You are previewing International Journal of Cyber Warfare and Terrorism (IJCWT) Volume 4, Issue 4.
O'Reilly logo
International Journal of Cyber Warfare and Terrorism (IJCWT) Volume 4, Issue 4

Book Description

The International Journal of Cyber Warfare and Terrorism (IJCWT) publishes original innovative findings on ethical, political, legal, and social issues relating to security and cybernetic wars. This journal focuses on cyber warfare and terrorism using examples from around the world. IJCWT covers technical aspects, management issues, social issues, and government issues that relate to cyber warfare and terrorism.

This issue contains the following articles:

  • Clausewitz and the Utility of Cyberattacks in War
  • The Covert Strengthening of Islamic Extremists under Ronald Reagan and George W. Bush
  • The Changing Face of Electronic Aggression: The Phenomenon of Online Trolling within the Context of e-Participation in the United Kingdom
  • Intellectual Property Protection in Small Knowledge Intensive Enterprises
  • A Critical Comparison of Trusted Computing and Trust Management Technologies

Table of Contents

  1. Cover
  2. Masthead
  3. Call For Articles
  4. Clausewitz and the Utility of Cyberattacks in War
    1. ABSTRACT
    2. INTRODUCTION
    3. ON WAR REVISITED IN THE AGE OF CYBERSPACE
    4. THE POLITICAL, INSTRUMENTAL AND PHYSICAL POTENTIAL OF CYBERATTACKS
    5. IS CYBERWAR REALLY COMING?
    6. THE UTILITY OF CYBERATTACKS IN WAR
    7. CONCLUSION
    8. REFERENCES
    9. ENDNOTES
  5. The Covert Strengthening of Islamic Extremists under Ronald Reagan and George W. Bush
    1. ABSTRACT
    2. INTRODUCTION
    3. COVERT MISSION IN AFGHANISTAN DURING THE REAGAN YEARS
    4. COVERT MISSION IN SOMALIA DURING THE BUSH YEARS
    5. CONCLUSION
    6. ACKNOWLEDGMENT
    7. REFERENCES
  6. The Changing Face of Electronic Aggression:
    1. ABSTRACT
    2. INTRODUCTION
    3. RESEARCH METHODOLOGY
    4. DIS(CONNECTED) CITIZENSHIP? AN EXPLORATION OF KEY CONCEPTS
    5. ONLINE AND OFFLINE PARTICIPATION: THE PSYCHOLOGY BEHIND HUMAN-COMPUTER INTERACTIONS
    6. TECHNOLOGY AND INTERNET-BASED ADDICTIONS: FORETELLING ELECTRONIC AGGRESSION
    7. ELECTRONIC AGGRESSION AND THE INSIDER THREAT TO SYSTEMIC NETWORK ARCHITECTURE
    8. TECHNOLOGY-BASED ADDICTION, DIGITISED ENVIRONMENTS, AND PUBLIC ENGAGEMENT
    9. UNDERSTANDING POLITICAL PARTICIPATION AND TROLLING ONLINE ONLINE
    10. E-CONSULTATION: TWO-WAY GOVERNANCE IN THE DIGITAL AGE?
    11. THE NO. 10 DOWNING STREET E-PETITIONS INITIATIVE
    12. RECONFIGURING GOVERNMENT-CITIZEN RELATIONS THROUGH E-PETITIONS
    13. THE TROLLS AMONG US: PRIVACY, TRUST, AND FREEDOM OF EXPRESSION ONLINE
    14. REFLECTIONS ON THE INSIDER THREAT: ELECTRONIC AGGRESSION, CYBER SECURITY, AND THE ARCHITECTURE OF CONTROL
    15. CONCLUSION
    16. ADDITIONAL READINGS
    17. REFERENCES
    18. ENDNOTES
  7. Intellectual Property Protection in Small Knowledge Intensive Enterprises
    1. ABSTRACT
    2. INTRODUCTION
    3. RATIONALE OF INTELLECTUAL PROPERTY PROTECTION IN SMALL ENTERPRISES
    4. WAYS TO PROTECT KNOWLEDGE AND INTELLECTUAL PROPERTY
    5. INTELLECTUAL PROPERTY PROTECTION PRACTICES AND PROCESSES, AND THEIR RELATION TO THE KNOWLEDGE MANAGEMENT FRAMEWORK
    6. INTELLECTUAL PROPERTY PROTECTION PRACTICES AND PROCESSES ADOPTED BY SMALL ENTERPRISES
    7. LEVEL OF TANGIBILITY AND INTERNALIZATION RELATED TO IP PROTECTION ACTIVITY
    8. WAYS TO PROTECT INTELLECTUAL PROPERTY AND THEIR RELATIONSHIP TO THE KNOWLEDGE MANAGEMENT FRAMEWORK
    9. CONCLUSION
    10. REFERENCES
    11. ENDNOTES
  8. A Critical Comparison of Trusted Computing and Trust Management Technologies
    1. ABSTRACT
    2. INTRODUCTION
    3. TRUSTED SYSTEMS
    4. TRUST MANAGEMENT
    5. EXPERIMENTATION WITH DELEGATION MECHANISMS FOR WEB SERVICES
    6. CONCLUSION
    7. REFERENCES
  9. Call For Articles