Economics at your fingertips  

International Journal of Cyber Warfare and Terrorism (IJCWT)

2011 - 2017

From IGI Global
Bibliographic data for series maintained by Journal Editor ().

Access Statistics for this journal.
Track citations for all items by RSS feed
Is something missing from the series or not right? See the RePEc data check for the archive and series.

Volume 7, issue 1, 2017

Toward Approaches to Big Data Analysis for Terroristic Behavior Identification: Child Soldiers in Illegal Armed Groups During the Conflict in the Donbas Region (East Ukraine) pp. 1-12 Downloads
Yuriy V. Kostyuchenko and Maxim Yuschenko
The Effects of Money Laundering (ML) on Growth Application to the Gulf Countries pp. 13-24 Downloads
Fakhri Issaoui, Toumi Hassen and Touili Wassim
Russian Active Measures and September 11, 2001: Nostradamus Themed Disinformation? pp. 25-41 Downloads
Michael Bennett Hotchkiss
Eriksonian Analysis of Terrorism in West Africa pp. 42-59 Downloads
Chris Mensah-Ankrah

Volume 6, issue 4, 2016

Opposing Viewpoints on Youth Social Media Banning in the U.S. for the Combatance of Extremist Recruiting: Constitutionality and Societal Implications pp. 1-12 Downloads
Lindsay A. West, Richard V. Martin, Courtney Perkins, Jennifer M. Quatel and Gavin Macgregor-Skinner
Understanding Online Radicalisation Using Data Science pp. 13-27 Downloads
Yeslam Al-Saggaf
Biometric Technology Solutions to Countering Today's Terrorism pp. 28-40 Downloads
Israel Fianyi and Tanveer Zia
Economics of Cyber Security and the Way Forward pp. 41-57 Downloads
Taiseera Al Balushi, Saqib Ali and Osama Rehman

Volume 6, issue 3, 2016

Cyber-Security for ICS/SCADA: A South African Perspective pp. 1-16 Downloads
Barend Pretorius and Brett van Niekerk
Adaptation of the JDL Model for Multi-Sensor National Cyber Security Data Fusion pp. 17-30 Downloads
Ignatius Swart, Barry Irwin and Marthie M. Grobler
Deception Detection in Cyber Conflicts: A Use Case for the Cybersecurity Strategy Formation Framework pp. 31-42 Downloads
Jim Q. Chen
The Next Generation of Scientific-Based Risk Metrics: Measuring Cyber Maturity pp. 43-52 Downloads
Lanier Watkins and John S. Hurley
Semantic Technologies and Big Data Analytics for Cyber Defence pp. 53-64 Downloads
Louise Leenen and Thomas Meyer
Using an Ontology for Network Attack Planning pp. 65-78 Downloads
Renier van Heerden, Peter Chan, Louise Leenen and Jacques Theron
SCADA Systems Cyber Security for Critical Infrastructures: Case Studies in Multiple Sectors pp. 79-95 Downloads
Suhaila Ismail, Elena Sitnikova and Jill Slay

Volume 6, issue 2, 2016

Situation Understanding for Operational Art in Cyber Operations pp. 1-14 Downloads
Tuija Kuusisto, Rauno Kuusisto and Wolfgang Roehrig
Cyber Security Education and Research in the Finland's Universities and Universities of Applied Sciences pp. 15-31 Downloads
Martti Lehto
Reconceptualising Cyber Security: Safeguarding Human Rights in the Era of Cyber Surveillance pp. 32-40 Downloads
Andrew N. Liaropoulos
SPCTA: An Analytical Framework for Analyzing Cyber Threats by Non-State Actors pp. 41-60 Downloads
Harry Brown

Volume 6, issue 1, 2016

Cyber Terrorism Taxonomies: Definition, Targets, Patterns, Risk Factors, and Mitigation Strategies pp. 1-12 Downloads
Ali Al Mazari, Ahmed H. Anjariny, Shakeel A. Habib and Emmanuel Nyakwende
Cyber Espionage and Illegitimate Information Retrieval pp. 13-23 Downloads
Roland Heickerö
Arts and Branches of Science Significantly Contributing to Cyber and Cyber Security: The West European and the Russian Views pp. 24-40 Downloads
Margarita Levin Jaitner and à ine MacDermott
A White Hat Study of a Nation's Publicly Accessible Critical Digital Infrastructure and a Way Forward pp. 41-52 Downloads
Timo Kiravuo, Seppo Tiilikainen, Mikko Särelä and Jukka Manner

Volume 5, issue 4, 2015

Cyberspace as a Complex Adaptive System and the Policy and Operational Implications for Cyberwarfare pp. 1-14 Downloads
Albert Olagbemiro
Scientometric Analysis of Chinese Cyber-Denial and Deception Research pp. 15-58 Downloads
Phil Hilliard, Frank J. Stech, Kristin E. Heckman and Janice Redington Ballo
International Perspectives of Cyber Warfare pp. 59-68 Downloads
Matthew D. Gonzalez

