Handbook of research on civil society and national security in the era of cyber warfare:
"This book addresses the problem of cyber terrorism head-on, first through a review of current literature, and then through a series of progressive proposals aimed at researchers, professionals, and policymakers"--Provided by publisher.
Gespeichert in:
Weitere Verfasser: | , |
---|---|
Format: | Elektronisch E-Book |
Sprache: | English |
Veröffentlicht: |
Hershey, Pennsylvania (701 E. Chocolate Avenue, Hershey, PA 17033, USA) :
IGI Global,
[2016]
|
Schlagworte: | |
Online-Zugang: | Volltext |
Zusammenfassung: | "This book addresses the problem of cyber terrorism head-on, first through a review of current literature, and then through a series of progressive proposals aimed at researchers, professionals, and policymakers"--Provided by publisher. |
Beschreibung: | PDFs (548 pages) : illustrations. Also available in print. |
Format: | Mode of access: World Wide Web. |
Bibliographie: | Includes bibliographical references and index. |
ISBN: | 9781466687943 |
Zugangseinschränkungen: | Restricted to subscribers or individual electronic text purchasers. |
Internformat
MARC
LEADER | 00000nam a2200000 i 4500 | ||
---|---|---|---|
001 | ZDB-98-IGB-00129591 | ||
003 | IGIG | ||
005 | 20151120130603.0 | ||
006 | m eo d | ||
007 | cr bn |||m|||a | ||
008 | 151119s2016 paua fob 001 0 eng d | ||
010 | |z 2015022718 | ||
020 | |a 9781466687943 |q electronic | ||
020 | |z 9781466687936 |q print | ||
024 | 7 | |a 10.4018/978-1-4666-8793-6 |2 doi | |
035 | |a (CaBNVSL)gtp00564345 | ||
035 | |a (OCoLC)930041657 | ||
040 | |a CaBNVSL |b eng |e rda |c CaBNVSL |d CaBNVSL | ||
050 | 4 | |a HV6773.15.C97 |b H36 2016e | |
082 | 7 | |a 363.325 |2 23 | |
245 | 0 | 0 | |a Handbook of research on civil society and national security in the era of cyber warfare |c Metodi Hadji-Janev and Mitko Bogdanoski, editors. |
264 | 1 | |a Hershey, Pennsylvania (701 E. Chocolate Avenue, Hershey, PA 17033, USA) : |b IGI Global, |c [2016] | |
300 | |a PDFs (548 pages) : |b illustrations. | ||
336 | |a text |2 rdacontent | ||
337 | |a electronic |2 isbdmedia | ||
338 | |a online resource |2 rdacarrier | ||
504 | |a Includes bibliographical references and index. | ||
505 | 0 | |a Cyber warfare, asymmetry, and responsibility: considerations for defence theorem / Jai Galliott -- National security policy and strategy and cyber security risks / Olivera Injac, Ramo Sendelj -- Cyber criminal profiling / Mohammed S. Gadelrab, Ali A. Ghorbani -- Hacking and hacktivism as an information communication system threat / Katerina Zlatanovska -- Attack scenarios perpetrated by terrorist organizations through the use of IT and ICT: on the basis of what is already available today / Flavia Zappa Leccisotti [and 4 others] -- Analysis of success of mobilization to terror using tools of neuro-linguistic programming (NLP) / Marina Shorer-Zeltser, Galit M. Ben-Israel -- Russian cyberwarfare taxonomy and cybersecurity contradictions between russia and EU: an analysis of management, strategies, standards, and legal aspects / Kimberly Lukin -- Access to information in the republic of Macedonia: between transparency and secrecy / Stojan Slaveski, Biljana Popovska -- Analysis of possible future global scenarios in the field of cyber warfare: national cyber defense and cyber attack capabilities / Flavia Zappa Leccisotti, Raoul Chiesa, Daniele De Nicolo -- Information security as a part of curricula in every professional domain, not just ICT's / Predrag Pale -- AI-based cyber defense for more secure cyberspace / Dimitar Stevo Bogatinov, Mitko Bogdanoski, Slavko Angelevski -- Mitigating unconventional cyber-warfare: scenario of cyber 9/11 / Ashok Vaseashta, Sherri B. Vaseashta, Eric W. Braman -- | |
505 | 8 | |a Changing the approach to deterrence in cyberspace while protecting civilians from cyber conflict / Metodi Hadji-Janev -- Cyber threats to critical infrastructure protection: public private aspects of resilience / Denis Caleta -- Toward more resilient cyber infrastructure: a practical approach / Biljana Tanceska, Mitko Bogdanoski, Aleksandar Risteski -- Novel first responder digital forensics tool as a support to law enforcement / Mitko Bogdanoski, Marjan Stoilkovski, Aleksandar Risteski -- Human factor role for cyber threats resilience / Zlatogor Borisov Minchev -- The impact of human behavior on cyber security / Nancy Houston -- International legal aspects of protecting civilians and their property in the future cyber conflict / Metodi Hadji-Janev -- Right to life and cyber warfare: applicability of legal regimes during counterterrorist operations (international humanitarian law) / Vesna Poposka -- Israel's cyber security policy: local response to the global cybersecurity risk / Lior Tabansky. | |
