Cyber warfare and terrorism: concepts, methodologies, tools, and applications
"This book explores the utilization of online tools by terrorist organizations to communicate with and recruit potential extremists and examines effective countermeasures employed by law enforcement agencies to defend against such threats"--
Gespeichert in:
Format: | Elektronisch E-Book |
---|---|
Sprache: | English |
Veröffentlicht: |
Hershey, PA
IGI Global
[2020]
|
Schlagworte: | |
Online-Zugang: | DE-1050 DE-706 DE-83 DE-898 Volltext |
Zusammenfassung: | "This book explores the utilization of online tools by terrorist organizations to communicate with and recruit potential extremists and examines effective countermeasures employed by law enforcement agencies to defend against such threats"-- |
Beschreibung: | 1 Online-Ressource |
ISBN: | 9781799824671 |
DOI: | 10.4018/978-1-7998-2466-4 |
Internformat
MARC
LEADER | 00000nmm a2200000 c 4500 | ||
---|---|---|---|
001 | BV046692214 | ||
003 | DE-604 | ||
005 | 20211108 | ||
007 | cr|uuu---uuuuu | ||
008 | 200424s2020 |||| o||u| ||||||eng d | ||
020 | |a 9781799824671 |9 978-1-7998-2467-1 | ||
035 | |a (OCoLC)1152312454 | ||
035 | |a (DE-599)BVBBV046692214 | ||
040 | |a DE-604 |b ger |e rda | ||
041 | 0 | |a eng | |
049 | |a DE-1050 |a DE-706 |a DE-83 |a DE-898 | ||
245 | 1 | 0 | |a Cyber warfare and terrorism |b concepts, methodologies, tools, and applications |c Information Resources Management Association, USA |
264 | 1 | |a Hershey, PA |b IGI Global |c [2020] | |
300 | |a 1 Online-Ressource | ||
336 | |b txt |2 rdacontent | ||
337 | |b c |2 rdamedia | ||
338 | |b cr |2 rdacarrier | ||
505 | 8 | |a Volume I. Section 1. Fundamental concepts and theories. Chapter 1. Digital evidence in practice: procedure and tools ; Chapter 2. Introduction to tourism security: tourism in the age of terrorism ; Chapter 3. English speaking countries and the culture of fear: understanding technology and terrorism ; Chapter 4. The cyber talent gap and cybersecurity professionalizing ; Chapter 5. The fundamentals of digital forensics and cyber law ; Chapter 6. Dark and deep webs-liberty or abuse ; Chapter 7. A review on cyberattacks: security threats and solution techniques for different applications -- | |
505 | 8 | |a Section 2. Development and design methodologies. Chapter 8. Cyber-physical systems: an overview of design process, applications, and security ; Chapter 9. Developing a military cyber maturity model for multi-domain battle mission resilience and success ; Chapter 10. Advances in digital forensics frameworks and tools: a comparative insight and ranking ; Chapter 11. Situation understanding for operational art in cyber operations ; Chapter 12. A new dynamic cyber defense framework ; Chapter 13. A cyber crime investigation model based on case characteristics ; Chapter 14. Deception detection in cyber conflicts: a use case for the cybersecurity strategy formation framework ; Chapter 15. Using an ontology for network attack planning ; Chapter 16. Contrast modification forensics algorithm based on merged weight histogram of run length ; Chapter 17. A framework for dark web threat intelligence analysis ; Chapter 18. | |
505 | 8 | |a A classification framework for data mining applications in criminal science and investigations ; Chapter 19. Toward a model for ethical cybersecurity leadership ; Chapter 20. Algorithm for secure hybrid cloud Design against ddos attacks ; Chapter 21. Modelling cyber-crime protection behaviour among computer users in the context of Bangladesh ; Chapter 22. A privacy protection approach based on android application's runtime behavior monitor and control ; Chapter 23. A steganalytic scheme based on classifier selection using joint image characteristics ; Chapter 24. Attack detection in cloud networks based on artificial intelligence approaches ; Chapter 25. An economical methodology to rhetorical identifications in cloud victimization virtual machine snapshots -- | |
505 | 8 | |a Section 3. Tools and technologies. Chapter 26. Cyber-physical systems in vehicular communications ; Chapter 27. Technology-enhanced learning in cyber-physical systems embedding modeling and simulation ; Chapter 28. SCADA systems cyber security for critical infrastructures: case studies in multiple sectors ; Chapter 29. Quantifying decision making in the critical infrastructure via the analytic hierarchy process (AHP) ; Chapter 30. Social media and the use of discursive markers of online extremism and recruitment ; Chapter 31. An overview on passive image forensics technology for automatic computer forgery ; Chapter 32. Secure interoperability in cyber-physical systems ; Chapter 33. Autonomic computing architecture for SCADA cyber security -- | |
505 | 8 | |a Volume II Chapter 34. Blind image source device identification: practicality and challenges ; Chapter 35. Digital forensic and machine learning ; Chapter 36. Disconnects of specialized mobile digital forensics within the generalized field of digital forensic science ; Chapter 37. A reliable data provenance and privacy preservation architecture for business-driven cyber-physical systems using blockchain ; Chapter 38. Cyber-security for ICS/SCADA: a South African perspective ; Chapter 39. The communicating and marketing of radicalism: a case study of ISIS and cyber recruitment ; Chapter 40. Optimization of operational large-scale (cyber) attacks by a combinational approach ; Chapter 41. GPS patents and their effects on our future and rights ; Chapter 42. Detecting synchronization signal jamming attacks for cybersecurity in cyber-physical energy grid systems ; Chapter 43. Slacktivism, supervision, and selfies: illuminating social media composition through reception theory ; Chapter 44. | |
505 | 8 | |a An image forgery detection approach based on camera's intrinsic noise properties ; Chapter 45. On more paradigms of steganalysis ; Chapter 46. Copy-move forgery detection using dywt ; Chapter 47. Distributed system implementation based on "ants feeding birds" algorithm: electronics transformation via animals and human ; Chapter 48. A cyber-physical photovoltaic array monitoring and control system ; Chapter 49. Advanced threat detection based on big data technologies ; Chapter 50. Possibilities, impediments, and challenges for network security in big data ; Chapter 51. Big data analytics platforms for electric vehicle integration in transport oriented smart cities: computing platforms for platforms for electric vehicle integration in smart cities ; Chapter 52. Computer forensic investigation in cloud of things ; Chapter 53. Distprov-data provenance in distributed cloud for secure transfer of digital assets with ethereum blockchain using ZKP -- | |
505 | 8 | |a Section 4. Utilization and applications. Chapter 54. Punching above their digital weight: why Iran is developing cyberwarfare capabilities far beyond expectations ; Chapter 55. Cyberattacks, cybercrime and cyberterrorism ; Chapter 56. Cyber security vulnerability management in CBRN industrial control systems (ICS) ; Chapter 57. A case for using blended learning and development techniques to aid the delivery of a UK cybersecurity core body of knowledge ; Chapter 58. Modern information technology, global risk, and the challenges of crime in the era of late modernity ; Chapter 59. The need for higher education in cyber supply chain security and hardware assurance ; Chapter 60. Toward approaches to big data analysis for terroristic behavior identification: child soldiers in illegal armed groups during the conflict in the Donbas Region (East Ukraine) ; Chapter 61. Russian active measures and september 11, 2001: Nostradamus themed disinformation? ; Chapter 62. | |
