishing the NISA as an organization serving the interests of the general public, it continues to operate as an instrument of political power. The
APA, Harvard, Vancouver, ISO, and other styles
39

Pandey, Shikha. "Anti-Terrorism Courts and Procedural (In)Justice: The Case of the National Investigation Agency (NIA) Special Courts in South Chhattisgarh, India." Socio-Legal Review 16, no. 1 (2020): 109–39. https://doi.org/10.55496/cpjy1470.

Full text
Abstract:
The National Investigation Agency Act, 2008 (‘NIA Act’) was enacted for setting up a central agency, namely the National Investigation Agency. It is responsible for the investigation and prosecution of offences related to national security. The NIA Act prescribes a specific procedure for investigating any offence classified as a ‘Scheduled Offence’ under Section 6 of the NIA Act. In doing so, the NIA Act empowers the Central Government and the state governments to designate Special Courts by notification and vest them with the powers to investigate and prosecute Scheduled Offences in accordanc
APA, Harvard, Vancouver, ISO, and other styles
40

Jäcklein-Kreis, Elisabeth. "Stichwort Prism." merz | medien + erziehung 57, no. 4 (2013): 4. http://dx.doi.org/10.21240/merz/2013.4.4.

Full text
Abstract:
„Yes we scan!“ prangt es groß vom zur Karikatur umfunktionierten Obama-Wahlplakat: Der sonst so beliebte amerikanische Präsident ist derzeit Zielscheibe von Spott, Häme aber auch erbitterter Wut. Schuld ist der Skandal um das Programm Prism, mit dem der US-Geheimdienst NSA (National Security Agency) im großen Stil ‚im Internet mitliest‘. Am 6. Juni 2013 veröffentlichten die Washington Post und der Guardian Informationen des Whistleblowers Edward Snowden, eines 29-jährigen ehemaligen Mitarbeiters einer Firma, die die Ausspäh-Programme der NSA anbietet und wartet. Der hatte sich die Praktiken de
APA, Harvard, Vancouver, ISO, and other styles
41

Enyia, Jacob Otu, Ayuk A. Achu, Otu Duke, Cleverty Afu Njong, Tiku Oru Takim, and John Thompson Okpa. "Intelligence Gathering Imperative: A Tool for Successful Security Outfits’ Operation." International Journal of Criminology and Sociology 11 (November 30, 2022): 136–43. http://dx.doi.org/10.6000/1929-4409.2022.11.15.

Full text
Abstract:
This study examines the recent security challenges Nigerians and non-Nigerians encounters in their daily existence to eke a living. These threats are orchestrated by the activities of one of the deadliest terrorist group in the world (Boko Haram), and herdsmen notorious killers, armed banditry, cow rustling by rustlers, incessant kidnapping especially students in schools and unsuspecting Nigerians and non-Nigerians alike; which has made Nigeria federating states unsafe for any meaningful socio-economic development to thrive. To achieve this, two objectives were stated to include, underscore th
APA, Harvard, Vancouver, ISO, and other styles
42

Purba, Darwis Pardamean. "Analisa Dan Perbandingan Algoritma Whirpool Dan Sha-512 Dalam Penyandian Data Gambar." Bulletin of Artificial Intelligence 1, no. 1 (2022): 8–12. http://dx.doi.org/10.62866/buai.v1i1.2.

Full text
Abstract:
Image file is a form of collaboration which is located between points, lines, fields and also colors which will be very useful for imaging something, digital images are representations of light intensity functions in discrete form on a two-dimensional plane. An image file can be said to be original or original if the image does not experience the slightest change in any structure of an image. Manipulation of a file often occurs and is carried out by irresponsible people to provide benefits for that person, it is necessary to have a technique used to maintain the originality of a file or detect
APA, Harvard, Vancouver, ISO, and other styles
43

Lawand, Arthur Miguel Ferreira. "O aparente conflito normativo sobre a avaliação da exposição ao hidrocarboneto benzeno nas atividades no meio ambiente do trabalho: aplicação do método quantitativo ou qualitativo?" Revista Brasileira de Direito Constitucional 24, no. 2 (2025): 61–68. https://doi.org/10.62530/rbdcv24n02p61.

Full text
Abstract:
This article aims to analyze the regulation and, secondarily, the potential social security impacts of the method used to assess benzene exposure in the occupational environment. The gray area of interpretive understandings and the proliferation of disparate norms have led to the judicialization of the issue, particularly regarding whether benzene exposure should be recorded in the social security occupational profile for purposes of claiming special retirement benefits. Through normative research with a qualitative approach, the documentary corpus on the subject is examined in order to foster
APA, Harvard, Vancouver, ISO, and other styles
44

Fagbemi, Adebimpe Saheed, Abiodun Ghali Issa, and Christiana Ayah Fagbemi. "Intelligence Gathering and Policy Formulation for Addressing Security Threats in Nigeria." African Journal of Humanities and Contemporary Education Research 16, no. 1 (2024): 139–49. http://dx.doi.org/10.62154/ajhcer.2024.016.010423.

