Journal: IJCWT

Volume 5, Issue 4

1 -- 14Albert Olagbemiro. Cyberspace as a Complex Adaptive System and the Policy and Operational Implications for Cyberwarfare
15 -- 58Phil Hilliard, Frank J. Stech, Kristin E. Heckman, Janice Redington Ballo. Scientometric Analysis of Chinese Cyber-Denial and Deception Research

Volume 5, Issue 3

1 -- 18Toufic Mezher, Sameh El Khatib, Thilanka Maduwanthi Sooriyaarachchi. Cyberattacks on Critical Infrastructure and Potential Sustainable Development Impacts
19 -- 27Rahul Rastogi, Rossouw von Solms. IT Security for SCADA: A Position Paper
28 -- 44Leanne M. Hirshfield, Philip Bobko, Alex J. Barelka, Mark R. Costa, Gregory J. Funke, Vincent F. Mancuso, Victor S. Finomore Jr., Benjamin A. Knott. The Role of Human Operators' Suspicion in the Detection of Cyber Attacks
45 -- 54Maximiliano E. Korstanje. Terrorists Tend to Target Innocent Tourists: A Radical Review

Volume 5, Issue 2

1 -- 20Sohail Tamaddon, Atif Ahmad, Rachelle Bosua. Secure Knowledge Management: Influencing the Development of Human Knowledge Sharing Networks
21 -- 30Aki-Mauri Huhtinen. The Double Edge of the Information Sword
31 -- 52Joo Soon Lim, Sean B. Maynard, Atif Ahmad, Shanton Chang. Information Security Culture: Towards an Instrument for Assessing Security Management Practices
53 -- 67Maximiliano E. Korstanje. Conflictive Touring: The Roots of Terrorism

Volume 5, Issue 1

1 -- 18Victor Jaquire, Basie von Solms. A Strategic Framework for a Secure Cyberspace in Developing Countries with Special Emphasis on the Risk of Cyber Warfare
19 -- 29Oliver K. Burmeister, Jackie Phahlamohlaka, Yeslam Al-Saggaf. Good Governance and Virtue in South Africa's Cyber Security Policy Implementation
30 -- 46Namosha Veerasamy, Marthie Grobler. Logic Tester for the Classification of Cyberterrorism Attacks
47 -- 61Kiru Pillay, Manoj Maharaj. The Restructuring and Re-Orientation of Civil Society in a Web 2.0 World: A Case Study of Greenpeace