Academic literature on the topic 'Spying'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'Spying.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Journal articles on the topic "Spying"

1

Western, Ken. "Ethical Spying." Business Ethics: The Magazine of Corporate Responsibility 9, no. 5 (1995): 22–23. http://dx.doi.org/10.5840/bemag19959594.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Goldman, Jan. "Spying Properly." International Journal of Intelligence and CounterIntelligence 32, no. 1 (2019): 208–13. http://dx.doi.org/10.1080/08850607.2018.1524251.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Zorpette, Glenn. "Spying Saucer." Scientific American 276, no. 6 (1997): 40. http://dx.doi.org/10.1038/scientificamerican0697-40b.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Braithwaite, Rodric. "Proper Spying." Survival 62, no. 5 (2020): 193–202. http://dx.doi.org/10.1080/00396338.2020.1819655.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Prakasa, Satria Unggul Wicaksana. "PILPRES RI 2019 DAN ANCAMAN SPYING ELECTION DALAM PERSPEKTIF HUKUM INTERNASIONAL." Legal Standing : Jurnal Ilmu Hukum 2, no. 2 (2018): 143. http://dx.doi.org/10.24269/ls.v2i2.1244.

Full text
Abstract:
Muncul modus operandi baru dari kegiatan mata-mata (spying) dalam bentuk intervensi terhadap hasil pemilihan Presiden (presidential election), yang bisa disebut sebagai spying election, merupakan ancaman serius terhadap kedaulatan dan keamanan negara di era globalisasi ini. Isu hukum yang diangkat pada penelitian hukum ini adalah: (1). Apakah spying election merupakan melanggar hukum internasional dan hukum Indonesia ? (2) Bagaimana mekanisme hukum untuk menindak terhadap kejahatan spying election?. Penulisan penelitian hukum ini menggunakan pendekatan statute approach dan conceptual approach.
APA, Harvard, Vancouver, ISO, and other styles
6

Krepon, Michael. "Spying from Space." Foreign Policy, no. 75 (1989): 92. http://dx.doi.org/10.2307/1148866.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Easley, Leif-Eric. "Spying on Allies." Survival 56, no. 4 (2014): 141–56. http://dx.doi.org/10.1080/00396338.2014.941545.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Watson, Matthew. "Spying on volcanoes." Physics World 30, no. 7 (2017): 40–43. http://dx.doi.org/10.1088/2058-7058/30/7/45.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Land, Thomas. "Spying for Food." Worldview 28, no. 1 (1985): 14. http://dx.doi.org/10.1017/s0084255900046441.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Weiss, Aaron. "Spying on ourselves." netWorker 8, no. 2 (2004): 18–24. http://dx.doi.org/10.1145/997922.997923.

Full text
APA, Harvard, Vancouver, ISO, and other styles
More sources

Dissertations / Theses on the topic "Spying"

1

Kwapich, Sally J. "Smartphone Spying: Uncovering Hidden Dangers." University of Toledo / OhioLINK, 2013. http://rave.ohiolink.edu/etdc/view?acc_num=toledo1363858931.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Lubbers, Eveline. "Activist intelligence and covert corporate strategy : an analysis of corporate spying on critical activists." Thesis, University of Strathclyde, 2009. http://oleg.lib.strath.ac.uk:80/R/?func=dbin-jump-full&object_id=11906.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Maddrell, John Paul. "Britain's exploitation of Occupied Germany for scientific and technical intelligence on the Soviet Union." Thesis, University of Cambridge, 1999. https://www.repository.cam.ac.uk/handle/1810/226719.

Full text
Abstract:
At the beginning of the Cold War, the gathering of intelligence on the Soviet Union's current and future military capability seemed a near-impossibility. Soviet high-level communications were secure against decryption. Agent networks in the USSR were very difficult to establish and of uncertain reliability. Aerial reconnaissance of warrelated targets in the Soviet Union was risky and could only be occasional. But valuable intelligence was gathered in the years 1945-55 on the USSR's frantic arms build-up, thanks to its policy towards Germans and their country. Its exploitation of Germans and it
APA, Harvard, Vancouver, ISO, and other styles
4

Hussey, Phillip Ryan. "The Evolution of Electronic Surveillance: Balancing National Security and Civil Liberties." unrestricted, 2007. http://etd.gsu.edu/theses/available/etd-06152007-110824/.

