Cyber disorders: The mental health concern for the new millennium

K Young, M Pistner, J O'mara… - Cyberpsychology & …, 1999 - liebertpub.com
Anecdotal evidence has suggested that mental health practitioners' report increased
caseloads of clients whose primary complaint involves the Internet. However, little is known …

[图书][B] Terrorism in cyberspace: The next generation

G Weimann - 2015 - books.google.com
The war on terrorism has not been won, Gabriel Weimann argues in Terrorism in
Cyberspace, the successor to his seminal Terror on the Internet. Even though al-Qaeda's …

“I am a Muslim not an extremist”: How the Prevent Strategy has constructed a “suspect” community

I Awan - Politics & Policy, 2012 - Wiley Online Library
The aim of this article is to examine the new Prevent Strategy 2011 in the United Kingdom
and critically analyze its impact upon British Muslim communities. The UK government's …

Tipping the scales: the attribution problem and the feasibility of deterrence against cyberattack

JR Lindsay - Journal of Cybersecurity, 2015 - academic.oup.com
Cyber attackers rely on deception to exploit vulnerabilities and obfuscate their identity, which
makes many pessimistic about cyber deterrence. The attribution problem appears to make …

Proposing the multi-motive information systems continuance model (MISC) to better explain end-user system evaluations and continuance intentions

PB Lowry, J Gaskin, GD Moody - Journal of the Association for …, 2015 - papers.ssrn.com
Abstract Information system designers must consider the influence of users' intrinsic
motivations, in addition to commonly studied extrinsic motivations, to ensure that users will …

Smart farming: Cyber security challenges

L Barreto, A Amaral - 2018 International Conference on …, 2018 - ieeexplore.ieee.org
The diffusion of new digital technologies renders digital transformation relevant to nearly
every economic activity sector, including in the agriculture sector. Farming and how farmers …

Cyberterrorism as a global threat: a review on repercussions and countermeasures

S Iftikhar - PeerJ Computer Science, 2024 - peerj.com
An act of cyberterrorism involves using the internet and other forms of information and
communication technology to threaten or cause bodily harm to gain political or ideological …

[图书][B] Essentials of criminal justice

JJ Senna, LJ Siegel, LJ Siegel, LJ Siegel - 2001 - ojp.gov
The text contains five parts, the first of which discusses the nature of crime, law, and criminal
justice. Chapters address such topics as formal and informal criminal justice processes …

Beyond cyber-doom: Assessing the limits of hypothetical scenarios in the framing of cyber-threats

S Lawson - Journal of Information Technology & Politics, 2013 - Taylor & Francis
Cybersecurity proponents often rely on cyber-doom scenarios as a key tactic for calling
attention to prospective cyberthreats. This article critically examines cyber-doom scenarios …

Cyber attacks and terrorism: A twenty-first century conundrum

M Albahar - Science and engineering ethics, 2019 - Springer
In the recent years, an alarming rise in the incidence of cyber attacks has made cyber
security a major concern for nations across the globe. Given the current volatile socio …