


default search action
Search dblp for Publications
export results for "toc:db/journals/ijcwt/ijcwt8.bht:"
@article{DBLP:journals/ijcwt/Abu-TaiehAAA18, author = {Evon M. O. Abu{-}Taieh and Auhood Abdullah Alfaries and Shaha T. Al{-}Otaibi and Ghadah Aldehim}, title = {Cyber Security Crime and Punishment: Comparative Study of the Laws of Jordan, Kuwait, Qatar, Oman, and Saudi Arabia}, journal = {Int. J. Cyber Warf. Terror.}, volume = {8}, number = {3}, pages = {46--59}, year = {2018}, url = {https://doi.org/10.4018/IJCWT.2018070104}, doi = {10.4018/IJCWT.2018070104}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijcwt/Abu-TaiehAAA18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijcwt/Al-RawiG18, author = {Ahmed Al{-}Rawi and Jacob Groshek}, title = {Jihadist Propaganda on Social Media: An Examination of {ISIS} Related Content on Twitter}, journal = {Int. J. Cyber Warf. Terror.}, volume = {8}, number = {4}, pages = {1--15}, year = {2018}, url = {https://doi.org/10.4018/IJCWT.2018100101}, doi = {10.4018/IJCWT.2018100101}, timestamp = {Mon, 26 Oct 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijcwt/Al-RawiG18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijcwt/AlguliyevAN18, author = {Rasim M. Alguliyev and Ramiz M. Aliguliyev and Gunay Y. Niftaliyeva}, title = {Filtration of Terrorism-Related Texts in the E-Government Environment}, journal = {Int. J. Cyber Warf. Terror.}, volume = {8}, number = {4}, pages = {35--48}, year = {2018}, url = {https://doi.org/10.4018/IJCWT.2018100103}, doi = {10.4018/IJCWT.2018100103}, timestamp = {Sun, 19 Jan 2025 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijcwt/AlguliyevAN18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijcwt/DasM18, author = {Ramesh Chandra Das and Sovik Mukherjee}, title = {Determinants of Terrorism in South Asia: Insights From a Dynamic Panel Data Analysis}, journal = {Int. J. Cyber Warf. Terror.}, volume = {8}, number = {4}, pages = {16--34}, year = {2018}, url = {https://doi.org/10.4018/IJCWT.2018100102}, doi = {10.4018/IJCWT.2018100102}, timestamp = {Sun, 19 Jan 2025 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijcwt/DasM18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijcwt/Gyamfi18, author = {Gerald Dapaah Gyamfi}, title = {Managing Terrorism in Africa: Assessing Policing Issues}, journal = {Int. J. Cyber Warf. Terror.}, volume = {8}, number = {3}, pages = {15--25}, year = {2018}, url = {https://doi.org/10.4018/IJCWT.2018070102}, doi = {10.4018/IJCWT.2018070102}, timestamp = {Sat, 08 Jan 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijcwt/Gyamfi18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijcwt/Islam18, author = {Mohammad Saidul Islam}, title = {Jus in Bello and the Acts of Terrorism: {A} Study}, journal = {Int. J. Cyber Warf. Terror.}, volume = {8}, number = {3}, pages = {1--14}, year = {2018}, url = {https://doi.org/10.4018/IJCWT.2018070101}, doi = {10.4018/IJCWT.2018070101}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijcwt/Islam18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijcwt/KostyuchenkoYA18, author = {Yuriy V. Kostyuchenko and Maxim Yuschenko and Igor Artemenko}, title = {On Experience of Social Networks Exploration for Comparative Analysis of Narratives of Foreign Members of Armed Groups: {IS} and {L/DPR} in Syria and Ukraine in 2015-2016}, journal = {Int. J. Cyber Warf. Terror.}, volume = {8}, number = {2}, pages = {17--31}, year = {2018}, url = {https://doi.org/10.4018/IJCWT.2018040102}, doi = {10.4018/IJCWT.2018040102}, timestamp = {Thu, 02 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijcwt/KostyuchenkoYA18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijcwt/Mali18, author = {Prashant Mali}, title = {Defining Cyber Weapon in Context of Technology and Law}, journal = {Int. J. Cyber Warf. Terror.