Journal Contents: International Journal of Cyber Warfare and Terrorism (IJCWT)

View the International Journal of Cyber Warfare and Terrorism (IJCWT) home page for complete details.
Volume 14 (2024)
Issue 1
Article 58
Socio-Economic Determinants of Terrorism in Tunisia (pages 1-20)
Nesrine Dardouri (University of Sousse, Tunisia), Abdelkader Aguir (ESPI2R Research Unit, France), Mounir Smida (University of Sousse, Tunisia)
Volume 13 (2023)
Issue 1
Article 8
Modeling and Simulating Student Protests Through Agent-Based Framework (pages 1-20)
Tshepo Solomon Raphiri (Tshwane University of Technology, South Africa), Joey J. Jansen van Vuuren (Tshwane University of Technology, South Africa), Albertus A. K. Buitendag (Tshwane University of Technology, South Africa)
Article 44
Meta-Analysis and the Integration of Terrorism Event Databases (pages 1-20)
Timothy Lee Jones (University of Michigan, USA)
Volume 12 (2022)
Issue 1
Article 1
The Impact of the COVID-19 Pandemic on the Radical Behavior and Armed Conflict Escalation Risks: Case of Donbas (East Ukraine) Warfare (pages 1-21)
Yuriy Kostyuchenko (Centre for Aerospace Research of the Earth, National Academy of Sciences of Ukraine, Ukraine;), Viktor Pushkar (Social Transformation Group, Ukraine), Olga Malysheva (Social Transformation Group, Ukraine), Maxim Yuschenko (Scientific Centre for Aerospace Research of the Earth, National Academy of Sciences of Ukraine, Ukraine)
Article 19
The Law Applicable to P2P Networks on National and International Bases for Violating Intellectual Property Rights (pages 1-10)
Ziad Kh. Al-Enizi (Al Ain University, UAE), Muawya Naser (Princess Sumaya University for Technology, Jordan)
Article 20
Assessing the Defence Cooperation Agreements Between the USA and African Countries: The Case of Ghana (pages 1-14)
Paul Coonley Boateng (Africa Centre for Security and Intelligence Studies (ACSIS), Accra, Ghana), Gerald Dapaah Gyamfi (University of Professional Studies, Accra, Ghana)
Article 21
An Ontology Towards Predicting Terrorism Events (pages 1-13)
Zubeida Dawood (Council for Scientific and Industrial Research, South Africa), Carien Van 't Wout (Capgemini, The Netherlands)
Article 22
Malevolent Information Crawling Mechanism for Forming Structured Illegal Organisations in Hidden Networks (pages 1-14)
Romil Rawat (University of Extremadura, Spain), Sonali Gupta (J.C. Bose University of Science and Technology, India), S. Sivaranjani (Sri Krishna College of Engineering and Technology,, India), Om Kumar C.U. (Vellore Institute of Technology, India), Megha Kuliha (Shri Govindram Seksaria Institute of Technology and Science, India), K. Sakthidasan Sankaran (Hindustan Institute of Technology and Science, India)
Article 42
Convolutional Neural Network-Based Automatic Diagnostic System for AL-DDoS Attacks Detection (pages 1-15)
Fargana J. Abdullayeva (Institute of Information Technology, ANAS, Azerbaijan)
Article 42
Evaluating the Strategic Consequences of Cyber Targeting Strategies on Road Transport Networks: A Case Study of Washington DC (pages 1-14)
Skanda Vivek (University of Maryland, College Park, USA), Charles Harry (University of Maryland, College Park, USA)
Article 43
Multi-Contextual Analysis of Internet Security Perception and Behavior: Perspectives of Anglophone and Francophone Internet Users (pages 1-20)
Alfred Paa Gyaisey (University of Ghana Business School, Ghana), Acheampong Owusu (University of Ghana Business School, Ghana)
Article 45
A Lone Wolf vs. an Affiliated Terrorist: Knowledge Inference on Who Poses More Danger to the Tourist (pages 1-9)
Donald Douglas Atsa'am (University of the Free State, South Africa), Ruth Wario (University of the Free State, South Africa)
Article 46
Boko Haram Insurgency and Violence Against Women and Girls in Nigeria (pages 1-13)
Olalonpe Oluwakemi Ajise (Kwara State Polytechnic, Nigeria), Babatunde Joshua Omotosho (Federal University, Oye-Ekiti, Nigeria)
Article 51
Cyber Kill Chain Analysis of Five Major US Data Breaches: Lessons Learnt and Prevention Plan (pages 1-15)
Glorin Sebastian (Georgia Institute of Technology, USA)
Article 55
Efficient Client-Side Cross-Platform Compatible Solution for Phishing Prevention (pages 1-24)
Ben Stewart S. (Anna University, India), Dhanush N. (Anna University, India), Santhosh G. (Anna University, India), Angelin Gladston (Anna University, India)
Article 56
On the Analysis of Horror Stories in the Militants' Narratives as Markers of Violent Behavior and Conflict Identity: Case of “L/DPR” During the Warfare in Donbass, East Ukraine, 2014-2021 (pages 1-19)
Yuriy V. Kostyuchenko (Centre for Aerospace Research of the Earth, National Academy of Sciences of Ukraine, Ukraine), Viktor Pushkar (Social Transformation Group, Ukraine)
Article 57
Recent Trends in Child Sexual Abuse Material (CSAM) Distribution in Indian Cyberspace (pages 1-15)
Sanjay Kumar Gautam (Amity Institute of Forensic Sciences, Amity University, Noida, India & DySP, CBI Academy, Ghaziabad, India), Himanshu Khajuria (Amity Institute of Forensic Sciences, Amity University, Noida, India), Reeta Rani Gupta (Central Forensic Science Laboratory (CBI), New Delhi, India), Biswa Prakash Nayak (Amity Institute of Forensic Sciences, Amity University, Noida, India)
Article 58
Techno-Radicalism: An Account of Radicalism in the Technology Era (pages 1-14)
Ehsan Arzroomchilar (South Bohemia University, Czech Republic)
Article 59
Differences and Commonalities Between Terrorism and COVID-19: Globalization in Ruins (pages 1-14)
Maximiliano Emanuel Korstanje (University of Palermo, Argentina)
Article 60
Understanding the Community's Perceptions Towards Online Radicalisation: An Exploratory Analysis (pages 1-15)
Loo Seng Neo (Nanyang Technological University, Singapore)
Article 67
Fake Identities in Social Cyberspace: From Escapism to Terrorism (pages 1-17)
Lev Topor (ISGAP & Woolf Institute, University of Cambridge, UK & CCLP, University of Haifa, Israel), Moran Pollack (Center for International Communication (CIC), Bar-Ilan University, Israel)
Article 90
Anti-Social Factors Influence the Decision Making of Tourists: A Study of Kashmir (pages 1-14)
Parwaiz Ahmad Najar (Lovely Professional University, India), Hafizullah Dar (Lovely Professional University, India), Priya Singh (Jamia Millia Islamia, India), Ashaq Hussain Najar (Central University of Kashmir, India)
Issue 2
Article 59
IoT and Edge Computing as Enabling Technologies of Human Factors Monitoring in CBRN Environment (pages 1-20)
Pietro Rossetti (Tera Srl, Italy), Fabio Garzia (University of Rome La Sapienza, Italy), Nicola Silverio Genco (S.T.A.S.A. Studies Center, Italy), Antonio Sacchetti (Tera Srl, Italy)
Article 60
Integrated Information Model of an Enterprise and Cybersecurity Management System: From Data to Activity (pages 1-21)
Sergiy Dotsenko (Ukrainian State University of Railway Transport, Ukraine), Oleg Illiashenko (National Aerospace University “KhAI”, Ukraine), Vyacheslav Kharchenko (National Aerospace University “KhAI”, Ukraine), Olga Morozova (National Aerospace University “KhAI”, Ukraine)
Article 61
Agent-Based Simulation of Heterogeneous Crowd Flows in Critical Infrastructures During Emergencies (pages 1-18)
Umberto Battista (STAM, Italy), Pietro De Vito (STAM, Italy), Davide Ottonello (STAM, Italy), Deborah Hugon (STAM, Italy)
Issue 3
Issue 4
Volume 11 (2021)
Issue 1
Editorial Preface
Brett van Niekerk (University of KwaZulu-Natal, South Africa), Graeme Pye (Deakin University, Australia)
Article 1
Between the Devil and the Deep Blue Sea: Insurgency and Humanitarian Conditions in IDP Camps in Nigeria (pages 1-19)
Segun Joshua (Covenant University, Ota, Nigeria), Samuel Sunday Idowu (Covenant University, Ota, Nigeria), Faith Osasumwen Olanrewaju (Covenant University, Ota, Nigeria)