505 | 8 | |a Countering online violent extremism: state action as strategic communication ; Chapter 63. An exploration of the cybersecurity workforce shortage ; Chapter 64. Bioterrorism, bio crimes and politics: a case of chaos and complexity ; Chapter 65. Managing organized crime ; Chapter 66. Cybercrime as a threat to Zimbabwe's peace and security -- Volume III. Chapter 67. Why is ISIS so psychologically attractive? ; Chapter 68. Assessment of honeypots: issues, challenges and future directions ; Chapter 69. Digital forensics in the context of the Internet of Things ; Chapter 70. A socio-technical perspective on threat intelligence informed digital forensic readiness -- | |
505 | 8 | |a Section 5. Organizational and social implications. Chapter 71. A comparative analysis of the cyberattacks against Estonia, the United States, and Ukraine: exemplifying the evolution of internet-supported warfare ; Chapter 72. Eriksonian analysis of terrorism in West Africa ; Chapter 73. Tourism, terrorism, morality, and marketing: a study of the role of reciprocity in tourism marketing ; Chapter 74. The roots of terror: the lesser evil doctrine under criticism ; Chapter 75. ISIS rhetoric for the creation of the ummah ; Chapter 76. Exploring myths in digital forensics: separating science from ritual ; Chapter 77. Cyber hygiene in health care data breaches ; Chapter 78. Building national resilience in the digital era of violent extremism: systems and people ; Chapter 79. A region of association and turbulence ; Chapter 80. Jus in Bello and the acts of terrorism: a study ; Chapter 81. Copy-move forgery localization using convolutional neural networks and CFA features ; Chapter 82. | |
505 | 8 | |a The cyberethics, cybersafety, and cybersecurity at schools ; Chapter 83. Filtration of terrorism-related texts in the e-government environment ; Chapter 84. The effects of money laundering (ML) on growth application to the Gulf countries ; Chapter 85. Jihadist propaganda on social media: an examination of ISIS related content on Twitter ; Chapter 86 | |
505 | 8 | |a Managing terrorism in Africa: assessing policing issues ; Chapter 87. Credit card fraud: behind the scenes ; Chapter 88. The threat of cyber warfare in the SADC region: the case of Zimbabwe ; Chapter 89. Islamic extremists in Africa: security spotlight on Kenya and Nigeria ; Chapter 90. Cloud risk resilience: investigation of audit practices and technology advances -- a technical report -- Section 6. Managerial impact. Chapter 91. Management approach of risk analysis in information security ; Chapter 92. Cybersecurity best practices and cultural change in global business: some perspectives from the European union -- Section 7. Critical issues and challenges. Chapter 93. Research on digital forensics based on Uyghur web text classification ; Chapter 94. Determinants of terrorism in South Asia: insights from a dynamic panel data analysis ; Chapter 95. What we know and what else we need to do to address the problem of violent extremism online: concluding chapter ; Chapter 96. Ethos construction, identification, and authenticity in the discourses of AWSA: the Arab women's solidarity association international ; Chapter 97. On experience of social networks exploration for comparative analysis of narratives of foreign members of armed groups: IS and l/DPR in Syria and Ukraine in 2015-2016 ; Chapter 98. A White hat study of a nation's publicly accessible critical digital infrastructure and a way forward -- Section 8. Emerging trends. Chapter 99. The next generation of scientific-based risk metrics: measuring cyber maturity | |
520 | |a "This book explores the utilization of online tools by terrorist organizations to communicate with and recruit potential extremists and examines effective countermeasures employed by law enforcement agencies to defend against such threats"-- | ||
650 | 4 | |a Cyberterrorism / Prevention | |
650 | 4 | |a Terrorism / Prevention | |
650 | 7 | |a Cyberterrorism / Prevention |2 fast | |
650 | 7 | |a Terrorism / Prevention |2 fast | |
710 | 2 | |a Information Resources Management Association |0 (DE-588)5010976-5 |4 isb | |
776 | 0 | 8 | |i Erscheint auch als |n Druck-Ausgabe, hardcover |z 978-1-7998-2466-4 |
856 | 4 | 0 | |u https://doi.org/10.4018/978-1-7998-2466-4 |x Verlag |z URL des Erstveröffentlichers |3 Volltext |
912 | |a ZDB-98-IGB | ||
966 | e | |u https://doi.org/10.4018/978-1-7998-2466-4 |l DE-1050 |p ZDB-98-IGB |q FHD01_IGB_Kauf |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.4018/978-1-7998-2466-4 |l DE-706 |p ZDB-98-IGB |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.4018/978-1-7998-2466-4 |l DE-83 |p ZDB-98-IGB |q TUB_EBS_IGB |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.4018/978-1-7998-2466-4 |l DE-898 |p ZDB-98-IGB |q FHR_PDA_IGB |x Verlag |3 Volltext |
Datensatz im Suchindex
_version_ | 1805076707189719040 |
---|---|
adam_text | |
adam_txt | |
any_adam_object | |
any_adam_object_boolean | |
building | Verbundindex |
bvnumber | BV046692214 |
collection | ZDB-98-IGB |
contents | Volume I. Section 1. Fundamental concepts and theories. Chapter 1. Digital evidence in practice: procedure and tools ; Chapter 2. Introduction to tourism security: tourism in the age of terrorism ; Chapter 3. English speaking countries and the culture of fear: understanding technology and terrorism ; Chapter 4. The cyber talent gap and cybersecurity professionalizing ; Chapter 5. The fundamentals of digital forensics and cyber law ; Chapter 6. Dark and deep webs-liberty or abuse ; Chapter 7. A review on cyberattacks: security threats and solution techniques for different applications -- Section 2. Development and design methodologies. Chapter 8. Cyber-physical systems: an overview of design process, applications, and security ; Chapter 9. Developing a military cyber maturity model for multi-domain battle mission resilience and success ; Chapter 10. Advances in digital forensics frameworks and tools: a comparative insight and ranking ; Chapter 11. Situation understanding for operational art in cyber operations ; Chapter 12. A new dynamic cyber defense framework ; Chapter 13. A cyber crime investigation model based on case characteristics ; Chapter 14. Deception detection in cyber conflicts: a use case for the cybersecurity strategy formation framework ; Chapter 15. Using an ontology for network attack planning ; Chapter 16. Contrast modification forensics algorithm based on merged weight histogram of run length ; Chapter 17. A framework for dark web threat intelligence analysis ; Chapter 18. A classification framework for data mining applications in criminal science and investigations ; Chapter 19. Toward a model for ethical cybersecurity leadership ; Chapter 20. Algorithm for secure hybrid cloud Design against ddos attacks ; Chapter 21. Modelling cyber-crime protection behaviour among computer users in the context of Bangladesh ; Chapter 22. A privacy