Journal Contents: International Journal of Cyber Warfare and Terrorism (IJCWT)

View the International Journal of Cyber Warfare and Terrorism (IJCWT) home page for complete details.
Volume 10 (2020)
Issue 1
Article 1
Terrorism in the Website: Society 4.0 and Fundamentalism in Scrutiny (pages 1-14)
Maximiliano Emanuel Korstanje (Department of Economics, University of Palermo, Buenos Aires, Argentina & CERS, University of Leeds, Leeds, UK)
Article 2
Terrorism Effects on Businesses Post 9/11 (pages 15-33)
Mariah Talia Solis (University of Tampa, USA), Jessica Pearson (University of Tampa, USA), Deirdre P Dixon (University of Tampa, USA), Abigail Blanco (University of Tampa, USA), Raymond Papp (University of Tampa, USA)
Article 3
A Framework for the Weapons of Influence (pages 34-49)
Miika Sartonen (Finnish National Defence University, Helsinki, Finland), Aki-Mauri Huhtinen (Finnish National Defence University, Helsinki, Finland), Petteri Simola (Finnish Defence Research Agency, Human Performance Division, Tuusula, Finland), Kari T. Takamaa (Finnish National Defence University, Helsinki, Finland), Veli-Pekka Kivimäki (Finnish Defence Research Agency, Riihimäki, Finland)
Terrorism and The State: Intra-State Dynamics and the Response to Non-State Political Violence
Book Review
Maximiliano Emanuel Korstanje (Department of Economics, University of Palermo, Buenos Aires, Argentina & CERS, University of Leeds, Leeds, UK)
Issue 2
Editorial Preface
Brett van Niekerk (University of Kwazulu-Natal, Duban, South Africa), Graeme Pye (Deakin University, Australia)
Article 1
Insider Threat Detection Using Supervised Machine Learning Algorithms on an Extremely Imbalanced Dataset (pages 1-26)
Naghmeh Moradpoor Sheykhkanloo (Edinburgh Napier University, Edinburgh, UK), Adam Hall (Edinburgh Napier University, Edinburgh, UK)
Article 2
On the Behavior-Based Risk Communication Models in Crisis Management and Social Risks Minimization (pages 27-45)
Yuriy V. Kostyuchenko (Scientific Centre for Aerospace Research of the Earth, National Academy of Sciences of Ukraine, Kyiv, Ukraine), Viktor Pushkar (Social Transformation Group, Kyiv, Ukraine), Olga Malysheva (Social Transformation Group, Kyiv, Ukraine), Maxim Yuschenko (Scientific Centre for Aerospace Research of the Earth, National Academy of Sciences of Ukraine, Kyiv, Ukraine)
Article 3
Predicting and Explaining Cyber Ethics with Ethical Theories (pages 46-63)
Winfred Yaokumah (University of Ghana, Accra, Ghana)
Article 4
The Security Aspects of Automotive Over-the-Air Updates (pages 64-81)
James Howden (De Montfort University, Leicester, UK), Leandros Maglaras (De Montfort University, Leicester, UK), Mohamed Amine Ferrag (Guelma University, Guelma, Algeria)
Article 5
Deep Learning in Cybersecurity: Challenges and Approaches (pages 82-105)
Yadigar N. Imamverdiyev (Institute of Information Technology, Azerbaijan National Academy of Sciences, Baku, Azerbaijan), Fargana J. Abdullayeva (Institute of Information Technology of Azerbaijan National Academy of Sciences, Baku, Azerbaijan)
Issue 3
Issue 4
Volume 9 (2019)
Issue 1
Editorial Preface
Brett van Niekerk (University of Kwazulu-Natal, Durban, South Africa), Graeme Pye (Deakin University, Deakin, Australia)
Article 1
The Improved LSTM and CNN Models for DDoS Attacks Prediction in Social Media (pages 1-18)
Rasim M. Alguliyev (Institute of Information Technology, Azerbaijan National Academy of Sciences, Baku, Azerbaijan), Ramiz M. Aliguliyev (Institute of Information Technology, Azerbaijan National Academy of Sciences, Baku, Azerbaijan), Fargana J Abdullayeva (Institute of Information Technology, Azerbaijan National Academy of Sciences, Baku, Azerbaijan)
Article 2
Cyberpeacekeeping: New Ways to Prevent and Manage Cyberattacks (pages 19-30)
A. Walter Dorn (Canadian Forces College, Toronto, Canada), Stewart Webb (DefenceReport, Salt Spring Island, Canada)
Article 3
Media Images of Islamophobia on Cable News Network (CNN) and Implications for International Relations (pages 31-47)
Jeffrey Kurebwa (Bindura University of Science Education, Bindura, Zimbabwe), Prosper Muchakabarwa (Bindura University of Science Education, Bindura, Zimbabwe)
Article 4
Slow Education and Cognitive Agility: Improving Military Cyber Cadet Cognitive Performance for Better Governance of Cyberpower (pages 48-66)
Benjamin James Knox (Norwegian Defence University College, Cyber Academy, Lillehammer, Norway & Department of Information Security and Communication Technology, NTNU, Gjøvik, Norway), Ricardo G Lugo (Dept. of Psychology, Inland University of Applied Science, Lillehammer, Norway), Kirsi Helkala (Norwegian Defence University College, Cyber Academy, Lillehammer, Norway), Stefan Sütterlin (Faculty of Health and Welfare Sciences, Østfold University College, Halden, Norway)
Memory and the Wars on Terror: Australian and British Perspectives
Book Review
Maximiliano Emanuel Korstanje (Department of Economics, University of Palermo, Buenos Aires, Argentina & CERS, University of Leeds, Leeds, UK)
Issue 2
Editorial Preface
Brett van Niekerk (University of Kwazulu-Natal, Durban, South Africa), Graeme Pye (Deakin University, Deakin, Australia)
Article 1
Dark and Deep Webs-Liberty or Abuse (pages 1-14)
Lev Topor (Bar Ilan University, Ramat Gan, Israel)
Article 2
Social Media Networking and Tactical Intelligence Collection in the Middle East (pages 15-28)
Karen Howells (Near East University, Nicosia, Cyprus)
Article 3
Role of Cyber Law and Mitigation Strategies in Perspective of Pakistan to Cope Cyber Threats (pages 29-38)
Jawad Hussain Awan (IICT, University of Sindh, Jamshoro, Pakistan), Shahzad Memon (IICT, University of Sindh, Jamshoro, Pakistan), Fateh Muhammad Burfat (University of Sindh, Jamshoro, Pakistan)
Article 4
Provably Secure Private Set Intersection With Constant Communication Complexity (pages 39-64)
Sumit Kumar Debnath (National Institute of Technology, Jamshedpur, India)
Issue 3
Editorial Preface
