To see the other types of publications on this topic, follow the link: Spying.

Dissertations / Theses on the topic 'Spying'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the top 16 dissertations / theses for your research on the topic 'Spying.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Browse dissertations / theses on a wide variety of disciplines and organise your bibliography correctly.

1

Kwapich, Sally J. "Smartphone Spying: Uncovering Hidden Dangers." University of Toledo / OhioLINK, 2013. http://rave.ohiolink.edu/etdc/view?acc_num=toledo1363858931.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Lubbers, Eveline. "Activist intelligence and covert corporate strategy : an analysis of corporate spying on critical activists." Thesis, University of Strathclyde, 2009. http://oleg.lib.strath.ac.uk:80/R/?func=dbin-jump-full&object_id=11906.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Maddrell, John Paul. "Britain's exploitation of Occupied Germany for scientific and technical intelligence on the Soviet Union." Thesis, University of Cambridge, 1999. https://www.repository.cam.ac.uk/handle/1810/226719.

Full text
Abstract:
At the beginning of the Cold War, the gathering of intelligence on the Soviet Union's current and future military capability seemed a near-impossibility. Soviet high-level communications were secure against decryption. Agent networks in the USSR were very difficult to establish and of uncertain reliability. Aerial reconnaissance of warrelated targets in the Soviet Union was risky and could only be occasional. But valuable intelligence was gathered in the years 1945-55 on the USSR's frantic arms build-up, thanks to its policy towards Germans and their country. Its exploitation of Germans and it
APA, Harvard, Vancouver, ISO, and other styles
4

Hussey, Phillip Ryan. "The Evolution of Electronic Surveillance: Balancing National Security and Civil Liberties." unrestricted, 2007. http://etd.gsu.edu/theses/available/etd-06152007-110824/.

Full text
Abstract:
Thesis (honors)--Georgia State University, 2007.<br>Title from file title page. Robert Howard, thesis advisor. Electronic text (50 p.) : digital, PDF file. Description based on contents viewed Jan 17, 2008. Includes bibliographical references (p. 48-50).
APA, Harvard, Vancouver, ISO, and other styles
5

Kronlund, Julia Signe, and Veronica Claeson. "Spying or Surviving? : Do companies on the Shanghai market use Competitive Intelligence today in order to stay competitive?" Thesis, Stockholm University, School of Business, 2005. http://urn.kb.se/resolve?urn=urn:nbn:se:su:diva-5942.

Full text
Abstract:
<p>Since 1979 China has gone through a powerful reform which has turned it from being a poor and underdeveloped country to becoming a relatively modern economy. Chinese companies, which are known for copying and producing have, because of this development become more interested in producing their own products, from first thought to final product. Shanghai, the most developed industrial city in China with an economical growth that has reached two number digits twelve years in a row, has been a big part of the development. This development in Shanghai has led to an increasing interest for the Sh
APA, Harvard, Vancouver, ISO, and other styles
6

Thorburn, Mark Allen. "The Times, Trial, and Execution of David McLane: The Story of an American Spying in Canada for the French in 1796-1797." PDXScholar, 1993. https://pdxscholar.library.pdx.edu/open_access_etds/4649.

Full text
Abstract:
The thesis primarily examines the 1797 trial of David McLane in Quebec City for spying, the steps taken by the British authorities to ensure a conviction, and McLane's activities in 1796 and 1797 in Vermont and Lower Canada on behalf of the French Minister to the United States, Pierre Adet. McLane did not receive a fair trial because the colonial administration in Lower Canada so thoroughly manipulated the legal system that a guilty verdict was assured. But, ironically, McLane was a guilty man, having been hired by Adet to find sympathizers who would help instigate a rebellion in the colony; h
APA, Harvard, Vancouver, ISO, and other styles
7

Vik, Kjell Inge Langeland. "Tyrolerinntak - Spyling av sedimenter." Thesis, Norges teknisk-naturvitenskapelige universitet, Institutt for bygg, anlegg og transport, 2013. http://urn.kb.se/resolve?urn=urn:nbn:no:ntnu:diva-23838.

Full text
Abstract:
Mange norske kraftverksystem er bygget ut med bekkeinntak i tillegg til vanlige kraftverksinntak. Inntak av typen Tyrolerinntak fungerer vanligvis svært bra under typiske norske forhold med liten sedimenttransport, men de er i liten grad tilpasset forhold med mye løsmasser i vannet. I dag baserer de fleste løsninger for fjerning av sedimenter fra bekkeinntak seg på manuell fjerning ved hjelp av for eksempel gravemaskin. Ved å benytte seg av en modell av Statskrafts Tyrolerinntak ved Stasjonselv i Skjomen i Narvik har det i denne oppgaven blitt sett på ulike spyleløsninger for denne typen innta
APA, Harvard, Vancouver, ISO, and other styles
8

Moulin, Thibault. "Le cyber-espionnage en Droit international." Thesis, Université Grenoble Alpes (ComUE), 2018. https://thares.univ-grenoble-alpes.fr/2018GREAD010.pdf.

Full text
Abstract:
Les Etats s’espionnent depuis des siècles, soulevant des tensions. Toutefois, une régulation expresse ne peut être trouvée que dans le droit des conflits armés. Alors que les espions peuvent être capturés et punis, il est paradoxalement admis que leur envoi en temps de guerre n’est pas contraire au droit international. En revanche, aucune règle expresse ne vient réglementer l’espionnage en temps de paix. Une appréhension indirecte n’existe que par le biais de la souveraineté territoriale. En effet, en l’absence de son consentement, l’envoi d’un agent sur le sol d’un territoire étranger est ill
APA, Harvard, Vancouver, ISO, and other styles
9

Reyhan, Dilnur. "Le rôle des technologies d'information et de communication (TIC) dans la contruction des nouvelles diasporas : le cas de la diaspora Ouïghoure." Thesis, Strasbourg, 2017. http://www.theses.fr/2017STRAG003.

