Journal Navigation
International Journal of Cyber Warfare and Terrorism (IJCWT)
Open Access Journal
Clarivate Impact Factor 0.5

International Journal of Cyber Warfare and Terrorism (IJCWT)

This journal converted to Gold Open Access on January 1, 2023
Editor-in-Chief: Brett van Niekerk
Indexed In: INSPEC, SCOPUS, Web of Science Emerging Sources Citation Index (ESCI) and 16 more indices
Published: Continuous Volume |Established: 2011
ISSN: 1947-3435|EISSN: 1947-3443|DOI: 10.4018/IJCWT
Latest Published Articles
Published: Mar 9, 2023
DOI: 10.4018/IJCWT.319708
Volume 13
Tshepo Solomon Raphiri, Joey J. Jansen van Vuuren, Albertus A. K. Buitendag
This paper presents an agent-based model to study the effect of grievance, net risk, social, sympathy, and political influence on the likelihood of student protests emerging in South Africa... Show More
Download (PDF): Article
Add to Your Personal Library: Article
Cite Article


Raphiri, Tshepo Solomon, et al. "Modeling and Simulating Student Protests Through Agent-Based Framework." vol.13, no.1 2023: pp.1-20.


Raphiri, T. S., Jansen van Vuuren, J. J., & Buitendag, A. A. (2023). Modeling and Simulating Student Protests Through Agent-Based Framework. , 13(1), 1-20.


Raphiri, Tshepo Solomon, Joey J. Jansen van Vuuren, and Albertus A. K. Buitendag. "Modeling and Simulating Student Protests Through Agent-Based Framework," 13, no.1: 1-20.

Export Reference

Published: Dec 21, 2022
DOI: 10.4018/IJCWT.315651
Volume 12
Glorin Sebastian
Data breaches are a major concern for both US and global corporations. With more companies allowing their employees to be working remote, providing them a secure work environment has been a priority... Show More
Download Sample (PDF): Article
Cite Article


Sebastian, Glorin. "Cyber Kill Chain Analysis of Five Major US Data Breaches: Lessons Learnt and Prevention Plan." vol.12, no.1 2022: pp.1-15.


Sebastian, G. (2022). Cyber Kill Chain Analysis of Five Major US Data Breaches: Lessons Learnt and Prevention Plan. , 12(1), 1-15.


Sebastian, Glorin. "Cyber Kill Chain Analysis of Five Major US Data Breaches: Lessons Learnt and Prevention Plan," 12, no.1: 1-15.

Export Reference

Published: Dec 16, 2022
DOI: 10.4018/IJCWT.315590
Volume 12
Parwaiz Ahmad Najar, Hafizullah Dar, Priya Singh, Ashaq Hussain Najar
This study is based on extensive scanning of literature about the anti-social factors and their influence on TDM in the Kashmir Valley. Content analysis has applied to the scanned literature. It is... Show More
Download Sample (PDF): Article
Cite Article


Najar, Parwaiz Ahmad, et al. "Anti-Social Factors Influence the Decision Making of Tourists: A Study of Kashmir." vol.12, no.1 2022: pp.1-14.


Najar, P. A., Dar, H., Singh, P., & Najar, A. H. (2022). Anti-Social Factors Influence the Decision Making of Tourists: A Study of Kashmir. , 12(1), 1-14.


Najar, Parwaiz Ahmad, et al. "Anti-Social Factors Influence the Decision Making of Tourists: A Study of Kashmir," 12, no.1: 1-14.