Brett van Niekerk (University of Kwazulu-Natal, Duban, South Africa), Graeme Pye (Deakin University, Australia)
Article 1
Information Influence in Hybrid Environment: Reflexive Control as an Analytical Tool for Understanding Warfare in Social Media (pages 1-20)
Aki-Mauri Huhtinen (Department of Leadership and Military Pedagogy, Finnish National Defence University, Helsinki, Finland), Noora Kotilainen (University of Helsinki, Helsinki, Finland), Saara Särmä (Finnish National Defence University, Helsinki, Finland), Mikko Streng (Finnish National Defence University, Helsinki, Finland)
Article 3
The Impact of Cyber-Physical Warfare on Global Human Security (pages 36-50)
Bryson R. Payne (University of North Georgia, Dahlonega, USA), Edward L. Mienie (University of North Georgia, Dahlonega, USA)
Issue 4
Special Issue on the 16th European Conference on Cyber Warfare and Security
Editorial Preface
Brett van Niekerk (University of Kwazulu-Natal, Duban, South Africa), Graeme Pye (Deakin University, Australia)
Article 1
The Modelling and Simulation of Integrated Battlefield Cyber-Kinetic Effects (pages 1-26)
David Ormrod (Terra Schwartz Pty Ltd, Canberra, Australia), Benjamin Turnbull (University of New South Wales, Kensington, Australia)
Article 2
The Winds of Change in World Politics and the Impact on Cyber Stability (pages 27-43)
Virginia Greiman (Boston University, USA)
Article 3
Cyber Counterintelligence: An Exploratory Proposition on a Conceptual Framework (pages 44-62)
Petrus Duvenage (University of Johannesburg, Johannesburg, South Africa), Thenjiwe Sithole (University of Johannesburg, Johannesburg, South Africa), Basie von Solms (University of Johannesburg, Johannesburg, South Africa)
Surveillance and Terror in Post-9/11: British and American Television
Book Review
Maximiliano Emanuel Korstanje (Department of Economics, University of Palermo, Buenos Aires, Argentina & CERS, University of Leeds, Leeds, UK)
Volume 8 (2018)
Issue 1
Editorial Preface
Brett van Niekerk (University of KwaZulu-Natal, Durban, South Africa), Graeme Pye (Deakin University, Australia, Australia)
Article 1
#TerroristFinancing: An Examination of Terrorism Financing via the Internet (pages 1-11)
Michael Tierney (University of Waterloo, Innisfil, Canada)
Article 2
Ensuring Public Safety Organisations' Information Flow and Situation Picture in Hybrid Environments (pages 12-24)
Teija Norri-Sederholm (National Defence University, Helsinki, Finland), Aki-Mauri Huhtinen (Department of Leadership and Military Pedagogy, Finnish National Defence University, Helsinki, Finland), Heikki Paakkonen (Arcada University of Applied Sciences, Helsinki, Finland)
Article 3
Social Media and Online Gaming: A Masquerading Funding Source (pages 25-42)
Pedro Ramos (Florida International University, Miami, USA), Pierre Funderburk (Florida International University, Miami, USA), Jennifer Gebelein (Florida International University, Miami, USA)
Article 4
Defining Cyber Weapon in Context of Technology and Law (pages 43-55)
Prashant Mali (Cyber Law Consulting (Advocates & Attorneys), Mumbai, India)
Issue 2
Editorial Preface
Brett van Niekerk (University of KwaZulu-Natal, Durban, South Africa), Graeme Pye (Deakin University, Geelong, Australia)
Article 1
Measuring the World: How the Smartphone Industry Impacts Cyber Deterrence Credibility (pages 1-16)
Dirk Westhoff (University of Applied Sciences Offenburg, Offenburg, Germany), Maximilian Zeiser (University of Applied Sciences Offenburg, Offenburg, Germany)
Article 2
On Experience of Social Networks Exploration for Comparative Analysis of Narratives of Foreign Members of Armed Groups: IS and L/DPR in Syria and Ukraine in 2015-2016 (pages 17-31)
Yuriy Kostyuchenko (Scientific Centre for Aerospace Research of the Earth, National Academy of Sciences of Ukraine, Kiev, Ukraine), Maxim Yuschenko (Scientific Centre for Aerospace Research of the Earth, National Academy of Sciences of Ukraine, Kiev, Ukraine), Igor Artemenko (Scientific Centre for Aerospace Research of the Earth, National Academy of Sciences of Ukraine, Kiev, Ukraine)
Article 3
Article 4
Framework for Military Applications of Social Media (pages 47-56)
Namosha Veerasamy (Council for Scientific and Industrial Research (CSIR), Pretoria, South Africa), William Aubrey Labuschagne (Council for Scientific and Industrial Research (CSIR), Pretoria, South Africa)
Issue 3
EDITORIAL PREFACE
Brett van Niekerk (University of KwaZulu-Natal, Durban, South Africa), Graeme Pye (Deakin University, Geelong, Australia)
Article 1
Jus in Bello and the Acts of Terrorism: A Study (pages 1-14)
Mohammad Saidul Islam (Department of Law, International Islamic University Chittagong, Chittagong, Bangladesh)
Article 2
Managing Terrorism in Africa: Assessing Policing Issues (pages 15-25)
Gerald Dapaah Gyamfi (University of Professional Studies, Accra, Ghana)
Article 3
The Communicating and Marketing of Radicalism: A Case Study of ISIS and Cyber Recruitment (pages 26-45)
David H. McElreath (University of Mississippi, Oxford, USA), Daniel Adrian Doss (University of West Alabama, Livingston, USA), Leisa McElreath (Mississippi Crime Stoppers Board, Jackson, USA), Ashley Lindsley (Southern Illinois University, Carbondale, USA), Glenna Lusk (University of Mississippi, Oxford, USA), Joseph Skinner (University of Mississippi, Oxford, USA), Ashley Wellman (Texas Christian University, Fort Worth, USA)
Article 4
Cyber Security Crime and Punishment: Comparative Study of the Laws of Jordan, Kuwait, Qatar, Oman, and Saudi Arabia (pages 46-59)
Evon Abu-Taieh (The University of Jordan-Aqaba, Aqaba, Jordan), Auhood Alfaries (King Saud University, Riyadh, Saudi Arabia), Shaha Al-Otaibi (Princess Nourah Bint Abdulrahman University, Riyadh, Saudi Arabia), Ghadah Aldehim (Princess Nourah Bint Abdulrahman University, Riyadh, Saudi Arabia)
Issue 4
Editorial Preface
Brett van Niekerk (University of KwaZulu-Natal, Durban, South Africa), Graeme Pye (Deakin University, Geelong, Australia)
Article 1
