Spyware in intelligence espionage operations as a threat to the state

dc.contributor.authorDeky, Rosdiana
dc.date.accessioned2024-05-06T11:40:15Z
dc.date.available2024-05-06T11:40:15Z
dc.date.issued2023
dc.descriptionСтаттю присвячено дослідженню питання застосування програм для стеження у межах актів шпіонажу. Детально оцінюється їх вплив у різних сферах життя держави, описуються нетипові аспекти та надаються пропозиції щодо захисту від таких програм.uk_UA
dc.description.abstractThe development of globalization has changed the pattern of war from conventional military power with trained soldiers and sophisticated weaponry to non-military state power through cultural, economic, political, and technological aspects. Warfare now dominantly utilizes technological sophistication or cyber warfare, posing a threat to national security, sovereignty, and resilience in the virtual world. This article uses a qualitative approach that refers to the meaning, concept, definition, characteristics, metaphor, symbol, and description of a qualitative study, conducted through examining various social arrangements and groups or individuals in a social setting. The data collection technique used here is only a literature review or a descriptive review of previous research sources and other secondary data. In terms of Cyber Espionage issues, updating the law can be a step towards providing a legal basis for law enforcement against Cyber Espionage perpetrators as a legal breakthrough to ensnare the perpetrators. Cyber intelligence's role as a "new" form in the governance of national intelligence can become clearer and avoid potential issues. Attention to these issues should be accompanied by solutions in preparing competent human resources, infrastructure, funds, and technology to make cyber intelligence an asset for national and state security.en_US
dc.identifier.citationRosdiana D. Spyware in intelligence espionage operations as a threat to the state / Deky Rosdiana // Kyiv-Mohyla Law and Politics Journal.. - 2022-2023. - No. 8-9. - P. 161-171. - https://doi.org/10.18523/kmlpj303225.2023-8-9.161-171en_US
dc.identifier.issn2414-9942
dc.identifier.urihttps://doi.org/10.18523/kmlpj303225.2023-8-9.161-171
dc.identifier.urihttps://ekmair.ukma.edu.ua/handle/123456789/29437
dc.language.isoenen_US
dc.relation.sourceKyiv-Mohyla Law and Politics Journaluk_UA
dc.statusfirst publisheduk_UA
dc.subjectSpywareen_US
dc.subjectIntelligence espionage operationsen_US
dc.subjectCyber attackn_US
dc.subjectMilitaryen_US
dc.subjectarticleen_US
dc.subjectпрограми для стеженняuk_UA
dc.subjectакти шпіонажуuk_UA
dc.subjectзагрозаuk_UA
dc.subjectзбройні силиuk_UA
dc.titleSpyware in intelligence espionage operations as a threat to the stateen_US
dc.title.alternativeПрограми для стеження в межах актів шпіонажу як загроза державіuk_UA
dc.typeArticleuk_UA
Files
Original bundle
Now showing 1 - 1 of 1
Loading...
Thumbnail Image
Name:
Deky_Spyware_in_intelligence_espionage_operations_as_a_threat_to_the_state.pdf
Size:
234.42 KB
Format:
Adobe Portable Document Format
License bundle
Now showing 1 - 1 of 1
No Thumbnail Available
Name:
license.txt
Size:
1.71 KB
Format:
Item-specific license agreed upon to submission
Description:
Collections