Journal: IJCWT

Volume 4, Issue 4

1 -- 16Jeppe Teglskov Jacobsen. Clausewitz and the Utility of Cyberattacks in War
17 -- 28Jason Cooley. The Covert Strengthening of Islamic Extremists under Ronald Reagan and George W. Bush
29 -- 46Shefali Virkar. The Changing Face of Electronic Aggression: The Phenomenon of Online Trolling within the Context of e-Participation in the United Kingdom
47 -- 63Riikka Kulmala, Juha Kettunen. Intellectual Property Protection in Small Knowledge Intensive Enterprises
64 -- 81Michele Tomaiuolo. A Critical Comparison of Trusted Computing and Trust Management Technologies

Volume 4, Issue 3

1 -- 10Jim Q. Chen. A Framework for Cybersecurity Strategy Formation
11 -- 26John S. Hurley, H. Mark McGibbon, Roxanne Everetts. Cyber Readiness: Are We There Yet?
27 -- 42Marina Krotofil. Cyber Can Kill and Destroy Too: Blurring Borders Between Conventional and Cyber Warfare
43 -- 62Qifan Wang. Applicability of Jus in Bello in Cyber Space: Dilemmas and Challenges
63 -- 80Mohammed H. Almeshekah, Eugene H. Spafford. Using Deceptive Information in Computer Security Defenses

Volume 4, Issue 2

1 -- 22Tiago Cruz, Jorge Proença, Paulo Simões, Matthieu Aubigny, Moussa Ouedraogo, Antonio Graziano, Leandros A. Maglaras. A Distributed IDS for Industrial Control Systems
23 -- 34Aki-Mauri Huhtinen, Arto Hirvelä, Tommi Kangasmaa. The Opportunities of National Cyber Strategy and Social Media in the Rhizome Networks
35 -- 45Margarita Jaitner. Countering Threats: A Comprehensive Model for Utilization of Social Media for Security and Law Enforcement Authorities
46 -- 62Riku Nykänen, Tommi Kärkkäinen. Aligning Two Specifications for Controlling Information Security

Volume 4, Issue 1

1 -- 7David L. Altheide. The Triumph of Fear: Connecting the Dots about Whistleblowers and Surveillance
8 -- 18Maximiliano E. Korstanje. Why Risk-Research is More Prominent in English Speaking Countries in the Digital Society
19 -- 26Maximiliano E. Korstanje. Towards an Index of Fear: The Role of Capital in Risk's Construction
27 -- 35Geoffrey R. Skoll. Stealing Consciousness: Using Cybernetics for Controlling Populations
36 -- 44Primavera Fisogni. Lone Wolves: Updating the Concept of Enemy in the Social Media Age