protection approach based on android application's runtime behavior monitor and control ; Chapter 23. A steganalytic scheme based on classifier selection using joint image characteristics ; Chapter 24. Attack detection in cloud networks based on artificial intelligence approaches ; Chapter 25. An economical methodology to rhetorical identifications in cloud victimization virtual machine snapshots -- Section 3. Tools and technologies. Chapter 26. Cyber-physical systems in vehicular communications ; Chapter 27. Technology-enhanced learning in cyber-physical systems embedding modeling and simulation ; Chapter 28. SCADA systems cyber security for critical infrastructures: case studies in multiple sectors ; Chapter 29. Quantifying decision making in the critical infrastructure via the analytic hierarchy process (AHP) ; Chapter 30. Social media and the use of discursive markers of online extremism and recruitment ; Chapter 31. An overview on passive image forensics technology for automatic computer forgery ; Chapter 32. Secure interoperability in cyber-physical systems ; Chapter 33. Autonomic computing architecture for SCADA cyber security -- Volume II Chapter 34. Blind image source device identification: practicality and challenges ; Chapter 35. Digital forensic and machine learning ; Chapter 36. Disconnects of specialized mobile digital forensics within the generalized field of digital forensic science ; Chapter 37. A reliable data provenance and privacy preservation architecture for business-driven cyber-physical systems using blockchain ; Chapter 38. Cyber-security for ICS/SCADA: a South African perspective ; Chapter 39. The communicating and marketing of radicalism: a case study of ISIS and cyber recruitment ; Chapter 40. Optimization of operational large-scale (cyber) attacks by a combinational approach ; Chapter 41. GPS patents and their effects on our future and rights ; Chapter 42. Detecting synchronization signal jamming attacks for cybersecurity in cyber-physical energy grid systems ; Chapter 43. Slacktivism, supervision, and selfies: illuminating social media composition through reception theory ; Chapter 44. An image forgery detection approach based on camera's intrinsic noise properties ; Chapter 45. On more paradigms of steganalysis ; Chapter 46. Copy-move forgery detection using dywt ; Chapter 47. Distributed system implementation based on "ants feeding birds" algorithm: electronics transformation via animals and human ; Chapter 48. A cyber-physical photovoltaic array monitoring and control system ; Chapter 49. Advanced threat detection based on big data technologies ; Chapter 50. Possibilities, impediments, and challenges for network security in big data ; Chapter 51. Big data analytics platforms for electric vehicle integration in transport oriented smart cities: computing platforms for platforms for electric vehicle integration in smart cities ; Chapter 52. Computer forensic investigation in cloud of things ; Chapter 53. Distprov-data provenance in distributed cloud for secure transfer of digital assets with ethereum blockchain using ZKP -- Section 4. Utilization and applications. Chapter 54. Punching above their digital weight: why Iran is developing cyberwarfare capabilities far beyond expectations ; Chapter 55. Cyberattacks, cybercrime and cyberterrorism ; Chapter 56. Cyber security vulnerability management in CBRN industrial control systems (ICS) ; Chapter 57. A case for using blended learning and development techniques to aid the delivery of a UK cybersecurity core body of knowledge ; Chapter 58. Modern information technology, global risk, and the challenges of crime in the era of late modernity ; Chapter 59. The need for higher education in cyber supply chain security and hardware assurance ; Chapter 60. Toward approaches to big data analysis for terroristic behavior identification: child soldiers in illegal armed groups during the conflict in the Donbas Region (East Ukraine) ; Chapter 61. Russian active measures and september 11, 2001: Nostradamus themed disinformation? ; Chapter 62. Countering online violent extremism: state action as strategic communication ; Chapter 63. An exploration of the cybersecurity workforce shortage ; Chapter 64. Bioterrorism, bio crimes and politics: a case of chaos and complexity ; Chapter 65. Managing organized crime ; Chapter 66. Cybercrime as a threat to Zimbabwe's peace and security -- Volume III. Chapter 67. Why is ISIS so psychologically attractive? ; Chapter 68. Assessment of honeypots: issues, challenges and future directions ; Chapter 69. Digital forensics in the context of the Internet of Things ; Chapter 70. A socio-technical perspective on threat intelligence informed digital forensic readiness -- Section 5. Organizational and social implications. Chapter 71. A comparative analysis of the cyberattacks against Estonia, the United States, and Ukraine: exemplifying the evolution of internet-supported warfare ; Chapter 72. Eriksonian analysis of terrorism in West Africa ; Chapter 73. Tourism, terrorism, morality, and marketing: a study of the role of reciprocity in tourism marketing ; Chapter 74. The roots of terror: the lesser evil doctrine under criticism ; Chapter 75. ISIS rhetoric for the creation of the ummah ; Chapter 76. Exploring myths in digital forensics: separating science from ritual ; Chapter 77. Cyber hygiene in health care data breaches ; Chapter 78. Building national resilience in the digital era of violent extremism: systems and people ; Chapter 79. A region of association and turbulence ; Chapter 80. Jus in Bello and the acts of terrorism: a study ; Chapter 81. Copy-move forgery localization using convolutional neural networks and CFA features ; Chapter 82. The cyberethics, cybersafety, and cybersecurity at schools ; Chapter 83. Filtration of terrorism-related texts in the e-government environment ; Chapter 84. The effects of money laundering (ML) on growth application to the Gulf countries ; Chapter 85. Jihadist propaganda on social media: an examination of ISIS related content on Twitter ; Chapter 86 Managing terrorism in Africa: assessing policing issues ; Chapter 87. Credit card fraud: behind the scenes ; Chapter 88. The threat of cyber warfare in the SADC region: the case of Zimbabwe ; Chapter 89. Islamic extremists in Africa: security spotlight on Kenya and Nigeria ; Chapter 90. Cloud risk resilience: investigation of audit practices and technology advances -- a technical report -- Section 6. Managerial impact. Chapter 91. Management approach of risk analysis in information security ; Chapter 92. Cybersecurity best practices and cultural change in global business: some perspectives from the European union -- Section 7. Critical issues and challenges. Chapter 93. Research on digital forensics based on Uyghur web text classification ; Chapter 94. Determinants of terrorism in South Asia: insights from a dynamic panel data analysis ; Chapter 95. What we know and what else we need to do to address the problem of violent extremism online: concluding chapter ; Chapter 96. Ethos construction, identification, and authenticity in the discourses of AWSA: the Arab women's solidarity association international ; Chapter 97. On experience of social networks exploration for comparative analysis of narratives of foreign members of armed groups: IS and l/DPR in Syria and Ukraine in 2015-2016 ; Chapter 98. A White hat study of a nation's publicly accessible critical digital infrastructure and a way forward -- Section 8. Emerging trends. Chapter 99. The next generation of scientific-based risk metrics: measuring cyber maturity |
