Cyberterrorism as a threat to international peace and security: A critical discourse
| Format: | Restricted Document |
|---|
Similar Items
The threat of Cyberterrorism and the applicability of the convention of cybercrime
by: Zulhuda, Sonny
Published: (2020)
by: Zulhuda, Sonny
Published: (2020)
2022_Self Defence Against Cyberterrorism in the Framework of International Law
Cyberterrorism definition patterns and mitigation
strategies: A literature review
by: SEissa, Israa G., et al.
Published: (2017)
by: SEissa, Israa G., et al.
Published: (2017)
Fighting cyberterrorism with legislative bullet: are we really ready?
by: Zulhuda, Sonny, et al.
Published: (2013)
by: Zulhuda, Sonny, et al.
Published: (2013)
The United Nations and the maintenance of international peace and security
by: White, N.D.
Published: (1988)
by: White, N.D.
Published: (1988)
The relationship between the UN Security Council and General Assembly in matters of international peace and security
by: White, Nigel D.
Published: (2015)
by: White, Nigel D.
Published: (2015)
Towards international peace and security: learning from the Prophet of Islam (S.A.W.)
by: Mohd Kamal, Mohd Hisham
Published: (2007)
by: Mohd Kamal, Mohd Hisham
Published: (2007)
Suicide is a national security threat
by: Ng, Alvin Lai Oon *
Published: (2022)
by: Ng, Alvin Lai Oon *
Published: (2022)
Insider threat: A critical review of the literature
by: Munshi, Asmaa, et al.
Published: (2012)
by: Munshi, Asmaa, et al.
Published: (2012)
A necessary evil: the Copenhagen School and the construction of migrants as security threats in political elite discourse: a comparative study of Malaysia and Singapore
by: Thompson, Caryl
Published: (2016)
by: Thompson, Caryl
Published: (2016)
A comparative analysis study on information security threat models: a propose for threat factor profiling
by: Sidi, Fatimah, et al.
Published: (2017)
by: Sidi, Fatimah, et al.
Published: (2017)
Human security & peace in archipelagic Southeast Asia
by: Mohd Ikbal Mohd Huda,
Published: (2018)
by: Mohd Ikbal Mohd Huda,
Published: (2018)
Threats and solutions for ATM security systems
by: Alharaki, Omarah Omar, et al.
Published: (2011)
by: Alharaki, Omarah Omar, et al.
Published: (2011)
The politics of regional security threat in Nigeria
by: Sule, Babayo, et al.
Published: (2022)
by: Sule, Babayo, et al.
Published: (2022)
IPTV network security: threats and countermeasures
by: M. S. A., Noman Ranak, et al.
Published: (2018)
by: M. S. A., Noman Ranak, et al.
Published: (2018)
China's oil diplomacy: is it a global security threat?
by: Lai, Hongyi
Published: (2007)
by: Lai, Hongyi
Published: (2007)
Security monitoring tool system using threat intelligence vs threat hunting
by: Wan Ikbal Ismat Wan Kamal,
Published: (2021)
by: Wan Ikbal Ismat Wan Kamal,
Published: (2021)
The Threat to International Higher Education
by: Phillimore, John, et al.
Published: (2011)
by: Phillimore, John, et al.
Published: (2011)
A Unified Classification Model of Insider Threats to Information Security.
by: Prabhu, sunitha, et al.
Published: (2020)
by: Prabhu, sunitha, et al.
Published: (2020)
Internal human based threats and security controls in computerized banking systems: evidence from Malaysia
by: Zainol, Zaini, et al.
Published: (2012)
by: Zainol, Zaini, et al.
Published: (2012)
Internal human based threats and security controls in computerized banking systems: evidence from Malaysia
by: Zainol, Zaini, et al.
Published: (2013)
by: Zainol, Zaini, et al.
Published: (2013)
The State of World Peace and the Enforceability of International Law
by: Eishan Jan, Mohammad Naqib
Published: (2006)
by: Eishan Jan, Mohammad Naqib
Published: (2006)
Smuggling of Rohingyas from Myanmar to Malaysia: a threat to human security
by: Andika Ab Wahab,, et al.