Jihadist Propaganda on Social Media: An Examination of ISIS Related Content on Twitter (pages 1-15)
Ahmed Al-Rawi (Simon Fraser University, Canada), Jacob Groshek (Boston University, USA)
Article 2
Determinants of Terrorism in South Asia: Insights From a Dynamic Panel Data Analysis (pages 16-34)
Ramesh Chandra Das (Katwa College, Burdwan, India), Sovik Mukherjee (St. Xavier's University, Kolkata, India)
Article 3
Filtration of Terrorism-Related Texts in the E-Government Environment (pages 35-48)
Rasim M. Alguliyev (Institute of Information Technology, Azerbaijan National Academy of Sciences, Baku, Azerbaijan), Ramiz M. Aliguliyev (Institute of Information Technology, Azerbaijan National Academy of Sciences, Baku, Azerbaijan), Gunay Y. Niftaliyeva (Institute of Information Technology, Azerbaijan National Academy of Sciences, Baku, Azerbaijan)
Globalization and the Economic Consequences of Terrorism
Book Review
Maximiliano E. Korstanje (Department of Economics, University of Palermo, Palermo, Argentina)
Volume 7 (2017)
Issue 1
Article 1
Toward Approaches to Big Data Analysis for Terroristic Behavior Identification: Child Soldiers in Illegal Armed Groups During the Conflict in the Donbas Region (East Ukraine) (pages 1-12)
Yuriy V. Kostyuchenko (National Academy of Sciences of Ukraine, Scientific Centre for Aerospace Research of the Earth, Kiev, Ukraine), Maxim Yuschenko (National Academy of Sciences of Ukraine, Scientific Centre for Aerospace Research of the Earth, Kiev, Ukraine)
Article 2
The Effects of Money Laundering (ML) on Growth Application to the Gulf Countries (pages 13-24)
Fakhri Issaoui (University of Tunis, Faculty of Economics and Management, Tunis, Tunisia), Toumi Hassen (University of Sfax, Economics and Management, Sfax, Tunisia), Touili Wassim (University of Tunis, Economics, Tunis, Tunisia)
Article 3
Russian Active Measures and September 11, 2001: Nostradamus Themed Disinformation? (pages 25-41)
Michael Bennett Hotchkiss (Independent Researcher, USA)
Article 4
Eriksonian Analysis of Terrorism in West Africa (pages 42-59)
Chris Mensah-Ankrah (West Africa Centre for Counter Extremism, Accra, Ghana)
Issue 2
Article 1
SCIPS: Using Experiential Learning to Raise Cyber Situational Awareness in Industrial Control System (pages 1-15)
Allan Cook (De Montfort University, Leicester, United Kingdom), Richard G Smith (De Montfort University, Leicester, United Kingdom), Leandros Maglaras (De Montfort University, Leicester, United Kingdom), Helge Janicke (De Montfort University, Leicester, United Kingdom)
Article 2
A Learning-based Neural Network Model for the Detection and Classification of SQL Injection Attacks (pages 16-41)
Naghmeh Moradpoor Sheykhkanloo (Edinburgh Napier University, Edinburgh, Scotland, United Kingdom)
Article 3
A Comparative Evaluation of Mining Techniques to Detect Malicious Node in Wireless Sensor Networks (pages 42-53)
Mandeep Singh (Lovely Professional University, Jalandhar, India), Navjyot Kaur (Lovely Professional University, Jalandhar, India), Amandeep Kaur (Lovely Professional University, Jalandhar, India), Gaurav Pushkarna (Lovely Professional University, Jalandhar, India)
Issue 3
Special Issue on ICCWS 2016: Part I
Editorial Preface
Graeme Pye (Deakin University, School of Information and Business Analytics, Geelong, Australia)
Article 1
Cyberspace: The New Battlefield - An Approach via the Analytics Hierarchy Process (pages 1-15)
John S. Hurley (National Defense University, College of Information and Cyberspace (CIC), Washington, DC, USA)
Article 2
Formulating the Building Blocks for National Cyberpower (pages 16-28)
JC Jansen van Vuuren (University of Venda, Thohoyandou, South Africa & CSR Defence, Peace, Safety and Security, Pretoria, South Africa), Louise Leenen (CSIR Defence, Peace, Safety and Security, Pretoria, South Africa), Graeme Plint (Department of Defense, Pretoria, South Africa), Jannie Zaaiman (Belgium Campus, Pretoria, South Africa), Jackie Phahlamohlaka (CSIR Defence, Peace, Safety and Security: CSIR, Pretoria, South Africa)
Article 3
Optimization of Operational Large-Scale (Cyber) Attacks by a Combinational Approach (pages 29-43)
Éric Filiol (Operational Cryptology and Virology Laboratory, ESIEA, Laval, France), Cécilia Gallais (Operational Cryptology and Virology Laboratory, ESIEA, Laval, France)
Article 4
Advanced Network Data Analytics for Large-Scale DDoS Attack Detection (pages 44-54)
Konstantinos F. Xylogiannopoulos (University of Calgary, Calgary, Canada), Panagiotis Karampelas (Hellenic Air Force Academy, Dekelia, Greece), Reda Alhajj (University of Calgary, Calgary, Canada)
Issue 4
Special Issue on ICCWS 2016: Part 2
Editorial Preface
Graeme Pye (School of Information and Business Analytics, Deakin University, Geelong, Australia), Brett van Niekerk (University of Kwazulu-Natal, Durban, South Africa)
Article 1
Developing a Military Cyber Maturity Model for Multi-Domain Battle Mission Resilience and Success (pages 1-13)
David Ormrod (Australian Centre for Cyber-Security, University of New South Wales at the Australian Defence Force Academy, Canberra, Australia), Benjamin Turnbull (Australian Centre for Cyber-Security, University of New South Wales at the Australian Defence Force Academy, Canberra, Australia)
Article 2
A New Dynamic Cyber Defense Framework (pages 14-22)
Jim Q. Chen (DoD National Defense University, Washington, D.C., United States)
Article 3
Quantifying Decision Making in the Critical Infrastructure via the Analytic Hierarchy Process (AHP) (pages 23-34)
John S. Hurley (College of Information and Cyberspace (CIC), JPME and Cyber-L Department, National Defense University, iCollege, Washington, DC, USA & Information, Communications, Technology and Acquisition Department, National Defense University, Washington, DC, USA)
Article 4
The World is Polluted With Leaked Cyber Data (pages 35-51)
