Skip to main content
IT for Security
Team
Researchers
Associates
Support Staff
PHD Students
Projects
Ongoing
Upcoming
Finalized
Courses
Defence policy
Security Studies
Cybersecurity
Administration
Management
Economics
Innovations
Themes
all courses
Resources
Publications
IT4Sec Reports
CSDM Views
Presentations
Books
Events
Partners
Contact
Biblio
Export 4 results:
RTF
EndNote XML
Filters:
Keyword
is
Internet
[Clear All Filters]
2016
Rusumanov, Vase
.
"
The Use of the Internet by Terrorist Organizations
."
Information & Security: An International Journal
34, no. 2 (2016): 137-150.
DOI
Google Scholar
RTF
EndNote XML
2006
Conway, Maura
.
"
Terrorist ‘Use’ of the Internet and Fighting Back
."
Information & Security: An International Journal
19 (2006): 9-30.
DOI
Google Scholar
RTF
EndNote XML
2004
Hwang, Min-Shiang
,
Chun-Ta Li
,
Jau-Ji Shen
, and
Yen-Ping Chu
.
"
Challenges in E-Government and Security of Information
."
Information & Security: An International Journal
15, no. 1 (2004): 9-20.
DOI
Google Scholar
RTF
EndNote XML
2001
Giacomello, Giampiero
, and
Fernando Mendez
.
"
"Cuius Regio, Eius Religio, Omnium Spatium?” State Sovereignty in the Age of the Internet
."
Information & Security: An International Journal
7 (2001): 15-27.
DOI
Google Scholar
RTF
EndNote XML
English
Български
Search form
Search
Resources
Security policy
Cybersecurity
Intelligence
Law Enforcement
Terrorism
Operations
Technologies & Industry
Personnel management
Acquisition Management
Strategy
Concepts and doctrine
Management
Defence economics
Financial management
Information & knowledge management
Simulation and Training
Change management
Decision-making
Good governance