期刊文献+
共找到2,914篇文章
< 1 2 146 >
每页显示 20 50 100
Terrorism Attack Classification Using Machine Learning: The Effectiveness of Using Textual Features Extracted from GTD Dataset
1
作者 Mohammed Abdalsalam Chunlin Li +1 位作者 Abdelghani Dahou Natalia Kryvinska 《Computer Modeling in Engineering & Sciences》 SCIE EI 2024年第2期1427-1467,共41页
One of the biggest dangers to society today is terrorism, where attacks have become one of the most significantrisks to international peace and national security. Big data, information analysis, and artificial intelli... One of the biggest dangers to society today is terrorism, where attacks have become one of the most significantrisks to international peace and national security. Big data, information analysis, and artificial intelligence (AI) havebecome the basis for making strategic decisions in many sensitive areas, such as fraud detection, risk management,medical diagnosis, and counter-terrorism. However, there is still a need to assess how terrorist attacks are related,initiated, and detected. For this purpose, we propose a novel framework for classifying and predicting terroristattacks. The proposed framework posits that neglected text attributes included in the Global Terrorism Database(GTD) can influence the accuracy of the model’s classification of terrorist attacks, where each part of the datacan provide vital information to enrich the ability of classifier learning. Each data point in a multiclass taxonomyhas one or more tags attached to it, referred as “related tags.” We applied machine learning classifiers to classifyterrorist attack incidents obtained from the GTD. A transformer-based technique called DistilBERT extracts andlearns contextual features from text attributes to acquiremore information from text data. The extracted contextualfeatures are combined with the “key features” of the dataset and used to perform the final classification. Thestudy explored different experimental setups with various classifiers to evaluate the model’s performance. Theexperimental results show that the proposed framework outperforms the latest techniques for classifying terroristattacks with an accuracy of 98.7% using a combined feature set and extreme gradient boosting classifier. 展开更多
关键词 Artificial intelligence machine learning natural language processing data analytic DistilBERT feature extraction terrorism classification GTD dataset
下载PDF
Cybersecurity and Domestic Terrorism: Purpose and Future
2
作者 Robb Shawe Ian R. McAndrew 《Journal of Software Engineering and Applications》 2023年第10期548-560,共13页
The increasing utilization of digital technologies presents risks to critical systems due to exploitation by terrorists. Cybersecurity entails proactive and reactive measures designed to protect software and electroni... The increasing utilization of digital technologies presents risks to critical systems due to exploitation by terrorists. Cybersecurity entails proactive and reactive measures designed to protect software and electronic devices from any threats. However, the rising cases of cyber threats are carried out by domestic terrorists who share particular ideologies or grievances. This paper analyzes the increasing cyber-attack instances and mechanisms to counter these threats. Additionally, it addresses the growing concern of domestic terrorism and its impact on national security. Finally, it provides an overview of gaps and possible areas of future research to promote cybersecurity. 展开更多
关键词 Cyber-Attacks CYBERCRIME CYBERSECURITY Cyber Threats Domestic terrorism
下载PDF
Robustα-Fe_(2)O_(3)/Epoxy Resin Superhydrophobic Coatings for Anti-icing Property
3
作者 乔燕明 TAO Xuan +2 位作者 LI Lei 阮敏 鲁礼林 《Journal of Wuhan University of Technology(Materials Science)》 SCIE EI CAS CSCD 2024年第3期621-626,共6页
α-Fe_(2)O_(3)/epoxy resin composite superhydrophobic coating was prepared withα-Fe_(2)O_(3) nanoparticles and epoxy resin by spin coating method.The coating without epoxy resin has higher contact angle(CA)and lower ... α-Fe_(2)O_(3)/epoxy resin composite superhydrophobic coating was prepared withα-Fe_(2)O_(3) nanoparticles and epoxy resin by spin coating method.The coating without epoxy resin has higher contact angle(CA)and lower ice adhesion strength(IAS),but the mechanical properties are poor.Theα-Fe_(2)O_(3)/epoxy resin composite superhydrophobic coating exhibits good mechanical durability.In addition,compared with the bare aluminum substrate,the Ecorr of the composite coating is positive and the Jcorr is lower.The inhibition efficiency of the composite coating is as high as 99.98%in 3.5 wt%NaCl solution.The difference in the microstructure caused by the two preparation methods leads to the changes in mechanical properties and corrosion resistance of composite superhydrophobic coating. 展开更多
