default search action
International Journal of Cyber Warfare and Terrorism, Volume 3
Volume 3, Number 1, 2013
- Ricardo J. Rejas-Muslera, Elena Davara, Alain Abran, Luigi Buglione:
Intellectual Property Systems in Software. 1-14 - Masakazu Ohashi, Mayumi Hori:
On the Study of Certified Originality for Digital Alteration Problem: Technology Developments of the Time Authentication. 15-28 - Riikka Kulmala, Juha Kettunen:
Intellectual Property Protection in Small Knowledge Intensive Enterprises. 29-45 - Kurt Komaromi, Fahri Unsal, G. Scott Erickson:
Online Interaction with Millenials: Institution vs. Community. 46-62
Volume 3, Number 2, 2013
- Anne M. Hewitt, Danielle Mirliss, Riad Twal:
Incident and Disaster Management Training: An Update on Using Virtual World Scenarios for Emergency Management Training. 1-21 - Namosha Veerasamy, Aubrey Labuschagne:
Ascertaining Trust Indicators in Social Networking Sites. 22-37 - Clifton J. Mulkey, Dulal C. Kar, Ajay K. Katangur:
An Efficient Protocol for Privacy and Authentication for Resource-Constrained Devices in Wireless Networks. 38-57 - B. Dawn Medlin:
Social Engineering Techniques and Password Security: Two Issues Relevant in the Case of Health Care Workers. 58-70
Volume 3, Number 3, 2013
- Martti Lehto:
The Cyberspace Threats and Cyber Security Objectives in the Cyber Security Strategies. 1-18 - Dipankar Dasgupta, Denise Ferebee:
Consequences of Diminishing Trust in Cyberspace. 19-31 - José Martins, Henrique dos Santos, António Rosinha, Agostinho Valente:
Information Security Management: A Case Study in a Portuguese Military Organization. 32-48 - Tim J. Grant:
Tools and Technologies for Professional Offensive Cyber Operations. 49-71 - Tuija Kuusisto, Rauno Kuusisto:
Strategic Communication for Supporting Cyber-Security. 72-79 - Lior Tabansky:
Critical Infrastructure Protection: Evolution of Israeli Policy. 80-87
Volume 3, Number 4, 2013
- Vasilyeva Inna:
The Value of Interaction for Russia, the USA and China Facing the Information Warfare. 1-9 - Denis Edgar-Nevill:
The EU ECENTRE Project: Education as a Defensive Weapon in the War Against Cybercrime. 10-21 - Ilona Ilvonen, Pasi Virtanen:
Preparing for Cyber Threats with Information Security Policies. 22-31 - John McCarthy, William Mahoney:
SCADA Threats in the Modern Airport. 32-39 - Karen Renaud, Wendy Goucher:
Monkey See - Monkey Take Photo: The Risk of Mobile Information Leakage. 40-51 - Yaroslav Radziwill:
What Lawyers Want: Legally Significant Questions that Only IT Specialists can Answer. 52-57 - C. Warren Axelrod, Sukumar Haldar:
Security Risks to IT Supply Chains under Economic Stress. 58-73
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.