Full text
Abstract:
Intelligence has been discussed by many scholars across the globe. But no doubt, there is no universal acceptable definition of intelligence. It is germane to explicate intelligence as the result of information that has been collated, evaluated and interpreted. More so, intelligence is the information that have been processed and originated to be truth and accurate about an object, subject, or group of people. Without accurate and timely intelligence there would not be a functional government or sustainable nationhood. This paper focuses on how government could improve on policy formulations t
APA, Harvard, Vancouver, ISO, and other styles
45

Chen, Chin-Ling, Cheng-Chen Fang, Ming Zhou, et al. "A Blockchain-Based Anti-Counterfeit and Traceable NBA Digital Trading Card Management System." Symmetry 14, no. 9 (2022): 1827. http://dx.doi.org/10.3390/sym14091827.

Full text
Abstract:
NBA (National Basketball Association) trading cards are a hot collector’s item, with sales increasing rapidly every year. However, with the popularity of online trading, some sellers have started to intentionally and unintentionally sell imitation trading cards, and even PwC (Pricewaterhouse Coopers) is not immune. However, the PSA (Professional Sports Authenticator), which is the authentication agency, is not liable for this. Faced with the above situation, we moved trading cards online and proposed a blockchain-based anti-counterfeit and traceable NBA digital trading card management system,
APA, Harvard, Vancouver, ISO, and other styles
46

Ramadianto, Anang Riyan. "Sebuah Perbandingan Perlindungan Hukum Terhadap Korban Tindak Pidana Terorisme di Indonesia dan India." Diktum: Jurnal Ilmu Hukum 10, no. 1 (2022): 118–31. http://dx.doi.org/10.24905/diktum.v10i1.193.

Full text
Abstract:
Terrorism is a crime that is a major threat to the maintenance of every country that poses a danger to security, world peace, and harms the welfare of society. This is inseparable from the suffering of victims of crimes who need legal protection from the state. The purpose of this study is to compare forms of legal protection in the normative and empirical settings given to victims of criminal acts in Indonesia and India. This study uses a qualitative research method with an empirical juridical approach and descriptive analytical research specifications. The research was conducted at the Natio
APA, Harvard, Vancouver, ISO, and other styles
47

Therrien, Cristiano, and Pierre Trudel. "The Brazilian Civil Rights Framework for the Internet (or the Virtual Times of a Postmodern Law). Doi: 10.5020/2317-2150.2015.v20n3p746." Pensar - Revista de Ciências Jurídicas 20, no. 3 (2016): 746–66. http://dx.doi.org/10.5020/23172150.2012.746-766.

Full text
Abstract:
The paper presents a critical perspective about the article “Le temps virtuel des lois postmodernes ou comment le droit se traite dans la société de l’information” (“The Virtual Time of Postmodern Laws, or How the Law is Processed in the Information Society”), published by the philosopher and jurist François Ost, with the purpose of conducting a case study through the Brazilian law “Marco Civil da Internet” (“Civil Rights Framework for the Internet”). The article analyzes the profound changes in the way the law came to be produced and interpreted, in the passage from the forms of writing and p
APA, Harvard, Vancouver, ISO, and other styles
48

Ha, Chung-Sik. "The Introduction of the “Dispatch Slide” to Secure the Golden Time." Fire Science and Engineering 36, no. 4 (2022): 74–78. http://dx.doi.org/10.7731/kifse.2ff52f3e.

Full text
Abstract:
During a disaster, through the “2022 Comprehensive Measures to Secure Golden Time at Disaster Sites”, the National Fire Agency (NFA) states that it aims for firefighters to leave their fire depots within 60 s. This study considered the use of the “Dispatch slide” to shorten the target time (60 s) of the garage escape and the travel times while using the stairs and the slide were measured and analyzed. The travel time using the “Dispatch slide” was about 11 s faster than that using the stairs. Fire stations in developed countries have already introduced and used the “Dispatch slide”. We hope th
APA, Harvard, Vancouver, ISO, and other styles
49

Jasthin, R., E. K. S. Harini, and R. F. Primasatya. "Hazard mapping in Sembalun-Senaru hiking trail, Mount Rinjani National Park." IOP Conference Series: Earth and Environmental Science 1366, no. 1 (2024): 012014. http://dx.doi.org/10.1088/1755-1315/1366/1/012014.

Full text
Abstract:
Abstract Visitors primarily prioritise safety and security while selecting a tourist site, such as Mount Rinjani National Park (3726 masl), which is known for its mountaineering activities. It is necessary to do a mapping of the possible hazard due to the fact that the earthquake in August 2018 caused significant changes to the landscape of the hiking trail. The objective of this study is to analyse and evaluate possible dangers and provide suggestions for managing risks on the Sembalun-Senaru hiking trail in Mount Rinjani National Park (MRNP). The data was gathered by field observations, inte
APA, Harvard, Vancouver, ISO, and other styles
50

Idrus. "Halal Haram Cryptocurrency." Al-Tasyree: Jurnal Bisnis, Keuangan dan Ekonomi Syariah 13, no. 02 (2021): 113–23. http://dx.doi.org/10.59833/altasyree.v13i02.300.

Full text
Abstract:
The invention of the computer which was originally a calculating machine (Difference Engine no. 1) which was discovered by Charles Babbage (1791-1871) is something very famous in the history of computer development and is the first automatic calculator. With the very rapid development of the digital world, in 1983 an American cryptography expert David Chaum used cryptographic electronic money called e-cash, and in 1995, he implemented it through Digichash, which became the initial form of collaboration between the digital world of computers and Money, which is a cryptographic electronic paymen
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!