Works matching Cyberterrorism
Results: 5000
جرائم الإرهاب السيبراني ودور السياسة الخارجية السعودية في مواجهتها من منظور الأمن الوطني والقانون الدولي.
- Published in:
- Al-Andalus journal for Humanities & Social Sciences, 2023, v. 10, n. 73, p. 181
- By:
- Publication type:
- Article
A Comparative Analysis of the Factors Predicting Fears of Terrorism and Cyberterrorism in a Developing Nation Context.
- Published in:
- Journal of Ethnic & Cultural Studies, 2022, v. 9, n. 4, p. 106, doi. 10.29333/ejecs/1372
- By:
- Publication type:
- Article
Cyberterrorism: Is the U.S. Healthcare System Safe?
- Published in:
- Telemedicine & e-Health, 2013, v. 19, n. 1, p. 61, doi. 10.1089/tmj.2012.0022
- By:
- Publication type:
- Article
CYBERTERRORISM: THE LATEST CRIME AGAINST INTERNATIONAL PUBLIC ORDER.
- Published in:
- LESIJ - Lex ET Scientia International Journal, 2019, v. 26, n. 1, p. 92
- By:
- Publication type:
- Article
Deterring Cyberterrorism in the Global Information Society: A Case for the Collective Responsibility of States.
- Published in:
- Defence Against Terrorism Review, 2014, v. 6, n. 1, p. 31
- By:
- Publication type:
- Article
State Cyberterrorism: A Contradiction in Terms?
- Published in:
- Journal of Terrorism Research, 2015, v. 6, n. 3, p. 62
- By:
- Publication type:
- Article
ANALYSIS OF THE CONCEPT OF CYBERTERRORISM IN THE CONTEXT OF POLITICAL SCIENCE.
- Published in:
- Studia Securitatis, 2024, v. 18, n. 2, p. 139
- By:
- Publication type:
- Article
Fears of cyberterrorism, terrorism, and terrorist attacks: an empirical comparison.
- Published in:
- Behavioral Sciences of Terrorism & Political Aggression, 2024, v. 16, n. 2, p. 149, doi. 10.1080/19434472.2022.2046625
- By:
- Publication type:
- Article
Potential cyberterrorism via a multimedia smart phone based on a web 2.0 application via ubiquitous Wi- Fi access points and the corresponding digital forensics.
- Published in:
- Multimedia Systems, 2011, v. 17, n. 4, p. 341, doi. 10.1007/s00530-010-0216-7
- By:
- Publication type:
- Article
The Virtual Jurisdiction to Combating Cyberterrorism in Indonesia.
- Published in:
- Central European Journal of International & Security Studies, 2018, v. 12, n. 4, p. 61
- By:
- Publication type:
- Article
Cyberterrorism: Four Reasons for Its Absence--So Far.
- Published in:
- Perspectives on Terrorism, 2022, v. 16, n. 5, p. 62, doi. 10.2307/27168617
- By:
- Publication type:
- Article
Constructing Cyberterrorism as a Security Threat: a Study of International News Media Coverage.
- Published in:
- Perspectives on Terrorism, 2015, v. 9, n. 1, p. 60
- By:
- Publication type:
- Article
Locating Cyberterrorism: How Terrorism Researchers Use and View the Cyber Lexicon.
- Published in:
- Perspectives on Terrorism, 2014, v. 8, n. 2, p. 52
- By:
- Publication type:
- Article
Socialno-psihološke implikacije kibernetskega terorizma.
- Published in:
- Varstvoslovje: Journal of Criminal Justice & Security, 2013, v. 15, n. 3, p. 357
- By:
- Publication type:
- Article
Cyberterorismul şi utilizarea teroristă a internetului.
- Published in:
- Annals of the West University of Timisoara: Law Series / Analele Universitatii de Vest din Timisoara: Seria Drept, 2018, n. 2, p. 21
- By:
- Publication type:
- Article
Analyzing the concept of cyberterrorism. An attempt at organizing chaos.
- Published in:
- Annales UMCS, Sectio K (Politologia), 2013, v. 20, n. 2, p. 81, doi. 10.2478/v10226-012-0041-7
- By:
- Publication type:
- Article
ASPECTS RELATING TO THE INVESTIGATION OF CYBERTERRORISM.
