researchr
explore
Tags
Journals
Conferences
Authors
Profiles
Groups
calendar
New Conferences
Events
Deadlines
search
search
You are not signed in
Sign in
Sign up
External Links
Journal: IJCWT
Home
Index
Info
Volume
Volume
4
, Issue
4
1
--
16
Jeppe Teglskov Jacobsen
.
Clausewitz and the Utility of Cyberattacks in War
17
--
28
Jason Cooley
.
The Covert Strengthening of Islamic Extremists under Ronald Reagan and George W. Bush
29
--
46
Shefali Virkar
.
The Changing Face of Electronic Aggression: The Phenomenon of Online Trolling within the Context of e-Participation in the United Kingdom
47
--
63
Riikka Kulmala
,
Juha Kettunen
.
Intellectual Property Protection in Small Knowledge Intensive Enterprises
64
--
81
Michele Tomaiuolo
.
A Critical Comparison of Trusted Computing and Trust Management Technologies
Volume
4
, Issue
3
1
--
10
Jim Q. Chen
.
A Framework for Cybersecurity Strategy Formation
11
--
26
John S. Hurley
,
H. Mark McGibbon
,
Roxanne Everetts
.
Cyber Readiness: Are We There Yet?
27
--
42
Marina Krotofil
.
Cyber Can Kill and Destroy Too: Blurring Borders Between Conventional and Cyber Warfare
43
--
62
Qifan Wang
.
Applicability of Jus in Bello in Cyber Space: Dilemmas and Challenges
63
--
80
Mohammed H. Almeshekah
,
Eugene H. Spafford
.
Using Deceptive Information in Computer Security Defenses
Volume
4
, Issue
2
1
--
22
Tiago Cruz
,
Jorge Proença
,
Paulo Simões
,
Matthieu Aubigny
,
Moussa Ouedraogo
,
Antonio Graziano
,
Leandros A. Maglaras
.
A Distributed IDS for Industrial Control Systems
23
--
34
Aki-Mauri Huhtinen
,
Arto Hirvelä
,
Tommi Kangasmaa
.
The Opportunities of National Cyber Strategy and Social Media in the Rhizome Networks
35
--
45
Margarita Jaitner
.
Countering Threats: A Comprehensive Model for Utilization of Social Media for Security and Law Enforcement Authorities
46
--
62
Riku Nykänen
,
Tommi Kärkkäinen
.
Aligning Two Specifications for Controlling Information Security
Volume
4
, Issue
1
1
--
7
David L. Altheide
.
The Triumph of Fear: Connecting the Dots about Whistleblowers and Surveillance
8
--
18
Maximiliano E. Korstanje
.
Why Risk-Research is More Prominent in English Speaking Countries in the Digital Society
19
--
26
Maximiliano E. Korstanje
.
Towards an Index of Fear: The Role of Capital in Risk's Construction
27
--
35
Geoffrey R. Skoll
.
Stealing Consciousness: Using Cybernetics for Controlling Populations
36
--
44
Primavera Fisogni
.
Lone Wolves: Updating the Concept of Enemy in the Social Media Age