关键词 SUPERHYDROPHOBIC anti-CORROSION anti-ICING ROBUST
下载PDF
Study of Flow and Heat Transfer in an Ejector-Driven Swirl Anti-Icing Chamber
4
作者 Yi Tu Yuan Wu Yu Zeng 《Fluid Dynamics & Materials Processing》 EI 2024年第5期989-1014,共26页
The formation of ice on the leading edge of aircraft engines is a serious issue,as it can have catastrophic consequences.The Swirl Anti-Icing(SAI)system,driven by ejection,circulates hot fluid within a 360°annula... The formation of ice on the leading edge of aircraft engines is a serious issue,as it can have catastrophic consequences.The Swirl Anti-Icing(SAI)system,driven by ejection,circulates hot fluid within a 360°annular chamber to heat the engine inlet lip surface and prevent icing.This study employs a validated Computational Fluid Dynamics(CFD)approach to study the impact of key geometric parameters of this system on flow and heat transfer characteristics within the anti-icing chamber.Additionally,the entropy generation rate and exergy efficiency are analyzed to assess the energy utilization in the system.The research findings indicate that,within the considered flow range,reducing the nozzle specific areaφfrom 0.03061 to 0.01083 can enhance the ejection coefficient by over 60.7%.This enhancement increases the air circulating rate,thereby intensifying convective heat transfer within the SAI chamber.However,the reduction inφalso leads to a significant increase in the required bleed air pressure and a higher entropy generation rate,indicating lower exergy efficiency.The nozzle angleθnotably affects the distribution of hot and cold spots on the lip surface of the SAI chamber.Increasingθfrom 0°to 20°reduces the maximum temperature difference on the anti-icing chamber surface by 60 K. 展开更多
关键词 Swirl anti-icing heat transfer exergy efficiency hot and cold spot aircraft engine
下载PDF
Neurosyphilis complicated by anti-γ-aminobutyric acid-B receptor encephalitis: A case report
5
作者 Ya-Xiu Fang Xiao-Ming Zhou +7 位作者 Dong Zheng Guang-Hui Liu Peng-Bo Gao Xiao-Zhen Huang Zhi-Cheng Chen Hui Zhang Lin Chen Ya-Fang Hu 《World Journal of Clinical Cases》 SCIE 2024年第11期1960-1966,共7页
BACKGROUND Syphilis is an infectious disease caused by Treponema pallidum that can invade the central nervous system,causing encephalitis.Few cases of anti-N-methyl-Daspartate receptor autoimmune encephalitis(AE)secon... BACKGROUND Syphilis is an infectious disease caused by Treponema pallidum that can invade the central nervous system,causing encephalitis.Few cases of anti-N-methyl-Daspartate receptor autoimmune encephalitis(AE)secondary to neurosyphilis have been reported.We report a neurosyphilis patient with anti-γ-aminobutyric acid-B receptor(GABABR)AE.CASE SUMMARY A young man in his 30s who presented with acute epileptic status was admitted to a local hospital.He was diagnosed with neurosyphilis,according to serum and cerebrospinal fluid(CSF)tests for syphilis.After 14 d of antiepileptic treatment and anti-Treponema pallidum therapy with penicillin,epilepsy was controlled but serious cognitive impairment,behavioral,and serious psychiatric symptoms were observed.He was then transferred to our hospital.The Mini-Mental State Examination(MMSE)crude test results showed only 2 points.Cranial magnetic resonance imaging revealed significant cerebral atrophy and multiple fluidattenuated inversion recovery high signals in the white matter surrounding both lateral ventricles,left amygdala and bilateral thalami.Anti-GABABR antibodies were discovered in CSF(1:3.2)and serum(1:100).The patient was diagnosed with neurosyphilis complicated by anti-GABABR AE,and received methylprednisolone and penicillin.Following treatment,his mental symptoms were alleviated.Cognitive impairment was significantly improved,with a MMSE of 8 points.Serum anti-GABABR antibody titer decreased to 1:32.The patient received methylprednisolone and penicillin after discharge.Three months later,the patient’s condition was stable,but the serum anti-GABABR antibody titer was 1:100.CONCLUSION This patient with neurosyphilis combined with anti-GABABR encephalitis benefited from immunotherapy. 展开更多
关键词 anti-γ-aminobutyric acid-B receptor GABABR NEUROSYPHILIS Tissue-based assay Magnetic resonance imaging Mini-mental state examination Case report
下载PDF
On the Conflict and Balance Between Anti-terrorism and Protection of Human Rights
6
作者 丁守庆 古丽燕 LU Mimi(译) 《The Journal of Human Rights》 2019年第5期564-578,共15页