Article 2
Knowledge Extraction on the Nexus Between Terrorism Criteria and Attacks on Private Citizens and Property (pages 20-30)
Donald Douglas Atsa'am (University of the Free State, South Africa), Ruth Wario (University of the Free State, South Africa)
Article 3
Social Media: A Protagonist for Terrorism (pages 31-44)
Yinka Olomojobi (Babcock University, Nigeria), Odusanya Temitope Omotola (Babcock University, Nigeria)
Article 4
Tracing the Cultural Background of Lone-Wolf Terrorism: Dilemmas, Contradictions, and Opportunities for the Next Decade (pages 45-56)
Maximiliano Emanuel Korstanje (University of Palermo, Buenos Aires, Argentina)
Issue 2
Article 1
Cyber Warfare and the “Humanization” of International Humanitarian Law (pages 1-11)
Steven Kleemann (Berlin School of Economics and Law, Germany & University of Potsdam, Germany)
Article 2
Detecting Markers of Radicalisation in Social Media Posts: Insights From Modified Delphi Technique and Literature Review (pages 12-28)
Loo Seng Neo (Home Team Behavioural Sciences Centre, Singapore & School of Social Sciences, Nanyang Technological University, Singapore)
Article 3
The Iran-Saudi Cyber Conflict (pages 29-42)
Chuck Easttom (Georgetown University, USA & University of Dallas, USA), William Butler (Capitol Technology University, USA)
Article 4
Coronavirus as a Rhizome: The Pandemic of Disinformation (pages 43-55)
Teija Sederholm (National Defence University, Finland), Petri Jääskeläinen (Tampere University, Finland), Aki-Mauri Huhtinen (National Defence University, Finland)
Article 5
Can Terrorism Mold Itself to Outer Space?: An International Legal Perspective (pages 56-75)
Shadi A. Alshdaifat (University of Sharjah, UAE), Sanford R. Silverburg (Catawba College, USA)
Issue 3
Special Issue on “Decision Making in Cybersecurity”
Guest Editorial Preface
Brian Nussbaum (College of Emergency Preparedness, Homeland Security, and Cybersecurity (CEHC), University at Albany, USA), Unal Tatar (College of Emergency Preparedness, Homeland Security, and Cybersecurity (CEHC), University at Albany, USA)
Article 1
Complex System Governance as a Foundation for Enhancing the Cybersecurity of Cyber-Physical Systems (pages 1-14)
Polinpapilinho F. Katina (University of South Carolina Upstate, USA), Omer F. Keskin (University at Albany, State University of New York, USA)
Article 2
COVID-19 and Biocybersecurity's Increasing Role on Defending Forward (pages 15-29)
Xavier Palmer (Old Dominion University, USA), Lucas N. Potter (Old Dominion University, USA), Saltuk Karahan (Old Dominion University, USA)
Article 3
Commissioning Development to Externals: Addressing Infosec Risks Upfront (pages 30-40)
Yasir Gokce (Bucerius Law School, Germany)
Article 4
Enhancing Cyberweapon Effectiveness Methodology With SE Modeling Techniques: Both for Offense and Defense (pages 41-57)
C. Ariel Pinto (Old Dominion University, USA), Matthew Zurasky (Old Dominion University, USA), Fatine Elakramine (Mississippi State University, USA), Safae El Amrani (Mississippi State University, USA), Raed M. Jaradat (Mississippi State University, USA), Chad Kerr (Mississippi State University, USA), Vidanelage L. Dayarathna (Mississippi State University, USA)
Article 5
A Monte-Carlo Analysis of Monetary Impact of Mega Data Breaches (pages 58-81)
Mustafa Canan (Naval Postgraduate School, USA), Omer Ilker Poyraz (Old Dominion University, USA), Anthony Akil (Naval Postgraduate School, USA)
Issue 4
Article 1
International Law and Cyberoperations: French View (pages 1-20)
Martina Smuclerova (Institut d´études politiques de Paris (Sciences PO), France & Ambis University, Prague, Czech Republic)
Article 2
Improving Discriminating Accuracy Rate of DDoS Attacks and Flash Events (pages 21-42)
Sahareesh Agha (Bahria University, Pakistan), Osama Rehman (Bahria University, Pakistan), Ibrahim M. H. Rahman (The Open Polytechnic of New Zealand, New Zealand)
Article 3
Mitigating Cyber-Attacks in Cloud Environments: Hardware-Supported Multi-Point Conceptual Framework (pages 43-57)
Jitendra Singh (Dyal Singh Evening College, University of Delhi, India)
Article 4
Global Terrorism as a Virus: Pathogenesis of Evildoing (pages 58-73)
Primavera Fisogni (La Provincia di Como Daily Newspaper, Italy)
Article 5
Islamists vs. Far Right Extremists: Insights Derived From Data Mining (pages 74-92)
Yeslam Al-Saggaf (Charles Sturt University, Australia), Patrick F. Walsh (Charles Sturt University, Australia)
Non-Western Responses to Terrorism
Book Review
Maximiliano Emanuel Korstanje (University of Palermo, Argentina)
Volume 10 (2020)
Issue 1
Article 1
Terrorism in the Website: Society 4.0 and Fundamentalism in Scrutiny (pages 1-14)
Maximiliano Emanuel Korstanje (Department of Economics, University of Palermo, Buenos Aires, Argentina & CERS, University of Leeds, Leeds, UK)
Article 2
Terrorism Effects on Businesses Post 9/11 (pages 15-33)
Mariah Talia Solis (University of Tampa, USA), Jessica Pearson (University of Tampa, USA), Deirdre P Dixon (University of Tampa, USA), Abigail Blanco (University of Tampa, USA), Raymond Papp (University of Tampa, USA)
Article 3
A Framework for the Weapons of Influence (pages 34-49)
Miika Sartonen (Finnish National Defence University, Helsinki, Finland), Aki-Mauri Huhtinen (Finnish National Defence University, Helsinki, Finland), Petteri Simola (Finnish Defence Research Agency, Human Performance Division, Tuusula, Finland), Kari T. Takamaa (Finnish National Defence University, Helsinki, Finland), Veli-Pekka Kivimäki (Finnish Defence Research Agency, Riihimäki, Finland)
Terrorism and The State: Intra-State Dynamics and the Response to Non-State Political Violence
Book Review
Maximiliano Emanuel Korstanje (Department of Economics, University of Palermo, Buenos Aires, Argentina & CERS, University of Leeds, Leeds, UK)
Issue 2
Editorial Preface
Brett van Niekerk (University of Kwazulu-Natal, Duban, South Africa), Graeme Pye (Deakin University, Australia)
Article 1
Insider Threat Detection Using Supervised Machine Learning Algorithms on an Extremely Imbalanced Dataset (pages 1-26)
Naghmeh Moradpoor Sheykhkanloo (Edinburgh Napier University, Edinburgh, UK), Adam Hall (Edinburgh Napier University, Edinburgh, UK)
Article 2
On the Behavior-Based Risk Communication Models in Crisis Management and Social Risks Minimization (pages 27-45)
Yuriy V. Kostyuchenko (Scientific Centre for Aerospace Research of the Earth, National Academy of Sciences of Ukraine, Kyiv, Ukraine), Viktor Pushkar (Social Transformation Group, Kyiv, Ukraine), Olga Malysheva (Social Transformation Group, Kyiv, Ukraine), Maxim Yuschenko (Scientific Centre for Aerospace Research of the Earth, National Academy of Sciences of Ukraine, Kyiv, Ukraine)
Article 3
Predicting and Explaining Cyber Ethics with Ethical Theories (pages 46-63)
Winfred Yaokumah (University of Ghana, Accra, Ghana)
Article 4
The Security Aspects of Automotive Over-the-Air Updates (pages 64-81)
James Howden (De Montfort University, Leicester, UK), Leandros Maglaras (De Montfort University, Leicester, UK), Mohamed Amine Ferrag (Guelma University, Guelma, Algeria)
Article 5
Deep Learning in Cybersecurity: Challenges and Approaches (pages 82-105)
Yadigar N. Imamverdiyev (Institute of Information Technology, Azerbaijan National Academy of Sciences, Baku, Azerbaijan), Fargana J. Abdullayeva (Institute of Information Technology of Azerbaijan National Academy of Sciences, Baku, Azerbaijan)
Issue 3
Special Issue of CWAR 2018
Guest Editorial Preface
Graeme Pye (Deakin University, Victoria, Australia), Brett van Niekerk (University of Kwazulu-Natal, Durban, South Africa)
Article 1
Deceiving Autonomous Drones (pages 1-14)
William Hutchinson (Edith Cowan University, Joondalup, Australia)
Article 2
Political Cyber Operations: A South Pacific Case Study (pages 15-27)
