


default search action
International Journal of Cyber Warfare and Terrorism, Volume 5
Volume 5, Number 1, 2015
- Victor Jaquire, Basie von Solms
:
A Strategic Framework for a Secure Cyberspace in Developing Countries with Special Emphasis on the Risk of Cyber Warfare. 1-18 - Oliver K. Burmeister
, Jackie Phahlamohlaka, Yeslam Al-Saggaf
:
Good Governance and Virtue in South Africa's Cyber Security Policy Implementation. 19-29 - Namosha Veerasamy, Marthie Grobler:
Logic Tester for the Classification of Cyberterrorism Attacks. 30-46 - Kiru Pillay, Manoj S. Maharaj:
The Restructuring and Re-Orientation of Civil Society in a Web 2.0 World: A Case Study of Greenpeace. 47-61
Volume 5, Number 2, 2015
- Sohail Tamaddon, Atif Ahmad, Rachelle Bosua
:
Secure Knowledge Management: Influencing the Development of Human Knowledge Sharing Networks. 1-20 - Aki-Mauri Huhtinen:
The Double Edge of the Information Sword. 21-30 - Joo Soon Lim, Sean B. Maynard
, Atif Ahmad, Shanton Chang:
Information Security Culture: Towards an Instrument for Assessing Security Management Practices. 31-52 - Maximiliano E. Korstanje
:
Conflictive Touring: The Roots of Terrorism. 53-67
Volume 5, Number 3, 2015
- Toufic Mezher, Sameh El Khatib, Thilanka Maduwanthi Sooriyaarachchi:
Cyberattacks on Critical Infrastructure and Potential Sustainable Development Impacts. 1-18 - Rahul Rastogi, Rossouw von Solms:
IT Security for SCADA: A Position Paper. 19-27 - Leanne M. Hirshfield, Philip Bobko, Alexander J. Barelka, Mark R. Costa, Gregory J. Funke, Vincent F. Mancuso, Victor S. Finomore Jr., Benjamin A. Knott
:
The Role of Human Operators' Suspicion in the Detection of Cyber Attacks. 28-44 - Maximiliano E. Korstanje
:
Terrorists Tend to Target Innocent Tourists: A Radical Review. 45-54
Volume 5, Number 4, 2015
- Albert Olagbemiro:
Cyberspace as a Complex Adaptive System and the Policy and Operational Implications for Cyberwarfare. 1-14 - Phil Hilliard, Frank J. Stech, Kristin E. Heckman, Janice Redington Ballo:
Scientometric Analysis of Chinese Cyber-Denial and Deception Research. 15-58

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.