With the increasingly serious global terrorism situation,all countries have continuously revised their anti-terrorism laws and related criminal laws,adopting legislation to restrict and derogate civil liberties,increa... With the increasingly serious global terrorism situation,all countries have continuously revised their anti-terrorism laws and related criminal laws,adopting legislation to restrict and derogate civil liberties,increased the punishment for terrorists,and adopted corresponding anti-terrorism measures to increase monitoring of suspicious persons.In this context,conflicts and contradictions in human rights protection and the fight against terrorism often arise.The Xinjiang uygur Autonomous Region is at the forefront of China’s anti-terrorism efforts.Facing the special situation of dealing simultaneously with the slowdown in economic growth,making difficult structural adjustments,and absorbing the effects of the previous economic stimulus policies,since 2014,the local government of Xinjiang has adopted a combination of measures on anti-terrorism and de-extremism work and achieved significant results under the correct guidance of the strategy of governance in Xinjiang proposed by the central government.The most important consideration of anti-terrorism lies in the analysis Chinese and Western human rights values,coordinate and balance the relationship between anti-terrorism and human rights protection within the existing legal framework. 展开更多
关键词 terrorism XINJIANG GOVERNANCE human RIGHTS PROTECTION
下载PDF
Anti-terrorism and Human Rights Protection: Africa in Perspective
7
作者 Paul Andrew GWAZA 《The Journal of Human Rights》 2015年第2期167-177,共11页
The relation between Anti-terrorism and human rights Protection is rather complicated. Based on the practices in Africa, this article analyses the conflicts and contradictions between the two. While countering terrori... The relation between Anti-terrorism and human rights Protection is rather complicated. Based on the practices in Africa, this article analyses the conflicts and contradictions between the two. While countering terrorism, governments have to take the duty of human rights protection as well. Rights are of key importance in preventing and countering terrorism. Integrating human rights construction into antiterrorism mechanism is rather helpful in eliminating various moods of dissatisfaction which are easy to breed terrorism. 展开更多
关键词 anti-terrorism Human Rights Protection AFRICA
下载PDF
The Relationship Between Anti-terrorism and Human Rights Protection: Perspective of International Politics
8
作者 钱雪梅 《The Journal of Human Rights》 2015年第1期71-82,共12页
This article briefly outlines how anti-terrorism struggles became linked and their relationship thereafter with human rights issues in international political life. With equal relevance and value to human development,... This article briefly outlines how anti-terrorism struggles became linked and their relationship thereafter with human rights issues in international political life. With equal relevance and value to human development, anti-terrorism efforts and human rights protection are themselves not mutually exclusive or contradictory. Their conflict in everyday life has sometimes resulted from the fact that they are both manipulated in the service of certain political ends. What's more, there has never been p erfect human rights protection in the world so far, which often makes human rights problems an easy charge against almost every government. No anti-terrorist activities in either the US or Europe have been really constrained by the idea of human rights no matter how beautiful their rhetoric has been. Now both human rights and anti-terrorism have been made into a tool of diplomacy and international politics. With the war in Afghanistan over, the United States is enhancing its human rights diplomacy together with its anti-terrorism diplomacy. Truly efficient, comprehensive international cooperation on anti-terrorism is still far away. 展开更多
关键词 anti-terrorism human rights international politics
下载PDF
Disaster preparedness, pediatric considerations in primary blast injury, chemical, and biological terrorism 被引量:15
9
作者 Mitchell Hamele William Bradley Poss Jill Sweney 《World Journal of Critical Care Medicine》 2014年第1期15-23,共9页