506 | |a Restricted to subscribers or individual electronic text purchasers. | ||
520 | 3 | |a "This book addresses the problem of cyber terrorism head-on, first through a review of current literature, and then through a series of progressive proposals aimed at researchers, professionals, and policymakers"--Provided by publisher. | |
530 | |a Also available in print. | ||
538 | |a Mode of access: World Wide Web. | ||
588 | |a Description based on title screen (IGI Global, viewed 11/19/2015). | ||
650 | 0 | |a Civil society. | |
650 | 0 | |a Cyberspace operations (Military science) | |
650 | 0 | |a Cyberterrorism. | |
650 | 0 | |a National security. | |
650 | 0 | |a Security, International. | |
653 | |a Cyber-criminal profiling | ||
653 | |a Cyberwarfare | ||
653 | |a Digital forensics as a first response | ||
653 | |a Digital terrorism and counterterrorism | ||
653 | |a Hacktivism | ||
653 | |a Mobile terror threats | ||
700 | 1 | |a Bogdanoski, Mitko |d 1977- |e editor. | |
700 | 1 | |a Hadji-Janev, Metodi |d 1976- |e editor. | |
710 | 2 | |a IGI Global, |e publisher. | |
776 | 0 | |c (Original) |w (DLC)2015022718 | |
776 | 0 | 8 | |i Print version: |z 1466687932 |z 9781466687936 |w (DLC) 2015022718 |
856 | 4 | 0 | |l FWS01 |p ZDB-98-IGB |q FWS_PDA_IGB |u http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-4666-8793-6 |3 Volltext |
912 | |a ZDB-98-IGB | ||
049 | |a DE-863 |
Datensatz im Suchindex
DE-BY-FWS_katkey | ZDB-98-IGB-00129591 |
---|---|
_version_ | 1816797076302856192 |
adam_text | |
any_adam_object | |
author2 | Bogdanoski, Mitko 1977- Hadji-Janev, Metodi 1976- |
author2_role | edt edt |
author2_variant | m b mb m h j mhj |
author_facet | Bogdanoski, Mitko 1977- Hadji-Janev, Metodi 1976- |
building | Verbundindex |
bvnumber | localFWS |
callnumber-first | H - Social Science |
callnumber-label | HV6773 |
callnumber-raw | HV6773.15.C97 H36 2016e |
callnumber-search | HV6773.15.C97 H36 2016e |
callnumber-sort | HV 46773.15 C97 H36 42016E |
callnumber-subject | HV - Social Pathology, Criminology |
collection | ZDB-98-IGB |
contents | Cyber warfare, asymmetry, and responsibility: considerations for defence theorem / Jai Galliott -- National security policy and strategy and cyber security risks / Olivera Injac, Ramo Sendelj -- Cyber criminal profiling / Mohammed S. Gadelrab, Ali A. Ghorbani -- Hacking and hacktivism as an information communication system threat / Katerina Zlatanovska -- Attack scenarios perpetrated by terrorist organizations through the use of IT and ICT: on the basis of what is already available today / Flavia Zappa Leccisotti [and 4 others] -- Analysis of success of mobilization to terror using tools of neuro-linguistic programming (NLP) / Marina Shorer-Zeltser, Galit M. Ben-Israel -- Russian cyberwarfare taxonomy and cybersecurity contradictions between russia and EU: an analysis of management, strategies, standards, and legal aspects / Kimberly Lukin -- Access to information in the republic of Macedonia: between transparency and secrecy / Stojan Slaveski, Biljana Popovska -- Analysis of possible future global scenarios in the field of cyber warfare: national cyber defense and cyber attack capabilities / Flavia Zappa Leccisotti, Raoul Chiesa, Daniele De Nicolo -- Information security as a part of curricula in every professional domain, not just ICT's / Predrag Pale -- AI-based cyber defense for more secure cyberspace / Dimitar Stevo Bogatinov, Mitko Bogdanoski, Slavko Angelevski -- Mitigating unconventional cyber-warfare: scenario of cyber 9/11 / Ashok Vaseashta, Sherri B. Vaseashta, Eric W. Braman -- Changing the approach to deterrence in cyberspace while protecting civilians from cyber conflict / Metodi Hadji-Janev -- Cyber threats to critical infrastructure protection: public private aspects of resilience / Denis Caleta -- Toward more resilient cyber infrastructure: a practical approach / Biljana Tanceska, Mitko Bogdanoski, Aleksandar Risteski -- Novel first responder digital forensics tool as a support to law enforcement / Mitko Bogdanoski, Marjan Stoilkovski, Aleksandar Risteski -- Human factor role for cyber threats resilience / Zlatogor Borisov Minchev -- The impact of human behavior on cyber security / Nancy Houston -- International legal aspects of protecting civilians and their property in the future cyber conflict / Metodi Hadji-Janev -- Right to life and cyber warfare: applicability of legal regimes during counterterrorist operations (international humanitarian law) / Vesna Poposka -- Israel's cyber security policy: local response to the global cybersecurity risk / Lior Tabansky. |