- Published in:
- Romanian Journal of Forensic Science, 2017, v. 18, n. 5, p. 2729
- By:
- Publication type:
- Article
Legal Landscape on National Cybersecurity Capacity in Combating Cyberterrorism Using Deep Fake Technology in Indonesia.
- Published in:
- International Journal of Cyber Criminology, 2022, v. 16, n. 1, p. 123, doi. 10.5281/zenodo.4766560
- By:
- Publication type:
- Article
Cyberterrorism: Postmodern State of Chaos.
- Published in:
- Information Security Journal: A Global Perspective, 2008, v. 17, n. 4, p. 179, doi. 10.1080/19393550802397033
- By:
- Publication type:
- Article
CONTEMPORARY ASPECTS OF CYBERTERRORISM MOTIVATED BY RELIGION.
- Published in:
- Eurasian Journal of Religious Studies, 2024, v. 39, n. 3, p. 38, doi. 10.26577//EJRS.2024.v39.c3.r4
- By:
- Publication type:
- Article
Mapping Global Cyberterror Networks: An Empirical Study of Al-Qaeda and ISIS Cyberterrorism Events.
- Published in:
- Journal of Contemporary Criminal Justice, 2021, v. 37, n. 2, p. 333, doi. 10.1177/10439862211001606
- By:
- Publication type:
- Article
Relational geographies of cyberterrorism and cyberwar.
- Published in:
- 2016
- By:
- Publication type:
- Case Study
A Postmodern Theory of Cyberterrorism: Game Theory.
- Published in:
- Information Security Journal: A Global Perspective, 2009, v. 18, n. 6, p. 273, doi. 10.1080/19393550903200474
- By:
- Publication type:
- Article
Role of Intelligence Inputs in Defending Against Cyber Warfare and Cyberterrorism.
- Published in:
- Decision Analysis, 2018, v. 15, n. 3, p. 174, doi. 10.1287/deca.2018.0370
- By:
- Publication type:
- Article
CYBERWAR AND CYBERTERRORISM. FEATURES AND ANSWERS TO THESE THREATS.
- Published in:
- Romanian Military Thinking, 2020, n. 3, p. 100
- By:
- Publication type:
- Article
COMPARATIVE STUDY ON CYBERTERRORISM IN EAST ASIA AND NORTH AFRICA.
- Published in:
- Knowledge Horizons / Orizonturi ale Cunoasterii, 2019, v. 11, n. 1, p. 93
- By:
- Publication type:
- Article
Cyberterrorism and Religious Fundamentalism: New Challenges for Europe in the Age of Universal Internet Access.
- Published in:
- Religions, 2023, v. 14, n. 4, p. 458, doi. 10.3390/rel14040458
- By:
- Publication type:
- Article
Cyber-Apocalypse Now: Securing the Internet Against Cyberterrorism and Using Universal Jurisdiction as a Deterrent.
- Published in:
- Vanderbilt Journal of Transnational Law, 2010, v. 43, n. 1, p. 57
- By:
- Publication type:
- Article
Cyberterrorism and Security of Critical Infrastructures: An Emerging Challenge for India.
- Published in:
- IUP Law Review, 2021, v. 11, n. 4, p. 7
- By:
- Publication type:
- Article
Analysis of modern types of cyberterrorism and methods for countering them.
- Published in:
- IDP: Revista de Internet, Derecho y Politica, 2024, n. 41, p. 1, doi. 10.7238/idp.v0i41.428542
- By:
- Publication type:
- Article
THE DARKENING STORM OF CYBERTERRORISM: INTERNATIONAL POLICY ADAPTATION FOR AUTOMOTIVE CYBERSECURITY REGULATIONS.
- Published in:
- Jurimetrics: The Journal of Law, Science & Technology, 2019, v. 59, n. 3, p. 267
- By:
- Publication type:
- Article
Deterring and Dissuading Cyberterrorism.
- Published in:
- Journal of Strategic Security, 2015, v. 8, n. 4, p. 23, doi. 10.5038/1944-0472.8.4.1460
- By:
- Publication type:
- Article
PSYCHOLOGICAL IMPACT OF CYBERTERRORISM.