}, volume = {8}, number = {1}, pages = {43--55}, year = {2018}, url = {https://doi.org/10.4018/IJCWT.2018010104}, doi = {10.4018/IJCWT.2018010104}, timestamp = {Mon, 26 Oct 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijcwt/Mali18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijcwt/Martins18, author = {Ralph Peter Martins}, title = {Punching Above Their Digital Weight: Why Iran is Developing Cyberwarfare Capabilities Far Beyond Expectations}, journal = {Int. J. Cyber Warf. Terror.}, volume = {8}, number = {2}, pages = {32--46}, year = {2018}, url = {https://doi.org/10.4018/IJCWT.2018040103}, doi = {10.4018/IJCWT.2018040103}, timestamp = {Sun, 19 Jan 2025 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijcwt/Martins18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijcwt/McElreathDMLLSW18, author = {David H. McElreath and Daniel Adrian Doss and Leisa S. McElreath and Ashley Lindsley and Glenna Lusk and Joseph Skinner and Ashley Wellman}, title = {The Communicating and Marketing of Radicalism: {A} Case Study of {ISIS} and Cyber Recruitment}, journal = {Int. J. Cyber Warf. Terror.}, volume = {8}, number = {3}, pages = {26--45}, year = {2018}, url = {https://doi.org/10.4018/IJCWT.2018070103}, doi = {10.4018/IJCWT.2018070103}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijcwt/McElreathDMLLSW18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijcwt/Norri-Sederholm18, author = {Teija Norri{-}Sederholm and Aki{-}Mauri Huhtinen and Heikki Paakkonen}, title = {Ensuring Public Safety Organisations' Information Flow and Situation Picture in Hybrid Environments}, journal = {Int. J. Cyber Warf. Terror.}, volume = {8}, number = {1}, pages = {12--24}, year = {2018}, url = {https://doi.org/10.4018/IJCWT.2018010102}, doi = {10.4018/IJCWT.2018010102}, timestamp = {Thu, 02 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijcwt/Norri-Sederholm18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijcwt/RamosFG18, author = {Pedro Ramos and Pierre Funderburk and Jennifer Gebelein}, title = {Social Media and Online Gaming: {A} Masquerading Funding Source}, journal = {Int. J. Cyber Warf. Terror.}, volume = {8}, number = {1}, pages = {25--42}, year = {2018}, url = {https://doi.org/10.4018/IJCWT.2018010103}, doi = {10.4018/IJCWT.2018010103}, timestamp = {Thu, 02 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijcwt/RamosFG18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijcwt/Tierney18, author = {Michael Tierney}, title = {{\#}TerroristFinancing: An Examination of Terrorism Financing via the Internet}, journal = {Int. J. Cyber Warf. Terror.}, volume = {8}, number = {1}, pages = {1--11}, year = {2018}, url = {https://doi.org/10.4018/IJCWT.2018010101}, doi = {10.4018/IJCWT.2018010101}, timestamp = {Thu, 02 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijcwt/Tierney18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijcwt/VeerasamyL18, author = {Namosha Veerasamy and Aubrey Labuschagne}, title = {Framework for Military Applications of Social Media}, journal = {Int. J. Cyber Warf. Terror.}, volume = {8}, number = {2}, pages = {47--56}, year = {2018}, url = {https://doi.org/10.4018/IJCWT.2018040104}, doi = {10.4018/IJCWT.2018040104}, timestamp = {Thu, 02 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijcwt/VeerasamyL18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijcwt/WesthoffZ18, author = {Dirk Westhoff and Maximilian Zeiser}, title = {Measuring the World: How the Smartphone Industry Impacts Cyber Deterrence Credibility}, journal = {Int. J. Cyber Warf. Terror.}, volume = {8}, number = {2}, pages = {1--16}, year = {2018}, url = {https://doi.org/10.4018/IJCWT.2018040101}, doi = {10.4018/IJCWT.2018040101}, timestamp = {Thu, 02 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijcwt/WesthoffZ18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.