Published: (2020)
by: Andika Ab Wahab,, et al.
Published: (2020)
Moth: a hybrid threat model for improving software security testing
by: Omotunde, Habeeb Oladapo
Published: (2018)
by: Omotunde, Habeeb Oladapo
Published: (2018)
The impact on non-traditional security threats in Sri Lanka
by: Ong, Jessica Hai Liaw, et al.
Published: (2021)
by: Ong, Jessica Hai Liaw, et al.
Published: (2021)
Application of critical discourse analysis in media discourse studies
by: Renugah Ramanathan,, et al.
Published: (2015)
by: Renugah Ramanathan,, et al.
Published: (2015)
Application of critical discourse analysis in media discourse studies
by: Ramanathan, Renugah, et al.
Published: (2015)
by: Ramanathan, Renugah, et al.
Published: (2015)
A critical discourse analysis on the discourse representation of the policy makers and the stakeholders on MBMMBI
by: Tharmalingam, Selvarajah, et al.
Published: (2016)
by: Tharmalingam, Selvarajah, et al.
Published: (2016)
Empowering the powerful: a critical discourse analysis of public discourse on graduate employability
by: Mohd Noor, Siti Noor Fazelah
Published: (2015)
by: Mohd Noor, Siti Noor Fazelah
Published: (2015)
Outsourcing peace. Private military and security companies. A setback to security sector reform in post conflict and transition states?
by: Mehboob, Cynthia
Published: (2017)
by: Mehboob, Cynthia
Published: (2017)
Web user' knowledge and their behavior towards security threats and vulnerabilities
by: Aldossary, Alia Ahmed, et al.
Published: (2016)
by: Aldossary, Alia Ahmed, et al.
Published: (2016)
Web users’ knowledge and their behavior towards security threats and vulnerabilities
by: Aldossary, Alia Ahmed, et al.
Published: (2016)
by: Aldossary, Alia Ahmed, et al.
Published: (2016)
Security threats of finger print biometric in network system environment
by: Taha, Imad, et al.
Published: (2011)
by: Taha, Imad, et al.
Published: (2011)
The Vietminh threat and the security of Thailand: Anglo-Thai response and attitude
by: Nik Anuar Nik Mahmud,
Published: (1988)
by: Nik Anuar Nik Mahmud,
Published: (1988)
Mediation in international disputes: a useful tool for peace-making and preventive diplomacy
by: Hamid, Abdul Ghafur@Khin Maung Sein
Published: (2010)
by: Hamid, Abdul Ghafur@Khin Maung Sein
Published: (2010)
A Survey on Internet Security Threat in Malaysia’s Internet Banking System and Suggestion Solutions
by: Mohd Hariz, Ibrahim, et al.
Published: (2018)
by: Mohd Hariz, Ibrahim, et al.
Published: (2018)
EVALUATING EXXONMOBIL’S CONTRIBUTIONS TO PEACE AND SECURITY IN CHAD THROUGH THE PRISM OF LEGITIMACY THEORY
by: Shuriye, Mohamed
Published: (2010)
by: Shuriye, Mohamed
Published: (2010)
Talib Peace and security vital for tourism industry's growth, 12 May 2013
by: Sunday, Star
Published: (2013)
by: Sunday, Star
Published: (2013)
A Merdeka wish for peace
by: Abdul Razak, Dzulkifli
Published: (2019)
by: Abdul Razak, Dzulkifli
Published: (2019)
Giving peace a chance
by: The Borneo Post
Published: (2010)
by: The Borneo Post
Published: (2010)
Similar Items
-
The threat of Cyberterrorism and the applicability of the convention of cybercrime
by: Zulhuda, Sonny
Published: (2020) - 2022_Self Defence Against Cyberterrorism in the Framework of International Law
-
Cyberterrorism definition patterns and mitigation
strategies: A literature review
by: SEissa, Israa G., et al.
Published: (2017) -
Fighting cyberterrorism with legislative bullet: are we really ready?
by: Zulhuda, Sonny, et al.
Published: (2013) -
The United Nations and the maintenance of international peace and security
by: White, N.D.
Published: (1988)