ctrlnum | (CaBNVSL)gtp00564345 (OCoLC)930041657 |
dewey-full | 363.325 |
dewey-hundreds | 300 - Social sciences |
dewey-ones | 363 - Other social problems and services |
dewey-raw | 363.325 |
dewey-search | 363.325 |
dewey-sort | 3363.325 |
dewey-tens | 360 - Social problems and services; associations |
discipline | Soziologie |
format | Electronic eBook |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>04917nam a2200577 i 4500</leader><controlfield tag="001">ZDB-98-IGB-00129591</controlfield><controlfield tag="003">IGIG</controlfield><controlfield tag="005">20151120130603.0</controlfield><controlfield tag="006">m eo d </controlfield><controlfield tag="007">cr bn |||m|||a</controlfield><controlfield tag="008">151119s2016 paua fob 001 0 eng d</controlfield><datafield tag="010" ind1=" " ind2=" "><subfield code="z"> 2015022718</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781466687943</subfield><subfield code="q">electronic</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="z">9781466687936</subfield><subfield code="q">print</subfield></datafield><datafield tag="024" ind1="7" ind2=" "><subfield code="a">10.4018/978-1-4666-8793-6</subfield><subfield code="2">doi</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(CaBNVSL)gtp00564345</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)930041657</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">CaBNVSL</subfield><subfield code="b">eng</subfield><subfield code="e">rda</subfield><subfield code="c">CaBNVSL</subfield><subfield code="d">CaBNVSL</subfield></datafield><datafield tag="050" ind1=" " ind2="4"><subfield code="a">HV6773.15.C97</subfield><subfield code="b">H36 2016e</subfield></datafield><datafield tag="082" ind1="7" ind2=" "><subfield code="a">363.325</subfield><subfield code="2">23</subfield></datafield><datafield tag="245" ind1="0" ind2="0"><subfield code="a">Handbook of research on civil society and national security in the era of cyber warfare </subfield><subfield code="c">Metodi Hadji-Janev and Mitko Bogdanoski, editors.</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Hershey, Pennsylvania (701 E. Chocolate Avenue, Hershey, PA 17033, USA) :</subfield><subfield code="b">IGI Global,</subfield><subfield code="c">[2016]</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">PDFs (548 pages) :</subfield><subfield code="b">illustrations.</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="a">text</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="a">electronic</subfield><subfield code="2">isbdmedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="a">online resource</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="504" ind1=" " ind2=" "><subfield code="a">Includes bibliographical references and index.</subfield></datafield><datafield tag="505" ind1="0" ind2=" "><subfield code="a">Cyber warfare, asymmetry, and responsibility: considerations for defence theorem / Jai Galliott -- National security policy and strategy and cyber security risks / Olivera Injac, Ramo Sendelj -- Cyber criminal profiling / Mohammed S. Gadelrab, Ali A. Ghorbani -- Hacking and hacktivism as an information communication system threat / Katerina Zlatanovska -- Attack scenarios perpetrated by terrorist organizations through the use of IT and ICT: on the basis of what is already available today / Flavia Zappa Leccisotti [and 4 others] -- Analysis of success of mobilization to terror using tools of neuro-linguistic programming (NLP) / Marina Shorer-Zeltser, Galit M. Ben-Israel -- Russian cyberwarfare taxonomy and cybersecurity contradictions between russia and EU: an analysis of management, strategies, standards, and legal aspects / Kimberly Lukin -- Access to information in the republic of Macedonia: between transparency and secrecy / Stojan Slaveski, Biljana Popovska -- Analysis of possible future