Journal: IJCWT

Volume 8, Issue 4

1 -- 15Ahmed Al-Rawi, Jacob Groshek. Jihadist Propaganda on Social Media: An Examination of ISIS Related Content on Twitter
16 -- 34Ramesh Chandra Das, Sovik Mukherjee. Determinants of Terrorism in South Asia: Insights From a Dynamic Panel Data Analysis
35 -- 48Rasim M. Alguliyev, Ramiz M. Aliguliyev, Gunay Y. Niftaliyeva. Filtration of Terrorism-Related Texts in the E-Government Environment

Volume 8, Issue 3

1 -- 14Mohammad Saidul Islam. Jus in Bello and the Acts of Terrorism: A Study
15 -- 25Gerald Dapaah Gyamfi. Managing Terrorism in Africa: Assessing Policing Issues
26 -- 45David H. McElreath, Daniel Adrian Doss, Leisa S. McElreath, Ashley Lindsley, Glenna Lusk, Joseph Skinner, Ashley Wellman. The Communicating and Marketing of Radicalism: A Case Study of ISIS and Cyber Recruitment
46 -- 59Evon Abu-Taieh, Auhood Abdullah Alfaries, Shaha Al-Otaibi, Ghadah Aldehim. Cyber Security Crime and Punishment: Comparative Study of the Laws of Jordan, Kuwait, Qatar, Oman, and Saudi Arabia

Volume 8, Issue 2

1 -- 16Dirk Westhoff, Maximilian Zeiser. Measuring the World: How the Smartphone Industry Impacts Cyber Deterrence Credibility
17 -- 31Yuriy V. Kostyuchenko, Maxim Yuschenko, Igor Artemenko. On Experience of Social Networks Exploration for Comparative Analysis of Narratives of Foreign Members of Armed Groups: IS and L/DPR in Syria and Ukraine in 2015-2016
32 -- 46Ralph Peter Martins. Punching Above Their Digital Weight: Why Iran is Developing Cyberwarfare Capabilities Far Beyond Expectations
47 -- 56Namosha Veerasamy, Aubrey Labuschagne. Framework for Military Applications of Social Media

Volume 8, Issue 1

1 -- 11Michael Tierney. #TerroristFinancing: An Examination of Terrorism Financing via the Internet
12 -- 24Teija Norri-Sederholm, Aki-Mauri Huhtinen, Heikki Paakkonen. Ensuring Public Safety Organisations' Information Flow and Situation Picture in Hybrid Environments
25 -- 42Pedro Ramos, Pierre Funderburk, Jennifer Gebelein. Social Media and Online Gaming: A Masquerading Funding Source
43 -- 55Prashant Mali. Defining Cyber Weapon in Context of Technology and Law