Economics at your fingertips  

International Journal of Cyber Warfare and Terrorism (IJCWT)

2011 - 2017

From IGI Global
Bibliographic data for series maintained by Journal Editor ().

Access Statistics for this journal.
Track citations for all items by RSS feed
Is something missing from the series or not right? See the RePEc data check for the archive and series.

Volume 3, issue 4, 2013

The Value of Interaction for Russia, the USA and China Facing the Information Warfare pp. 1-9 Downloads
Vasilyeva Inna
The EU ECENTRE Project: Education as a Defensive Weapon in the War Against Cybercrime pp. 10-21 Downloads
Denis Edgar-Nevill
Preparing for Cyber Threats with Information Security Policies pp. 22-31 Downloads
Ilona Ilvonen and Pasi Virtanen
SCADA Threats in the Modern Airport pp. 32-39 Downloads
John McCarthy and William Mahoney
Monkey See - Monkey Take Photo: The Risk of Mobile Information Leakage pp. 40-51 Downloads
Karen Renaud and Wendy Goucher
What Lawyers Want: Legally Significant Questions that Only IT Specialists can Answer pp. 52-57 Downloads
Yaroslav Radziwill
Security Risks to IT Supply Chains under Economic Stress pp. 58-73 Downloads
C. Warren Axelrod and Sukumar Haldar

Volume 3, issue 3, 2013

The Cyberspace Threats and Cyber Security Objectives in the Cyber Security Strategies pp. 1-18 Downloads
Martti Lehto
Consequences of Diminishing Trust in Cyberspace pp. 19-31 Downloads
Dipankar Dasgupta and Denise M. Ferebee
Information Security Management: A Case Study in a Portuguese Military Organization pp. 32-48 Downloads
José Martins, Henrique dos Santos, António Rosinha and Agostinho Valente
Tools and Technologies for Professional Offensive Cyber Operations pp. 49-71 Downloads
T. J. Grant
Strategic Communication for Supporting Cyber-Security pp. 72-79 Downloads
Tuija Kuusisto and Rauno Kuusisto
Critical Infrastructure Protection: Evolution of Israeli Policy pp. 80-87 Downloads
L. Tabansky

Volume 3, issue 2, 2013

Incident and Disaster Management Training: An Update on Using Virtual World Scenarios for Emergency Management Training pp. 1-21 Downloads
Anne M. Hewitt, Danielle Mirliss and Riad Twal
Ascertaining Trust Indicators in Social Networking Sites pp. 22-37 Downloads
N. Veerasamy and W. A. Labuschagne
An Efficient Protocol for Privacy and Authentication for Resource-Constrained Devices in Wireless Networks pp. 38-57 Downloads
Clifton Mulkey, Dulal Kar and Ajay Katangur
Social Engineering Techniques and Password Security: Two Issues Relevant in the Case of Health Care Workers pp. 58-70 Downloads
B. Dawn Medlin

Volume 3, issue 1, 2013

Intellectual Property Systems in Software pp. 1-14 Downloads
Ricardo Rejas-Muslera, Elena Davara, Alain Abran and Luigi Buglione
On the Study of Certified Originality for Digital Alteration Problem: Technology Developments of the Time Authentication pp. 15-28 Downloads
Masakazu Ohashi and Mayumi Hori
Intellectual Property Protection in Small Knowledge Intensive Enterprises pp. 29-45 Downloads
Riikka Kulmala and Juha Kettunen
Online Interaction with Millenials: Institution vs. Community pp. 46-62 Downloads
Kurt Komaromi, Fahri Unsal and G. Scott Erickson

Volume 2, issue 4, 2012

Application of Information Technology in Disaster and Emergency Management pp. 1-12 Downloads
Jishnu Subedi
An Approach to Governance of CyberSecurity in South Africa pp. 13-27 Downloads
Joey Jansen van Vuuren, Louise Leenen, Jackie Phahlamohlaka and Jannie Zaaiman
US Foreign Policy Challenges of Non-State Actors’ Cyber Terrorism against Critical Infrastructure pp. 28-48 Downloads
Natalia Tereshchenko
Trust Enforcing and Trust Building, Different Technologies and Visions pp. 49-66 Downloads
Michele Tomaiuolo