Matthew Warren (Deakin University Centre of Cyber Security Research and Innovation, Victoria, Australia)
Article 3
Cyber Warfare: An Enquiry Into the Applicability of National Law to Cyberspace (pages 28-46)
Helaine Leggat (ICTLC Australia Pty Ltd, Melbourne, Australia)
Article 4
Risks of Critical Infrastructure Adoption of Cloud Computing by Government (pages 47-58)
Mansoor Al-Gharibi (Deakin University Centre for Cyber Security Research and Innovation, Victoria, Australia), Matthew Warren (Deakin University Centre for Cyber Security Research and Innovation, Victoria, Australia), William Yeoh (Deakin University Centre for Cyber Security Research and Innovation, Victoria, Australia)
Article 5
A Study of Cyber Security Issues in Sri Lanka (pages 59-72)
Ruwan Nagahawatta (Deakin University, Victoria, Australia), Matthew Warren (Centre for Cyber Security Research, RMIT University, Melbourne, Australia), William Yeoh (Department of Information Systems and Business Analytics, Faculty of Business and Law, Deakin University, Victoria, Australia)
Issue 4
Article 1
Article 2
Cross-Regional Analysis of Terrorism Reporting and Dynamics of Ethnic Relations in Nigeria (pages 20-35)
Doris Ngozi Morah (Madonna University, Okija, Nigeria), Omojola Oladokun (Covenant University, Nigeria)
Article 3
Article 4
Proposed Framework of Smart Transportation in Pakistan: Issues, Challenges, Vulnerabilities,and Solutions (pages 48-63)
Jawad Hussain Awan (Faculty of Engineering and Technology, Allama I.I Kazi Campus, University of Sindh, Jamshoro, Sindh, Pakistan), Shahzad Memon (Faculty of Engineering and Technology, Allama I.I Kazi Campus, University of Sindh, Jamshoro, Sindh, Pakistan), Azhar Ali Shah (Faculty of Engineering and Technology, Allama I.I Kazi Campus, University of Sindh, Jamshoro, Sindh, Pakistan), Kamran Taj Pathan (Faculty of Engineering and Technology, Allama I.I Kazi Campus, University of Sindh, Jamshoro, Sindh, Pakistan)
Volume 9 (2019)
Issue 1
Editorial Preface
Brett van Niekerk (University of Kwazulu-Natal, Durban, South Africa), Graeme Pye (Deakin University, Deakin, Australia)
Article 1
The Improved LSTM and CNN Models for DDoS Attacks Prediction in Social Media (pages 1-18)
Rasim M. Alguliyev (Institute of Information Technology, Azerbaijan National Academy of Sciences, Baku, Azerbaijan), Ramiz M. Aliguliyev (Institute of Information Technology, Azerbaijan National Academy of Sciences, Baku, Azerbaijan), Fargana J Abdullayeva (Institute of Information Technology, Azerbaijan National Academy of Sciences, Baku, Azerbaijan)
Article 2
Cyberpeacekeeping: New Ways to Prevent and Manage Cyberattacks (pages 19-30)
A. Walter Dorn (Canadian Forces College, Toronto, Canada), Stewart Webb (DefenceReport, Salt Spring Island, Canada)
Article 3
Media Images of Islamophobia on Cable News Network (CNN) and Implications for International Relations (pages 31-47)
Jeffrey Kurebwa (Bindura University of Science Education, Bindura, Zimbabwe), Prosper Muchakabarwa (Bindura University of Science Education, Bindura, Zimbabwe)
Article 4
Slow Education and Cognitive Agility: Improving Military Cyber Cadet Cognitive Performance for Better Governance of Cyberpower (pages 48-66)
Benjamin James Knox (Norwegian Defence University College, Cyber Academy, Lillehammer, Norway & Department of Information Security and Communication Technology, NTNU, Gjøvik, Norway), Ricardo G Lugo (Dept. of Psychology, Inland University of Applied Science, Lillehammer, Norway), Kirsi Helkala (Norwegian Defence University College, Cyber Academy, Lillehammer, Norway), Stefan Sütterlin (Faculty of Health and Welfare Sciences, Østfold University College, Halden, Norway)
Memory and the Wars on Terror: Australian and British Perspectives
Book Review
Maximiliano Emanuel Korstanje (Department of Economics, University of Palermo, Buenos Aires, Argentina & CERS, University of Leeds, Leeds, UK)
Issue 2
Editorial Preface
Brett van Niekerk (University of Kwazulu-Natal, Durban, South Africa), Graeme Pye (Deakin University, Deakin, Australia)
Article 1
Dark and Deep Webs-Liberty or Abuse (pages 1-14)
Lev Topor (Bar Ilan University, Ramat Gan, Israel)
Article 2
Social Media Networking and Tactical Intelligence Collection in the Middle East (pages 15-28)
Karen Howells (Near East University, Nicosia, Cyprus)
Article 3
Role of Cyber Law and Mitigation Strategies in Perspective of Pakistan to Cope Cyber Threats (pages 29-38)
Jawad Hussain Awan (IICT, University of Sindh, Jamshoro, Pakistan), Shahzad Memon (IICT, University of Sindh, Jamshoro, Pakistan), Fateh Muhammad Burfat (University of Sindh, Jamshoro, Pakistan)
Article 4
Provably Secure Private Set Intersection With Constant Communication Complexity (pages 39-64)
Sumit Kumar Debnath (National Institute of Technology, Jamshedpur, India)
Issue 3
Editorial Preface
Brett van Niekerk (University of Kwazulu-Natal, Duban, South Africa), Graeme Pye (Deakin University, Australia)
Article 1
Information Influence in Hybrid Environment: Reflexive Control as an Analytical Tool for Understanding Warfare in Social Media (pages 1-20)
Aki-Mauri Huhtinen (Department of Leadership and Military Pedagogy, Finnish National Defence University, Helsinki, Finland), Noora Kotilainen (University of Helsinki, Helsinki, Finland), Saara Särmä (Finnish National Defence University, Helsinki, Finland), Mikko Streng (Finnish National Defence University, Helsinki, Finland)
Article 3
The Impact of Cyber-Physical Warfare on Global Human Security (pages 36-50)
Bryson R. Payne (University of North Georgia, Dahlonega, USA), Edward L. Mienie (University of North Georgia, Dahlonega, USA)
Issue 4
Special Issue on the 16th European Conference on Cyber Warfare and Security
Editorial Preface
Brett van Niekerk (University of Kwazulu-Natal, Duban, South Africa), Graeme Pye (Deakin University, Australia)
Article 1
The Modelling and Simulation of Integrated Battlefield Cyber-Kinetic Effects (pages 1-26)
David Ormrod (Terra Schwartz Pty Ltd, Canberra, Australia), Benjamin Turnbull (University of New South Wales, Kensington, Australia)
Article 2
The Winds of Change in World Politics and the Impact on Cyber Stability (pages 27-43)
Virginia Greiman (Boston University, USA)
Article 3
Cyber Counterintelligence: An Exploratory Proposition on a Conceptual Framework (pages 44-62)
Petrus Duvenage (University of Johannesburg, Johannesburg, South Africa), Thenjiwe Sithole (University of Johannesburg, Johannesburg, South Africa), Basie von Solms (University of Johannesburg, Johannesburg, South Africa)
Surveillance and Terror in Post-9/11: British and American Television
Book Review
Maximiliano Emanuel Korstanje (Department of Economics, University of Palermo, Buenos Aires, Argentina & CERS, University of Leeds, Leeds, UK)
Volume 8 (2018)
Issue 1
Editorial Preface
Brett van Niekerk (University of KwaZulu-Natal, Durban, South Africa), Graeme Pye (Deakin University, Australia, Australia)
Article 1
#TerroristFinancing: An Examination of Terrorism Financing via the Internet (pages 1-11)
Michael Tierney (University of Waterloo, Innisfil, Canada)
Article 2
Ensuring Public Safety Organisations' Information Flow and Situation Picture in Hybrid Environments (pages 12-24)
Teija Norri-Sederholm (National Defence University, Helsinki, Finland), Aki-Mauri Huhtinen (Department of Leadership and Military Pedagogy, Finnish National Defence University, Helsinki, Finland), Heikki Paakkonen (Arcada University of Applied Sciences, Helsinki, Finland)
Article 3
Social Media and Online Gaming: A Masquerading Funding Source (pages 25-42)
Pedro Ramos (Florida International University, Miami, USA), Pierre Funderburk (Florida International University, Miami, USA), Jennifer Gebelein (Florida International University, Miami, USA)
Article 4