Both domestic and foreign terror incidents are an unfortunate outgrowth of our modern times from the Oklahoma City bombings, Sarin gas attacks in Japan, the Madrid train bombing, anthrax spores in the mail, to the Wor... Both domestic and foreign terror incidents are an unfortunate outgrowth of our modern times from the Oklahoma City bombings, Sarin gas attacks in Japan, the Madrid train bombing, anthrax spores in the mail, to the World Trade Center on September 11 th, 2001. The modalities used to perpetrate these terrorist acts range from conventional weapons to high explosives, chemical weapons, and biological weapons all of which have been used in the recent past. While these weapons platforms can cause significant injury requiring critical care the mechanism of injury, pathophysiology and treatment of these injuries are unfamiliar to many critical care providers. Additionally the pediatric population is particularly vulnerable to these types of attacks. In the event of a mass casualty incident both adult and pediatric critical care practitioners will likely be called upon to care for children and adults alike. We will review the presentation, pathophysiology, and treatment of victims of blast injury, chemical weapons, and biological weapons. The focus will be on those injuries not commonly encountered in critical care practice, primary blast injuries, category A pathogens likely to be used in terrorist incidents, and chemical weapons including nerve agents, vesicants, pulmonary agents, cyanide, and riot control agents with special attention paid to pediatric specific considerations. 展开更多
关键词 terrorism BIOterrorism CHEMICAL terrorism Blast injuries Mass CASUALTY incidents DISASTERS PEDIATRICS
下载PDF
The Impact of the Collapse of the IS on the Environment of International Terrorism 被引量:1
10
作者 Li Wei 《Contemporary International Relations》 2017年第6期126-143,共18页
Recently, the international campaign against terrorism has made great achievements, with Abu Bakr al-Baghdadi, the leader of the Islamic State(IS) killed, the last city Mosul the IS controlled in Iraq liberated and it... Recently, the international campaign against terrorism has made great achievements, with Abu Bakr al-Baghdadi, the leader of the Islamic State(IS) killed, the last city Mosul the IS controlled in Iraq liberated and its so-called capital Raqqa in Syria besieged. The visible"Caliphate"of the IS is breaking up with an obvious trend of declining, which will return to a normal terrorist group from a new-type and semi-militarized terrorist organization with an independent army, territories and administrative systems. Such a change will bring about new uncertainties to the IS itself and the environment of international terrorism. For some time to come in the future, how to cope with the impact brought about by such a change of the IS will become a major issue of the international community. 展开更多
关键词 IS international terrorism international security
下载PDF
Trojan Terrorism:Revenge Colonists or Condition of Evolution? (To the Problem "Your/Alien") 被引量:2
11
作者 Menshikova Elena Rudolfovna 《Journal of Philosophy Study》 2018年第4期191-208,共18页
Thinking about the problem of terrorism, the author finds its origins in the myth of the Trojan War, treating it as a battle for space, which was the primary basis for the civilizational leap--the expansion of the Gre... Thinking about the problem of terrorism, the author finds its origins in the myth of the Trojan War, treating it as a battle for space, which was the primary basis for the civilizational leap--the expansion of the Greek world to the east, which led to the flourishing of Greek culture, creating a precedent of justified colonialism, provided strategy and tactics-the causal apology of violence-all subsequent wars, colonial campaigns, which was no exception for the migratory flows of the XX century, as a result of which the word "terrorism" sounded with by force of the song of B. Brecht. The theme of "space"-chucked away, lost, taken away, destroyed, compressed, anarchic, empty, boundless, virtual-remains vital in our time, when the limitless possibilities lead to the limitation of man himself, his emptiness, and "complete shortuess" (Platonov), when the treaty as the basis of human existence is rejected, and when you become the Other yourself. The metaphysics of "violence" is buried in anthropology-in ignorance of one's limits by man, in denying the boundaries of "another's," in unwillingness to ask a question mad find the answer, in laziness and, in fact, in the loss of oneself. 展开更多
关键词 MYTH space terrorism Own/Alien's TREATY another happiness
下载PDF
U.S. Financial War on Terrorism vs. International Financial System 被引量:1
12
作者 Su Jingxiang Associate Research ProfessorDeputy Director at Division for World Economics Studies, China Institute of Contemporary International Relations. 《Contemporary International Relations》 2002年第4期21-32,共12页