Volume 2, issue 3, 2012

Internet Study: Cyber Threats and Cybercrime Awareness and Fear pp. 1-11 Downloads
Igor Bernik
A Computer Network Attack Taxonomy and Ontology pp. 12-25 Downloads
R. P. van Heerden, B. Irwin, I. D. Burke and L. Leenen
Establishing Cyberspace Sovereignty pp. 26-38 Downloads
Kris E. Barcomb, Dennis J. Krill, Robert F. Mills and Michael A. Saville
In Internet’s Way: Radical, Terrorist Islamists on the Free Highway pp. 39-58 Downloads
Raphael Cohen-Almagor

Volume 2, issue 2, 2012

From Military Threats to Everyday Fear: Computer Games as the Representation of Military Information Operations pp. 1-10 Downloads
Aki-Mauri Huhtinen
What Does the Concept of Ambidexterity Mean in the Current Military Planning Process and Organization Construction? pp. 11-21 Downloads
Aki-Mauri Huhtinen
The Comprehensive Approach as a Strategic Design to Run the Military-Industrial Complex in Operations pp. 22-30 Downloads
Mirva Salminen and Aki-Mauri Huhtinen

Volume 2, issue 1, 2012

Online Social Networking: A Source of Intelligence for Advanced Persistent Threats pp. 1-13 Downloads
Nurul Nuha Abdul Molok, Atif Ahmad and Shanton Chang
A Vulnerability-Based Model of Cyber Weapons and its Implications for Cyber Conflict pp. 14-26 Downloads
Christian Czosseck and Karlis Podins
Cyber Security Awareness as Critical Driver to National Security pp. 27-38 Downloads
Joey Jansen van Vuuren, Marthie Grobler and Jannie Zaaiman
Securing America Against Cyber War pp. 39-49 Downloads
Jayson McCune and Dwight A. Haworth
A World without Islam pp. 50-52 Downloads
Maximiliano E. Korstanje

Volume 1, issue 4, 2011

The Memetic Engineering of Anonymous, the Cyberterrorist Group pp. 1-9 Downloads
Thomas Woolford and Jonathan Matusitz
Cyber War Retaliation Decision: A Fuzzy Multi Criteria Decision Making Approach pp. 10-31 Downloads
Mhamed Zineddine
Adapting the Current National Defence Doctrine to Cyber Domain pp. 32-52 Downloads
Topi Tuukkanen
Violencia de Estado, guerra, resistencia. Por una nueva política de la Izquierda pp. 53-55 Downloads
Maximiliano E. Korstanje

Volume 1, issue 3, 2011

Fostering SCADA and IT Relationships: An Industry Perspective pp. 1-11 Downloads
Christopher Beggs and Ryan McGowan
Influence Strategy: Consistency and Legitimacy as Key Factors pp. 12-36 Downloads
Bryan Pickett and Mike Lingenfelter
Critical Infrastructure Systems: Security Analysis and Modelling Approach pp. 37-58 Downloads
Graeme Pye
World War III: The Cyber War pp. 59-69 Downloads
Mandeep Singh Bhatia
Toward a U.S. Army Cyber Security Culture pp. 70-80 Downloads
Christopher Paul and Isaac R. Porche

Volume 1, issue 2, 2011

The Open Definition of Cyber: Technology or a Social Construction? pp. 1-9 Downloads
Martti Lehto, Aki-Mauri Huhtinen and Saara Jantunen
Towards the Human Information Security Firewall pp. 10-17 Downloads
Rossouw von Solms and Matthew Warren
Understanding Optimal Investment in Cyber Terrorism: A Decision Theoretic Approach pp. 18-34 Downloads
Tridib Bandyopadhyay
Challenges in Monitoring Cyberarms Compliance pp. 35-48 Downloads
Neil C. Rowe, Simson L. Garfinkel, Robert Beverly and Panayotis Yannakogeorgos

Volume 1, issue 1, 2011

Critical Infrastructure as Complex Emergent Systems pp. 1-12 Downloads
Ted G. Lewis, Thomas J. Mackin and Rudy Darken
"This is not a cyber war, it's a...?": Wikileaks, Anonymous and the Politics of Hegemony pp. 13-23 Downloads
David Barnard-Wills
Estonia after the 2007 Cyber Attacks: Legal, Strategic and Organisational Changes in Cyber Security pp. 24-34 Downloads
Christian Czosseck, Rain Ottis and Anna-Maria Talihärm
Protection of Australia in the Cyber Age pp. 35-40 Downloads
Matthew Warren and Shona Leitch
Misuse Detection for Mobile Devices Using Behaviour Profiling pp. 41-53 Downloads
Fudong Li, Nathan Clarke, Maria Papadaki and Paul Dowland
Page updated 2020-01-27