Defining Cyber Weapon in Context of Technology and Law (pages 43-55)
Prashant Mali (Cyber Law Consulting (Advocates & Attorneys), Mumbai, India)
Issue 2
Editorial Preface
Brett van Niekerk (University of KwaZulu-Natal, Durban, South Africa), Graeme Pye (Deakin University, Geelong, Australia)
Article 1
Measuring the World: How the Smartphone Industry Impacts Cyber Deterrence Credibility (pages 1-16)
Dirk Westhoff (University of Applied Sciences Offenburg, Offenburg, Germany), Maximilian Zeiser (University of Applied Sciences Offenburg, Offenburg, Germany)
Article 2
On Experience of Social Networks Exploration for Comparative Analysis of Narratives of Foreign Members of Armed Groups: IS and L/DPR in Syria and Ukraine in 2015-2016 (pages 17-31)
Yuriy Kostyuchenko (Scientific Centre for Aerospace Research of the Earth, National Academy of Sciences of Ukraine, Kiev, Ukraine), Maxim Yuschenko (Scientific Centre for Aerospace Research of the Earth, National Academy of Sciences of Ukraine, Kiev, Ukraine), Igor Artemenko (Scientific Centre for Aerospace Research of the Earth, National Academy of Sciences of Ukraine, Kiev, Ukraine)
Article 3
Article 4
Framework for Military Applications of Social Media (pages 47-56)
Namosha Veerasamy (Council for Scientific and Industrial Research (CSIR), Pretoria, South Africa), William Aubrey Labuschagne (Council for Scientific and Industrial Research (CSIR), Pretoria, South Africa)
Issue 3
EDITORIAL PREFACE
Brett van Niekerk (University of KwaZulu-Natal, Durban, South Africa), Graeme Pye (Deakin University, Geelong, Australia)
Article 1
Jus in Bello and the Acts of Terrorism: A Study (pages 1-14)
Mohammad Saidul Islam (Department of Law, International Islamic University Chittagong, Chittagong, Bangladesh)
Article 2
Managing Terrorism in Africa: Assessing Policing Issues (pages 15-25)
Gerald Dapaah Gyamfi (University of Professional Studies, Accra, Ghana)
Article 3
The Communicating and Marketing of Radicalism: A Case Study of ISIS and Cyber Recruitment (pages 26-45)
David H. McElreath (University of Mississippi, Oxford, USA), Daniel Adrian Doss (University of West Alabama, Livingston, USA), Leisa McElreath (Mississippi Crime Stoppers Board, Jackson, USA), Ashley Lindsley (Southern Illinois University, Carbondale, USA), Glenna Lusk (University of Mississippi, Oxford, USA), Joseph Skinner (University of Mississippi, Oxford, USA), Ashley Wellman (Texas Christian University, Fort Worth, USA)
Article 4
Cyber Security Crime and Punishment: Comparative Study of the Laws of Jordan, Kuwait, Qatar, Oman, and Saudi Arabia (pages 46-59)
Evon Abu-Taieh (The University of Jordan-Aqaba, Aqaba, Jordan), Auhood Alfaries (King Saud University, Riyadh, Saudi Arabia), Shaha Al-Otaibi (Princess Nourah Bint Abdulrahman University, Riyadh, Saudi Arabia), Ghadah Aldehim (Princess Nourah Bint Abdulrahman University, Riyadh, Saudi Arabia)
Issue 4
Editorial Preface
Brett van Niekerk (University of KwaZulu-Natal, Durban, South Africa), Graeme Pye (Deakin University, Geelong, Australia)
Article 1
Jihadist Propaganda on Social Media: An Examination of ISIS Related Content on Twitter (pages 1-15)
Ahmed Al-Rawi (Simon Fraser University, Canada), Jacob Groshek (Boston University, USA)
Article 2
Determinants of Terrorism in South Asia: Insights From a Dynamic Panel Data Analysis (pages 16-34)
Ramesh Chandra Das (Katwa College, Burdwan, India), Sovik Mukherjee (St. Xavier's University, Kolkata, India)
Article 3
Filtration of Terrorism-Related Texts in the E-Government Environment (pages 35-48)
Rasim M. Alguliyev (Institute of Information Technology, Azerbaijan National Academy of Sciences, Baku, Azerbaijan), Ramiz M. Aliguliyev (Institute of Information Technology, Azerbaijan National Academy of Sciences, Baku, Azerbaijan), Gunay Y. Niftaliyeva (Institute of Information Technology, Azerbaijan National Academy of Sciences, Baku, Azerbaijan)
Globalization and the Economic Consequences of Terrorism
Book Review
Maximiliano E. Korstanje (Department of Economics, University of Palermo, Palermo, Argentina)
Volume 7 (2017)
Issue 1
Article 1
Toward Approaches to Big Data Analysis for Terroristic Behavior Identification: Child Soldiers in Illegal Armed Groups During the Conflict in the Donbas Region (East Ukraine) (pages 1-12)
Yuriy V. Kostyuchenko (National Academy of Sciences of Ukraine, Scientific Centre for Aerospace Research of the Earth, Kiev, Ukraine), Maxim Yuschenko (National Academy of Sciences of Ukraine, Scientific Centre for Aerospace Research of the Earth, Kiev, Ukraine)
Article 2
The Effects of Money Laundering (ML) on Growth Application to the Gulf Countries (pages 13-24)
Fakhri Issaoui (University of Tunis, Faculty of Economics and Management, Tunis, Tunisia), Toumi Hassen (University of Sfax, Economics and Management, Sfax, Tunisia), Touili Wassim (University of Tunis, Economics, Tunis, Tunisia)
Article 3
Russian Active Measures and September 11, 2001: Nostradamus Themed Disinformation? (pages 25-41)
Michael Bennett Hotchkiss (Independent Researcher, USA)
Article 4
Eriksonian Analysis of Terrorism in West Africa (pages 42-59)
Chris Mensah-Ankrah (West Africa Centre for Counter Extremism, Accra, Ghana)
Issue 2
Article 1
SCIPS: Using Experiential Learning to Raise Cyber Situational Awareness in Industrial Control System (pages 1-15)
Allan Cook (De Montfort University, Leicester, United Kingdom), Richard G Smith (De Montfort University, Leicester, United Kingdom), Leandros Maglaras (De Montfort University, Leicester, United Kingdom), Helge Janicke (De Montfort University, Leicester, United Kingdom)
Article 2
A Learning-based Neural Network Model for the Detection and Classification of SQL Injection Attacks (pages 16-41)
Naghmeh Moradpoor Sheykhkanloo (Edinburgh Napier University, Edinburgh, Scotland, United Kingdom)
Article 3
A Comparative Evaluation of Mining Techniques to Detect Malicious Node in Wireless Sensor Networks (pages 42-53)
Mandeep Singh (Lovely Professional University, Jalandhar, India), Navjyot Kaur (Lovely Professional University, Jalandhar, India), Amandeep Kaur (Lovely Professional University, Jalandhar, India), Gaurav Pushkarna (Lovely Professional University, Jalandhar, India)
Issue 3
Special Issue on ICCWS 2016: Part I
Guest Editorial Preface
Graeme Pye (Deakin University, School of Information and Business Analytics, Geelong, Australia)
Article 1
Cyberspace: The New Battlefield - An Approach via the Analytics Hierarchy Process (pages 1-15)
John S. Hurley (National Defense University, College of Information and Cyberspace (CIC), Washington, DC, USA)
Article 2
Formulating the Building Blocks for National Cyberpower (pages 16-28)
JC Jansen van Vuuren (University of Venda, Thohoyandou, South Africa & CSR Defence, Peace, Safety and Security, Pretoria, South Africa), Louise Leenen (CSIR Defence, Peace, Safety and Security, Pretoria, South Africa), Graeme Plint (Department of Defense, Pretoria, South Africa), Jannie Zaaiman (Belgium Campus, Pretoria, South Africa), Jackie Phahlamohlaka (CSIR Defence, Peace, Safety and Security: CSIR, Pretoria, South Africa)
Article 3
Optimization of Operational Large-Scale (Cyber) Attacks by a Combinational Approach (pages 29-43)
Éric Filiol (Operational Cryptology and Virology Laboratory, ESIEA, Laval, France), Cécilia Gallais (Operational Cryptology and Virology Laboratory, ESIEA, Laval, France)
Article 4
Advanced Network Data Analytics for Large-Scale DDoS Attack Detection (pages 44-54)
Konstantinos F. Xylogiannopoulos (University of Calgary, Calgary, Canada), Panagiotis Karampelas (Hellenic Air Force Academy, Dekelia, Greece), Reda Alhajj (University of Calgary, Calgary, Canada)
Issue 4
Special Issue on ICCWS 2016: Part 2
Guest Editorial Preface