ctrlnum | (OCoLC)1152312454 (DE-599)BVBBV046692214 |
doi_str_mv | 10.4018/978-1-7998-2466-4 |
format | Electronic eBook |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>00000nmm a2200000 c 4500</leader><controlfield tag="001">BV046692214</controlfield><controlfield tag="003">DE-604</controlfield><controlfield tag="005">20211108</controlfield><controlfield tag="007">cr|uuu---uuuuu</controlfield><controlfield tag="008">200424s2020 |||| o||u| ||||||eng d</controlfield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781799824671</subfield><subfield code="9">978-1-7998-2467-1</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)1152312454</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)BVBBV046692214</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-604</subfield><subfield code="b">ger</subfield><subfield code="e">rda</subfield></datafield><datafield tag="041" ind1="0" ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-1050</subfield><subfield code="a">DE-706</subfield><subfield code="a">DE-83</subfield><subfield code="a">DE-898</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Cyber warfare and terrorism</subfield><subfield code="b">concepts, methodologies, tools, and applications</subfield><subfield code="c">Information Resources Management Association, USA</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Hershey, PA</subfield><subfield code="b">IGI Global</subfield><subfield code="c">[2020]</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">1 Online-Ressource</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="b">c</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="b">cr</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="505" ind1="8" ind2=" "><subfield code="a">Volume I. Section 1. Fundamental concepts and theories. Chapter 1. Digital evidence in practice: procedure and tools ; Chapter 2. Introduction to tourism security: tourism in the age of terrorism ; Chapter 3. English speaking countries and the culture of fear: understanding technology and terrorism ; Chapter 4. The cyber talent gap and cybersecurity professionalizing ; Chapter 5. The fundamentals of digital forensics and cyber law ; Chapter 6. Dark and deep webs-liberty or abuse ; Chapter 7. A review on cyberattacks: security threats and solution techniques for different applications --</subfield></datafield><datafield tag="505" ind1="8" ind2=" "><subfield code="a">Section 2. Development and design methodologies. Chapter 8. Cyber-physical systems: an overview of design process, applications, and security ; Chapter 9. Developing a military cyber maturity model for multi-domain battle mission resilience and success ; Chapter 10. Advances in digital forensics frameworks and tools: a comparative insight and ranking ; Chapter 11. Situation understanding for operational art in cyber operations ; Chapter 12. A new dynamic cyber defense framework ; Chapter 13. A cyber crime investigation model based on case characteristics ; Chapter 14. Deception detection in cyber conflicts: a use case for the cybersecurity strategy formation framework ; Chapter 15. Using an ontology for network attack planning ; Chapter 16. Contrast modification forensics algorithm based on merged weight histogram of run length ; Chapter 17. A framework for dark web threat intelligence analysis ; Chapter 18.</subfield></datafield><datafield tag="505" ind1="8" ind2=" "><subfield code="a">A classification framework for data mining applications in criminal science and investigations ; Chapter 19. Toward a model for ethical cybersecurity leadership ; Chapter 20. Algorithm for secure hybrid cloud Design against ddos attacks ; Chapter 21. Modelling cyber-crime protection behaviour among computer users in the context of Bangladesh ; Chapter 22. A privacy protection approach based on android application's runtime behavior monitor and control ; Chapter 23. A steganalytic scheme based on classifier selection using joint image characteristics ; Chapter 24. Attack detection in cloud networks based on artificial intelligence approaches ; Chapter 25. An economical methodology to rhetorical identifications in cloud victimization virtual machine snapshots --</subfield></datafield><datafield tag="505" ind1="8" ind2=" "><subfield code="a">Section 3. Tools and technologies. Chapter 26. Cyber-physical systems in vehicular communications ; Chapter 27. Technology-enhanced learning in cyber-physical systems embedding modeling and simulation ; Chapter 28. SCADA systems cyber security for critical infrastructures: case studies in multiple sectors ; Chapter 29. Quantifying decision making in the critical infrastructure via the analytic hierarchy process (AHP) ; Chapter 30. Social media and the use of discursive markers of online extremism and recruitment ; Chapter 31. An overview on passive image forensics technology for automatic computer forgery ; Chapter 32. Secure interoperability in cyber-physical systems ; Chapter 33. Autonomic computing architecture for SCADA cyber security --</subfield></datafield><datafield tag="505" ind1="8" ind2=" "><subfield code="a">Volume II Chapter 34. Blind image source device identification: practicality and challenges ; Chapter 35. Digital forensic and machine learning ; Chapter 36. Disconnects of specialized mobile digital forensics within the generalized field of digital forensic science ; Chapter 37. A reliable data provenance and privacy preservation architecture for business-driven cyber-physical systems using blockchain ; Chapter 38. Cyber-security for ICS/SCADA: a South African perspective ; Chapter 39. The communicating and marketing of radicalism: a case study of ISIS and cyber recruitment ; Chapter 40. Optimization of operational large-scale (cyber) attacks by a combinational approach ; Chapter 41. GPS patents and their effects on our future and rights ; Chapter 42. Detecting synchronization signal jamming attacks for cybersecurity in cyber-physical energy grid systems ; Chapter 43. Slacktivism, supervision, and selfies: illuminating social media composition through reception theory ; Chapter 44.