Full text
Abstract:
Thesis (honors)--Georgia State University, 2007.<br>Title from file title page. Robert Howard, thesis advisor. Electronic text (50 p.) : digital, PDF file. Description based on contents viewed Jan 17, 2008. Includes bibliographical references (p. 48-50).
APA, Harvard, Vancouver, ISO, and other styles
5

Kronlund, Julia Signe, and Veronica Claeson. "Spying or Surviving? : Do companies on the Shanghai market use Competitive Intelligence today in order to stay competitive?" Thesis, Stockholm University, School of Business, 2005. http://urn.kb.se/resolve?urn=urn:nbn:se:su:diva-5942.

Full text
Abstract:
<p>Since 1979 China has gone through a powerful reform which has turned it from being a poor and underdeveloped country to becoming a relatively modern economy. Chinese companies, which are known for copying and producing have, because of this development become more interested in producing their own products, from first thought to final product. Shanghai, the most developed industrial city in China with an economical growth that has reached two number digits twelve years in a row, has been a big part of the development. This development in Shanghai has led to an increasing interest for the Sh
APA, Harvard, Vancouver, ISO, and other styles
6

Thorburn, Mark Allen. "The Times, Trial, and Execution of David McLane: The Story of an American Spying in Canada for the French in 1796-1797." PDXScholar, 1993. https://pdxscholar.library.pdx.edu/open_access_etds/4649.

Full text
Abstract:
The thesis primarily examines the 1797 trial of David McLane in Quebec City for spying, the steps taken by the British authorities to ensure a conviction, and McLane's activities in 1796 and 1797 in Vermont and Lower Canada on behalf of the French Minister to the United States, Pierre Adet. McLane did not receive a fair trial because the colonial administration in Lower Canada so thoroughly manipulated the legal system that a guilty verdict was assured. But, ironically, McLane was a guilty man, having been hired by Adet to find sympathizers who would help instigate a rebellion in the colony; h
APA, Harvard, Vancouver, ISO, and other styles
7

Vik, Kjell Inge Langeland. "Tyrolerinntak - Spyling av sedimenter." Thesis, Norges teknisk-naturvitenskapelige universitet, Institutt for bygg, anlegg og transport, 2013. http://urn.kb.se/resolve?urn=urn:nbn:no:ntnu:diva-23838.

Full text
Abstract:
Mange norske kraftverksystem er bygget ut med bekkeinntak i tillegg til vanlige kraftverksinntak. Inntak av typen Tyrolerinntak fungerer vanligvis svært bra under typiske norske forhold med liten sedimenttransport, men de er i liten grad tilpasset forhold med mye løsmasser i vannet. I dag baserer de fleste løsninger for fjerning av sedimenter fra bekkeinntak seg på manuell fjerning ved hjelp av for eksempel gravemaskin. Ved å benytte seg av en modell av Statskrafts Tyrolerinntak ved Stasjonselv i Skjomen i Narvik har det i denne oppgaven blitt sett på ulike spyleløsninger for denne typen innta
APA, Harvard, Vancouver, ISO, and other styles
8

Moulin, Thibault. "Le cyber-espionnage en Droit international." Thesis, Université Grenoble Alpes (ComUE), 2018. https://thares.univ-grenoble-alpes.fr/2018GREAD010.pdf.

Full text
Abstract:
Les Etats s’espionnent depuis des siècles, soulevant des tensions. Toutefois, une régulation expresse ne peut être trouvée que dans le droit des conflits armés. Alors que les espions peuvent être capturés et punis, il est paradoxalement admis que leur envoi en temps de guerre n’est pas contraire au droit international. En revanche, aucune règle expresse ne vient réglementer l’espionnage en temps de paix. Une appréhension indirecte n’existe que par le biais de la souveraineté territoriale. En effet, en l’absence de son consentement, l’envoi d’un agent sur le sol d’un territoire étranger est ill
APA, Harvard, Vancouver, ISO, and other styles
9

Reyhan, Dilnur. "Le rôle des technologies d'information et de communication (TIC) dans la contruction des nouvelles diasporas : le cas de la diaspora Ouïghoure." Thesis, Strasbourg, 2017. http://www.theses.fr/2017STRAG003.