Graeme Pye (School of Information and Business Analytics, Deakin University, Geelong, Australia), Brett van Niekerk (University of Kwazulu-Natal, Durban, South Africa)
Article 1
Developing a Military Cyber Maturity Model for Multi-Domain Battle Mission Resilience and Success (pages 1-13)
David Ormrod (Australian Centre for Cyber-Security, University of New South Wales at the Australian Defence Force Academy, Canberra, Australia), Benjamin Turnbull (Australian Centre for Cyber-Security, University of New South Wales at the Australian Defence Force Academy, Canberra, Australia)
Article 2
A New Dynamic Cyber Defense Framework (pages 14-22)
Jim Q. Chen (DoD National Defense University, Washington, D.C., United States)
Article 3
Quantifying Decision Making in the Critical Infrastructure via the Analytic Hierarchy Process (AHP) (pages 23-34)
John S. Hurley (College of Information and Cyberspace (CIC), JPME and Cyber-L Department, National Defense University, iCollege, Washington, DC, USA & Information, Communications, Technology and Acquisition Department, National Defense University, Washington, DC, USA)
Article 4
The World is Polluted With Leaked Cyber Data (pages 35-51)
Ivan D. Burke (Council for Scientific and Industrial Research, University of Pretoria, Pretoria, South Africa and Rhodes University, Grahamstown, South Africa), Renier P. van Heerden (Council for Scientific and Industrial Research, University of Pretoria, Pretoria, South Africa and Nelson Mandela University, South Africa)
Sustainable Security: Rethinking American National Security Strategy
Book Review
Maximiliano Emanuel Korstanje (Department of Economics, University of Palermo, Buenos Aires, Argentina & CERS, University of Leeds, Leeds, UK)
Volume 6 (2016)
Issue 1
Special Issue on the 14th European Conference on Information Warfare and Security 2015 (ECCWS): Hatfield, UK (Part 1)
Editorial Preface
Graeme Pye (Deakin University, Geelong, Australia), Maximiliano E. Korstanje (University of Palermo, Buenos Aires, Argentina)
Article 1
Cyber Terrorism Taxonomies: Definition, Targets, Patterns, Risk Factors, and Mitigation Strategies (pages 1-12)
Ali Al Mazari (Alfaisal University, PSCJ Campus, Jeddah, Saudi Arabia), Ahmed H. Anjariny (Alfaisal University, PSCJ Campus, Jeddah, Saudi Arabia), Shakeel A. Habib (Alfaisal University, PSCJ Campus, Jeddah, Saudi Arabia), Emmanuel Nyakwende (Alfaisal University, PSCJ Campus, Jeddah, Saudi Arabia)
Article 2
Cyber Espionage and Illegitimate Information Retrieval (pages 13-23)
Roland Heickerö (School of Computer Science and Communication, Royal Institute of Technology (KTH), Stockholm, Sweden)
Article 3
Arts and Branches of Science Significantly Contributing to Cyber and Cyber Security: The West European and the Russian Views (pages 24-40)
Margarita Levin Jaitner (Swedish Defence University, Stockholm, Sweden), Áine MacDermott (School of Computer Science, Liverpool John Moores University, Liverpool, UK)
Article 4
A White Hat Study of a Nation's Publicly Accessible Critical Digital Infrastructure and a Way Forward (pages 41-52)
Timo Kiravuo (Aalto University, Helsinki, Finland), Seppo Tiilikainen (Aalto University, Helsinki, Finland), Mikko Särelä (Aalto University, Helsinki, Finland), Jukka Manner (Aalto University, Helsinki, Finland)
Issue 2
Special Issue on the 14th European Conference on Information Warfare and Security 2015 (ECCWS) – Hatfield, UK (Part 2)
Editorial Preface
Graeme Pye (Deakin University, Geelong, Australia), Maximiliano E. Korstanje (University of Palermo, Buenos Aires, Argentina)
Article 1
Situation Understanding for Operational Art in Cyber Operations (pages 1-14)
Tuija Kuusisto (Ministry of Finance and National Defence University, Helsinki, Finland), Rauno Kuusisto (The Finnish Defence Research Agency, Riihimäki, Finland and National Defence University, Helsinki, Finland and University of Jyväskylä, Jyväskylä, Finland), Wolfgang Roehrig (European Defence Agency, Brussels, Belgium)
Article 2
Cyber Security Education and Research in the Finland's Universities and Universities of Applied Sciences (pages 15-31)
Martti Lehto (Faculty of Information Technology, University of Jyväskylä, Finland)
Article 3
Reconceptualising Cyber Security: Safeguarding Human Rights in the Era of Cyber Surveillance (pages 32-40)
Andrew N. Liaropoulos (University of Piraeus, Piraeus, Greece)
Article 4
SPCTA: An Analytical Framework for Analyzing Cyber Threats by Non-State Actors (pages 41-60)
Harry Brown III (Norwich University, Northfield, VT, USA)
Issue 3
Special Issue on the 10th International Conference on Cyber Warfare and Security (ICCWS)
Editorial Preface
Graeme Pye (Deakin University, Geelong, Australia), Maximiliano E. Korstanje (University of Palermo, Buenos Aires, Argentina)
Article 1
Cyber-Security for ICS/SCADA: A South African Perspective (pages 1-16)
Barend Pretorius (Transnet and University of KwaZulu-Natal, Durban, South Africa), Brett van Niekerk (University of Kwazulu-Natal, Durban, South Africa)
Article 2
Adaptation of the JDL Model for Multi-Sensor National Cyber Security Data Fusion (pages 17-30)
Ignatius Swart (CSIR, Pretoria, South Africa), Barry Irwin (Rhodes University, Grahamstown, South Africa), Marthie M. Grobler (CSIR, Pretoria, South Africa)
Article 3
Deception Detection in Cyber Conflicts: A Use Case for the Cybersecurity Strategy Formation Framework (pages 31-42)
Jim Q. Chen (DoD National Defense University, Washington D.C., USA)
Article 4
The Next Generation of Scientific-Based Risk Metrics: Measuring Cyber Maturity (pages 43-52)
Lanier Watkins (Johns Hopkins University Information Security Institution, Baltimore, MD, USA), John S. Hurley (National Defense University, Washington D.C., USA)
Article 5
Semantic Technologies and Big Data Analytics for Cyber Defence (pages 53-64)
Louise Leenen (DPSS, CSIR and Cape Peninsula University of Technology, Cape Town, South Africa), Thomas Meyer (CAIR, CSIR Meraka, and Computer Science, University of Cape Town, Cape Town, South Africa)
Article 6
Using an Ontology for Network Attack Planning (pages 65-78)
Renier van Heerden (Council for Scientific and Industrial Research (CSIR) and Nelson Mandela Metropolitan University, South Africa), Peter Chan (Council for Scientific and Industrial Research (CSIR), Pretoria, South Africa), Louise Leenen (Council for Scientific and Industrial Research (CSIR), Pretoria and Cape Peninsula University of Technology, Cape Town, South Africa), Jacques Theron (South African National Defence Force (SANDF), Pretoria, South Africa)
Article 7
SCADA Systems Cyber Security for Critical Infrastructures: Case Studies in Multiple Sectors (pages 79-95)
Suhaila Ismail (School of Information Technology and Mathematical Sciences, University of South Australia, Adelaide, Australia), Elena Sitnikova (Australian Centre for Cyber Security (ACCS), University of New South Wales at ADFA, Canberra, Australia), Jill Slay (Australian Centre for Cyber Security (ACCS), University of New South Wales at ADFA, Canberra, Australia)
Issue 4
Article 1
Opposing Viewpoints on Youth Social Media Banning in the U.S. for the Combatance of Extremist Recruiting: Constitutionality and Societal Implications (pages 1-12)
Lindsay A. West (Pennsylvania State University, University Park, PA, USA), Richard V. Martin (Pennsylvania State University, University Park, PA, USA), Courtney Perkins (Pennsylvania State University, University Park, PA, USA), Jennifer M. Quatel (Pennsylvania State University, University Park, PA, USA), Gavin Macgregor-Skinner (Penn State Hershey Medical Center, Hershey, PA, USA)
Article 2
Understanding Online Radicalisation Using Data Science (pages 13-27)
Yeslam Al-Saggaf (Charles Sturt University, Albury, Australia)
Article 3
Biometric Technology Solutions to Countering Today's Terrorism (pages 28-40)