- Published in:
- Romanian Military Thinking, 2019, n. 4, p. 192
- By:
- Publication type:
- Article
Cyberterrorism targeting the general public through social media.
- Published in:
- Security & Communication Networks, 2016, v. 9, n. 15, p. 2864, doi. 10.1002/sec.1568
- By:
- Publication type:
- Article
Public Opinion and Cyberterrorism.
- Published in:
- Public Opinion Quarterly, 2023, v. 87, n. 1, p. 92, doi. 10.1093/poq/nfad006
- By:
- Publication type:
- Article
Understanding the European Union's Perception of the Threat of Cyberterrorism: A Discursive Analysis.
- Published in:
- Journal of Common Market Studies, 2022, v. 60, n. 4, p. 1086, doi. 10.1111/jcms.13300
- By:
- Publication type:
- Article
Research Note: More Bucks, Still No Bangs? Why a Cost-Benefit Analysis of Cyberterrorism Still Holds True.
- Published in:
- Studies in Conflict & Terrorism, 2023, v. 46, n. 8, p. 1508, doi. 10.1080/1057610X.2020.1822591
- By:
- Publication type:
- Article
Cyberterrorism Today? Findings From a Follow-on Survey of Researchers.
- Published in:
- Studies in Conflict & Terrorism, 2022, v. 45, n. 8, p. 727, doi. 10.1080/1057610X.2019.1696444
- By:
- Publication type:
- Article
The Cyberterrorism Threat: Findings from a Survey of Researchers.
- Published in:
- Studies in Conflict & Terrorism, 2014, v. 37, n. 1, p. 68, doi. 10.1080/1057610X.2014.853603
- By:
- Publication type:
- Article
Cyberterrorism: The Sum of All Fears?
- Published in:
- Studies in Conflict & Terrorism, 2005, v. 28, n. 2, p. 129, doi. 10.1080/10576100590905110
- By:
- Publication type:
- Article
Bangs for the Buck: A Cost-Benefit Analysis of Cyberterrorism.
- Published in:
- Studies in Conflict & Terrorism, 2004, v. 27, n. 5, p. 387, doi. 10.1080/10576100490483660
- By:
- Publication type:
- Article
Cyberterrorism in the Context of Contemporary International Law.
- Published in:
- San Diego International Law Journal, 2012, v. 14, n. 1, p. 139
- By:
- Publication type:
- Article
State-Sponsored Cyberterrorism.
- Published in:
- Journal of Counterterrorism & Homeland Security International, 2010, v. 16, n. 1, p. 8
- By:
- Publication type:
- Article
Cyberterrorism: Prepare Now Or Pay Later.
- Published in:
- Public Relations Tactics, 2003, v. 10, n. 1, p. 6
- By:
- Publication type:
- Article
Countering cyberterrorism: the confluence of artificial intelligence, cyber forensics and digital policing in US and UK national cybersecurity: by Reza Montasari, United Kingdom, Springer, 2023, xv+164 pp., £139.99 (hardback), ISBN 9783031219191.
- Published in:
- 2024
- By:
- Publication type:
- Book Review
Cyberterrorism: The Logic Bomb versus the Truck Bomb.
- Published in:
- Global Dialogue, 2000, v. 2, n. 4, p. 1
- By:
- Publication type:
- Article
CYBERWAR & CYBERTERRORISM HEADING TOWARDS A CYBER-WATERLOO.
- Published in:
- Annals of University of Oradea, Series: International Relations & European Studies, 2015, n. 7, p. 49
- By:
- Publication type:
- Article
MANIFESTATIONS OF CONTEMPORARY TERRORISM: CYBERTERRORISM.
- Published in:
- Research & Science Today, 2017, v. 1, n. 13, p. 20
- By:
- Publication type:
- Article
Cyberterrorism: Are you at risk?
- Published in:
- Journal of Corporate Accounting & Finance (Wiley), 2004, v. 15, n. 5, p. 3, doi. 10.1002/jcaf.20032
- By:
- Publication type:
- Article
NEW TECHNOLOGIES - RISKS AND VULNERABILITIES FOR THE NATIONAL SECURITY. CYBERTERRORISM.
- Published in:
- Romanian Military Thinking, 2019, n. 2, p. 138
- By:
- Publication type:
- Article