Ivan D. Burke (Council for Scientific and Industrial Research, University of Pretoria, Pretoria, South Africa and Rhodes University, Grahamstown, South Africa), Renier P. van Heerden (Council for Scientific and Industrial Research, University of Pretoria, Pretoria, South Africa and Nelson Mandela University, South Africa)
Sustainable Security: Rethinking American National Security Strategy
Book Review
Maximiliano Emanuel Korstanje (Department of Economics, University of Palermo, Buenos Aires, Argentina & CERS, University of Leeds, Leeds, UK)
Volume 6 (2016)
Issue 1
Special Issue on the 14th European Conference on Information Warfare and Security 2015 (ECCWS): Hatfield, UK (Part 1)
Editorial Preface
Graeme Pye (Deakin University, Geelong, Australia), Maximiliano E. Korstanje (University of Palermo, Buenos Aires, Argentina)
Article 1
Cyber Terrorism Taxonomies: Definition, Targets, Patterns, Risk Factors, and Mitigation Strategies (pages 1-12)
Ali Al Mazari (Alfaisal University, PSCJ Campus, Jeddah, Saudi Arabia), Ahmed H. Anjariny (Alfaisal University, PSCJ Campus, Jeddah, Saudi Arabia), Shakeel A. Habib (Alfaisal University, PSCJ Campus, Jeddah, Saudi Arabia), Emmanuel Nyakwende (Alfaisal University, PSCJ Campus, Jeddah, Saudi Arabia)
Article 2
Cyber Espionage and Illegitimate Information Retrieval (pages 13-23)
Roland Heickerö (School of Computer Science and Communication, Royal Institute of Technology (KTH), Stockholm, Sweden)
Article 3
Arts and Branches of Science Significantly Contributing to Cyber and Cyber Security: The West European and the Russian Views (pages 24-40)
Margarita Levin Jaitner (Swedish Defence University, Stockholm, Sweden), Áine MacDermott (School of Computer Science, Liverpool John Moores University, Liverpool, UK)
Article 4
A White Hat Study of a Nation's Publicly Accessible Critical Digital Infrastructure and a Way Forward (pages 41-52)
Timo Kiravuo (Aalto University, Helsinki, Finland), Seppo Tiilikainen (Aalto University, Helsinki, Finland), Mikko Särelä (Aalto University, Helsinki, Finland), Jukka Manner (Aalto University, Helsinki, Finland)
Issue 2
Special Issue on the 14th European Conference on Information Warfare and Security 2015 (ECCWS) – Hatfield, UK (Part 2)
Editorial Preface
Graeme Pye (Deakin University, Geelong, Australia), Maximiliano E. Korstanje (University of Palermo, Buenos Aires, Argentina)
Article 1
Situation Understanding for Operational Art in Cyber Operations (pages 1-14)
Tuija Kuusisto (Ministry of Finance and National Defence University, Helsinki, Finland), Rauno Kuusisto (The Finnish Defence Research Agency, Riihimäki, Finland and National Defence University, Helsinki, Finland and University of Jyväskylä, Jyväskylä, Finland), Wolfgang Roehrig (European Defence Agency, Brussels, Belgium)
Article 2
Cyber Security Education and Research in the Finland's Universities and Universities of Applied Sciences (pages 15-31)
Martti Lehto (Faculty of Information Technology, University of Jyväskylä, Finland)
Article 3
Reconceptualising Cyber Security: Safeguarding Human Rights in the Era of Cyber Surveillance (pages 32-40)
Andrew N. Liaropoulos (University of Piraeus, Piraeus, Greece)
Article 4
SPCTA: An Analytical Framework for Analyzing Cyber Threats by Non-State Actors (pages 41-60)
Harry Brown III (Norwich University, Northfield, VT, USA)
Issue 3
Special Issue on the 10th International Conference on Cyber Warfare and Security (ICCWS)
Editorial Preface
Graeme Pye (Deakin University, Geelong, Australia), Maximiliano E. Korstanje (University of Palermo, Buenos Aires, Argentina)
Article 1
Cyber-Security for ICS/SCADA: A South African Perspective (pages 1-16)
Barend Pretorius (Transnet and University of KwaZulu-Natal, Durban, South Africa), Brett van Niekerk (University of Kwazulu-Natal, Durban, South Africa)
Article 2
Adaptation of the JDL Model for Multi-Sensor National Cyber Security Data Fusion (pages 17-30)
Ignatius Swart (CSIR, Pretoria, South Africa), Barry Irwin (Rhodes University, Grahamstown, South Africa), Marthie M. Grobler (CSIR, Pretoria, South Africa)
Article 3
Deception Detection in Cyber Conflicts: A Use Case for the Cybersecurity Strategy Formation Framework (pages 31-42)
Jim Q. Chen (DoD National Defense University, Washington D.C., USA)
Article 4
The Next Generation of Scientific-Based Risk Metrics: Measuring Cyber Maturity (pages 43-52)
Lanier Watkins (Johns Hopkins University Information Security Institution, Baltimore, MD, USA), John S. Hurley (National Defense University, Washington D.C., USA)
Article 5
Semantic Technologies and Big Data Analytics for Cyber Defence (pages 53-64)
Louise Leenen (DPSS, CSIR and Cape Peninsula University of Technology, Cape Town, South Africa), Thomas Meyer (CAIR, CSIR Meraka, and Computer Science, University of Cape Town, Cape Town, South Africa)
Article 6
Using an Ontology for Network Attack Planning (pages 65-78)
Renier van Heerden (Council for Scientific and Industrial Research (CSIR) and Nelson Mandela Metropolitan University, South Africa), Peter Chan (Council for Scientific and Industrial Research (CSIR), Pretoria, South Africa), Louise Leenen (Council for Scientific and Industrial Research (CSIR), Pretoria and Cape Peninsula University of Technology, Cape Town, South Africa), Jacques Theron (South African National Defence Force (SANDF), Pretoria, South Africa)
Article 7
SCADA Systems Cyber Security for Critical Infrastructures: Case Studies in Multiple Sectors (pages 79-95)
Suhaila Ismail (School of Information Technology and Mathematical Sciences, University of South Australia, Adelaide, Australia), Elena Sitnikova (Australian Centre for Cyber Security (ACCS), University of New South Wales at ADFA, Canberra, Australia), Jill Slay (Australian Centre for Cyber Security (ACCS), University of New South Wales at ADFA, Canberra, Australia)
Issue 4
Article 1
Opposing Viewpoints on Youth Social Media Banning in the U.S. for the Combatance of Extremist Recruiting: Constitutionality and Societal Implications (pages 1-12)
