Skip Nav Destination
Close Modal
Update search
Filter
- Title
- Author
- Author Affiliations
- Full Text
- Abstract
- Keyword
- DOI
- ISBN
- EISBN
- ISSN
- EISSN
- Issue
- Volume
- References
Filter
- Title
- Author
- Author Affiliations
- Full Text
- Abstract
- Keyword
- DOI
- ISBN
- EISBN
- ISSN
- EISSN
- Issue
- Volume
- References
Filter
- Title
- Author
- Author Affiliations
- Full Text
- Abstract
- Keyword
- DOI
- ISBN
- EISBN
- ISSN
- EISSN
- Issue
- Volume
- References
Filter
- Title
- Author
- Author Affiliations
- Full Text
- Abstract
- Keyword
- DOI
- ISBN
- EISBN
- ISSN
- EISSN
- Issue
- Volume
- References
Filter
- Title
- Author
- Author Affiliations
- Full Text
- Abstract
- Keyword
- DOI
- ISBN
- EISBN
- ISSN
- EISSN
- Issue
- Volume
- References
Filter
- Title
- Author
- Author Affiliations
- Full Text
- Abstract
- Keyword
- DOI
- ISBN
- EISBN
- ISSN
- EISSN
- Issue
- Volume
- References
NARROW
Format
Journal
Article Type
Date
Availability
1-3 of 3
Keywords: hacking
Close
Follow your search
Access your saved searches in your account
Would you like to receive an alert when new items match your search?
Sort by
Journal Articles
Current History (2018) 117 (795): 29–34.
Published: 01 January 2018
...David S. Wall Big data and big crimes are powered by cloud technologies and the Internet of Things … © 2018 Current History. All rights reserved. 2018 The Regents of the University of California David Wall economy big data cybercrime date theft dark web Internet spam hacking...
Abstract
Big data and big crimes are powered by cloud technologies and the Internet of Things …
Journal Articles
Current History (2016) 115 (777): 29–31.
Published: 01 January 2016
... Susan Landau cybersecurity cybersurveillance cyberattacks hacking North Korea Kim Jong-un Sony US National Security Agency Edward Snowden intelligence spying 29 PERSPECTIVE From Paul Revere s legendary ride in 1775 to warn the American colonists in Massachusetts after he spotted the...
Abstract
Why did the Obama administration treat threats against a Hollywood studio over a movie mocking North Korea as a matter of national security? It was sending a message to deter others.
Journal Articles
Current History (2015) 114 (768): 9–15.
Published: 01 January 2015
... geopolitics cyberspace internet interweb snowden leak wikileaks economy state localization data convergence functionality analysis cia outsourcing facebook twitter activism monitoring surveillance hacking cyberwarfare Google 9 The aims of the Internet economy and those of state...
Abstract
The aims of the Internet economy and those of state security converge around the same functional needs: collecting, monitoring, and analyzing as much data as possible.