default search action
International Journal of Cyber Warfare and Terrorism, Volume 4
Volume 4, Number 1, 2014
- David L. Altheide:
The Triumph of Fear: Connecting the Dots about Whistleblowers and Surveillance. 1-7 - Maximiliano E. Korstanje:
Why Risk-Research is More Prominent in English Speaking Countries in the Digital Society. 8-18 - Maximiliano E. Korstanje:
Towards an Index of Fear: The Role of Capital in Risk's Construction. 19-26 - Geoffrey R. Skoll:
Stealing Consciousness: Using Cybernetics for Controlling Populations. 27-35 - Primavera Fisogni:
Lone Wolves: Updating the Concept of Enemy in the Social Media Age. 36-44
Volume 4, Number 2, 2014
- Tiago Cruz, Jorge Proença, Paulo Simões, Matthieu Aubigny, Moussa Ouedraogo, Antonio Graziano, Leandros A. Maglaras:
A Distributed IDS for Industrial Control Systems. 1-22 - Aki-Mauri Huhtinen, Arto Hirvelä, Tommi Kangasmaa:
The Opportunities of National Cyber Strategy and Social Media in the Rhizome Networks. 23-34 - Margarita Jaitner:
Countering Threats: A Comprehensive Model for Utilization of Social Media for Security and Law Enforcement Authorities. 35-45 - Riku Nykänen, Tommi Kärkkäinen:
Aligning Two Specifications for Controlling Information Security. 46-62
Volume 4, Number 3, 2014
- Jim Q. Chen:
A Framework for Cybersecurity Strategy Formation. 1-10 - John S. Hurley, H. Mark McGibbon, Roxanne Everetts:
Cyber Readiness: Are We There Yet? 11-26 - Marina Krotofil:
Cyber Can Kill and Destroy Too: Blurring Borders Between Conventional and Cyber Warfare. 27-42 - Qifan Wang:
Applicability of Jus in Bello in Cyber Space: Dilemmas and Challenges. 43-62 - Mohammed H. Almeshekah, Eugene H. Spafford:
Using Deceptive Information in Computer Security Defenses. 63-80
Volume 4, Number 4, 2014
- Jeppe Teglskov Jacobsen:
Clausewitz and the Utility of Cyberattacks in War. 1-16 - Jason Cooley:
The Covert Strengthening of Islamic Extremists under Ronald Reagan and George W. Bush. 17-28 - Shefali Virkar:
The Changing Face of Electronic Aggression: The Phenomenon of Online Trolling within the Context of e-Participation in the United Kingdom. 29-46 - Riikka Kulmala, Juha Kettunen:
Intellectual Property Protection in Small Knowledge Intensive Enterprises. 47-63 - Michele Tomaiuolo:
A Critical Comparison of Trusted Computing and Trust Management Technologies. 64-81
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.