global scenarios in the field of cyber warfare: national cyber defense and cyber attack capabilities / Flavia Zappa Leccisotti, Raoul Chiesa, Daniele De Nicolo -- Information security as a part of curricula in every professional domain, not just ICT's / Predrag Pale -- AI-based cyber defense for more secure cyberspace / Dimitar Stevo Bogatinov, Mitko Bogdanoski, Slavko Angelevski -- Mitigating unconventional cyber-warfare: scenario of cyber 9/11 / Ashok Vaseashta, Sherri B. Vaseashta, Eric W. Braman -- </subfield></datafield><datafield tag="505" ind1="8" ind2=" "><subfield code="a">Changing the approach to deterrence in cyberspace while protecting civilians from cyber conflict / Metodi Hadji-Janev -- Cyber threats to critical infrastructure protection: public private aspects of resilience / Denis Caleta -- Toward more resilient cyber infrastructure: a practical approach / Biljana Tanceska, Mitko Bogdanoski, Aleksandar Risteski -- Novel first responder digital forensics tool as a support to law enforcement / Mitko Bogdanoski, Marjan Stoilkovski, Aleksandar Risteski -- Human factor role for cyber threats resilience / Zlatogor Borisov Minchev -- The impact of human behavior on cyber security / Nancy Houston -- International legal aspects of protecting civilians and their property in the future cyber conflict / Metodi Hadji-Janev -- Right to life and cyber warfare: applicability of legal regimes during counterterrorist operations (international humanitarian law) / Vesna Poposka -- Israel's cyber security policy: local response to the global cybersecurity risk / Lior Tabansky.</subfield></datafield><datafield tag="506" ind1=" " ind2=" "><subfield code="a">Restricted to subscribers or individual electronic text purchasers.</subfield></datafield><datafield tag="520" ind1="3" ind2=" "><subfield code="a">"This book addresses the problem of cyber terrorism head-on, first through a review of current literature, and then through a series of progressive proposals aimed at researchers, professionals, and policymakers"--Provided by publisher.</subfield></datafield><datafield tag="530" ind1=" " ind2=" "><subfield code="a">Also available in print.</subfield></datafield><datafield tag="538" ind1=" " ind2=" "><subfield code="a">Mode of access: World Wide Web.</subfield></datafield><datafield tag="588" ind1=" " ind2=" "><subfield code="a">Description based on title screen (IGI Global, viewed 11/19/2015).</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Civil society.</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Cyberspace operations (Military science)</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Cyberterrorism.</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">National security.</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Security, International.</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">Cyber-criminal profiling</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">Cyberwarfare</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">Digital forensics as a first response</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">Digital terrorism and counterterrorism</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">Hacktivism</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">Mobile terror threats</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Bogdanoski, Mitko</subfield><subfield code="d">1977-</subfield><subfield code="e">editor.</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Hadji-Janev, Metodi</subfield><subfield code="d">1976-</subfield><subfield code="e">editor.</subfield></datafield><datafield tag="710" ind1="2" ind2=" "><subfield code="a">IGI Global,</subfield><subfield code="e">publisher.</subfield></datafield><datafield tag="776" ind1="0" ind2=" "><subfield code="c">(Original)</subfield><subfield code="w">(DLC)2015022718</subfield></datafield><datafield tag="776" ind1="0" ind2="8"><subfield code="i">Print version:</subfield><subfield code="z">1466687932</subfield><subfield code="z">9781466687936</subfield><subfield code="w">(DLC) 2015022718</subfield></datafield><datafield tag="856" ind1="4" ind2="0"><subfield code="l">FWS01</subfield><subfield code="p">ZDB-98-IGB</subfield><subfield code="q">FWS_PDA_IGB</subfield><subfield code="u">http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-4666-8793-6</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-98-IGB</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-863</subfield></datafield></record></collection> |