Israel Fianyi (Charles Sturt University, Wagga Wagga, Australia), Tanveer Zia (Charles Sturt University, Wagga Wagga, Australia)
Article 4
Economics of Cyber Security and the Way Forward (pages 41-57)
Taiseera Al Balushi (Sultan Qaboos University, Muscat, Oman), Saqib Ali (Sultan Qaboos University, Muscat, Oman), Osama Rehman (Bahria University, Karachi, Pakistan)
Ethical Issues and Citizens Rights in the Era of Digital Government Surveillance
Book Review
Maximiliano E. Korstanje (University of Palermo, Buenos Aires, Argentina)
Volume 5 (2015)
Issue 1
Special Issue on Cyber Defence in Southern African Region
Guest Editorial Preface
Joey Jansen van Vuuren (Cyber Defense for Scientific Research, Council for Scientific and Industrial Research, Pretoria, South Africa)
Article 1
A Strategic Framework for a Secure Cyberspace in Developing Countries with Special Emphasis on the Risk of Cyber Warfare (pages 1-18)
Victor Jaquire (University of Johannesburg, Johannesburg, South Africa), Basie von Solms (University of Johannesburg, Johannesburg, South Africa)
Article 2
Good Governance and Virtue in South Africa's Cyber Security Policy Implementation (pages 19-29)
Oliver Burmeister (School of Computing and Mathematics, Charles Sturt University, Bathurst, Australia), Jackie Phahlamohlaka (Defence, Peace, Safety and Security, Council for Scientific and Industrial Research, Pretoria, South Africa), Yeslam Al-Saggaf (School of Computing and Mathematics, Charles Sturt University, Wagga Wagga, Australia)
Article 3
Logic Tester for the Classification of Cyberterrorism Attacks (pages 30-46)
N. Veerasamy (Council for Scientific and Industrial Research, Johannesburg, South Africa), M.M. Grobler (University of Johannesburg, Johannesburg, South Africa)
Article 4
The Restructuring and Re-Orientation of Civil Society in a Web 2.0 World: A Case Study of Greenpeace (pages 47-61)
Kiru Pillay (Council for Scientific and Industrial Research and University of Witwatersrand, Johannesburg, South Africa), Manoj Maharaj (University of KwaZulu-Natal, Durban, South Africa)
Exchanging Terrorism Oxygen for Media Airwaves: The Age of Terroredia
Book Review
Maximiliano E. Korstanje (University of Palermo, Buenos Aires, Argentina)
Issue 2
Article 1
Secure Knowledge Management: Influencing the Development of Human Knowledge Sharing Networks (pages 1-20)
Sohail Tamaddon (Accenture/Avanade, Melbourne, Australia), Atif Ahmad (The University of Melbourne, Parkville, Australia), Rachelle Bosua (The University of Melbourne, Parkville, Australia)
Article 2
The Double Edge of the Information Sword (pages 21-30)
Aki-Mauri Huhtinen (Department of Leadership and Military Pedagogy, Finnish National Defence University, Helsinki, Finland)
Article 3
Information Security Culture: Towards an Instrument for Assessing Security Management Practices (pages 31-52)
Joo S. Lim (The University of Melbourne, Parkville, Australia), Sean B Maynard (The University of Melbourne, Parkville, Australia), Atif Ahmad (The University of Melbourne, Parkville, Australia), Shanton Chang (The University of Melbourne, Parkville, Australia)
Article 4
Conflictive Touring: The Roots of Terrorism (pages 53-67)
Maximiliano E. Korstanje (University of Palermo, Buenos Aires, Argentina)
Issue 3
Article 1
Cyberattacks on Critical Infrastructure and Potential Sustainable Development Impacts (pages 1-18)
Toufic Mezher (Masdar Institute of Science and Technology, Abu Dhabi, UAE), Sameh El Khatib (Masdar Institute of Science and Technology, Abu Dhabi, UAE), Thilanka Maduwanthi Sooriyaarachchi (Ceylon Electricity Board, Colombo, Sri Lanka)
Article 2
IT Security for SCADA: A Position Paper (pages 19-27)
Rahul Rastogi (Engineers India Limited, New Delhi, India and Nelson Mandela Metropolitan University, Port Elizabeth, South Africa), Rossouw von Solms (Nelson Mandela Metropolitan University, Port Elizabeth, South Africa)
Article 3
The Role of Human Operators' Suspicion in the Detection of Cyber Attacks (pages 28-44)
Leanne Hirshfield (Syracuse University, Syracuse, NY, USA), Philip Bobko (Gettysburg College, Gettysburg, PA, USA), Alex J. Barelka (Illinois State University, Normal, IL, USA), Mark R. Costa (Syracuse University, Syracuse, NY, USA), Gregory J. Funke (Air Force Research Laboratory, Wright-Patterson Air Force Base, OH, USA), Vincent F. Mancuso (MIT Lincoln Laboratory, Lexington, MA, USA), Victor Finomore (Air Force Research Laboratory, Wright-Patterson Air Force Base, OH, USA), Benjamin A. Knott (Air Force Office of Scientific Research, Arlington, VA, USA)
Article 4
Terrorists Tend to Target Innocent Tourists: A Radical Review (pages 45-54)
Maximiliano E. Korstanje (University of Palermo, Buenos Aires, Argentina)
The Psychology of Cyber Crime: Concept and Principles
Book Review
Maximiliano E. Korstanje (University of Palermo, Buenos Aires, Argentina)
Issue 4
Article 1
Cyberspace as a Complex Adaptive System and the Policy and Operational Implications for Cyberwarfare (pages 1-14)
Albert Olagbemiro (United States Air Force Reserve, Charlotte, NC, USA)
Article 2
Scientometric Analysis of Chinese Cyber-Denial and Deception Research (pages 15-58)
Phil Hilliard (The MITRE Corporation, McLean, VA, USA), Frank J. Stech (The MITRE Corporation, McLean, VA, USA), Kristin E. Heckman (The MITRE Corporation, McLean, VA, USA), Janice Redington Ballo (The MITRE Corporation, McLean, VA, USA)
Volume 4 (2014)
Issue 1
Special Issue on Cyber Terrorism and the Dark Side of the Information Society
Guest Editorial Preface
Maximiliano E. Korstanje (Department of Economics, University of Palermo, Buenos Aires, Argentina)
Article 1
The Triumph of Fear: Connecting the Dots about Whistleblowers and Surveillance (pages 1-7)
David L. Altheide (School of Social Transformation, Arizona State University, Tempe, Arizona, USA)
Article 2
Why Risk-Research is More Prominent in English Speaking Countries in the Digital Society (pages 8-18)
Maximiliano E. Korstanje (National University of Quilmes, Buenos Aires, Argentina)
Article 3
Towards an Index of Fear: The Role of Capital in Risk´s Construction (pages 19-26)
Maximiliano E. Korstanje (National University of Quilmes, Buenos Aires, Argentina)
Article 4
Stealing Consciousness: Using Cybernetics for Controlling Populations (pages 27-35)
Geoffrey R. Skoll (Buffalo State College, Buffalo, New York, USA)
Article 5
Lone Wolves: Updating the Concept of Enemy in the Social Media Age (pages 36-44)
Primavera Fisogni (Editor in Chief at La Provincia Di Como, Como, Italy)
Issue 2
Article 1
A Distributed IDS for Industrial Control Systems (pages 1-22)
Tiago Cruz (University of Coimbra, Coimbra, Portugal), Jorge Proença (University of Coimbra, Coimbra, Portugal), Paulo Simões (University of Coimbra, Coimbra, Portugal), Matthieu Aubigny (iTrust Consulting, Niederanven, Luxembourg), Moussa Ouedraogo (Luxembourg Institute of Science and Technology, Kirchberg, Luxembourg), Antonio Graziano (Selex ES, Roma, Italy), Leandros Maglaras (University of Surrey, Guildford, UK)
Article 2
The Opportunities of National Cyber Strategy and Social Media in the Rhizome Networks (pages 23-34)
Aki-Mauri Huhtinen (National Defence University, Helsinki, Finland), Arto Hirvelä (National Defence University, Helsinki, Finland), Tommi Kangasmaa (National Defence University, Helsinki, Finland)
Article 3
Article 4
Aligning Two Specifications for Controlling Information Security (pages 46-62)
Riku Nykänen (University of Jyväskylä, Jyväskylä, Finland), Tommi Kärkkäinen (University of Jyväskylä, Jyväskylä, Finland)
Issue 3
Article 1
A Framework for Cybersecurity Strategy Formation (pages 1-10)
Jim Q. Chen (DoD National Defense University, Washington, DC, USA)
Article 2
Cyber Readiness: Are We There Yet? (pages 11-26)
