Query Result Set
Skip Navigation Links
   ActiveUsers:1152Hits:19490609Skip Navigation Links
Show My Basket
Contact Us
IDSA Web Site
Ask Us
Today's News
HelpExpand Help
Advanced search

  Hide Options
Sort Order Items / Page
DIGITAL SECURITY (3) answer(s).
 
SrlItem
1
ID:   149705


Crack habit: intelligence agencies face undecryptable code / IHS Jane's   Journal Article
IHS Jane's Journal Article
0 Rating(s) & 0 Review(s)
Summary/Abstract Advances in quantum cryptography raise the prospect of genuinely undecryptable communications. In the second of an occasional series on future intellence collection, IHS Jane's analyses how unbreakable digital security might change espionage.
        Export Export
2
ID:   130993


Digital security governance and risk anticipation: what about the role of security officials in privacy protection? ( / Eijkman, Quirine   Journal Article
Eijkman, Quirine Journal Article
0 Rating(s) & 0 Review(s)
Publication 2014.
Summary/Abstract The anticipatory turn in managing security and safety relies not only on innovative technological tools, but also on social practice. New information and communication technology, for instance, facilitates digital security governance1 which entails the collection, processing, storage, and sharing of digital personal data for risk profiling, but little is known about the role of security officials in preemptive security. Although people, or "data subjects," are categorized according to a (predefined) level of potential threat on the basis of digital data, it is often unclear which actor or agency was responsible for this categorization. This is especially unclear when information was shared across the globe between several security agencies and/or private companies. Nonetheless, as the assessment of risk or dangerousness affects someone's real-life opportunities, privacy rights or claims to something or someone are likely to be evoked.
        Export Export
3
ID:   150985


Innovation and adaptation in jihadist digital security / Brantly, Aaron   Journal Article
Brantly, Aaron Journal Article
0 Rating(s) & 0 Review(s)
Summary/Abstract Online discussions among jihadists depict a community that is alert to changes both in the technology and the laws and policies of its adversaries.
Key Words Jihadist  Innovation  Adaptation  Digital Security 
        Export Export