Volume 5, issue 3, 2015

Cyberattacks on Critical Infrastructure and Potential Sustainable Development Impacts pp. 1-18 Downloads
Toufic Mezher, Sameh El Khatib and Thilanka Maduwanthi Sooriyaarachchi
IT Security for SCADA: A Position Paper pp. 19-27 Downloads
Rahul Rastogi and Rossouw von Solms
The Role of Human Operators' Suspicion in the Detection of Cyber Attacks pp. 28-44 Downloads
Leanne Hirshfield, Philip Bobko, Alex J. Barelka, Mark R. Costa, Gregory J. Funke, Vincent F. Mancuso, Victor Finomore and Benjamin A. Knott
Terrorists Tend to Target Innocent Tourists: A Radical Review pp. 45-54 Downloads
Maximiliano E. Korstanje

Volume 5, issue 2, 2015

Secure Knowledge Management: Influencing the Development of Human Knowledge Sharing Networks pp. 1-20 Downloads
Sohail Tamaddon, Atif Ahmad and Rachelle Bosua
The Double Edge of the Information Sword pp. 21-30 Downloads
Aki-Mauri Huhtinen
Information Security Culture: Towards an Instrument for Assessing Security Management Practices pp. 31-52 Downloads
Joo S. Lim, Sean B. Maynard, Atif Ahmad and Shanton Chang
Conflictive Touring: The Roots of Terrorism pp. 53-67 Downloads
Maximiliano E. Korstanje

Volume 5, issue 1, 2015

A Strategic Framework for a Secure Cyberspace in Developing Countries with Special Emphasis on the Risk of Cyber Warfare pp. 1-18 Downloads
Victor Jaquire and Basie von Solms
Good Governance and Virtue in South Africa's Cyber Security Policy Implementation pp. 19-29 Downloads
Oliver Burmeister, Jackie Phahlamohlaka and Yeslam Al-Saggaf
Logic Tester for the Classification of Cyberterrorism Attacks pp. 30-46 Downloads
N. Veerasamy and M.M. Grobler
The Restructuring and Re-Orientation of Civil Society in a Web 2.0 World: A Case Study of Greenpeace pp. 47-61 Downloads
Kiru Pillay and Manoj Maharaj

Volume 4, issue 4, 2014

Clausewitz and the Utility of Cyberattacks in War pp. 1-16 Downloads
Jeppe Teglskov Jacobsen
The Covert Strengthening of Islamic Extremists under Ronald Reagan and George W. Bush pp. 17-28 Downloads
Jason Cooley
The Changing Face of Electronic Aggression: The Phenomenon of Online Trolling within the Context of e-Participation in the United Kingdom pp. 29-46 Downloads
Shefali Virkar
Intellectual Property Protection in Small Knowledge Intensive Enterprises pp. 47-63 Downloads
Riikka Kulmala and Juha Kettunen
A Critical Comparison of Trusted Computing and Trust Management Technologies pp. 64-81 Downloads
Michele Tomaiuolo

Volume 4, issue 3, 2014

A Framework for Cybersecurity Strategy Formation pp. 1-10 Downloads
Jim Q. Chen
Cyber Readiness: Are We There Yet? pp. 11-26 Downloads
John S. Hurley, H. Mark McGibbon and Roxanne Everetts
Cyber Can Kill and Destroy Too: Blurring Borders Between Conventional and Cyber Warfare pp. 27-42 Downloads
Marina Krotofil
Applicability of Jus in Bello in Cyber Space: Dilemmas and Challenges pp. 43-62 Downloads
Qifan Wang
Using Deceptive Information in Computer Security Defenses pp. 63-80 Downloads
Mohammed H. Almeshekah and Eugene H. Spafford

Volume 4, issue 2, 2014

A Distributed IDS for Industrial Control Systems pp. 1-22 Downloads
Tiago Cruz, Jorge Proença, Paulo Simões, Matthieu Aubigny, Moussa Ouedraogo, Antonio Graziano and Leandros Maglaras
The Opportunities of National Cyber Strategy and Social Media in the Rhizome Networks pp. 23-34 Downloads
Aki-Mauri Huhtinen, Arto Hirvelä and Tommi Kangasmaa
Countering Threats: A Comprehensive Model for Utilization of Social Media for Security and Law Enforcement Authorities pp. 35-45 Downloads
Margarita Jaitner
Aligning Two Specifications for Controlling Information Security pp. 46-62 Downloads
Riku Nykänen and Tommi Kärkkäinen

Volume 4, issue 1, 2014

The Triumph of Fear: Connecting the Dots about Whistleblowers and Surveillance pp. 1-7 Downloads
David L. Altheide
Why Risk-Research is More Prominent in English Speaking Countries in the Digital Society pp. 8-18 Downloads
Maximiliano E. Korstanje
Towards an Index of Fear: The Role of Capital in Risk´s Construction pp. 19-26 Downloads
Maximiliano E. Korstanje
Stealing Consciousness: Using Cybernetics for Controlling Populations pp. 27-35 Downloads
Geoffrey R. Skoll
Lone Wolves: Updating the Concept of Enemy in the Social Media Age pp. 36-44 Downloads
Primavera Fisogni
Page updated 2019-11-24