Results 101 to 110 of about 5,305 (181)

Information strategy of the Al Qaeda terror organisation [PDF]

open access: yes, 2006
In this article a detailed account is given of the information strategies of terrorist organizations with a special emphasis on Al Qaeda, by using a the end–ways–means approach and the model called mystic diamond.
Porkoláb, Imre
core  

Organizational science and cybersecurity: abundant opportunities for research at the interface. [PDF]

open access: yesJ Bus Psychol, 2022
Dalal RS   +5 more
europepmc   +1 more source

Desafíos nacionales frente a la ciberseguridad en el escenario global: un análisis para Colombia

open access: yesRevista Criminalidad, 2020
This article covers the topic of information security in light of cybersecurity threats in a global context, reviewing the current situation in Colombia.
Milton Ricardo Ospina Díaz   +1 more
doaj  

Internet, terrorismo islámico y libertades fundamentales [PDF]

open access: yes, 2016
En el Islam conviven corrientes modernistas (que concilian el Islam con la cultura occidental), tradicionalistas (que siguen con rigor el Islam de la tradición local) y fundamentalistas (que exigen el retorno al Islam de los orígenes).
Losano, Mario G.
core  

Developing a Proportionate Response to a Cyber Attack [PDF]

open access: yes, 2016
The debate on both the impacts of cyber attacks and how to response to attacks is active but precedents are only a few. Strategies and political speeches are always (at least partially) declaratory and vague by nature, and beyond these declarations the ...
Limnéll, Jarno
core  

Peeling Back the Onion of Cyber Espionage after Tallinn 2.0 [PDF]

open access: yes, 2019
Tallinn 2.0 represents an important advancement in the understanding of international law’s application to cyber operations below the threshold of force.
McCarthy, Amy H.   +2 more
core   +1 more source

Nuclear Lessons for Cyber Security? [PDF]

open access: yes, 2012
Identifying “revolutions in military affairs” is arbitrary, but some inflection points in technological change are larger than others: for example, the gunpowder revolution in early modern Europe, the industrial revolution of the nineteenth century, the ...
Nye, Joseph S.
core  

The Law of Cyberwar: A Case Study from the Future [PDF]

open access: yes, 1998
Segmentation is one of the most fundamental corner stones in the theory of marketing. It has been a subject for research for over 60 years. The subject has been actualised because of the lack of research within the practice of segmentation.
Andersson, Ludwig, Sellhed, Oscar
core   +1 more source

Home - About - Disclaimer - Privacy