After September 11 events, America has launched a worldwide financial war against terrorism with a series of farreaching measures. It is not only confined to combating international terrorist activities, but will also... After September 11 events, America has launched a worldwide financial war against terrorism with a series of farreaching measures. It is not only confined to combating international terrorist activities, but will also exert great 展开更多
关键词 FATF International Financial System Financial War on terrorism vs U.S
下载PDF
On Uzbekistan's Experience Countering Religious Extremism and Terrorism
13
作者 Mirgiyos Azimov 《Contemporary International Relations》 2017年第5期150-154,共5页
Since the first years of independence,Uzbekistan began to develop and implement a policy of countering religious extremism and addressing the ideological basis of terrorism.Taking into consideration the complexity of ... Since the first years of independence,Uzbekistan began to develop and implement a policy of countering religious extremism and addressing the ideological basis of terrorism.Taking into consideration the complexity of this problem,Uzbekistan is comprehensively combating expressions of extremism and terrorism. 展开更多
关键词 Uzbekistan experience religious extremism terrorism
下载PDF
Media Coverage of Terrorism and Mental Health Concerns among Youth: Testing Moderated Mediation by Spirituality and Resilience
14
作者 Mian Ahmad Hanan Arooj Arshad +1 位作者 Noshina Saleem Shamaila Asad 《International Journal of Mental Health Promotion》 2021年第4期565-575,共11页
Previous research on media coverage of terrorism and its associated psychological consequences was explored internationally particularly after 9/11 attacks in the US.Also,the constructive role of resilience in this tr... Previous research on media coverage of terrorism and its associated psychological consequences was explored internationally particularly after 9/11 attacks in the US.Also,the constructive role of resilience in this traumatic era has also been explored internationally.However,some studies have been conducted on the effect of media coverage of national terrorism on people that have endured a nearby terrorist attack.Moreover,knowledge about how the media coverage of terrorism,as a secondary source of evidence,can have devastated effects on native’s mental health and how resilience work in this relationship is rather limited.For example,it is possible that different cultures have their own coping strategies(resilience&spirituality)to be adopted as they perceive and respond to terrorism coverage on media differently.Hence,this study examines the moderated role of spirituality as an adaptive mechanism along with resilience as a mediating factor in the relationship between media coverage of terrorists’incidents and mental health concerns such as perceived stress,generalized anxiety and perceived fear among Pakistani youth.Thefindings show significant results as expected,people having high level of spirituality effectively cope with the media coverage of terrorist incidents by facing the situation with more resilient personality and therefore experience less mental health concerns compared to those with low level of spirituality. 展开更多
关键词 Anxiety FEAR online terrorism exposure psychological concerns RESILIENCE stress terrorism coverage
下载PDF
Perception on Cyber Terrorism: A Focus Group Discussion Approach
15
作者 Rabiah Ahmad Zahri Yunos +1 位作者 Shahrin Sahib Mariana Yusoff 《Journal of Information Security》 2012年第3期231-237,共7页
Focus group discussion is an exploratory research technique used to collect data through group interaction. This technique provides the opportunity to observe interaction among participants on a topic under this study... Focus group discussion is an exploratory research technique used to collect data through group interaction. This technique provides the opportunity to observe interaction among participants on a topic under this study. This paper contributes to an understanding on the cyber terrorism conceptual framework through the analysis of focus group discussion. The proposed cyber terrorism conceptual framework which was obtained during the qualitative study by the authors has been used as a basis for discussion in the focus group discussion. Thirty (30) participants took part in the focus group discussion. The overall results suggest that the proposed cyber terrorism framework is acceptable by the participants. The present study supports our initial research that the cyber terrorism conceptual framework constitutes the following components: target, motivation, tools of attack, domain, methods of attack and impact. 展开更多