Lindsay A. West (Pennsylvania State University, University Park, PA, USA), Richard V. Martin (Pennsylvania State University, University Park, PA, USA), Courtney Perkins (Pennsylvania State University, University Park, PA, USA), Jennifer M. Quatel (Pennsylvania State University, University Park, PA, USA), Gavin Macgregor-Skinner (Penn State Hershey Medical Center, Hershey, PA, USA)
Article 2
Understanding Online Radicalisation Using Data Science (pages 13-27)
Yeslam Al-Saggaf (Charles Sturt University, Albury, Australia)
Article 3
Biometric Technology Solutions to Countering Today's Terrorism (pages 28-40)
Israel Fianyi (Charles Sturt University, Wagga Wagga, Australia), Tanveer Zia (Charles Sturt University, Wagga Wagga, Australia)
Article 4
Economics of Cyber Security and the Way Forward (pages 41-57)
Taiseera Al Balushi (Sultan Qaboos University, Muscat, Oman), Saqib Ali (Sultan Qaboos University, Muscat, Oman), Osama Rehman (Bahria University, Karachi, Pakistan)
Ethical Issues and Citizens Rights in the Era of Digital Government Surveillance
Book Review
Maximiliano E. Korstanje (University of Palermo, Buenos Aires, Argentina)
Volume 5 (2015)
Issue 1
Special Issue on Cyber Defence in Southern African Region
Guest Editorial Preface
Joey Jansen van Vuuren (Cyber Defense for Scientific Research, Council for Scientific and Industrial Research, Pretoria, South Africa)
Article 1
A Strategic Framework for a Secure Cyberspace in Developing Countries with Special Emphasis on the Risk of Cyber Warfare (pages 1-18)
Victor Jaquire (University of Johannesburg, Johannesburg, South Africa), Basie von Solms (University of Johannesburg, Johannesburg, South Africa)
Article 2
Good Governance and Virtue in South Africa's Cyber Security Policy Implementation (pages 19-29)
Oliver Burmeister (School of Computing and Mathematics, Charles Sturt University, Bathurst, Australia), Jackie Phahlamohlaka (Defence, Peace, Safety and Security, Council for Scientific and Industrial Research, Pretoria, South Africa), Yeslam Al-Saggaf (School of Computing and Mathematics, Charles Sturt University, Wagga Wagga, Australia)
Article 3
Logic Tester for the Classification of Cyberterrorism Attacks (pages 30-46)
N. Veerasamy (Council for Scientific and Industrial Research, Johannesburg, South Africa), M.M. Grobler (University of Johannesburg, Johannesburg, South Africa)
Article 4
The Restructuring and Re-Orientation of Civil Society in a Web 2.0 World: A Case Study of Greenpeace (pages 47-61)
Kiru Pillay (Council for Scientific and Industrial Research and University of Witwatersrand, Johannesburg, South Africa), Manoj Maharaj (University of KwaZulu-Natal, Durban, South Africa)
Exchanging Terrorism Oxygen for Media Airwaves: The Age of Terroredia
Book Review
Maximiliano E. Korstanje (University of Palermo, Buenos Aires, Argentina)
Issue 2
Article 1
Secure Knowledge Management: Influencing the Development of Human Knowledge Sharing Networks (pages 1-20)
Sohail Tamaddon (Accenture/Avanade, Melbourne, Australia), Atif Ahmad (The University of Melbourne, Parkville, Australia), Rachelle Bosua (The University of Melbourne, Parkville, Australia)
Article 2
The Double Edge of the Information Sword (pages 21-30)
Aki-Mauri Huhtinen (Department of Leadership and Military Pedagogy, Finnish National Defence University, Helsinki, Finland)
Article 3
Information Security Culture: Towards an Instrument for Assessing Security Management Practices (pages 31-52)
Joo S. Lim (The University of Melbourne, Parkville, Australia), Sean B Maynard (The University of Melbourne, Parkville, Australia), Atif Ahmad (The University of Melbourne, Parkville, Australia), Shanton Chang (The University of Melbourne, Parkville, Australia)
Article 4
Conflictive Touring: The Roots of Terrorism (pages 53-67)
Maximiliano E. Korstanje (University of Palermo, Buenos Aires, Argentina)
Issue 3
Article 1
Cyberattacks on Critical Infrastructure and Potential Sustainable Development Impacts (pages 1-18)
Toufic Mezher (Masdar Institute of Science and Technology, Abu Dhabi, UAE), Sameh El Khatib (Masdar Institute of Science and Technology, Abu Dhabi, UAE), Thilanka Maduwanthi Sooriyaarachchi (Ceylon Electricity Board, Colombo, Sri Lanka)
Article 2
IT Security for SCADA: A Position Paper (pages 19-27)
Rahul Rastogi (Engineers India Limited, New Delhi, India and Nelson Mandela Metropolitan University, Port Elizabeth, South Africa), Rossouw von Solms (Nelson Mandela Metropolitan University, Port Elizabeth, South Africa)
Article 3
The Role of Human Operators' Suspicion in the Detection of Cyber Attacks (pages 28-44)
Leanne Hirshfield (Syracuse University, Syracuse, NY, USA), Philip Bobko (Gettysburg College, Gettysburg, PA, USA), Alex J. Barelka (Illinois State University, Normal, IL, USA), Mark R. Costa (Syracuse University, Syracuse, NY, USA), Gregory J. Funke (Air Force Research Laboratory, Wright-Patterson Air Force Base, OH, USA), Vincent F. Mancuso (MIT Lincoln Laboratory, Lexington, MA, USA), Victor Finomore (Air Force Research Laboratory, Wright-Patterson Air Force Base, OH, USA), Benjamin A. Knott (Air Force Office of Scientific Research, Arlington, VA, USA)
Article 4
Terrorists Tend to Target Innocent Tourists: A Radical Review (pages 45-54)
Maximiliano E. Korstanje (University of Palermo, Buenos Aires, Argentina)
The Psychology of Cyber Crime: Concept and Principles
Book Review
Maximiliano E. Korstanje (University of Palermo, Buenos Aires, Argentina)
Issue 4
Article 1
Cyberspace as a Complex Adaptive System and the Policy and Operational Implications for Cyberwarfare (pages 1-14)
Albert Olagbemiro (United States Air Force Reserve, Charlotte, NC, USA)
Article 2
Scientometric Analysis of Chinese Cyber-Denial and Deception Research (pages 15-58)
Phil Hilliard (The MITRE Corporation, McLean, VA, USA), Frank J. Stech (The MITRE Corporation, McLean, VA, USA), Kristin E. Heckman (The MITRE Corporation, McLean, VA, USA), Janice Redington Ballo (The MITRE Corporation, McLean, VA, USA)
Volume 4 (2014)
Issue 1