Full text
Abstract:
Cette thèse s’intéresse aux rôles des TIC dans la constitution de la diaspora ouïghoure. L’approche sociologique choisie a permis d’aborder cette question sous l’angle politique et communicationnelle mais aussi historique et géographique et de prendre en compte tant les aspects idéologiques, sociaux qu’institutionnels et organisationnels. Les communautés ouïghoures à l’étranger commencent à être visibles et créent des organisations officielles représentant leur cause. La première partie met en évidence un réseau complexe constitué des communautés ouïghoures institutionalisées qui sont en inter
APA, Harvard, Vancouver, ISO, and other styles
10

Evert, Benjamin J. "Applications of polyhydroxy butyrate bead technology." Thesis, Griffith University, 2022. http://hdl.handle.net/10072/411889.

Full text
Abstract:
Recent research into bioengineered polyhydroxy butyrate (PHB) bead technology has resulted in the ability to generate functional polyester nanoparticles and materials with diverse applications across many fields of science. Through protein engineering and by hijacking Escherichia coli as a high yielding cell factory the Rehm lab group has been able to generate hundreds of PHB beads coated in various target proteins for multiple applications. The possible applications of this technology are only limited by our own ideas for targets which can be applied to the PHB bead technology. PHB beads coat
APA, Harvard, Vancouver, ISO, and other styles
11

Fierer, J. O. "Development of spontaneous isopeptide bond formation for ligation of peptide tags." Thesis, University of Oxford, 2014. http://ora.ox.ac.uk/objects/uuid:833289ee-87cf-42f0-a66f-ca9ef9dd6420.

Full text
Abstract:
Peptide tags are ubiquitous in the life sciences, with roles including purification and selective labeling of proteins. Because peptide tags are small they have a limited surface area for binding and hence usually form low affinity protein interactions. These weak interactions limit the uses of peptide tags in cases that require resistance to forces generated with macromolecular architectures or protein motors. Hence a way to create a covalent interaction with a peptide tag would be useful. It was found possible to create a covalent bond-forming peptide tag using the spontaneous isopeptide che
APA, Harvard, Vancouver, ISO, and other styles
12

Hoult, Stacy Ellen. "Inside looking out : spying and subjectivity in Norah Lange /." 1999. http://gateway.proquest.com/openurl?url_ver=Z39.88-2004&res_dat=xri:pqdiss&rft_val_fmt=info:ofi/fmt:kev:mtx:dissertation&rft_dat=xri:pqdiss:9934066.

Full text
APA, Harvard, Vancouver, ISO, and other styles
13

YANG, MING-CHE, and 楊明哲. "Research of Corruption and Crime Committed by Armed Forces-take the case of CCP Spying as an Example." Thesis, 2016. http://ndltd.ncl.edu.tw/handle/j8ep6d.

Full text
Abstract:
碩士<br>銘傳大學<br>社會與安全管理學系兩岸關係與安全管理碩士在職專班<br>105<br>The corruption has been around the world for a long time. If democracy and human rights are worldwide recognized value, then the corruption would be a kind of worldwide pathological behavior. Ironically, before the democracy and human rights have become global, the corruption had been a worldwide phenomenon. Regardless the evolution of history, the development of economic, the competitive strength of a nation or the institutional framework to a constitutional system, a government, even a private enterprise, the corruption always exist. According
APA, Harvard, Vancouver, ISO, and other styles
14

Alexander, Jason. "Ghost in the Shell: A Counter-intelligence Method for Spying while Hiding in (or from) the Kernel with APCs." Thesis, 2012. http://hdl.handle.net/1974/7605.

Full text
Abstract:
Advanced malicious software threats have become commonplace in cyberspace, with large scale cyber threats exploiting consumer, corporate and government systems on a constant basis. Regardless of the target, upon successful infiltration into a target system an attacker will commonly deploy a backdoor to maintain persistent access as well as a rootkit to evade detection on the infected machine. If the attacked system has access to classified or sensitive material, virus eradication may not be the best response. Instead, a counter-intelligence operation may be initiated to track the infiltratio
APA, Harvard, Vancouver, ISO, and other styles
15

Liu, Wei-Chen, and 劉維珍. "Research on spyan-ras-gzigs-sgrub-thabs in Tibetan Scripture." Thesis, 2008. http://ndltd.ncl.edu.tw/handle/71479326220081528740.

Full text
Abstract:
碩士<br>華梵大學<br>東方人文思想研究所<br>96<br>As far as academic research is concerned, Nyingmapa, which is one of the Tibetan Buddhism schools, has been criticized as a hidden teaching and its scripture is often regarded as Apocrypha due to its lack of organization and its rituals and teachings of term. This thesis is a tracing research and comparison study between "spyan-ras-gzigs cha-si-ba sgrub-thabs" and "spyan-ras-gzigs ritual" collected in Tibetan Scripture of Sde-dge Edition. The present work is firstly to categorize all the "spyan-ras-gzigs" related sutras and rituals in the most well known
APA, Harvard, Vancouver, ISO, and other styles
16

Haas, Michaela [Verfasser]. "Die tibetische Rezeption des Abhisamayālaṃkāra am Beispiel der ersten drei Kapitel in der Kommentierung von rDza dPal spruls sPyi don / vorgelegt von Michaela Haas". 2008. http://d-nb.info/99080691X/34.

Full text
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!