John S. Hurley (National Defense University, Washington, DC, USA), H. Mark McGibbon (National Defense University, Washington, DC, USA), Roxanne Everetts (National Defense University, Washington, DC, USA)
Article 3
Cyber Can Kill and Destroy Too: Blurring Borders Between Conventional and Cyber Warfare (pages 27-42)
Marina Krotofil (Institute for Security in Distributed Applications, Hamburg University of Technology, Hamburg, Germany)
Article 4
Applicability of Jus in Bello in Cyber Space: Dilemmas and Challenges (pages 43-62)
Qifan Wang (Robert H. McKinney School of Law, Indiana University, Indianapolis, IN, USA)
Article 5
Using Deceptive Information in Computer Security Defenses (pages 63-80)
Mohammed H. Almeshekah (Purdue University, West Lafayette, IN, USA), Eugene H. Spafford (Purdue University, West Lafayette, IN, USA)
Issue 4
Article 1
Clausewitz and the Utility of Cyberattacks in War (pages 1-16)
Jeppe Teglskov Jacobsen (Danish Institute for International Studies, Copenhagen, Denmark)
Article 2
The Covert Strengthening of Islamic Extremists under Ronald Reagan and George W. Bush (pages 17-28)
Jason Cooley (University of Hartford, West Hartford, CT, USA)
Article 4
Intellectual Property Protection in Small Knowledge Intensive Enterprises (pages 47-63)
Riikka Kulmala (Turku University of Applied Sciences, Turku, Finland), Juha Kettunen (Turku University of Applied Sciences, Turku, Finland)
Article 5
A Critical Comparison of Trusted Computing and Trust Management Technologies (pages 64-81)
Michele Tomaiuolo (Department of Information Engineering, University of Parma, Parma, Italy)
Volume 3 (2013)
Issue 1
Article 1
Intellectual Property Systems in Software (pages 1-14)
Ricardo Rejas-Muslera (University of Alcalá, Madrid, Spain), Elena Davara (Davara & Davara Law, Madrid, Spain), Alain Abran (University du Quebec, Montréal, Canada), Luigi Buglione (University du Quebec, Montréal, Canada)
Article 2
On the Study of Certified Originality for Digital Alteration Problem: Technology Developments of the Time Authentication (pages 15-28)
Masakazu Ohashi (Chuo University, Tokyo, Japan), Mayumi Hori (Hakuoh University, Tochigi, Japan)
Article 3
Intellectual Property Protection in Small Knowledge Intensive Enterprises (pages 29-45)
Riikka Kulmala (Turku University of Applied Sciences, Turku, Finland), Juha Kettunen (Turku University of Applied Sciences, Turku, Finland)
Article 4
Online Interaction with Millenials: Institution vs. Community (pages 46-62)
Kurt Komaromi (Ithaca College, Ithaca, NY, USA), Fahri Unsal (Ithaca College, Ithaca, NY, USA), G. Scott Erickson (Ithaca College, Ithaca, NY, USA)
Issue 2
Article 1
Incident and Disaster Management Training: An Update on Using Virtual World Scenarios for Emergency Management Training (pages 1-21)
Anne M. Hewitt (Seton Hall University, South Orange, NJ, USA), Danielle Mirliss (Seton Hall University, South Orange, NJ, USA), Riad Twal (Seton Hall University, South Orange, NJ, USA)
Article 2
Ascertaining Trust Indicators in Social Networking Sites (pages 22-37)
N. Veerasamy (Defense, Peace, Safety and Security, Council for Scientific and Industrial Research, Pretoria, South Africa), W. A. Labuschagne (Defense, Peace, Safety and Security, Council for Scientific and Industrial Research, Pretoria, South Africa)
Article 3
An Efficient Protocol for Privacy and Authentication for Resource-Constrained Devices in Wireless Networks (pages 38-57)
Clifton Mulkey (Texas A &M University - Corpus Christi, Corpus Christi, TX, USA), Dulal Kar (Texas A &M University - Corpus Christi, Corpus Christi, TX, USA), Ajay Katangur (Texas A &M University - Corpus Christi, Corpus Christi, TX, USA)
Article 4
Social Engineering Techniques and Password Security: Two Issues Relevant in the Case of Health Care Workers (pages 58-70)
B. Dawn Medlin (Department of Computer Information Systems, Walker College of Business, Appalachian State University, Boone, NC, USA)
Issue 3
Article 1
The Cyberspace Threats and Cyber Security Objectives in the Cyber Security Strategies (pages 1-18)
Martti Lehto (University of Jyväskylä, Jyväskylä, Finland)
Article 2
Consequences of Diminishing Trust in Cyberspace (pages 19-31)
Dipankar Dasgupta (Center for Information Assurance (CAE-R), Department of Computer Science, University of Memphis, Memphis, TN, USA), Denise M. Ferebee (Center for Information Assurance (CAE-R), Department of Computer Science, University of Memphis, Memphis, TN, USA)
Article 3
Information Security Management: A Case Study in a Portuguese Military Organization (pages 32-48)
José Martins (Centro de Investigação da Academia Militar (CINAMIL), Academia Militar, Lisboa, Portugal), Henrique dos Santos (Departamento de Sistemas de Informação (DSI), Universidade do Minho, Guimarães, Portugal), António Rosinha (Centro de Investigação da Academia Militar (CINAMIL), Academia Militar, Lisboa, Portugal), Agostinho Valente (Instituto Geográfico do Exército, Lisboa, Portugal)
Article 4
Tools and Technologies for Professional Offensive Cyber Operations (pages 49-71)
T. J. Grant (Retired But Active Researcher (R-BAR), Benschop, Netherlands)
Article 5
Strategic Communication for Supporting Cyber-Security (pages 72-79)
Tuija Kuusisto (Department of Tactics and Operations Art, National Defence University, Helsinki, Finland), Rauno Kuusisto (Department of Tactics and Operations Art, National Defence University, Helsinki, Finland & Department of Mathematical Information Technology, University of Jyväskylä, Jyväskylä, Finland)
Article 6
Critical Infrastructure Protection: Evolution of Israeli Policy (pages 80-87)
L. Tabansky (Yuval Ne'eman Workshop for Science, Technology and Security, Tel Aviv University, Tel Aviv, Israel)
Issue 4
Article 1
The Value of Interaction for Russia, the USA and China Facing the Information Warfare (pages 1-9)
Vasilyeva Inna (Kuban State University of Technology, Krasnodar, Russia)
Article 2
The EU ECENTRE Project: Education as a Defensive Weapon in the War Against Cybercrime (pages 10-21)
Denis Edgar-Nevill (Centre for Cybercrime Forensics, Canterbury Christ Church University, Canterbury, United Kingdom)
Article 3
Preparing for Cyber Threats with Information Security Policies (pages 22-31)
Ilona Ilvonen (Tampere University of Technology, Tampere, Finland), Pasi Virtanen (Tampere University of Technology, Tampere, Finland)
Article 4
SCADA Threats in the Modern Airport (pages 32-39)
John McCarthy (ServiceTec, Cranfield University, Cranfield, England), William Mahoney (University of Nebraska Omaha, Omaha, NE, USA)
Article 5
Monkey See - Monkey Take Photo: The Risk of Mobile Information Leakage (pages 40-51)
Karen Renaud (School of Computing Science, University of Glasgow, Glasgow, UK), Wendy Goucher (University of Glasgow, Glasgow, UK)
Article 6
What Lawyers Want: Legally Significant Questions that Only IT Specialists can Answer (pages 52-57)
Yaroslav Radziwill (University of Warwick, Coventry, UK)
Article 7
Security Risks to IT Supply Chains under Economic Stress (pages 58-73)
C. Warren Axelrod (Delta Risk LLC, Arlington, VA, USA), Sukumar Haldar (Director of Application Development and Risk Management, Anshinsoft Inc., New York, NY, USA)
Volume 2 (2012)
Issue 1
Article 1
Online Social Networking: A Source of Intelligence for Advanced Persistent Threats (pages 1-13)
Nurul Nuha Abdul Molok (Department of Information Systems, The University of Melbourne, Melbourne, VIC, Australia), Atif Ahmad (Department of Information Systems, The University of Melbourne, Melbourne, VIC, Australia), Shanton Chang (Department of Information Systems, The University of Melbourne, Melbourne, VIC, Australia)
Article 2
A Vulnerability-Based Model of Cyber Weapons and its Implications for Cyber Conflict (pages 14-26)
Christian Czosseck (Estonian Business School, Tallinn, Estonia), Karlis Podins (Tallinn University of Technology, Tallinn, Estonia)