Full text
Abstract:
Cette thèse s’intéresse aux rôles des TIC dans la constitution de la diaspora ouïghoure. L’approche sociologique choisie a permis d’aborder cette question sous l’angle politique et communicationnelle mais aussi historique et géographique et de prendre en compte tant les aspects idéologiques, sociaux qu’institutionnels et organisationnels. Les communautés ouïghoures à l’étranger commencent à être visibles et créent des organisations officielles représentant leur cause. La première partie met en évidence un réseau complexe constitué des communautés ouïghoures institutionalisées qui sont en inter
APA, Harvard, Vancouver, ISO, and other styles
10

Evert, Benjamin J. "Applications of polyhydroxy butyrate bead technology." Thesis, Griffith University, 2022. http://hdl.handle.net/10072/411889.

Full text
Abstract:
Recent research into bioengineered polyhydroxy butyrate (PHB) bead technology has resulted in the ability to generate functional polyester nanoparticles and materials with diverse applications across many fields of science. Through protein engineering and by hijacking Escherichia coli as a high yielding cell factory the Rehm lab group has been able to generate hundreds of PHB beads coated in various target proteins for multiple applications. The possible applications of this technology are only limited by our own ideas for targets which can be applied to the PHB bead technology. PHB beads coat
APA, Harvard, Vancouver, ISO, and other styles
More sources

Books on the topic "Spying"

1

Spying eyes. Pocket Books, 1998.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
2

Royce, Benjamin. The spying daughter. Greenleaf Classics, 1988.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
3

The spying game. Putnam's, 1999.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
4

Spying and security. Brown Bear Books, 2012.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
5

David, Baker. Infiltration and spying. Rourke Pub., 2006.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
6

Bunting, Eve. Spying on Miss Müller. Fawcett Juniper, 1996.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
7

Lockwood, Brad. Domestic spying and wiretapping. Rosen Pub., 2007.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
8

Howard, Laurence. Spying on my dreams. Creative Arts Book Co., 2001.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
9

H, Cook Earleen, ed. Industrial spying and espionage. Vance Bibliographies, 1985.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
10

Spying in Guru Land. Fourth Estate, 1995.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
More sources

Book chapters on the topic "Spying"

1

Dey, Sayar Kumar, Prerna Choudhary, and Günter Fahrnberger. "Spying Mobrob." In Distributed Computing and Internet Technology. Springer International Publishing, 2016. http://dx.doi.org/10.1007/978-3-319-50472-8_18.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Bearce, Stephanie. "3D Spying." In Top Secret Files. Routledge, 2021. http://dx.doi.org/10.4324/9781003239222-34.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Maloba, W. O. "Spying on Political Activism." In Kenyatta and Britain. Springer International Publishing, 2017. http://dx.doi.org/10.1007/978-3-319-50895-5_3.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Wakeman, Frederic. "Spying." In SpymasterDai Li and the Chinese Secret Service. University of California Press, 2003. http://dx.doi.org/10.1525/california/9780520234079.003.0022.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

"Acknowledgments." In Spying. Lynne Rienner Publishers, 2019. http://dx.doi.org/10.1515/9781626378018-001.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

"Contents." In Spying. Lynne Rienner Publishers, 2019. http://dx.doi.org/10.1515/9781626378018-toc.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

"6 The FBI’s Human Capital Issues." In Spying. Lynne Rienner Publishers, 2019. http://dx.doi.org/10.1515/9781626378018-007.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

"About the Book." In Spying. Lynne Rienner Publishers, 2019. http://dx.doi.org/10.1515/9781626378018-017.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

"Frontmatter." In Spying. Lynne Rienner Publishers, 2019. http://dx.doi.org/10.1515/9781626378018-fm.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

"Index." In Spying. Lynne Rienner Publishers, 2019. http://dx.doi.org/10.1515/9781626378018-016.