关键词 CYBER terrorism COMPONENTS Framework FOCUS GROUP
下载PDF
Trojan Terrorism as a Principate of Deception, Or in the Arms of the Terracotta Locust (Ethymological Wing Cases of Virtus): Part 1
16
作者 Menshikova Elena Rudolfovna 《International Relations and Diplomacy》 2019年第11期539-547,共9页
“Trojan terrorism”leaped to the place and in time as an exhalation of bewilderment at the terrorist attacks in London last year,as a challenge to political manipulation,and jumped as the continuation of the topic of... “Trojan terrorism”leaped to the place and in time as an exhalation of bewilderment at the terrorist attacks in London last year,as a challenge to political manipulation,and jumped as the continuation of the topic of migration(the fundamental problem of modernity),as a creation of an internal conflict that multiplies the external conflict,in the theme of systemic instability―theoretical reasonableness of deception,which destroys the system of contracts as a condition of the world order,leaped as a report at the University of London(Birkbeck)on Feb.9,2018,which the relevance of its problems beat real events in because the state of modern“utopianism”―the state of Utopus(USA),intended from the matrix of the British Empire,its tactics of violence―“occupy”(seizure of the“alien”)―has never changed.As in the case of Marks’s“capital”,the theory first followed,and then the practice of sabotage:a system of terrorist attacks,riots,revolutions,world and civil wars,and“Trojan terrorism”:bold attacks by international terrorists,sweeping away the principles and norms of any social treaty(Rousseau did not even dream of this sadness),the norms of law,ethics and morality,economic agreements(interstate agreements),including military demonstration of force,provocation of military conflicts,pirate antics,demarches of intimidation and blackmail,reviving the myth of the Trojan Horse and giving it the status of an“established order”:The norms that are accepted by the majority as“natural law”,as the natural course of things,contrary to common sense and universal human canons of being,legitimize treachery and deceit as the only one of possible and all probable ways of further development of human society―such are the“difficulties to the stars”:Without star wars,but by“occupy”,which allows us to conclude that“Trojan terrorism”is the sum of technologies aimed at seizure the land(habitable)by fraud,panic,and violence. 展开更多
关键词 terra terror TROJAN terrorism TIMOR PIRACY technology of lies Myth
下载PDF
INTERNATIONAL TERRORISM:NEW TRENDS
17
作者 Qin Xingda Qin Xingda Research Professor,Division for Social Studies,China Institute of Contemporary International Relations. 《Contemporary International Relations》 1998年第2期1-8,共8页
New trends have surfaced in a variety of international struggles and contradic-tions coupled with marked alternations in their manifestations since the end ofthe Cold War.Similarly.international terrorism as a peculia... New trends have surfaced in a variety of international struggles and contradic-tions coupled with marked alternations in their manifestations since the end ofthe Cold War.Similarly.international terrorism as a peculiar phenomenon in con-temporary world politics has also been spreading with some new characteristicsmainly in the following aspects. 展开更多
关键词 In OVER INTERNATIONAL terrorism
下载PDF
Trojan Terrorism as a Principate of Deception, Or in the Arms of the Terracotta Locust (Ethymological Wing Cases of Virtus): Part Ⅱ
18
作者 Menshikova Elena Rudolfovna 《International Relations and Diplomacy》 2020年第9期409-417,共9页
“Trojan terrorism”leaped to the place and in time as an exhalation of bewilderment at the terrorist attacks in London last year,as a challenge to political manipulation,and jumped as the continuation of the topic of... “Trojan terrorism”leaped to the place and in time as an exhalation of bewilderment at the terrorist attacks in London last year,as a challenge to political manipulation,and jumped as the continuation of the topic of migration(the fundamental problem of modernity),as a creation of an internal conflict that multiplies the external conflict,in the theme of systemic instability-theoretical reasonableness of Deception,which destroys the system of contracts as a condition of the world order.My report at the University of London(Birkbeck)on Feb.9,2018,which was read in English,still not the latest direct evidence of the use of this scandalous method of“Trojan terrorism”—the defamation of the whole country(Russia),plus violation of territorial integrity,including and military attack,another country that lies on the