2005
DOI: 10.1109/mitp.2005.100
|View full text |Cite
|
Sign up to set email alerts
|

The role of policy in balancing outsourcing and homeland security

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1

Citation Types

0
1
0

Year Published

2009
2009
2013
2013

Publication Types

Select...
2
1

Relationship

0
3

Authors

Journals

citations
Cited by 3 publications
(1 citation statement)
references
References 0 publications
0
1
0
Order By: Relevance
“…For example, it is reasonable to assume that hostile or competitive nation-states will source accessible code for their benefit. This could range from economic espionage to more aggressive manipulation of code, possibly escalating to the level of a "use of force" or "armed attack" (Michael, Roberts, Voas, & Wingfield, 2005).…”
Section: Private Sector Partnersmentioning
confidence: 99%
“…For example, it is reasonable to assume that hostile or competitive nation-states will source accessible code for their benefit. This could range from economic espionage to more aggressive manipulation of code, possibly escalating to the level of a "use of force" or "armed attack" (Michael, Roberts, Voas, & Wingfield, 2005).…”
Section: Private Sector Partnersmentioning
confidence: 99%