id | ZDB-98-IGB-00129591 |
illustrated | Illustrated |
indexdate | 2024-11-26T14:51:49Z |
institution | BVB |
isbn | 9781466687943 |
language | English |
oclc_num | 930041657 |
open_access_boolean | |
owner | DE-863 DE-BY-FWS |
owner_facet | DE-863 DE-BY-FWS |
physical | PDFs (548 pages) : illustrations. Also available in print. |
psigel | ZDB-98-IGB |
publishDate | 2016 |
publishDateSearch | 2016 |
publishDateSort | 2016 |
publisher | IGI Global, |
record_format | marc |
spelling | Handbook of research on civil society and national security in the era of cyber warfare Metodi Hadji-Janev and Mitko Bogdanoski, editors. Hershey, Pennsylvania (701 E. Chocolate Avenue, Hershey, PA 17033, USA) : IGI Global, [2016] PDFs (548 pages) : illustrations. text rdacontent electronic isbdmedia online resource rdacarrier Includes bibliographical references and index. Cyber warfare, asymmetry, and responsibility: considerations for defence theorem / Jai Galliott -- National security policy and strategy and cyber security risks / Olivera Injac, Ramo Sendelj -- Cyber criminal profiling / Mohammed S. Gadelrab, Ali A. Ghorbani -- Hacking and hacktivism as an information communication system threat / Katerina Zlatanovska -- Attack scenarios perpetrated by terrorist organizations through the use of IT and ICT: on the basis of what is already available today / Flavia Zappa Leccisotti [and 4 others] -- Analysis of success of mobilization to terror using tools of neuro-linguistic programming (NLP) / Marina Shorer-Zeltser, Galit M. Ben-Israel -- Russian cyberwarfare taxonomy and cybersecurity contradictions between russia and EU: an analysis of management, strategies, standards, and legal aspects / Kimberly Lukin -- Access to information in the republic of Macedonia: between transparency and secrecy / Stojan Slaveski, Biljana Popovska -- Analysis of possible future global scenarios in the field of cyber warfare: national cyber defense and cyber attack capabilities / Flavia Zappa Leccisotti, Raoul Chiesa, Daniele De Nicolo -- Information security as a part of curricula in every professional domain, not just ICT's / Predrag Pale -- AI-based cyber defense for more secure cyberspace / Dimitar Stevo Bogatinov, Mitko Bogdanoski, Slavko Angelevski -- Mitigating unconventional cyber-warfare: scenario of cyber 9/11 / Ashok Vaseashta, Sherri B. Vaseashta, Eric W. Braman -- Changing the approach to deterrence in cyberspace while protecting civilians from cyber conflict / Metodi Hadji-Janev -- Cyber threats to critical infrastructure protection: public private aspects of resilience / Denis Caleta -- Toward more resilient cyber infrastructure: a practical approach / Biljana Tanceska, Mitko Bogdanoski, Aleksandar Risteski -- Novel first responder digital forensics tool as a support to law enforcement / Mitko Bogdanoski, Marjan Stoilkovski, Aleksandar Risteski -- Human factor role for cyber threats resilience / Zlatogor Borisov Minchev -- The impact of human behavior on cyber security / Nancy Houston -- International legal aspects of protecting civilians and their property in the future cyber conflict / Metodi Hadji-Janev -- Right to life and cyber warfare: applicability of legal regimes during counterterrorist operations (international humanitarian law) / Vesna Poposka -- Israel's cyber security policy: local response to the global cybersecurity risk / Lior Tabansky. Restricted to subscribers or individual electronic text purchasers. "This book addresses the problem of cyber terrorism head-on, first through a review of current literature, and then through a series of progressive proposals aimed at researchers, professionals, and policymakers"--Provided by publisher. Also available in print. Mode of access: World Wide Web. Description based on title screen (IGI Global, viewed 11/19/2015). Civil society. Cyberspace operations (Military science) Cyberterrorism. National security. Security, International. Cyber-criminal profiling Cyberwarfare Digital forensics as a first response Digital terrorism and counterterrorism Hacktivism Mobile terror threats Bogdanoski, Mitko 1977- editor. Hadji-Janev, Metodi 1976- editor. IGI Global, publisher. (Original) (DLC)2015022718 Print version: 1466687932 9781466687936 (DLC) 2015022718 FWS01 ZDB-98-IGB FWS_PDA_IGB http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-4666-8793-6 Volltext |