Special Issue on Cyber Terrorism and the Dark Side of the Information Society
Editorial Preface
Maximiliano E. Korstanje (Department of Economics, University of Palermo, Buenos Aires, Argentina)
Article 1
The Triumph of Fear: Connecting the Dots about Whistleblowers and Surveillance (pages 1-7)
David L. Altheide (School of Social Transformation, Arizona State University, Tempe, Arizona, USA)
Article 2
Why Risk-Research is More Prominent in English Speaking Countries in the Digital Society (pages 8-18)
Maximiliano E. Korstanje (National University of Quilmes, Buenos Aires, Argentina)
Article 3
Towards an Index of Fear: The Role of Capital in Risk´s Construction (pages 19-26)
Maximiliano E. Korstanje (National University of Quilmes, Buenos Aires, Argentina)
Article 4
Stealing Consciousness: Using Cybernetics for Controlling Populations (pages 27-35)
Geoffrey R. Skoll (Buffalo State College, Buffalo, New York, USA)
Article 5
Lone Wolves: Updating the Concept of Enemy in the Social Media Age (pages 36-44)
Primavera Fisogni (Editor in Chief at La Provincia Di Como, Como, Italy)
Issue 2
Article 1
A Distributed IDS for Industrial Control Systems (pages 1-22)
Tiago Cruz (University of Coimbra, Coimbra, Portugal), Jorge Proença (University of Coimbra, Coimbra, Portugal), Paulo Simões (University of Coimbra, Coimbra, Portugal), Matthieu Aubigny (iTrust Consulting, Niederanven, Luxembourg), Moussa Ouedraogo (Luxembourg Institute of Science and Technology, Kirchberg, Luxembourg), Antonio Graziano (Selex ES, Roma, Italy), Leandros Maglaras (University of Surrey, Guildford, UK)
Article 2
The Opportunities of National Cyber Strategy and Social Media in the Rhizome Networks (pages 23-34)
Aki-Mauri Huhtinen (National Defence University, Helsinki, Finland), Arto Hirvelä (National Defence University, Helsinki, Finland), Tommi Kangasmaa (National Defence University, Helsinki, Finland)
Article 3
Article 4
Aligning Two Specifications for Controlling Information Security (pages 46-62)
Riku Nykänen (University of Jyväskylä, Jyväskylä, Finland), Tommi Kärkkäinen (University of Jyväskylä, Jyväskylä, Finland)
Issue 3
Article 1
A Framework for Cybersecurity Strategy Formation (pages 1-10)
Jim Q. Chen (DoD National Defense University, Washington, DC, USA)
Article 2
Cyber Readiness: Are We There Yet? (pages 11-26)
John S. Hurley (National Defense University, Washington, DC, USA), H. Mark McGibbon (National Defense University, Washington, DC, USA), Roxanne Everetts (National Defense University, Washington, DC, USA)
Article 3
Cyber Can Kill and Destroy Too: Blurring Borders Between Conventional and Cyber Warfare (pages 27-42)
Marina Krotofil (Institute for Security in Distributed Applications, Hamburg University of Technology, Hamburg, Germany)
Article 4
Applicability of Jus in Bello in Cyber Space: Dilemmas and Challenges (pages 43-62)
Qifan Wang (Robert H. McKinney School of Law, Indiana University, Indianapolis, IN, USA)
Article 5
Using Deceptive Information in Computer Security Defenses (pages 63-80)
Mohammed H. Almeshekah (Purdue University, West Lafayette, IN, USA), Eugene H. Spafford (Purdue University, West Lafayette, IN, USA)
Issue 4
Article 1
Clausewitz and the Utility of Cyberattacks in War (pages 1-16)
Jeppe Teglskov Jacobsen (Danish Institute for International Studies, Copenhagen, Denmark)
Article 2
The Covert Strengthening of Islamic Extremists under Ronald Reagan and George W. Bush (pages 17-28)
Jason Cooley (University of Hartford, West Hartford, CT, USA)
Article 4
Intellectual Property Protection in Small Knowledge Intensive Enterprises (pages 47-63)
Riikka Kulmala (Turku University of Applied Sciences, Turku, Finland), Juha Kettunen (Turku University of Applied Sciences, Turku, Finland)
Article 5
A Critical Comparison of Trusted Computing and Trust Management Technologies (pages 64-81)
Michele Tomaiuolo (Department of Information Engineering, University of Parma, Parma, Italy)
Volume 3 (2013)
Issue 1
Article 1
Intellectual Property Systems in Software (pages 1-14)
Ricardo Rejas-Muslera (University of Alcalá, Madrid, Spain), Elena Davara (Davara & Davara Law, Madrid, Spain), Alain Abran (University du Quebec, Montréal, Canada), Luigi Buglione (University du Quebec, Montréal, Canada)
Article 2
On the Study of Certified Originality for Digital Alteration Problem: Technology Developments of the Time Authentication (pages 15-28)
Masakazu Ohashi (Chuo University, Tokyo, Japan), Mayumi Hori (Hakuoh University, Tochigi, Japan)
Article 3
Intellectual Property Protection in Small Knowledge Intensive Enterprises (pages 29-45)
Riikka Kulmala (Turku University of Applied Sciences, Turku, Finland), Juha Kettunen (Turku University of Applied Sciences, Turku, Finland)
Article 4
Online Interaction with Millenials: Institution vs. Community (pages 46-62)
Kurt Komaromi (Ithaca College, Ithaca, NY, USA), Fahri Unsal (Ithaca College, Ithaca, NY, USA), G. Scott Erickson (Ithaca College, Ithaca, NY, USA)
Issue 2
Article 1
Incident and Disaster Management Training: An Update on Using Virtual World Scenarios for Emergency Management Training (pages 1-21)
Anne M. Hewitt (Seton Hall University, South Orange, NJ, USA), Danielle Mirliss (Seton Hall University, South Orange, NJ, USA), Riad Twal (Seton Hall University, South Orange, NJ, USA)
Article 2
Ascertaining Trust Indicators in Social Networking Sites (pages 22-37)
N. Veerasamy (Defense, Peace, Safety and Security, Council for Scientific and Industrial Research, Pretoria, South Africa), W. A. Labuschagne (Defense, Peace, Safety and Security, Council for Scientific and Industrial Research, Pretoria, South Africa)
Article 3
An Efficient Protocol for Privacy and Authentication for Resource-Constrained Devices in Wireless Networks (pages 38-57)
Clifton Mulkey (Texas A &M University - Corpus Christi, Corpus Christi, TX, USA), Dulal Kar (Texas A &M University - Corpus Christi, Corpus Christi, TX, USA), Ajay Katangur (Texas A &M University - Corpus Christi, Corpus Christi, TX, USA)
Article 4
