Journal of Information Security

Journal of Information Security

ISSN Print: 2153-1234
ISSN Online: 2153-1242
www.scirp.org/journal/jis
E-mail: jis@scirp.org
"The Application of Mixed Method in Developing a Cyber Terrorism Framework"
written by Rabiah Ahmad, Zahri Yunos,
published by Journal of Information Security, Vol.3 No.3, 2012
has been cited by the following article(s):
  • Google Scholar
  • CrossRef
[1] THE IMPORTANCE OF MIXED METHOD IN TERRORISM STUDY
International Journal of Social And Humanities …, 2023
[2] 42 Methoden der Terrorismusforschung: Ein Überblick
Terrorismusforschung, 2022
[3] Terrorism and Social Media: Extremist Groups and College Student Recruitment
2021
[4] Artificial Intelligence Cybersecurity Threats: Determining Strategy and Decision-Making Effects
2020
[5] A Mixed-Methods Research design for study of possible futures for South Africa's transition to a low carbon economy.
2020
[6] Representations of the threat of cyberterrorism in the UAE's Arabic and English-language news media
2019
[7] Security Technology and Awareness Training; Do They Affect Behaviors and Thus Reduce Breaches?
2019
[8] The evolution of deterrence theory for a new dimension The challenges of cyber deterrence strategies in international system
2019
[9] Cashing in on Cyberpower: How Interdependent Actors Seek Economic Outcomes in a Digital World
2018
[10] EFFECT OF MOBILE BANKING ADOPTION ON THE PERFORMANCE OF SMALL AND MEDIUM ENTERPRISES IN NAIROBI COUNTY
International Journal of Economics, Business and Management Research, 2018
[11] Estudos prospectivos sobre o ciber terrorismo na Paraíba
2018
[12] The Threats of Cyber Warfare in the Sadc Region: The Case of Zimbabwe
2017
[13] THE CRIME-TERROR NEXUS: IMPROVISED EXPLOSIVE DEVICE ILLICIT SUPPLY INTERMEDIATION
2017
[14] Understanding Cyber Terrorism from Motivational Perspectives: A Qualitative Data Analysis
2017
[15] Cyber-Security Policy Decisions in Small Businesses
Walden Dissertations and Doctoral Studies, 2017
[16] Examining the Negative Impact of Information Security on Worker Performance
ProQuest Dissertations Publishing, 2017
[17] Organizational Decisions about Cyber Security in Small to Mid-Sized Businesses: A Qualitative Study
ProQuest Dissertations Publishing, 2016
[18] Law Enforcement Leadership Training Strategies
Walden Dissertations and Doctoral Studies, 2016
[19] Law Enforcement Employees' Experiences of Skillful Recognition by Leaders
Walden Dissertations and Doctoral Studies, 2016
[20] The Relationship Between Terrorism, Oil Prices, and Airline Profitability
Walden Dissertations and Doctoral Studies, 2015
[21] The implementation of mixed method in developing a mobile learners security framework
Computational Science and Technology (ICCST), 2014 International Conference on, 2014
[22] Adoption of Mobile Payments in Kenyan Businesses: A case study of Small and Medium Enterprises (SME) in Kenya
International Journal of Computer Applications, 2014
[23] Grounding the component of cyber terrorism framework using the grounded theory
Science and Information Conference (SAI), 2014. IEEE, 2014
[24] The Application of Qualitative Method in Developing a Cyber Terrorism Framework
RECENT ADVANCES in ECONOMICS, MANAGEMENT and DEVELOPMENT, 2014
Free SCIRP Newsletters
Copyright © 2006-2025 Scientific Research Publishing Inc. All Rights Reserved.
Top