Open Access. Powered by Scholars. Published by Universities.®
- Discipline
Articles 1 - 2 of 2
Full-Text Articles in Entire DC Network
Threats To Information Protection - Industry And Academic Perspectives: An Annotated Bibliography, Michael E. Whitman, Herbert J. Mattord
Threats To Information Protection - Industry And Academic Perspectives: An Annotated Bibliography, Michael E. Whitman, Herbert J. Mattord
Journal of Cybersecurity Education, Research and Practice
Threats to information assets have always been a concern to those responsible for making information useful and defending its value. The concepts of threat, threat agent, threat events and threat sources have evolved in recent years have very precise definitions. A summary of threat classification models used in academic research is provided along with a summary of recent industry threat assessment reports. Finally, the results from a recent study, 2015 SEC/CISE Threats to Information Protection Report Including a Current Snapshot of the State of the Industry, are given.
A Comparative Approach To Economic Espionage: Is Any Nation Effectively Dealing With This Global Threat?, Melanie Reid
A Comparative Approach To Economic Espionage: Is Any Nation Effectively Dealing With This Global Threat?, Melanie Reid
University of Miami Law Review
In 1996, Congress passed the Economic Espionage Act (EEA), 18 U.S.C. Sections 1831 and 1832, to help thwart attempts by foreign entities intent on stealing U.S. proprietary information and trade secrets. Despite the passage of the EEA almost twenty years ago, if recent statistics are to be believed, there is so much trade secret thievery going around that the United States finds itself in the midst of an epidemic of economic espionage. Currently, any and all U.S. technology that is vulnerable and profitable is being targeted. Unfortunately, existing remedies and enforcement have barely blunted the onslaught against the U.S. which …