


default search action
International Journal of Cyber Warfare and Terrorism, Volume 3
Volume 3, Number 1, 2013
- Ricardo J. Rejas-Muslera, Elena Davara, Alain Abran

, Luigi Buglione:
Intellectual Property Systems in Software. 1-14 - Masakazu Ohashi, Mayumi Hori:

On the Study of Certified Originality for Digital Alteration Problem: Technology Developments of the Time Authentication. 15-28 - Riikka Kulmala, Juha Kettunen:

Intellectual Property Protection in Small Knowledge Intensive Enterprises. 29-45 - Kurt Komaromi, Fahri Unsal, G. Scott Erickson:

Online Interaction with Millenials: Institution vs. Community. 46-62
Volume 3, Number 2, 2013
- Anne M. Hewitt, Danielle Mirliss, Riad Twal:

Incident and Disaster Management Training: An Update on Using Virtual World Scenarios for Emergency Management Training. 1-21 - Namosha Veerasamy, Aubrey Labuschagne:

Ascertaining Trust Indicators in Social Networking Sites. 22-37 - Clifton J. Mulkey, Dulal C. Kar, Ajay K. Katangur

:
An Efficient Protocol for Privacy and Authentication for Resource-Constrained Devices in Wireless Networks. 38-57 - B. Dawn Medlin:

Social Engineering Techniques and Password Security: Two Issues Relevant in the Case of Health Care Workers. 58-70
Volume 3, Number 3, 2013
- Martti Lehto:

The Cyberspace Threats and Cyber Security Objectives in the Cyber Security Strategies. 1-18 - Dipankar Dasgupta, Denise Ferebee:

Consequences of Diminishing Trust in Cyberspace. 19-31 - José Martins, Henrique dos Santos, António Rosinha

, Agostinho Valente:
Information Security Management: A Case Study in a Portuguese Military Organization. 32-48 - Tim J. Grant:

Tools and Technologies for Professional Offensive Cyber Operations. 49-71 - Tuija Kuusisto, Rauno Kuusisto:

Strategic Communication for Supporting Cyber-Security. 72-79 - Lior Tabansky:

Critical Infrastructure Protection: Evolution of Israeli Policy. 80-87
Volume 3, Number 4, 2013
- Vasilyeva Inna:

The Value of Interaction for Russia, the USA and China Facing the Information Warfare. 1-9 - Denis Edgar-Nevill:

The EU ECENTRE Project: Education as a Defensive Weapon in the War Against Cybercrime. 10-21 - Ilona Ilvonen

, Pasi Virtanen:
Preparing for Cyber Threats with Information Security Policies. 22-31 - John McCarthy, William Mahoney:

SCADA Threats in the Modern Airport. 32-39 - Karen Renaud, Wendy Goucher:

Monkey See - Monkey Take Photo: The Risk of Mobile Information Leakage. 40-51 - Yaroslav Radziwill:

What Lawyers Want: Legally Significant Questions that Only IT Specialists can Answer. 52-57 - C. Warren Axelrod, Sukumar Haldar:

Security Risks to IT Supply Chains under Economic Stress. 58-73

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