Full text
APA, Harvard, Vancouver, ISO, and other styles

Conference papers on the topic "Spying"

1

Sun, Ke, Chen Chen, and Xinyu Zhang. ""Alexa, stop spying on me!"." In SenSys '20: The 18th ACM Conference on Embedded Networked Sensor Systems. ACM, 2020. http://dx.doi.org/10.1145/3384419.3430727.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Xiong, Wenjie, Nikolaos Athanasios Anagnostopoulos, Andre Schaller, Stefan Katzenbeisser, and Jakub Szefer. "Spying on Temperature using DRAM." In 2019 Design, Automation & Test in Europe Conference & Exhibition (DATE). IEEE, 2019. http://dx.doi.org/10.23919/date.2019.8714882.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Varshney, Gaurav, Manoj Misra, and Pradeep K. Atrey. "Detecting Spying and Fraud Browser Extensions." In CCS '17: 2017 ACM SIGSAC Conference on Computer and Communications Security. ACM, 2017. http://dx.doi.org/10.1145/3137616.3137619.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Sami, Sriram, Yimin Dai, Sean Rui Xiang Tan, Nirupam Roy, and Jun Han. "Spying with your robot vacuum cleaner." In SenSys '20: The 18th ACM Conference on Embedded Networked Sensor Systems. ACM, 2020. http://dx.doi.org/10.1145/3384419.3430781.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Aarthi, V., R. Visali, and K. K. Nagarajan. "Smart Spying Robot with IR Thermal Vision." In 2021 7th International Conference on Advanced Computing and Communication Systems (ICACCS). IEEE, 2021. http://dx.doi.org/10.1109/icaccs51430.2021.9441821.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Basak, Suryoday, and Mahanth Gowda. "mmSpy: Spying Phone Calls using mmWave Radars." In 2022 IEEE Symposium on Security and Privacy (SP). IEEE, 2022. http://dx.doi.org/10.1109/sp46214.2022.9833568.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Terkki, Eeva, Ashwin Rao, and Sasu Tarkoma. "Spying on Android users through targeted ads." In 2017 9th International Conference on Communication Systems and Networks (COMSNETS). IEEE, 2017. http://dx.doi.org/10.1109/comsnets.2017.7945362.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Hilgefort, Jan Malte, Daniel Arp, and Konrad Rieck. "Spying through Virtual Backgrounds of Video Calls." In CCS '21: 2021 ACM SIGSAC Conference on Computer and Communications Security. ACM, 2021. http://dx.doi.org/10.1145/3474369.3486870.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Antonik, Piotr, Marvyn Gulina, Jael Pauwels, Damien Rontani, Marc Haelterman, and Serge Massar. "Spying on chaos-based cryptosystems with reservoir computing." In 2018 International Joint Conference on Neural Networks (IJCNN). IEEE, 2018. http://dx.doi.org/10.1109/ijcnn.2018.8489102.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Sharma, Divya, and Usha Chauhan. "War Spying Robot with Wireless Night Vision Camera." In 2020 2nd International Conference on Advances in Computing, Communication Control and Networking (ICACCCN). IEEE, 2020. http://dx.doi.org/10.1109/icacccn51052.2020.9362981.

Full text
APA, Harvard, Vancouver, ISO, and other styles

Reports on the topic "Spying"

1

Ölbei, Tamás. Tinker, Tailor, Soldier, Spy: Reconnaissance, Spying on Mercenaries and Crusaders. Edicions de la Universitat de Lleida, 2020. http://dx.doi.org/10.21001/itma.2020.14.11.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Hin, Saskia C. Interdisciplinary research collaboration as the future of ancient history? Insights from spying on demographers. Max Planck Institute for Demographic Research, 2013. http://dx.doi.org/10.4054/mpidr-wp-2013-002.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Thorburn, Mark. The Times, Trial, and Execution of David McLane: The Story of an American Spying in Canada for the French in 1796-1797. Portland State University Library, 2000. http://dx.doi.org/10.15760/etd.6533.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Steinman, Dave, Mike Celiceo, and Joe Head. Stopping Insider Abuse and Spying. Detecting the Hard Stuff: Stolen Passwords Unauthorized Records Browsing, Employee Espionage, Infiltration, and Insertion of Unwelcome Code, via Automatic Behavior Profiling. Defense Technical Information Center, 1999. http://dx.doi.org/10.21236/ada385478.

Full text
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!