Journal of Information Security

Journal of Information Security

ISSN Print: 2153-1234
ISSN Online: 2153-1242
www.scirp.org/journal/jis
E-mail: jis@scirp.org
"The Application of Mixed Method in Developing a Cyber Terrorism Framework"
written by Rabiah Ahmad, Zahri Yunos,
published by Journal of Information Security, Vol.3 No.3, 2012
has been cited by the following article(s):
  • Google Scholar
  • CrossRef
[1] 42 Methoden der Terrorismusforschung: Ein Überblick
Terrorismusforschung, 2022
[2] Terrorism and Social Media: Extremist Groups and College Student Recruitment
2021
[3] Artificial Intelligence Cybersecurity Threats: Determining Strategy and Decision-Making Effects
2020
[4] A Mixed-Methods Research design for study of possible futures for South Africa's transition to a low carbon economy.
2020
[5] Security Technology and Awareness Training; Do They Affect Behaviors and Thus Reduce Breaches?
2019
[6] The evolution of deterrence theory for a new dimension The challenges of cyber deterrence strategies in international system
2019
[7] Cashing in on Cyberpower: How Interdependent Actors Seek Economic Outcomes in a Digital World
2018
[8] EFFECT OF MOBILE BANKING ADOPTION ON THE PERFORMANCE OF SMALL AND MEDIUM ENTERPRISES IN NAIROBI COUNTY
International Journal of Economics, Business and Management Research, 2018
[9] Estudos prospectivos sobre o ciber terrorismo na Paraíba
2018
[10] The Threats of Cyber Warfare in the Sadc Region: The Case of Zimbabwe
2017
[11] THE CRIME-TERROR NEXUS: IMPROVISED EXPLOSIVE DEVICE ILLICIT SUPPLY INTERMEDIATION
2017
[12] Understanding Cyber Terrorism from Motivational Perspectives: A Qualitative Data Analysis
2017
[13] Cyber-Security Policy Decisions in Small Businesses
Walden Dissertations and Doctoral Studies, 2017
[14] Examining the Negative Impact of Information Security on Worker Performance
ProQuest Dissertations Publishing, 2017
[15] Organizational Decisions about Cyber Security in Small to Mid-Sized Businesses: A Qualitative Study
ProQuest Dissertations Publishing, 2016
[16] Law Enforcement Leadership Training Strategies
Walden Dissertations and Doctoral Studies, 2016
[17] Law Enforcement Employees' Experiences of Skillful Recognition by Leaders
Walden Dissertations and Doctoral Studies, 2016
[18] The Relationship Between Terrorism, Oil Prices, and Airline Profitability
Walden Dissertations and Doctoral Studies, 2015
[19] The implementation of mixed method in developing a mobile learners security framework
Computational Science and Technology (ICCST), 2014 International Conference on, 2014
[20] Adoption of Mobile Payments in Kenyan Businesses: A case study of Small and Medium Enterprises (SME) in Kenya
International Journal of Computer Applications, 2014
[21] Grounding the component of cyber terrorism framework using the grounded theory
Science and Information Conference (SAI), 2014. IEEE, 2014
[22] The Application of Qualitative Method in Developing a Cyber Terrorism Framework
RECENT ADVANCES in ECONOMICS, MANAGEMENT and DEVELOPMENT, 2014
[23] The evolution of deterrence theory for a new dimension: The challenges of cyber deterrence strategies in international system
Free SCIRP Newsletters
Copyright © 2006-2024 Scientific Research Publishing Inc. All Rights Reserved.
Top