Works matching DE "INTELLECTUAL property theft"
Results: 80
ინოვაციური მეწარმეობის როლი საქართველოს მდგრად ეკონომიკურ განვითარებაში
- Published in:
- Economics & Business (1987-5789), 2024, n. 3, p. 65, doi. 10.52340/eab.2024.16.03.05
- By:
- Publication type:
- Article
Does technology transfer from the US to China harm American firms, workers, and consumers? A historical and analytic investigation.
- Published in:
- Economic & Political Studies, 2021, v. 9, n. 4, p. 417, doi. 10.1080/20954816.2021.1933768
- By:
- Publication type:
- Article
CIS Controls: Best Practices to Cope with Threats and Attacks on Privileged Accounts.
- Published in:
- ISSA Journal, 2021, v. 19, n. 2, p. 26
- By:
- Publication type:
- Article
CYBERSECURITY -- the No. 1 threat facing manufacturers.
- Published in:
- Industrial Management, 2018, v. 60, n. 4, p. 24
- By:
- Publication type:
- Article
Movie Piracy Networks at Alaba International Market, Lagos, Nigeria.
- Published in:
- 2018
- By:
- Publication type:
- journal article
America's New Map: Restoring Our Global Leadership in an Era of Climate Change and Demographic Collapse.
- Published in:
- Homeland Security Affairs, 2023, v. 19, p. 1
- By:
- Publication type:
- Article
Best practices in supplier relationship management and response when supply is disrupted by cyber attack : An incident response framework.
- Published in:
- Journal of Business Continuity & Emergency Planning, 2023, v. 17, n. 1, p. 6, doi. 10.69554/grlb2974
- By:
- Publication type:
- Article
The Three Laws: The Chinese Communist Party Throws Down the Data Regulation Gauntlet.
- Published in:
- Washington & Lee Law Review, 2022, v. 79, n. 3, p. 1169
- By:
- Publication type:
- Article
Cyber Offense and a Changing Strategic Paradigm.
- Published in:
- Washington Quarterly, 2022, v. 45, n. 1, p. 38, doi. 10.1080/0163660X.2022.2054123
- By:
- Publication type:
- Article
The Elephant in the Room of WTO Reform: China.
- Published in:
- CESifo Forum, 2021, v. 22, n. 2, p. 22
- By:
- Publication type:
- Article
Using Accountability to Reduce Access Policy Violations in Information Systems.
- Published in:
- Journal of Management Information Systems, 2013, v. 29, n. 4, p. 263, doi. 10.2753/MIS0742-1222290410
- By:
- Publication type:
- Article
China is the New Tesla.
- Published in:
- International Policy Digest, 2024, p. 1
- By:
- Publication type:
- Article
SOCIAL MEDIA AND THE ART OF INTELLECTUAL PROPERTY THEFT.
- Published in:
- Media Transformations / Mediju Transformacijos, 2016, v. 12, p. 98, doi. 10.7220/2029-8668.12.06
- By:
- Publication type:
- Article
Network intrusion detection system for DDoS attacks in ICS using deep autoencoders.
- Published in:
- Wireless Networks (10220038), 2024, v. 30, n. 6, p. 5059, doi. 10.1007/s11276-022-03214-3
- By:
- Publication type:
- Article
Entrepreneurial Resilience, High Impact Challenges, and Firm Performance.
- Published in:
- Journal of Management Policy & Practice, 2017, v. 18, n. 2, p. 28
- By:
- Publication type:
- Article
DEFENDING AMERICA AGAINST CHINESE CYBER ESPIONAGE THROUGH THE USE OF ACTIVE DEFENSES.
- Published in:
- Cardozo Journal of International & Comparative Law, 2012, v. 20, n. 2, p. 537
- By:
- Publication type:
- Article
CHINA'S GRAND STRATEGY AND AUSTRALIA'S FUTURE IN THE NEW GLOBAL ORDER.
- Published in:
- 2021
- By:
- Publication type:
- Book Review
The New Enlightenment and the Fight to Free Knowledge: by Peter B. Kaufman, New York, Seven Stories Press, 2021, 256 pp., $40 (hardcover); $18.95 (paperback); $7.79 (e-book), ISBN 9781644210604.
- Published in:
- Slavic & East European Information Resources, 2023, v. 24, n. 1, p. 94, doi. 10.1080/15228886.2023.2171716
- By:
- Publication type:
- Article
INSTITUTIONAL FRAMEWORKS THAT GUIDE RESEARCH INTEGRITY AND SECURITY TOWARDS PROTECTION OF IP AND MANAGEMENT OF TECHNOLOGY TRANSFER IN UNIVERSITIES IN KENYA.
- Published in:
- African Journal of Food, Agriculture, Nutrition & Development, 2024, v. 24, n. 4, p. 1, doi. 10.18697/ajfand.129.SC016
- By:
- Publication type:
- Article
Message from the Editor.
- Published in:
- Engineering Design Graphics Journal, 2021, v. 85, p. 5
- By:
- Publication type:
- Article
Watchful Eye.
- Published in:
- Quality Progress, 2022, v. 55, n. 2, p. 8
- Publication type:
- Article
A deep hybrid learning model for detection of cyber attacks in industrial IoT devices.
- Published in:
- International Journal of Advanced Manufacturing Technology, 2022, v. 123, n. 5/6, p. 1973, doi. 10.1007/s00170-022-10329-6
- By:
- Publication type:
- Article
Intellectual property: Safeguard the ideas of junior scientists.
- Published in:
- 2015
- By:
- Publication type:
- Letter to the Editor
IS IT TIME FOR THE IRON SQUARE?
- Published in:
- Defense Acquisition, 2022, v. 51, n. 3, p. 18
- By:
- Publication type:
- Article
BLOOM ENERGY - VERY SATISFYING INVESTOR DAY.