spellingShingle | Handbook of research on civil society and national security in the era of cyber warfare Cyber warfare, asymmetry, and responsibility: considerations for defence theorem / Jai Galliott -- National security policy and strategy and cyber security risks / Olivera Injac, Ramo Sendelj -- Cyber criminal profiling / Mohammed S. Gadelrab, Ali A. Ghorbani -- Hacking and hacktivism as an information communication system threat / Katerina Zlatanovska -- Attack scenarios perpetrated by terrorist organizations through the use of IT and ICT: on the basis of what is already available today / Flavia Zappa Leccisotti [and 4 others] -- Analysis of success of mobilization to terror using tools of neuro-linguistic programming (NLP) / Marina Shorer-Zeltser, Galit M. Ben-Israel -- Russian cyberwarfare taxonomy and cybersecurity contradictions between russia and EU: an analysis of management, strategies, standards, and legal aspects / Kimberly Lukin -- Access to information in the republic of Macedonia: between transparency and secrecy / Stojan Slaveski, Biljana Popovska -- Analysis of possible future global scenarios in the field of cyber warfare: national cyber defense and cyber attack capabilities / Flavia Zappa Leccisotti, Raoul Chiesa, Daniele De Nicolo -- Information security as a part of curricula in every professional domain, not just ICT's / Predrag Pale -- AI-based cyber defense for more secure cyberspace / Dimitar Stevo Bogatinov, Mitko Bogdanoski, Slavko Angelevski -- Mitigating unconventional cyber-warfare: scenario of cyber 9/11 / Ashok Vaseashta, Sherri B. Vaseashta, Eric W. Braman -- Changing the approach to deterrence in cyberspace while protecting civilians from cyber conflict / Metodi Hadji-Janev -- Cyber threats to critical infrastructure protection: public private aspects of resilience / Denis Caleta -- Toward more resilient cyber infrastructure: a practical approach / Biljana Tanceska, Mitko Bogdanoski, Aleksandar Risteski -- Novel first responder digital forensics tool as a support to law enforcement / Mitko Bogdanoski, Marjan Stoilkovski, Aleksandar Risteski -- Human factor role for cyber threats resilience / Zlatogor Borisov Minchev -- The impact of human behavior on cyber security / Nancy Houston -- International legal aspects of protecting civilians and their property in the future cyber conflict / Metodi Hadji-Janev -- Right to life and cyber warfare: applicability of legal regimes during counterterrorist operations (international humanitarian law) / Vesna Poposka -- Israel's cyber security policy: local response to the global cybersecurity risk / Lior Tabansky. Civil society. Cyberspace operations (Military science) Cyberterrorism. National security. Security, International. |
title | Handbook of research on civil society and national security in the era of cyber warfare |
title_auth | Handbook of research on civil society and national security in the era of cyber warfare |
title_exact_search | Handbook of research on civil society and national security in the era of cyber warfare |
title_full | Handbook of research on civil society and national security in the era of cyber warfare Metodi Hadji-Janev and Mitko Bogdanoski, editors. |
title_fullStr | Handbook of research on civil society and national security in the era of cyber warfare Metodi Hadji-Janev and Mitko Bogdanoski, editors. |
title_full_unstemmed | Handbook of research on civil society and national security in the era of cyber warfare Metodi Hadji-Janev and Mitko Bogdanoski, editors. |
title_short | Handbook of research on civil society and national security in the era of cyber warfare |
title_sort | handbook of research on civil society and national security in the era of cyber warfare |
topic | Civil society. Cyberspace operations (Military science) Cyberterrorism. National security. Security, International. |
topic_facet | Civil society. Cyberspace operations (Military science) Cyberterrorism. National security. Security, International. |
url | http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-4666-8793-6 |
work_keys_str_mv | AT bogdanoskimitko handbookofresearchoncivilsocietyandnationalsecurityintheeraofcyberwarfare AT hadjijanevmetodi handbookofresearchoncivilsocietyandnationalsecurityintheeraofcyberwarfare AT igiglobal handbookofresearchoncivilsocietyandnationalsecurityintheeraofcyberwarfare |