Journal of Information Security

Journal of Information Security

ISSN Print: 2153-1234
ISSN Online: 2153-1242
www.scirp.org/journal/jis
E-mail: jis@scirp.org
"Perception on Cyber Terrorism: A Focus Group Discussion Approach"
written by Rabiah Ahmad, Zahri Yunos, Shahrin Sahib, Mariana Yusoff,
published by Journal of Information Security, Vol.3 No.3, 2012
has been cited by the following article(s):
  • Google Scholar
  • CrossRef
[1] Financial innovations in terrorism financing: a case study of Malaysian terror financing
Journal of Criminological …, 2024
[2] Understanding How National CSIRTs Evaluate Cyber Incident Response Tools and Data: Findings from Focus Group Discussions
Digital Threats: Research and Practice, 2023
[3] ADAPTING TO CYBERSECURITY CHALLENGES: ASSESSING THE EFFECTIVENESS OF INTERNATIONAL LAW AGAINST CYBER TERRORISM
Journal of Social Research …, 2023
[4] DDoS Capability and Readiness-Evidence from Australian Organisations
2023
[5] Terrorismo cibernetico e sicurezza nazionale: potenziale metamorfosi della minaccia eversiva
2023
[6] Students' Perception towards New Face of Education during This Unprecedented Phase of COVID-19 Outbreak: An Empirical Study of Higher Educational Institutions …
European Journal of Investigation in Health …, 2022
[7] Cyber threats: taxonomy, impact, policies, and way forward.
KSII Transactions on …, 2022
[8] Prospectiva de ciberseguridad nacional para Colombia a 2030
Martínez - Revista Científica General José María …, 2022
[9] FMEA Approach to Risk Factors as a Factor in Implementing Green Supply Chain Management (Study in PT. Gresik Cipta Sejahtera)
2021
[10] CYBERTERRORISM AND CYBERWAR AS NEW THREATS TO THE SECURITY OF THE STATE
2020
[11] On combating online radicalisation: a framework for cybercrime investigations
2019
[12] Cybersecurity: A Nonexperimental Correlational Study of Organizational Employees' Security Perceptions and Vulnerabilities in Information Technology Infrastructure
2019
[13] A Quantitative Evaluation of Digital Natives' and Digital Immigrants' Information Security Compliance in the Context of Protection Motivation Theory
2019
[14] Fighting with Cyber Terror and Terrorism: Threats and Precautions
2019
[15] A Review of Research Studies on Cyber Terror
2019
[16] Media Persuasion in the Islamic State
2019
[17] Estudos prospectivos sobre o ciber terrorismo na Paraíba
2018
[18] CYBERSECURITY PERCEPTIONS OF UNIVERSITY STUDENTS IN TURKEY
Karadeniz Teknik üniversitesi ?leti?im Ara?t?rmalar? Dergisi, 2018
[19] Cyber Dogfighting: A Case Study Evaluation of the Dynamic Decision-Making Used by Hackers in a Turbulent Environment of Cyberspace at a Regional Hacking …
2018
[20] Cyberspace and Cybersecurity in the Digital Age: An Evolving Concern in Contemporary Security Discourse
Computer and Cyber Security, 2018
[21] FOCUS GROUP DISCUSSION (FGD) UNTUK MENGURANGI PROKRASTINASI AKADEMIK PADA SISWA SEKOLAH MENENGAH PERTAMA (SMP)
2018
[22] Understanding Cyber Terrorism from Motivational Perspectives
2017
[23] Google Maps Security Concerns
2017
[24] Cyberterrorism: Using the internet as a weapon of destruction
National Security: Breakthroughs in Research and Practice, 2016
[25] Addressing the Threat of Cyber Terrorism
2016
[26] Cyberterrorism: Using the Internet as
2016
[27] The perception of cyber threats and its associative relationship to the protection motivation theory and generational age groups: A quantitative study
2015
[28] Improving Collaboration of Bali Cattle Supply Chain and Its Impact on Cattle Farmer Income in South Sulawesi, Indonesia
Arabian Journal of Business and Management Review, 2015
[29] A qualitative analysis for evaluating a cyber terrorism framework in Malaysia
Fiber & Integrated Optics, 2015
[30] Strategy Matrix for Containing Cyber-Attacks: A Generic Approach
2015
[31] Adoption of ISMS for Protecting SCADA Systems against Cyber Terrorism Threats
International Journal of Computer and Information Technology, 2014
[32] Grounding the component of cyber terrorism framework using the grounded theory
Science and Information Conference (SAI), 2014. IEEE, 2014
[33] The Application of Qualitative Method in Developing a Cyber Terrorism Framework
RECENT ADVANCES in ECONOMICS, MANAGEMENT and DEVELOPMENT, 2014
[34] An Overview of Contemporary Cyberspace Activities and the Challenging Cyberspace Crimes/Threats
International Journal of Computer Science and Information Security, 2014
[35] Addressing Cyber Terrorism Threats {By Zahri Bin Yunos, Cybersecurity Malaisia} Written by
Free SCIRP Newsletters
Copyright © 2006-2025 Scientific Research Publishing Inc. All Rights Reserved.
Top