- Published in:
- H2 International, 2022, n. 3, p. 52
- By:
- Publication type:
- Article
EDITORIAL.
- Published in:
- Nigerian Journal of Technology, 2024, v. 43, n. 3, p. 610
- By:
- Publication type:
- Article
NATIONAL CYBERSECURITY EDUCATION: BRIDGING DEFENSE TO OFFENSE.
- Published in:
- Revista Academiei Fortelor Terestre, 2020, v. 25, n. 1, p. 68, doi. 10.2478/raft-2020-0009
- By:
- Publication type:
- Article
Fateful Decisions: Choices That Will Shape China's Future.
- Published in:
- Developing Economies, 2020, v. 58, n. 4, p. 397, doi. 10.1111/deve.12251
- By:
- Publication type:
- Article
He Saved the Euro. Can He Now Save the Atlantic Alliance?
- Published in:
- International Economy, 2021, v. 35, n. 1, p. 5
- By:
- Publication type:
- Article
Global Economic Trumpism.
- Published in:
- 2018
- By:
- Publication type:
- Interview
THE POTENTIAL IMPACT OF THE AFRICAN CONTINENTAL FREE TRADE AREA (AFCFTA) ON MULTINATIONAL COMPANIES IN SOUTH AFRICA.
- Published in:
- USV Annals of Economics & Public Administration, 2024, v. 24, n. 1, p. 28
- By:
- Publication type:
- Article
Collaborations to Prevent "Researching while Asian" from Going Viral.
- Published in:
- Asian American Policy Review, 2020, v. 30, p. 32
- By:
- Publication type:
- Article
Modern theatre in Russia: tradition building and transmission processes: by Stefan Aquilina, published by Methuen/drama.
- Published in:
- 2022
- By:
- Publication type:
- Book Review
Winning the 5G Race with China: A U.S.-Japan Strategy to Trip the Competition, Run Faster, and Put the Fix In.
- Published in:
- Asia Policy, 2021, v. 16, n. 3, p. 75
- By:
- Publication type:
- Article
Opportunity Seldom Knocks Twice: Influencing China's Trajectory via Defend Forward and Persistent Engagement in Cyberspace.
- Published in:
- Asia Policy, 2020, v. 15, n. 4, p. 65, doi. 10.1353/asp.2020.0060
- By:
- Publication type:
- Article
Trusted Threat Intelligence Sharing in Practice and Performance Benchmarking through the Hyperledger Fabric Platform.
- Published in:
- Entropy, 2022, v. 24, n. 10, p. 1379, doi. 10.3390/e24101379
- By:
- Publication type:
- Article
A cyber-physical attack taxonomy for production systems: a quality control perspective.
- Published in:
- Journal of Intelligent Manufacturing, 2019, v. 30, n. 6, p. 2489, doi. 10.1007/s10845-018-1408-9
- By:
- Publication type:
- Article
The Language of Deception: Applying Findings on Opinion Spam to Legal and Forensic Discourses.
- Published in:
- Languages, 2024, v. 9, n. 1, p. 10, doi. 10.3390/languages9010010
- By:
- Publication type:
- Article
CONSUMER DECISION MODEL OF INTELLECTUAL PROPERTY THEFT IN EMERGING MARKETS.
- Published in:
- Organizations & Markets in Emerging Economies, 2012, v. 3, n. 1, p. 58, doi. 10.15388/omee.2012.3.1.14275
- By:
- Publication type:
- Article
Intellectual Property Piracy: The Case of Manga and Anime in the US.
- Published in:
- 2014
- By:
- Publication type:
- Case Study
The war in Eurasia.
- Published in:
- Spokesman, 2021, n. 148, p. 49
- Publication type:
- Article
UK MoD Releases Science and Technology Strategy 2020.
- Published in:
- Strategic Digest, 2020, v. 2, n. 20, p. 1
- Publication type:
- Article
مفهوم الجريمة الالكترونية وأثرها السلبي على مستخدمي مواقع التواصل الاجتماعي الانترنت
- Published in:
- Rihan Journal for Science Publishing, 2024, n. 49, p. 363
- By:
- Publication type:
- Article
The Triangle Model for Cyber Threat Attribution.
- Published in:
- Journal of Cyber Security Technology, 2021, v. 5, n. 3/4, p. 191, doi. 10.1080/23742917.2021.1895532
- By:
- Publication type:
- Article
Did Wallace's Ternate essay and letter on natural selection come as a reply to Darwin's letter of 22 December 1857? A brief review.
- Published in:
- Biological Journal of the Linnean Society, 2016, v. 118, n. 2, p. 421, doi. 10.1111/bij.12740
- By:
- Publication type:
- Article
Random sampling strategies for multivariate statistical process control to detect cyber-physical manufacturing attacks.
- Published in:
- Quality Engineering, 2021, v. 33, n. 2, p. 300, doi. 10.1080/08982112.2020.1838541
- By:
- Publication type:
- Article
Cyber-physical attack vulnerabilities in manufacturing quality control tools.
- Published in:
- Quality Engineering, 2020, v. 32, n. 4, p. 676, doi. 10.1080/08982112.2020.1737115
- By:
- Publication type:
- Article
Defend Trade Secrets Act of 2016 Passed Unanimously by U.S. Senate.
- Published in:
- CoatingsTech, 2016, v. 13, n. 5, p. 34
- By:
- Publication type:
- Article
Intellectual Property & Global Policy.
- Published in:
- Global Policy, 2017, v. 8, n. 2, p. 149, doi. 10.1111/1758-5899.12381
- By:
- Publication type:
- Article
A Short History of Uighur Resistance.
- Published in:
- CounterPunch, 2021, p. 1
- By:
- Publication type:
- Article