</subfield></datafield><datafield tag="505" ind1="8" ind2=" "><subfield code="a">An image forgery detection approach based on camera's intrinsic noise properties ; Chapter 45. On more paradigms of steganalysis ; Chapter 46. Copy-move forgery detection using dywt ; Chapter 47. Distributed system implementation based on "ants feeding birds" algorithm: electronics transformation via animals and human ; Chapter 48. A cyber-physical photovoltaic array monitoring and control system ; Chapter 49. Advanced threat detection based on big data technologies ; Chapter 50. Possibilities, impediments, and challenges for network security in big data ; Chapter 51. Big data analytics platforms for electric vehicle integration in transport oriented smart cities: computing platforms for platforms for electric vehicle integration in smart cities ; Chapter 52. Computer forensic investigation in cloud of things ; Chapter 53. Distprov-data provenance in distributed cloud for secure transfer of digital assets with ethereum blockchain using ZKP --</subfield></datafield><datafield tag="505" ind1="8" ind2=" "><subfield code="a">Section 4. Utilization and applications. Chapter 54. Punching above their digital weight: why Iran is developing cyberwarfare capabilities far beyond expectations ; Chapter 55. Cyberattacks, cybercrime and cyberterrorism ; Chapter 56. Cyber security vulnerability management in CBRN industrial control systems (ICS) ; Chapter 57. A case for using blended learning and development techniques to aid the delivery of a UK cybersecurity core body of knowledge ; Chapter 58. Modern information technology, global risk, and the challenges of crime in the era of late modernity ; Chapter 59. The need for higher education in cyber supply chain security and hardware assurance ; Chapter 60. Toward approaches to big data analysis for terroristic behavior identification: child soldiers in illegal armed groups during the conflict in the Donbas Region (East Ukraine) ; Chapter 61. Russian active measures and september 11, 2001: Nostradamus themed disinformation? ; Chapter 62.</subfield></datafield><datafield tag="505" ind1="8" ind2=" "><subfield code="a">Countering online violent extremism: state action as strategic communication ; Chapter 63. An exploration of the cybersecurity workforce shortage ; Chapter 64. Bioterrorism, bio crimes and politics: a case of chaos and complexity ; Chapter 65. Managing organized crime ; Chapter 66. Cybercrime as a threat to Zimbabwe's peace and security -- Volume III. Chapter 67. Why is ISIS so psychologically attractive? ; Chapter 68. Assessment of honeypots: issues, challenges and future directions ; Chapter 69. Digital forensics in the context of the Internet of Things ; Chapter 70. A socio-technical perspective on threat intelligence informed digital forensic readiness --</subfield></datafield><datafield tag="505" ind1="8" ind2=" "><subfield code="a">Section 5. Organizational and social implications. Chapter 71. A comparative analysis of the cyberattacks against Estonia, the United States, and Ukraine: exemplifying the evolution of internet-supported warfare ; Chapter 72. Eriksonian analysis of terrorism in West Africa ; Chapter 73. Tourism, terrorism, morality, and marketing: a study of the role of reciprocity in tourism marketing ; Chapter 74. The roots of terror: the lesser evil doctrine under criticism ; Chapter 75. ISIS rhetoric for the creation of the ummah ; Chapter 76. Exploring myths in digital forensics: separating science from ritual ; Chapter 77. Cyber hygiene in health care data breaches ; Chapter 78. Building national resilience in the digital era of violent extremism: systems and people ; Chapter 79. A region of association and turbulence ; Chapter 80. Jus in Bello and the acts of terrorism: a study ; Chapter 81. Copy-move forgery localization using convolutional neural networks and CFA features ; Chapter 82.</subfield></datafield><datafield tag="505" ind1="8" ind2=" "><subfield code="a">The cyberethics, cybersafety, and cybersecurity at schools ; Chapter 83. Filtration of terrorism-related texts in the e-government environment ; Chapter 84. The effects of money laundering (ML) on growth application to the Gulf countries ; Chapter 85. Jihadist propaganda on social media: an examination of ISIS related content on Twitter ; Chapter 86</subfield></datafield><datafield tag="505" ind1="8" ind2=" "><subfield code="a">Managing terrorism in Africa: assessing policing issues ; Chapter 87. Credit card fraud: behind the scenes ; Chapter 88. The threat of cyber warfare in the SADC region: the case of Zimbabwe ; Chapter 89. Islamic extremists in Africa: security spotlight on Kenya and Nigeria ; Chapter 90. Cloud risk resilience: investigation of audit practices and technology advances -- a technical report -- Section 6. Managerial impact. Chapter 91. Management approach of risk analysis in information security ; Chapter 92. Cybersecurity best practices and cultural change in global business: some perspectives from the European union -- Section 7. Critical issues and challenges. Chapter 93. Research on digital forensics based on Uyghur web text classification ; Chapter 94. Determinants of terrorism in South Asia: insights from a dynamic panel data analysis ; Chapter 95. What we know and what else we need to do to address the problem of violent extremism online: concluding chapter ; Chapter 96. Ethos construction, identification, and authenticity in the discourses of AWSA: the Arab women's solidarity association international ; Chapter 97. On experience of social networks exploration for comparative analysis of narratives of foreign members of armed groups: IS and l/DPR in Syria and Ukraine in 2015-2016 ; Chapter 98. A White hat study of a nation's publicly accessible critical digital infrastructure and a way forward -- Section 8. Emerging trends. Chapter 99. The next generation of scientific-based risk metrics: measuring cyber maturity</subfield></datafield><datafield tag="520" ind1=" " ind2=" "><subfield code="a">"This book explores the utilization of online tools by terrorist organizations to communicate with and recruit potential extremists and examines effective countermeasures employed by law enforcement agencies to defend against such threats"--</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Cyberterrorism / Prevention</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Terrorism / Prevention</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Cyberterrorism / Prevention</subfield><subfield code="2">fast</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Terrorism / Prevention</subfield><subfield code="2">fast</subfield></datafield><datafield tag="710" ind1="2" ind2=" "><subfield code="a">Information Resources Management Association</subfield><subfield code="0">(DE-588)5010976-5</subfield><subfield code="4">isb</subfield></datafield><datafield tag="776" ind1="0" ind2="8"><subfield code="i">Erscheint auch als</subfield><subfield code="n">Druck-Ausgabe, hardcover</subfield><subfield code="z">978-1-7998-2466-4</subfield></datafield><datafield tag="856" ind1="4" ind2="0"><subfield code="u">https://doi.org/10.4018/978-1-7998-2466-4</subfield><subfield code="x">Verlag</subfield><subfield code="z">URL des Erstveröffentlichers</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-98-IGB</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.4018/978-1-7998-2466-4</subfield><subfield code="l">DE-1050</subfield><subfield code="p">ZDB-98-IGB</subfield><subfield code="q">FHD01_IGB_Kauf</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.4018/978-1-7998-2466-4</subfield><subfield code="l">DE-706</subfield><subfield code="p">ZDB-98-IGB</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.4018/978-1-7998-2466-4</subfield><subfield code="l">DE-83</subfield><subfield code="p">ZDB-98-IGB</subfield><subfield code="q">TUB_EBS_IGB</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.4018/978-1-7998-2466-4</subfield><subfield code="l">DE-898</subfield><subfield code="p">ZDB-98-IGB</subfield><subfield code="q">FHR_PDA_IGB</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield></record></collection> |
id | DE-604.BV046692214 |
illustrated | Not Illustrated |
index_date | 2024-07-03T14:25:29Z |