other side of the ocean(Syria),and which is accused of not living by the rules(the“Absolute”method by Caesar),the relevance of its problems beat real events in because the state of modern“utopianism”-the state of Utopus(USA),intended from the matrix of the British Empire,its tactics of violence-“occupy”(seizure of the“alien”)-has never changed,and the March-April events in international politics are just another notch on this dead python,which is called“democratic values”.As in the case of Marks’s“Capital”,the theory first followed,and then the practice of sabotage:a system of terrorist attacks,riots,revolutions,world and civil wars,and“Trojan terrorism”:bold attacks by international terrorists,sweeping away the principles and norms of any social treaty(Rousseau did not even dream of this sadness),the norms of law,ethics and morality,economic agreements(interstate agreements),including military demonstration of force,provocation of military conflicts,pirate antics,demarches of intimidation and blackmail,reviving the myth of the Trojan Horse and giving it the status of an“established order”:the norms that are accepted by the majority as“natural law”,as the natural course of things,contrary to common sense and universal human canons of being,legitimize treachery and deceit as the only one of possible and all probable ways of further development of human society-such are the“difficulties to the stars”:without star wars,but by“occupy”,which allows us to conclude that“Trojan terrorism”is the sum of technologies aimed at seizure the land(habitable)by fraud,panic,and violence. 展开更多
关键词 terra terror “Trojan terrorism PIRACY technology of lies Myth
下载PDF
Awareness of the Potential Threat of Cyberterrorism to the National Security
19
作者 Abdulrahman Alqahtani 《Journal of Information Security》 2014年第4期137-146,共10页
The revolution of computing and networks could revolutionise terrorism in the same way that it has brought about changes in other aspects of life. The modern technological era has faced countries with a new set of sec... The revolution of computing and networks could revolutionise terrorism in the same way that it has brought about changes in other aspects of life. The modern technological era has faced countries with a new set of security challenges. There are many states and potential adversaries, who have the potential and capacity in cyberspace, which makes them able to carry out cyber-attacks in the future. Some of them are currently conducting surveillance, gathering and analysis of technical information, and mapping of networks and nodes and infrastructure of opponents, which may be exploited in future conflicts. This paper uses qualitative data to develop a conceptual framework for awareness of cyberterrorism threat from the viewpoint of experts and security officials in critical infrastructure. Empirical data collected from in-depth interviews were analysed using grounded theory approach. This study applied to Saudi Arabia as a case study. 展开更多
关键词 CYBERterrorism terrorism National Security Critical Infrastructure CONCEPTUAL Framework
下载PDF
The Application of Mixed Method in Developing a Cyber Terrorism Framework
20
作者 Rabiah Ahmad Zahri Yunos 《Journal of Information Security》 2012年第3期209-214,共6页
Mixed method research has becoming an increasingly popular approach in the discipline of sociology, psychology, education, health science and social science. The purpose of this paper is to describe the application of... Mixed method research has becoming an increasingly popular approach in the discipline of sociology, psychology, education, health science and social science. The purpose of this paper is to describe the application of mixed method in developing a cyber terrorism framework. This project has two primary goals: firstly is to discover the theory and then develop a conceptual framework that describes the phenomena, and secondly is to verify the conceptual framework that describes the phenomena. In order to achieve conclusive findings of the study, a mixed method research is recommended: qualitative data and quantitative data are collected and analyzed respectively in a separate phase. The mixed method approach improves the rigor and explanation of the research results, thus bring conclusive findings to the study outcome. By utilizing qualitative and quantitative techniques within the same study, we are able to incorporate the strength of both methodologies and fit together the insights into a workable solution. 展开更多
关键词 MIXED Method Research METHODOLOGY DATA Analysis DATA COLLECTION CYBER terrorism
下载PDF
上一页 1 2 146 下一页 到第
使用帮助 返回顶部