default search action
International Journal of Cyber Warfare and Terrorism, Volume 2
Volume 2, Number 1, 2012
- Nurul Nuha Abdul Molok, Atif Ahmad, Shanton Chang:
Online Social Networking: A Source of Intelligence for Advanced Persistent Threats. 1-13 - Christian Czosseck, Karlis Podins:
A Vulnerability-Based Model of Cyber Weapons and its Implications for Cyber Conflict. 14-26 - Joey Jansen van Vuuren, Marthie Grobler, Jannie Zaaiman:
Cyber Security Awareness as Critical Driver to National Security. 27-38 - Jayson McCune, Dwight A. Haworth:
Securing America Against Cyber War. 39-49 - Maximiliano E. Korstanje:
A World without Islam. 50-52
Volume 2, Number 2, 2012
- Aki-Mauri Huhtinen:
From Military Threats to Everyday Fear: Computer Games as the Representation of Military Information Operations. 1-10 - Aki-Mauri Huhtinen:
What Does the Concept of Ambidexterity Mean in the Current Military Planning Process and Organization Construction? 11-21 - Mirva Salminen, Aki-Mauri Huhtinen:
The Comprehensive Approach as a Strategic Design to Run the Military-Industrial Complex in Operations. 22-30
Volume 2, Number 3, 2012
- Igor Bernik:
Internet Study: Cyber Threats and Cybercrime Awareness and Fear. 1-11 - Renier van Heerden, Barry Irwin, Ivan D. Burke, Louise Leenen:
A Computer Network Attack Taxonomy and Ontology. 12-25 - Kris E. Barcomb, Dennis J. Krill, Robert F. Mills, Michael A. Saville:
Establishing Cyberspace Sovereignty. 26-38 - Raphael Cohen-Almagor:
In Internet's Way: Radical, Terrorist Islamists on the Free Highway. 39-58
Volume 2, Number 4, 2012
- Jishnu Subedi:
Application of Information Technology in Disaster and Emergency Management. 1-12 - Joey Jansen van Vuuren, Louise Leenen, Jackie Phahlamohlaka, Jannie Zaaiman:
An Approach to Governance of CyberSecurity in South Africa. 13-27 - Natalia Tereshchenko:
US Foreign Policy Challenges of Non-State Actors' Cyber Terrorism against Critical Infrastructure. 28-48 - Michele Tomaiuolo:
Trust Enforcing and Trust Building, Different Technologies and Visions. 49-66
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.