Social Engineering Techniques and Password Security: Two Issues Relevant in the Case of Health Care Workers (pages 58-70)
B. Dawn Medlin (Department of Computer Information Systems, Walker College of Business, Appalachian State University, Boone, NC, USA)
Issue 3
Article 1
The Cyberspace Threats and Cyber Security Objectives in the Cyber Security Strategies (pages 1-18)
Martti Lehto (University of Jyväskylä, Jyväskylä, Finland)
Article 2
Consequences of Diminishing Trust in Cyberspace (pages 19-31)
Dipankar Dasgupta (Center for Information Assurance (CAE-R), Department of Computer Science, University of Memphis, Memphis, TN, USA), Denise M. Ferebee (Center for Information Assurance (CAE-R), Department of Computer Science, University of Memphis, Memphis, TN, USA)
Article 3
Information Security Management: A Case Study in a Portuguese Military Organization (pages 32-48)
José Martins (Centro de Investigação da Academia Militar (CINAMIL), Academia Militar, Lisboa, Portugal), Henrique dos Santos (Departamento de Sistemas de Informação (DSI), Universidade do Minho, Guimarães, Portugal), António Rosinha (Centro de Investigação da Academia Militar (CINAMIL), Academia Militar, Lisboa, Portugal), Agostinho Valente (Instituto Geográfico do Exército, Lisboa, Portugal)
Article 4
Tools and Technologies for Professional Offensive Cyber Operations (pages 49-71)
T. J. Grant (Retired But Active Researcher (R-BAR), Benschop, Netherlands)
Article 5
Strategic Communication for Supporting Cyber-Security (pages 72-79)
Tuija Kuusisto (Department of Tactics and Operations Art, National Defence University, Helsinki, Finland), Rauno Kuusisto (Department of Tactics and Operations Art, National Defence University, Helsinki, Finland & Department of Mathematical Information Technology, University of Jyväskylä, Jyväskylä, Finland)
Article 6
Critical Infrastructure Protection: Evolution of Israeli Policy (pages 80-87)
L. Tabansky (Yuval Ne'eman Workshop for Science, Technology and Security, Tel Aviv University, Tel Aviv, Israel)
Issue 4
Article 1
The Value of Interaction for Russia, the USA and China Facing the Information Warfare (pages 1-9)
Vasilyeva Inna (Kuban State University of Technology, Krasnodar, Russia)
Article 2
The EU ECENTRE Project: Education as a Defensive Weapon in the War Against Cybercrime (pages 10-21)
Denis Edgar-Nevill (Centre for Cybercrime Forensics, Canterbury Christ Church University, Canterbury, United Kingdom)
Article 3
Preparing for Cyber Threats with Information Security Policies (pages 22-31)
Ilona Ilvonen (Tampere University of Technology, Tampere, Finland), Pasi Virtanen (Tampere University of Technology, Tampere, Finland)
Article 4
SCADA Threats in the Modern Airport (pages 32-39)
John McCarthy (ServiceTec, Cranfield University, Cranfield, England), William Mahoney (University of Nebraska Omaha, Omaha, NE, USA)
Article 5
Monkey See - Monkey Take Photo: The Risk of Mobile Information Leakage (pages 40-51)
Karen Renaud (School of Computing Science, University of Glasgow, Glasgow, UK), Wendy Goucher (University of Glasgow, Glasgow, UK)
Article 6
What Lawyers Want: Legally Significant Questions that Only IT Specialists can Answer (pages 52-57)
Yaroslav Radziwill (University of Warwick, Coventry, UK)
Article 7
Security Risks to IT Supply Chains under Economic Stress (pages 58-73)
C. Warren Axelrod (Delta Risk LLC, Arlington, VA, USA), Sukumar Haldar (Director of Application Development and Risk Management, Anshinsoft Inc., New York, NY, USA)
Volume 2 (2012)
Issue 1
Article 1
Online Social Networking: A Source of Intelligence for Advanced Persistent Threats (pages 1-13)
Nurul Nuha Abdul Molok (Department of Information Systems, The University of Melbourne, Melbourne, VIC, Australia), Atif Ahmad (Department of Information Systems, The University of Melbourne, Melbourne, VIC, Australia), Shanton Chang (Department of Information Systems, The University of Melbourne, Melbourne, VIC, Australia)
Article 2
A Vulnerability-Based Model of Cyber Weapons and its Implications for Cyber Conflict (pages 14-26)
Christian Czosseck (Estonian Business School, Tallinn, Estonia), Karlis Podins (Tallinn University of Technology, Tallinn, Estonia)
Article 3
Cyber Security Awareness as Critical Driver to National Security (pages 27-38)
Joey Jansen van Vuuren (Cyber Defense for Scientific Research, Council for Scientific and Industrial Research, Pretoria, South Africa), Marthie Grobler (Cyber Security Research, Council for Scientific and Industrial Research, Pretoria, South Africa), Jannie Zaaiman (University of Venda, Thohoyandou, South Africa)
Article 4
Securing America Against Cyber War (pages 39-49)
Jayson McCune (College of Information Science & Technology, University of Nebraska at Omaha, Omaha, NE, USA), Dwight A. Haworth (Department of Information Systems, University of Nebraska at Omaha, Omaha, NE, USA)
Article 5
A World without Islam (pages 50-52)
Maximiliano E. Korstanje (Department of Economics, University of Palermo, Buenos Aires, Argentina)
Issue 2
Article 1
From Military Threats to Everyday Fear: Computer Games as the Representation of Military Information Operations (pages 1-10)
Aki-Mauri Huhtinen (Department of Leadership and Military Pedagogy, Finnish National Defence University, Helsinki, Finland)
Article 2
What Does the Concept of Ambidexterity Mean in the Current Military Planning Process and Organization Construction? (pages 11-21)
Aki-Mauri Huhtinen (Department of Leadership and Military Pedagogy, Finnish National Defence University, Helsinki, Finland)
Article 3
The Comprehensive Approach as a Strategic Design to Run the Military-Industrial Complex in Operations (pages 22-30)
Mirva Salminen (Department of Social Sciences, University of Lapland, Rovaniemi, Finland), Aki-Mauri Huhtinen (Department of Leadership and Military Pedagogy, National Defence University, Helsinki, Finland)
Public Violence in Colombia, 1958-2010
Book Review
Maximiliano E. Korstanje (Department of Economics, University of Palermo, Buenos Aires, Argentina)
