2021
DOI: 10.1080/08850607.2020.1836603
|View full text |Cite
|
Sign up to set email alerts
|

Counterintelligence Vetting Techniques Compared across Multiple Domains

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
2

Citation Types

0
8
0

Year Published

2024
2024
2024
2024

Publication Types

Select...
1

Relationship

0
1

Authors

Journals

citations
Cited by 1 publication
(8 citation statements)
references
References 0 publications
0
8
0
Order By: Relevance
“…In conclusion, in the age of information, where data flows freely and technology connects the world like never before, the importance of CI has grown exponentially (Barnea, 2019;Clark and Mitchell, 2019;Mobley and Wege, 2021a). The sheer volume and accessibility of information have opened new avenues for espionage, cyberattacks and threats to national security (Guitton and Fréchette, 2023).…”
Section: Counterintelligence Evolution and Importance In The Age Of I...mentioning
confidence: 98%
See 4 more Smart Citations
“…In conclusion, in the age of information, where data flows freely and technology connects the world like never before, the importance of CI has grown exponentially (Barnea, 2019;Clark and Mitchell, 2019;Mobley and Wege, 2021a). The sheer volume and accessibility of information have opened new avenues for espionage, cyberattacks and threats to national security (Guitton and Fréchette, 2023).…”
Section: Counterintelligence Evolution and Importance In The Age Of I...mentioning
confidence: 98%
“…It traces its roots to ancient civilizations where secrecy and deception were essential elements of statecraft. As societies evolved, so did the methods and structures of CI, adapting to the changing nature of threats and technology (Spielmann, 2012;Mobley and Wege, 2021a).…”
Section: Counterintelligence Evolution and Importance In The Age Of I...mentioning
confidence: 99%
See 3 more Smart Citations