Article 3
Cyber Security Awareness as Critical Driver to National Security (pages 27-38)
Joey Jansen van Vuuren (Cyber Defense for Scientific Research, Council for Scientific and Industrial Research, Pretoria, South Africa), Marthie Grobler (Cyber Security Research, Council for Scientific and Industrial Research, Pretoria, South Africa), Jannie Zaaiman (University of Venda, Thohoyandou, South Africa)
Article 4
Securing America Against Cyber War (pages 39-49)
Jayson McCune (College of Information Science & Technology, University of Nebraska at Omaha, Omaha, NE, USA), Dwight A. Haworth (Department of Information Systems, University of Nebraska at Omaha, Omaha, NE, USA)
Article 5
A World without Islam (pages 50-52)
Maximiliano E. Korstanje (Department of Economics, University of Palermo, Buenos Aires, Argentina)
Issue 2
Article 1
From Military Threats to Everyday Fear: Computer Games as the Representation of Military Information Operations (pages 1-10)
Aki-Mauri Huhtinen (Department of Leadership and Military Pedagogy, Finnish National Defence University, Helsinki, Finland)
Article 2
What Does the Concept of Ambidexterity Mean in the Current Military Planning Process and Organization Construction? (pages 11-21)
Aki-Mauri Huhtinen (Department of Leadership and Military Pedagogy, Finnish National Defence University, Helsinki, Finland)
Article 3
The Comprehensive Approach as a Strategic Design to Run the Military-Industrial Complex in Operations (pages 22-30)
Mirva Salminen (Department of Social Sciences, University of Lapland, Rovaniemi, Finland), Aki-Mauri Huhtinen (Department of Leadership and Military Pedagogy, National Defence University, Helsinki, Finland)
Public Violence in Colombia, 1958-2010
Book Review
Maximiliano E. Korstanje (Department of Economics, University of Palermo, Buenos Aires, Argentina)
Crime and Crime Reduction: The Importance of Group Processes
Book Review
Maximiliano E. Korstanje (Department of Economics, University of Palermo, Buenos Aires, Argentina)
Issue 3
Article 1
Internet Study: Cyber Threats and Cybercrime Awareness and Fear (pages 1-11)
Igor Bernik (Faculty of Criminal Justice and Security, University of Maribor, Ljubljana, Slovenia)
Article 2
A Computer Network Attack Taxonomy and Ontology (pages 12-25)
R. P. van Heerden (CSIR, Pretoria, South Africa & Rhodes University, Grahamstown, South Africa), B. Irwin (Rhodes University, Grahamstown, South Africa), I. D. Burke (CSIR, Pretoria, South Africa), L. Leenen (CSIR, Pretoria, South Africa)
Article 3
Establishing Cyberspace Sovereignty (pages 26-38)
Kris E. Barcomb (Air Force Institute of Technology, Wright-Patterson AFB, OH, USA), Dennis J. Krill (Air Force Institute of Technology, Wright-Patterson AFB, OH, USA), Robert F. Mills (Air Force Institute of Technology, Wright-Patterson AFB, OH, USA), Michael A. Saville (Air Force Institute of Technology, Wright-Patterson AFB, OH, USA)
Article 4
In Internet’s Way: Radical, Terrorist Islamists on the Free Highway (pages 39-58)
Raphael Cohen-Almagor (Department of Politics and International Studies, The University of Hull, Hull, UK)
Issue 4
Article 1
Application of Information Technology in Disaster and Emergency Management (pages 1-12)
Jishnu Subedi (Centre of Resilient Development, Kathmandu, Nepal)
Article 2
An Approach to Governance of CyberSecurity in South Africa (pages 13-27)
Joey Jansen van Vuuren (Council for Industrial and Scientific Research, Pretoria, South Africa), Louise Leenen (Council for Industrial and Scientific Research, Pretoria, South Africa), Jackie Phahlamohlaka (Council for Industrial and Scientific Research, Pretoria, South Africa), Jannie Zaaiman (University of Venda, Thohoyandou, South Africa)
Article 3
US Foreign Policy Challenges of Non-State Actors’ Cyber Terrorism against Critical Infrastructure (pages 28-48)
Natalia Tereshchenko (Russian Academy of Sciences, Athens, Greece)
Article 4
Trust Enforcing and Trust Building, Different Technologies and Visions (pages 49-66)
Michele Tomaiuolo (Department of Information Engineering, University of Parma, Parma, Italy)
Volume 1 (2011)
Issue 1
Article 1
Critical Infrastructure as Complex Emergent Systems (pages 1-12)
Ted G. Lewis (Naval Postgraduate School, USA), Thomas J. Mackin (Cal Poly University, San Luis Obispo, USA), Rudy Darken (Naval Postgraduate School, USA)
Article 2
"This is not a cyber war, it's a...?": Wikileaks, Anonymous and the Politics of Hegemony (pages 13-23)
David Barnard-Wills (Cranfield University, UK)
Article 3
Estonia after the 2007 Cyber Attacks: Legal, Strategic and Organisational Changes in Cyber Security (pages 24-34)
Christian Czosseck (Cooperative Cyber Defence Centre of Excellence, Estonia), Rain Ottis (Cooperative Cyber Defence Centre of Excellence, Estonia), Anna-Maria Talihärm (Cooperative Cyber Defence Centre of Excellence, Estonia)
Article 4
Protection of Australia in the Cyber Age (pages 35-40)
Matthew Warren (Deakin University, Australia), Shona Leitch (Deakin University, Australia)
Article 5
Misuse Detection for Mobile Devices Using Behaviour Profiling (pages 41-53)
Fudong Li (Plymouth University, UK), Nathan Clarke (Plymouth University, UK, and Edith Cowan University, Australia), Maria Papadaki (Plymouth University, UK), Paul Dowland (Plymouth University, UK)
Issue 2
Article 1
The Open Definition of Cyber: Technology or a Social Construction? (pages 1-9)
Martti Lehto (Finnish National Defence University, Finland), Aki-Mauri Huhtinen (Finnish National Defence University, Finland), Saara Jantunen (Finnish National Defence University, Finland)
Article 2
Towards the Human Information Security Firewall (pages 10-17)
Rossouw von Solms (Nelson Mandela Metropolitan University, South Africa), Matthew Warren (Deakin University, Australia)
Article 3
Understanding Optimal Investment in Cyber Terrorism: A Decision Theoretic Approach (pages 18-34)
Tridib Bandyopadhyay (Kennesaw State University, USA)
Article 4
Challenges in Monitoring Cyberarms Compliance (pages 35-48)
Neil C. Rowe (U.S. Naval Postgraduate School, USA), Simson L. Garfinkel (U.S. Naval Postgraduate School, USA), Robert Beverly (U.S. Naval Postgraduate School, USA), Panayotis Yannakogeorgos (Air Force Research Institute, USA)
Issue 3
Article 1
Fostering SCADA and IT Relationships: An Industry Perspective (pages 1-11)
Christopher Beggs (Security Infrastructure Solutions, Australia), Ryan McGowan (Goulburn Valley Water, Australia)
Article 2
Influence Strategy: Consistency and Legitimacy as Key Factors (pages 12-36)
Bryan Pickett (United State Air Force, USA), Mike Lingenfelter (United States Army, USA)
Article 3
Critical Infrastructure Systems: Security Analysis and Modelling Approach (pages 37-58)
Graeme Pye (Deakin University, Australia)
Article 4
World War III: The Cyber War (pages 59-69)
Mandeep Singh Bhatia (Lyallpur Khalsa College, Jalandhar, India)
Article 5
Toward a U.S. Army Cyber Security Culture (pages 70-80)
Christopher Paul (RAND, USA), Isaac R. Porche (RAND, USA)
Issue 4
Article 1
The Memetic Engineering of Anonymous, the Cyberterrorist Group (pages 1-9)
Thomas Woolford (Nicholson School of Communication, University of Central Florida, Sanford, FL, USA), Jonathan Matusitz (Seminole State College, University of Central Florida, Sanford, USA)
Article 2
Cyber War Retaliation Decision: A Fuzzy Multi Criteria Decision Making Approach (pages 10-31)
Mhamed Zineddine (ALHOSN University Abu Dhabi, Abu Dhabi, UAE)
Article 3
Adapting the Current National Defence Doctrine to Cyber Domain (pages 32-52)
Topi Tuukkanen (Finnish Ministry of Defence, Helsinki, Finland)
Article 4
Violencia de Estado, guerra, resistencia. Por una nueva política de la Izquierda (pages 53-55)
Maximiliano E. Korstanje (University of Palermo, Buenos Aires, Argentina)