indexdate | 2024-07-20T06:01:34Z |
institution | BVB |
institution_GND | (DE-588)5010976-5 |
isbn | 9781799824671 |
language | English |
oai_aleph_id | oai:aleph.bib-bvb.de:BVB01-032102946 |
oclc_num | 1152312454 |
open_access_boolean | |
owner | DE-1050 DE-706 DE-83 DE-898 DE-BY-UBR |
owner_facet | DE-1050 DE-706 DE-83 DE-898 DE-BY-UBR |
physical | 1 Online-Ressource |
psigel | ZDB-98-IGB ZDB-98-IGB FHD01_IGB_Kauf ZDB-98-IGB TUB_EBS_IGB ZDB-98-IGB FHR_PDA_IGB |
publishDate | 2020 |
publishDateSearch | 2020 |
publishDateSort | 2020 |
publisher | IGI Global |
record_format | marc |
spelling | Cyber warfare and terrorism concepts, methodologies, tools, and applications Information Resources Management Association, USA Hershey, PA IGI Global [2020] 1 Online-Ressource txt rdacontent c rdamedia cr rdacarrier Volume I. Section 1. Fundamental concepts and theories. Chapter 1. Digital evidence in practice: procedure and tools ; Chapter 2. Introduction to tourism security: tourism in the age of terrorism ; Chapter 3. English speaking countries and the culture of fear: understanding technology and terrorism ; Chapter 4. The cyber talent gap and cybersecurity professionalizing ; Chapter 5. The fundamentals of digital forensics and cyber law ; Chapter 6. Dark and deep webs-liberty or abuse ; Chapter 7. A review on cyberattacks: security threats and solution techniques for different applications -- Section 2. Development and design methodologies. Chapter 8. Cyber-physical systems: an overview of design process, applications, and security ; Chapter 9. Developing a military cyber maturity model for multi-domain battle mission resilience and success ; Chapter 10. Advances in digital forensics frameworks and tools: a comparative insight and ranking ; Chapter 11. Situation understanding for operational art in cyber operations ; Chapter 12. A new dynamic cyber defense framework ; Chapter 13. A cyber crime investigation model based on case characteristics ; Chapter 14. Deception detection in cyber conflicts: a use case for the cybersecurity strategy formation framework ; Chapter 15. Using an ontology for network attack planning ; Chapter 16. Contrast modification forensics algorithm based on merged weight histogram of run length ; Chapter 17. A framework for dark web threat intelligence analysis ; Chapter 18. A classification framework for data mining applications in criminal science and investigations ; Chapter 19. Toward a model for ethical cybersecurity leadership ; Chapter 20. Algorithm for secure hybrid cloud Design against ddos attacks ; Chapter 21. Modelling cyber-crime protection behaviour among computer users in the context of Bangladesh ; Chapter 22. A privacy protection approach based on android application's runtime behavior monitor and control ; Chapter 23. A steganalytic scheme based on classifier selection using joint image characteristics ; Chapter 24. Attack detection in cloud networks based on artificial intelligence approaches ; Chapter 25. An economical methodology to rhetorical identifications in cloud victimization virtual machine snapshots -- Section 3. Tools and technologies. Chapter 26. Cyber-physical systems in vehicular communications ; Chapter 27. Technology-enhanced learning in cyber-physical systems embedding modeling and simulation ; Chapter 28. SCADA systems cyber security for critical infrastructures: case studies in multiple sectors ; Chapter 29. Quantifying decision making in the critical infrastructure via the analytic hierarchy process (AHP) ; Chapter 30. Social media and the use of discursive markers of online extremism and recruitment ; Chapter 31. An overview on passive image forensics technology for automatic computer forgery ; Chapter 32. Secure interoperability in cyber-physical systems ; Chapter 33. Autonomic computing architecture for SCADA cyber security -- Volume II Chapter 34. Blind image source device identification: practicality and challenges ; Chapter 35. Digital forensic and machine learning ; Chapter 36. Disconnects of specialized mobile digital forensics within the generalized field of digital forensic science ; Chapter 37. A reliable data provenance and privacy preservation architecture for business-driven cyber-physical systems using blockchain ; Chapter 38. Cyber-security for ICS/SCADA: a South African perspective ; Chapter 39. The communicating and marketing of radicalism: a case study of ISIS and cyber recruitment ; Chapter 40. Optimization of operational large-scale (cyber) attacks by a combinational approach ; Chapter 41. GPS patents and their effects on our future and rights ; Chapter 42. Detecting synchronization signal jamming attacks for cybersecurity in cyber-physical energy grid systems ; Chapter 43. Slacktivism, supervision, and selfies: illuminating social media composition through reception theory ; Chapter 44. An image forgery detection approach based on camera's intrinsic noise properties ; Chapter 45. On more paradigms of steganalysis ; Chapter 46. Copy-move forgery detection using dywt ; Chapter 47. Distributed system implementation based on "ants feeding birds" algorithm: electronics transformation via animals and human ; Chapter 48. A cyber-physical photovoltaic array monitoring and control system ; Chapter 49. Advanced threat detection based on big data technologies ; Chapter 50. Possibilities, impediments, and challenges for network security in big data ; Chapter 51. Big data analytics platforms for electric vehicle integration in transport oriented smart cities: computing platforms for platforms for electric vehicle integration in smart cities ; Chapter 52. Computer forensic investigation in cloud of things ; Chapter 53. Distprov-data provenance in distributed cloud for secure transfer of digital assets with ethereum blockchain using ZKP -- Section 4. Utilization and applications. Chapter 54. Punching above their digital weight: why Iran is developing cyberwarfare capabilities far beyond expectations ; Chapter 55. Cyberattacks, cybercrime and cyberterrorism ; Chapter 56. Cyber security vulnerability management in CBRN industrial control systems (ICS) ; Chapter 57. A case for using blended learning and development techniques to aid the delivery of a UK cybersecurity core body of knowledge ; Chapter 58. Modern information technology, global risk, and the challenges of crime in the era of late modernity ; Chapter 59. The need for higher education in cyber supply chain security and hardware assurance ; Chapter 60. Toward approaches to big data analysis for terroristic behavior identification: child soldiers in illegal armed groups during the conflict in the Donbas Region (East Ukraine) ; Chapter 61. Russian active measures and september 11, 2001: Nostradamus themed disinformation? ; Chapter 62. Countering online violent extremism: state action as strategic communication ; Chapter 63. An exploration of the cybersecurity workforce shortage ; Chapter 64. Bioterrorism, bio crimes and politics: a case of chaos and complexity ; Chapter 65. Managing organized crime ; Chapter 66. Cybercrime as a threat to Zimbabwe's peace and security -- Volume III. Chapter 67. Why is ISIS so psychologically attractive? ; Chapter 68. Assessment of honeypots: issues, challenges and future directions ; Chapter 69. Digital forensics in the context of the Internet of Things ; Chapter 70. A socio-technical perspective on threat intelligence informed digital forensic readiness -- Section 5. Organizational and social implications. Chapter 71. A comparative analysis of the cyberattacks against Estonia, the United States, and Ukraine: exemplifying the evolution of internet-supported warfare ; Chapter 72. Eriksonian analysis of terrorism in West Africa ; Chapter 73. Tourism, terrorism, morality, and marketing: a study of the role of reciprocity in tourism marketing ; Chapter 74. The roots of terror: the lesser evil doctrine under criticism ; Chapter 75. ISIS rhetoric for the creation of the ummah ; Chapter 76. Exploring myths in digital forensics: separating science from ritual ; Chapter 77. Cyber hygiene in health care data breaches ; Chapter 78. Building national resilience in the digital era of violent extremism: systems and people ; Chapter 79. A region of association and turbulence ; Chapter 80. Jus in Bello and the acts of terrorism: a study ; Chapter 81. Copy-move forgery localization using convolutional neural networks and CFA features ; Chapter 82. The cyberethics, cybersafety, and cybersecurity at schools ; Chapter 83. Filtration of terrorism-related texts in the e-government environment ; Chapter 84. The effects of money laundering (ML) on growth application to the Gulf countries ; Chapter 85. Jihadist propaganda on social media: an examination of ISIS related content on Twitter ; Chapter 86 Managing terrorism in Africa: assessing policing issues ; Chapter 87. Credit card fraud: behind the scenes ; Chapter 88. The threat of cyber warfare in the SADC region: the case of Zimbabwe ; Chapter 89. Islamic extremists in Africa: security spotlight on Kenya and Nigeria ; Chapter 90. Cloud risk resilience: investigation of audit practices and technology advances -- a technical report -- Section 6. Managerial impact. Chapter 91. Management approach of risk analysis in information security ; Chapter 92. Cybersecurity best practices and cultural change in global business: some perspectives from the European union -- Section 7. Critical issues and challenges. Chapter 93. Research on digital forensics based on Uyghur web text classification ; Chapter 94. Determinants of terrorism in South Asia: insights from a dynamic panel data analysis ; Chapter 95. What we know and what else we need to do to address the problem of violent extremism online: concluding chapter ; Chapter 96. Ethos construction, identification, and authenticity in the discourses of AWSA: the Arab women's solidarity association international ; Chapter 97. On experience of social networks exploration for comparative analysis of narratives of foreign members of armed groups: IS and l/DPR in Syria and Ukraine in 2015-2016 ; Chapter 98. A White hat study of a nation's publicly accessible critical digital infrastructure and a way forward -- Section 8. Emerging trends. Chapter 99. The next generation of scientific-based risk metrics: measuring cyber maturity "This book explores the utilization of online tools by terrorist organizations to communicate with and recruit potential extremists and examines effective countermeasures employed by law enforcement agencies to defend against such threats"-- Cyberterrorism / Prevention Terrorism / Prevention Cyberterrorism / Prevention fast Terrorism / Prevention fast Information Resources Management Association (DE-588)5010976-5 isb Erscheint auch als Druck-Ausgabe, hardcover 978-1-7998-2466-4 https://doi.org/10.4018/978-1-7998-2466-4 Verlag URL des Erstveröffentlichers Volltext |
spellingShingle | Cyber warfare and terrorism concepts, methodologies, tools, and applications Volume I. Section 1. Fundamental concepts and theories. Chapter 1. Digital evidence in practice: procedure and tools ; Chapter 2. Introduction to tourism security: tourism in the age of terrorism ; Chapter 3. English speaking countries and the culture of fear: understanding technology and terrorism ; Chapter 4. The cyber talent gap and cybersecurity professionalizing ; Chapter 5. The fundamentals of digital forensics and cyber law ; Chapter 6. Dark and deep webs-liberty or abuse ; Chapter 7. A review on cyberattacks: security threats and solution techniques for different applications -- Section 2. Development and design methodologies. Chapter 8. Cyber-physical systems: an overview of design process, applications, and security ; Chapter 9. Developing a military cyber maturity model for multi-domain battle mission resilience and success ; Chapter 10. Advances in digital forensics frameworks and tools: a comparative insight and ranking ; Chapter 11. Situation understanding for operational art in cyber operations ; Chapter 12. A new dynamic cyber defense framework ; Chapter 13. A cyber crime investigation model based on case characteristics ; Chapter 14. Deception detection in cyber conflicts: a use case for the cybersecurity strategy formation framework ; Chapter 15. Using an ontology for network attack planning ; Chapter 16. Contrast modification forensics algorithm based on merged weight histogram of run length ; Chapter 17. A framework for dark web threat intelligence analysis ; Chapter 18. A classification framework for data mining applications in criminal science and investigations ; Chapter 19. Toward a model for ethical cybersecurity leadership ; Chapter 20. Algorithm for secure hybrid cloud Design against ddos attacks ; Chapter 21. Modelling cyber-crime protection behaviour among computer users in the context of Bangladesh ; Chapter 22. A privacy protection approach based on android application's runtime behavior monitor and control ; Chapter 23. A steganalytic scheme based on classifier selection using joint image characteristics ; Chapter 24. Attack detection in cloud networks based on artificial intelligence approaches ; Chapter 25. An economical methodology to rhetorical identifications in cloud victimization virtual machine snapshots -- Section 3. Tools and technologies. Chapter 26. Cyber-physical systems in vehicular communications ; Chapter 27. Technology-enhanced learning in cyber-physical systems embedding modeling and simulation ; Chapter 28. SCADA systems cyber security for critical infrastructures: case studies in multiple sectors ; Chapter 29. Quantifying decision making in the critical infrastructure via the analytic hierarchy process (AHP) ; Chapter 30. Social media and the use of discursive markers of online extremism and recruitment ; Chapter 31. An overview on passive image forensics technology for automatic computer forgery ; Chapter 32. Secure interoperability in cyber-physical systems ; Chapter 33. Autonomic computing architecture for SCADA cyber security -- Volume II Chapter 34. Blind image source device identification: practicality and challenges ; Chapter 35. Digital forensic and machine learning ; Chapter 36. Disconnects of specialized mobile digital forensics within the generalized field of digital forensic science ; Chapter 37. A reliable data provenance and privacy preservation architecture for business-driven cyber-physical systems using blockchain ; Chapter 38. Cyber-security for ICS/SCADA: a South African perspective ; Chapter 39. The communicating and marketing of radicalism: a case study of ISIS and cyber recruitment ; Chapter 40. Optimization of operational large-scale (cyber) attacks by a combinational approach ; Chapter 41. GPS patents and their effects on our future and rights ; Chapter 42. Detecting synchronization signal jamming attacks for cybersecurity in cyber-physical energy grid systems ; Chapter 43. Slacktivism, supervision, and selfies: illuminating social media composition through reception theory ; Chapter 44. An image forgery detection approach based on camera's intrinsic noise properties ; Chapter 45. On more paradigms of steganalysis ; Chapter 46. Copy-move forgery detection using dywt ; Chapter 47. Distributed system implementation based on "ants feeding birds" algorithm: electronics transformation via animals and human ; Chapter 48. A cyber-physical photovoltaic array monitoring and control system ; Chapter 49. Advanced threat detection based on big data technologies ; Chapter 50. Possibilities, impediments, and challenges for network security in big data ; Chapter 51. Big data analytics platforms for electric vehicle integration in transport oriented smart cities: computing platforms for platforms for electric vehicle integration in smart cities ; Chapter 52. Computer forensic investigation in cloud of things ; Chapter 53. Distprov-data provenance in distributed cloud for secure transfer of digital assets with ethereum blockchain using ZKP -- Section 4. Utilization and applications. Chapter 54. Punching above their digital weight: why Iran is developing cyberwarfare capabilities far beyond expectations ; Chapter 55. Cyberattacks, cybercrime and cyberterrorism ; Chapter 56. Cyber security vulnerability management in CBRN industrial control systems (ICS) ; Chapter 57. A case for using blended learning and development techniques to aid the delivery of a UK cybersecurity core body of knowledge ; Chapter 58. Modern information technology, global risk, and the challenges of crime in the era of late modernity ; Chapter 59. The need for higher education in cyber supply chain security and hardware assurance ; Chapter 60. Toward approaches to big data analysis for terroristic behavior identification: child soldiers in illegal armed groups during the conflict in the Donbas Region (East Ukraine) ; Chapter 61. Russian active measures and september 11, 2001: Nostradamus themed disinformation? ; Chapter 62. Countering online violent extremism: state action as strategic communication ; Chapter 63. An exploration of the cybersecurity workforce shortage ; Chapter 64. Bioterrorism, bio crimes and politics: a case of chaos and complexity ; Chapter 65. Managing organized crime ; Chapter 66. Cybercrime as a threat to Zimbabwe's peace and security -- Volume III. Chapter 67. Why is ISIS so psychologically attractive? ; Chapter 68. Assessment of honeypots: issues, challenges and future directions ; Chapter 69. Digital forensics in the context of the Internet of Things ; Chapter 70. A socio-technical perspective on threat intelligence informed digital forensic readiness -- Section 5. Organizational and social implications. Chapter 71. A comparative analysis of the cyberattacks against Estonia, the United States, and Ukraine: exemplifying the evolution of internet-supported warfare ; Chapter 72. Eriksonian analysis of terrorism in West Africa ; Chapter 73. Tourism, terrorism, morality, and marketing: a study of the role of reciprocity in tourism marketing ; Chapter 74. The roots of terror: the lesser evil doctrine under criticism ; Chapter 75. ISIS rhetoric for the creation of the ummah ; Chapter 76. Exploring myths in digital forensics: separating science from ritual ; Chapter 77. Cyber hygiene in health care data breaches ; Chapter 78. Building national resilience in the digital era of violent extremism: systems and people ; Chapter 79. A region of association and turbulence ; Chapter 80. Jus in Bello and the acts of terrorism: a study ; Chapter 81. Copy-move forgery localization using convolutional neural networks and CFA features ; Chapter 82. The cyberethics, cybersafety, and cybersecurity at schools ; Chapter 83. Filtration of terrorism-related texts in the e-government environment ; Chapter 84. The effects of money laundering (ML) on growth application to the Gulf countries ; Chapter 85. Jihadist propaganda on social media: an examination of ISIS related content on Twitter ; Chapter 86 Managing terrorism in Africa: assessing policing issues ; Chapter 87. Credit card fraud: behind the scenes ; Chapter 88. The threat of cyber warfare in the SADC region: the case of Zimbabwe ; Chapter 89. Islamic extremists in Africa: security spotlight on Kenya and Nigeria ; Chapter 90. Cloud risk resilience: investigation of audit practices and technology advances -- a technical report -- Section 6. Managerial impact. Chapter 91. Management approach of risk analysis in information security ; Chapter 92. Cybersecurity best practices and cultural change in global business: some perspectives from the European union -- Section 7. Critical issues and challenges. Chapter 93. Research on digital forensics based on Uyghur web text classification ; Chapter 94. Determinants of terrorism in South Asia: insights from a dynamic panel data analysis ; Chapter 95. What we know and what else we need to do to address the problem of violent extremism online: concluding chapter ; Chapter 96. Ethos construction, identification, and authenticity in the discourses of AWSA: the Arab women's solidarity association international ; Chapter 97. On experience of social networks exploration for comparative analysis of narratives of foreign members of armed groups: IS and l/DPR in Syria and Ukraine in 2015-2016 ; Chapter 98. A White hat study of a nation's publicly accessible critical digital infrastructure and a way forward -- Section 8. Emerging trends. Chapter 99. The next generation of scientific-based risk metrics: measuring cyber maturity Cyberterrorism / Prevention Terrorism / Prevention Cyberterrorism / Prevention fast Terrorism / Prevention fast |
title | Cyber warfare and terrorism concepts, methodologies, tools, and applications |
title_auth | Cyber warfare and terrorism concepts, methodologies, tools, and applications |
title_exact_search | Cyber warfare and terrorism concepts, methodologies, tools, and applications |
title_exact_search_txtP | Cyber warfare and terrorism concepts, methodologies, tools, and applications |
title_full | Cyber warfare and terrorism concepts, methodologies, tools, and applications Information Resources Management Association, USA |
title_fullStr | Cyber warfare and terrorism concepts, methodologies, tools, and applications Information Resources Management Association, USA |
title_full_unstemmed | Cyber warfare and terrorism concepts, methodologies, tools, and applications Information Resources Management Association, USA |
title_short | Cyber warfare and terrorism |
title_sort | cyber warfare and terrorism concepts methodologies tools and applications |
title_sub | concepts, methodologies, tools, and applications |
topic | Cyberterrorism / Prevention Terrorism / Prevention Cyberterrorism / Prevention fast Terrorism / Prevention fast |
topic_facet | Cyberterrorism / Prevention Terrorism / Prevention |
url | https://doi.org/10.4018/978-1-7998-2466-4 |
work_keys_str_mv | AT informationresourcesmanagementassociation cyberwarfareandterrorismconceptsmethodologiestoolsandapplications |