Export Reference

Description, Mission, Scope & Coverage
The International Journal of Cyber Warfare and Terrorism (IJCWT) publishes original innovative findings on ethical, political, legal, and social issues relating to security and cybernetic wars. This journal focuses on cyber warfare and terrorism using examples from around the world. IJCWT covers... Show More
Mission & Scope:
The mission of the International Journal of Cyber Warfare and Terrorism (IJCWT) is to explore a range of security related topics and generate research debates in relation to cyber warfare and terrorism. Targeting researchers, practitioners, academicians, government officials, military professionals and other industry professionals, IJCWT provides a forum to discuss human, technical, and policy... Show More
  • Censorship
  • Crisis Response and Management
  • Critical infrastructure protection
  • Cyber Terrorism
  • Cyber Warfare
  • Electronic civil disobedience
  • Ethical, political, legal, and social issues relating to security
  • Governance and security
  • Hacking
  • Hacktivism
  • Homeland security
  • Impact of new security technologies
  • Information Management
  • Information Security
  • Internet and controls
  • Law Enforcement
  • Manipulation
  • National identification schemes
  • National Security
  • Privacy
  • Protecting society
  • Rights of the individual
  • Social Engineering
  • Terrorism
Editorial Policy
IGI Global holds its journals to the highest ethical practices. View Full Editorial Policy
IGI Global Open Access
When you publish under the OA model with IGI Global, you enable your work to be viewed by millions of readers worldwide immediately after publication and you are able to experience our personal support and commitment to editorial service. This includes:
  • Timely Publication: Quick Turnarounds & Prompt Peer Review (No Embargoes)
  • Continuous Support: In-House, Personalized Service Throughout the Entire Process
  • Cutting-Edge Technology: Proprietary Technologies & Integrations With Major Open Access Platforms
  • Diverse Options: Individual APCs, Platinum Funding, Institutional Open Access Agreements, & More
  • Research Advancement First: IGI Global Prioritizes Research Over Profit by Forfeiting Subscription Revenue
  • Unmatched Transparency: Comprehensive Visibility in Processes, Licensing, & More
  • Rapid Transformation: IGI Global is One of Few Publishers That Have Completed the Open Access Transition
  • Independence and Integrity: IGI Global is Committed to Maintaining its Autonomy as an Independent Publisher
  • Medium-Sized, Yet Powerful: IGI Global Offers Advantages of a Medium-Sized Publisher With the Reach of a Larger Publisher
Article Processing Charges
Article Processing Charge (APC):

Payment of the APC fee (directly to the publisher) by the author or a funding body is not required until AFTER the manuscript has gone through the full double-blind peer review process and the Editor(s)-in-Chief at his/her/their full discretion has/have decided to accept the manuscript based on the results of the double-blind peer review process. 

What Does IGI Global's Open Access APC Cover?

In the traditional subscription-based model, the cost to the publisher to produce each article is covered by the revenue generated by journal subscriptions. Under OA, all the articles are published under a Creative Commons (CC BY) license; therefore, the authors or funding body will pay a one-time article processing charge (APC) to offset the costs of all of the activities associated with the publication of the article manuscript, including:

  • Digital tools used to support the manuscript management and review process
  • Typesetting, formatting and layout
  • Online hosting
  • Submission of the journal's content to numerous abstracts, directories, and indexes
  • Third-party software (e.g. plagiarism checks)
  • Editorial support which includes manuscript tracking, communications, submission guideline checks, and communications with authors and reviewers
  • All promotional support and activities which include metadata distribution, press releases, promotional communications, web content, ads, fliers, brochures, postcards, etc. for the journal and its published contents
  • The fact that all published articles will be freely accessible and able to be posted and disseminated widely by
    the authors
  • Professional line-by-line English language copy editing and proofreading*

*This service is only performed on article manuscripts with fully paid (not discounted or waived) APC fees.

APC Subsidizing and Funding

To assist researchers in covering the costs of the APC in OA publishing, there are various sources of OA funding. Additionally, unlike many other publishers, IGI Global offers flexible subsidies, 100% Open Access APC funding, discounts, and more. Learn More

Open Access Funding Resources
IGI Global recognizes that many researchers may not know where to begin when searching for OA funding opportunities. IGI Global recently launched an Open Access Funding Resources page for researchers to browse. This page provides a comprehensive list of OA funding sources available for researchers to secure funds for their various OA publications.
Submit to This Journal
This journal is currently actively seeking new submissions. Interested authors should ensure that their article manuscript adheres to the journal's submission guidelines and before you write page, which include originality of the manuscript, APA formatting information and examples, manuscript requirements, and more. To submit an article for consideration, please begin the submission process below.
Submission-Related Inquiries
Brett van Niekerk
International Journal of Cyber Warfare and Terrorism

Author Services Inquiries
For inquiries involving pre-submission concerns, please contact the Journal Development Division:

Open Access Inquiries
For inquiries involving publishing costs, APCs, etc., please contact the Open Access Division:

Production-Related Inquiries
For inquiries involving accepted manuscripts currently in production or post-production, please contact the Journal Production Division:

Rights and Permissions Inquiries
For inquiries involving permissions, rights, and reuse, please contact the Intellectual Property & Contracts Division:

Publication-Related Inquiries
For inquiries involving journal publishing, please contact the Acquisitions Division:

Discoverability Inquiries
For inquiries involving sharing, promoting, and indexing of manuscripts, please contact the Citation Metrics & Indexing Division:

Editorial Office
701 E. Chocolate Ave.
Hershey, PA 17033, USA
717-533-8845 x100
All of IGI Global's content is archived via the CLOCKSS and LOCKSS initiative. Additionally, all IGI Global published content is available in IGI Global's InfoSci® platform.