Insider espionage has destabilized governments, jeopardized national security and critical infrastructures, diminished the economic strength of nations, and cost lives. Deterrence and detection - the two methods most used to combat this threat - often prove ineffective. The author, therefore, suggests placing more emphasis on prediction. This book is based on a four-year research project in which the author studied hundreds of cases of insider espionage in the government and private sectors across various countries. The project led to the development of the author's Five-Factor Model of…mehr
Insider espionage has destabilized governments, jeopardized national security and critical infrastructures, diminished the economic strength of nations, and cost lives. Deterrence and detection - the two methods most used to combat this threat - often prove ineffective. The author, therefore, suggests placing more emphasis on prediction. This book is based on a four-year research project in which the author studied hundreds of cases of insider espionage in the government and private sectors across various countries. The project led to the development of the author's Five-Factor Model of Insider Espionage, which he validated through multiple case analyses and a cross-case synthesis. This model aims to provide a framework to predict and thus mitigate the risks associated with insider espionage. The book will familiarize readers with the model and the underlying concepts.
Die Herstellerinformationen sind derzeit nicht verfügbar.
Autorenporträt
Frank C. Danesy has over 30 years of experience in space, defense, and academia. Formerly a Head of HR at ESA, he is now a strategic advisor spearheading Intelsource and an adjunct faculty member at the University of Mannheim. He holds doctorates in business administration and criminal justice and master's degrees in business, intelligence, and space studies.
Inhaltsangabe
List of Figures and Tables - List of Abbreviations - Acknowledgments - Preface - Part 1 Toward a Model of Insider Espionage - Chapter 2: Under the Veil of Secrecy: The World of Espionage - Chapter 3: Laying the Foundation - Chapter 4: Research Behind the Five- Factor Model - Chapter 5: Development of a Model of Insider Espionage - Part 2 An Exploration of the Five Factors of Insider Espionage - Chapter 6: Triggers of Insider Espionage - Chapter 7: Motives of Insider Espionage - Chapter 8: Organizational Vulnerabilities - Chapter 9: Market Opportunities - Chapter 10: Disinhibiting Factors - Part 3 Case Studies- Applying the Five- Factor Model of Insider Espionage - Chapter 11: Conventional Insider Espionage During the Cold War: The Oleg Gordievsky Case - Chapter 12: Insider Espionage During a Period of Geopolitical and Technological Transition: The Aldrich Ames Case - Chapter 13: Insider Espionage as an I.C.T.- Supported Commercial Enterprise: The Brian Regan Case - Chapter 14: Insider Espionage as a Mass Data Collection Operation: The Edward Snowden Case - Chapter 15: Cross- Case Analysis - Part 4 Findings, Recommendations, and Conclusion - Chapter 16: Research Findings - Chapter 17: Recommendations and Conclusion - Appendix A: List of Espionage Cases - Appendix B: Codes and Code Definitions - References - Author Index - Subject Index
List of Figures and Tables - List of Abbreviations - Acknowledgments - Preface - Part 1 Toward a Model of Insider Espionage - Chapter 2: Under the Veil of Secrecy: The World of Espionage - Chapter 3: Laying the Foundation - Chapter 4: Research Behind the Five- Factor Model - Chapter 5: Development of a Model of Insider Espionage - Part 2 An Exploration of the Five Factors of Insider Espionage - Chapter 6: Triggers of Insider Espionage - Chapter 7: Motives of Insider Espionage - Chapter 8: Organizational Vulnerabilities - Chapter 9: Market Opportunities - Chapter 10: Disinhibiting Factors - Part 3 Case Studies- Applying the Five- Factor Model of Insider Espionage - Chapter 11: Conventional Insider Espionage During the Cold War: The Oleg Gordievsky Case - Chapter 12: Insider Espionage During a Period of Geopolitical and Technological Transition: The Aldrich Ames Case - Chapter 13: Insider Espionage as an I.C.T.- Supported Commercial Enterprise: The Brian Regan Case - Chapter 14: Insider Espionage as a Mass Data Collection Operation: The Edward Snowden Case - Chapter 15: Cross- Case Analysis - Part 4 Findings, Recommendations, and Conclusion - Chapter 16: Research Findings - Chapter 17: Recommendations and Conclusion - Appendix A: List of Espionage Cases - Appendix B: Codes and Code Definitions - References - Author Index - Subject Index
Es gelten unsere Allgemeinen Geschäftsbedingungen: www.buecher.de/agb
Impressum
www.buecher.de ist ein Internetauftritt der buecher.de internetstores GmbH
Geschäftsführung: Monica Sawhney | Roland Kölbl | Günter Hilger
Sitz der Gesellschaft: Batheyer Straße 115 - 117, 58099 Hagen
Postanschrift: Bürgermeister-Wegele-Str. 12, 86167 Augsburg
Amtsgericht Hagen HRB 13257
Steuernummer: 321/5800/1497
USt-IdNr: DE450055826