Crime and Crime Reduction: The Importance of Group Processes
Book Review
Maximiliano E. Korstanje (Department of Economics, University of Palermo, Buenos Aires, Argentina)
Issue 3
Article 1
Internet Study: Cyber Threats and Cybercrime Awareness and Fear (pages 1-11)
Igor Bernik (Faculty of Criminal Justice and Security, University of Maribor, Ljubljana, Slovenia)
Article 2
A Computer Network Attack Taxonomy and Ontology (pages 12-25)
R. P. van Heerden (CSIR, Pretoria, South Africa & Rhodes University, Grahamstown, South Africa), B. Irwin (Rhodes University, Grahamstown, South Africa), I. D. Burke (CSIR, Pretoria, South Africa), L. Leenen (CSIR, Pretoria, South Africa)
Article 3
Establishing Cyberspace Sovereignty (pages 26-38)
Kris E. Barcomb (Air Force Institute of Technology, Wright-Patterson AFB, OH, USA), Dennis J. Krill (Air Force Institute of Technology, Wright-Patterson AFB, OH, USA), Robert F. Mills (Air Force Institute of Technology, Wright-Patterson AFB, OH, USA), Michael A. Saville (Air Force Institute of Technology, Wright-Patterson AFB, OH, USA)
Article 4
In Internet’s Way: Radical, Terrorist Islamists on the Free Highway (pages 39-58)
Raphael Cohen-Almagor (Department of Politics and International Studies, The University of Hull, Hull, UK)
Issue 4
Article 1
Application of Information Technology in Disaster and Emergency Management (pages 1-12)
Jishnu Subedi (Centre of Resilient Development, Kathmandu, Nepal)
Article 2
An Approach to Governance of CyberSecurity in South Africa (pages 13-27)
Joey Jansen van Vuuren (Council for Industrial and Scientific Research, Pretoria, South Africa), Louise Leenen (Council for Industrial and Scientific Research, Pretoria, South Africa), Jackie Phahlamohlaka (Council for Industrial and Scientific Research, Pretoria, South Africa), Jannie Zaaiman (University of Venda, Thohoyandou, South Africa)
Article 3
US Foreign Policy Challenges of Non-State Actors’ Cyber Terrorism against Critical Infrastructure (pages 28-48)
Natalia Tereshchenko (Russian Academy of Sciences, Athens, Greece)
Article 4
Trust Enforcing and Trust Building, Different Technologies and Visions (pages 49-66)
Michele Tomaiuolo (Department of Information Engineering, University of Parma, Parma, Italy)
Volume 1 (2011)
Issue 1
Article 1
Critical Infrastructure as Complex Emergent Systems (pages 1-12)
Ted G. Lewis (Naval Postgraduate School, USA), Thomas J. Mackin (Cal Poly University, San Luis Obispo, USA), Rudy Darken (Naval Postgraduate School, USA)
Article 2
"This is not a cyber war, it's a...?": Wikileaks, Anonymous and the Politics of Hegemony (pages 13-23)
David Barnard-Wills (Cranfield University, UK)
Article 3
Estonia after the 2007 Cyber Attacks: Legal, Strategic and Organisational Changes in Cyber Security (pages 24-34)
Christian Czosseck (Cooperative Cyber Defence Centre of Excellence, Estonia), Rain Ottis (Cooperative Cyber Defence Centre of Excellence, Estonia), Anna-Maria Talihärm (Cooperative Cyber Defence Centre of Excellence, Estonia)
Article 4
Protection of Australia in the Cyber Age (pages 35-40)
Matthew Warren (Deakin University, Australia), Shona Leitch (Deakin University, Australia)
Article 5
Misuse Detection for Mobile Devices Using Behaviour Profiling (pages 41-53)
Fudong Li (Plymouth University, UK), Nathan Clarke (Plymouth University, UK, and Edith Cowan University, Australia), Maria Papadaki (Plymouth University, UK), Paul Dowland (Plymouth University, UK)
Issue 2
Article 1
The Open Definition of Cyber: Technology or a Social Construction? (pages 1-9)
Martti Lehto (Finnish National Defence University, Finland), Aki-Mauri Huhtinen (Finnish National Defence University, Finland), Saara Jantunen (Finnish National Defence University, Finland)
Article 2
Towards the Human Information Security Firewall (pages 10-17)
Rossouw von Solms (Nelson Mandela Metropolitan University, South Africa), Matthew Warren (Deakin University, Australia)
Article 3
Understanding Optimal Investment in Cyber Terrorism: A Decision Theoretic Approach (pages 18-34)
Tridib Bandyopadhyay (Kennesaw State University, USA)
Article 4
Challenges in Monitoring Cyberarms Compliance (pages 35-48)
Neil C. Rowe (U.S. Naval Postgraduate School, USA), Simson L. Garfinkel (U.S. Naval Postgraduate School, USA), Robert Beverly (U.S. Naval Postgraduate School, USA), Panayotis Yannakogeorgos (Air Force Research Institute, USA)
Issue 3
Article 1
Fostering SCADA and IT Relationships: An Industry Perspective (pages 1-11)
Christopher Beggs (Security Infrastructure Solutions, Australia), Ryan McGowan (Goulburn Valley Water, Australia)
Article 2
Influence Strategy: Consistency and Legitimacy as Key Factors (pages 12-36)
Bryan Pickett (United State Air Force, USA), Mike Lingenfelter (United States Army, USA)
Article 3
Critical Infrastructure Systems: Security Analysis and Modelling Approach (pages 37-58)
Graeme Pye (Deakin University, Australia)
Article 4
World War III: The Cyber War (pages 59-69)
Mandeep Singh Bhatia (Lyallpur Khalsa College, Jalandhar, India)
Article 5
Toward a U.S. Army Cyber Security Culture (pages 70-80)
Christopher Paul (RAND, USA), Isaac R. Porche (RAND, USA)
Issue 4
Article 1
The Memetic Engineering of Anonymous, the Cyberterrorist Group (pages 1-9)
Thomas Woolford (Nicholson School of Communication, University of Central Florida, Sanford, FL, USA), Jonathan Matusitz (Seminole State College, University of Central Florida, Sanford, USA)
Article 2
Cyber War Retaliation Decision: A Fuzzy Multi Criteria Decision Making Approach (pages 10-31)
Mhamed Zineddine (ALHOSN University Abu Dhabi, Abu Dhabi, UAE)
Article 3
Adapting the Current National Defence Doctrine to Cyber Domain (pages 32-52)
Topi Tuukkanen (Finnish Ministry of Defence, Helsinki, Finland)
Article 4
Violencia de Estado, guerra, resistencia. Por una nueva política de la Izquierda (pages 53-55)
Maximiliano E. Korstanje (University of Palermo, Buenos Aires, Argentina)