Results 101 to 110 of about 5,305 (181)
Information strategy of the Al Qaeda terror organisation [PDF]
In this article a detailed account is given of the information strategies of terrorist organizations with a special emphasis on Al Qaeda, by using a the end–ways–means approach and the model called mystic diamond.
Porkoláb, Imre
core
Organizational science and cybersecurity: abundant opportunities for research at the interface. [PDF]
Dalal RS +5 more
europepmc +1 more source
Desafíos nacionales frente a la ciberseguridad en el escenario global: un análisis para Colombia
This article covers the topic of information security in light of cybersecurity threats in a global context, reviewing the current situation in Colombia.
Milton Ricardo Ospina Díaz +1 more
doaj
Internet, terrorismo islámico y libertades fundamentales [PDF]
En el Islam conviven corrientes modernistas (que concilian el Islam con la cultura occidental), tradicionalistas (que siguen con rigor el Islam de la tradición local) y fundamentalistas (que exigen el retorno al Islam de los orígenes).
Losano, Mario G.
core
Developing a Proportionate Response to a Cyber Attack [PDF]
The debate on both the impacts of cyber attacks and how to response to attacks is active but precedents are only a few. Strategies and political speeches are always (at least partially) declaratory and vague by nature, and beyond these declarations the ...
Limnéll, Jarno
core
Peeling Back the Onion of Cyber Espionage after Tallinn 2.0 [PDF]
Tallinn 2.0 represents an important advancement in the understanding of international law’s application to cyber operations below the threshold of force.
McCarthy, Amy H. +2 more
core +1 more source
The Rise of Cyber Warfare: The Digital Age and American Decline [PDF]
Chwe, Hanyu
core +2 more sources
Nuclear Lessons for Cyber Security? [PDF]
Identifying “revolutions in military affairs” is arbitrary, but some inflection points in technological change are larger than others: for example, the gunpowder revolution in early modern Europe, the industrial revolution of the nineteenth century, the ...
Nye, Joseph S.
core
Covid-19: implications for insurer risk management and the insurability of pandemic risk. [PDF]
Richter A, Wilson TC.
europepmc +1 more source
The Law of Cyberwar: A Case Study from the Future [PDF]
Segmentation is one of the most fundamental corner stones in the theory of marketing. It has been a subject for research for over 60 years. The subject has been actualised because of the lack of research within the practice of segmentation.
Andersson, Ludwig, Sellhed, Oscar
core +1 more source

