Published: Jan 23, 2024
Converted to Gold OA:
DOI: 10.4018/IJCWT.336558
Volume 14
Nesrine Dardouri, Abdelkader Aguir, Mounir Smida
Tunisia has always been affected by terrorism, but since the late 2011s there has been a sharp increase in terrorism perpetrated. The object of this research is to analyze the socio-economic...
Show More
Tunisia has always been affected by terrorism, but since the late 2011s there has been a sharp increase in terrorism perpetrated. The object of this research is to analyze the socio-economic determinants of terrorism using terrorist attacks as a dependent variable and indicators that affect the level of growth in Tunisia such as explanatory variables. The aim of this work is to develop recommendations on how to respond to the state in response to terrorist shocks. The following policy implications were deduced. First, we must increase the level of growth of the country by stabilizing the policy and by controlling governance to show the effectiveness of the results of this study which aims at reducing terrorism and improving the country's economic conditions. Second, in view of the results found in this research, terrorism can stabilize the long-term labor market through investment by putting in place realistic economic policies that are time-bound to encourage the State to create vacancies for the unemployed.
Content Forthcoming
Add to Your Personal Library: Article
Cite Article
Cite Article
MLA
Dardouri, Nesrine, et al. "Socio-Economic Determinants of Terrorism in Tunisia." IJCWT vol.14, no.1 2024: pp.1-20. http://doi.org/10.4018/IJCWT.336558
APA
Dardouri, N., Aguir, A., & Smida, M. (2024). Socio-Economic Determinants of Terrorism in Tunisia. International Journal of Cyber Warfare and Terrorism (IJCWT), 14(1), 1-20. http://doi.org/10.4018/IJCWT.336558
Chicago
Dardouri, Nesrine, Abdelkader Aguir, and Mounir Smida. "Socio-Economic Determinants of Terrorism in Tunisia," International Journal of Cyber Warfare and Terrorism (IJCWT) 14, no.1: 1-20. http://doi.org/10.4018/IJCWT.336558
Export Reference
Published: May 6, 2024
Converted to Gold OA:
DOI: 10.4018/IJCWT.343314
Volume 14
Romil Rawat, Anand Rajavat
The limits of user visibility have been exceeded by the internet. The “Dark Web” or “Dark Net” refers to certain unknown portions of the internet that cannot be found using standard search methods....
Show More
The limits of user visibility have been exceeded by the internet. The “Dark Web” or “Dark Net” refers to certain unknown portions of the internet that cannot be found using standard search methods. A number of computerised techniques are being explored to extract or crawl the concealed data. All users can freely interact on the surface web. Identity identities may be found on the deep web, and the dark web (DW), a hub for anonymous data, is a haven for terrorists and cybercriminals to promote their ideologies and illegal activities. Officials in clandestine surveillance and cyberpolicing are always trying to track down offenders' trails or hints. The search for DW offenders might take five to ten years.The proposed study provides data from a DW mining and online marketplaces situation from a few domains, as well as an overview for investigators to build an automated engine for scraping all dangerous information from related sites.
Content Forthcoming
Add to Your Personal Library: Article
Cite Article
Cite Article
MLA
Rawat, Romil, and Anand Rajavat. "Perceptual Operating Systems for the Trade Associations of Cyber Criminals to Scrutinize Hazardous Content." IJCWT vol.14, no.1 2024: pp.1-19. http://doi.org/10.4018/IJCWT.343314
APA
Rawat, R. & Rajavat, A. (2024). Perceptual Operating Systems for the Trade Associations of Cyber Criminals to Scrutinize Hazardous Content. International Journal of Cyber Warfare and Terrorism (IJCWT), 14(1), 1-19. http://doi.org/10.4018/IJCWT.343314
Chicago
Rawat, Romil, and Anand Rajavat. "Perceptual Operating Systems for the Trade Associations of Cyber Criminals to Scrutinize Hazardous Content," International Journal of Cyber Warfare and Terrorism (IJCWT) 14, no.1: 1-19. http://doi.org/10.4018/IJCWT.343314
Export Reference
Published: May 10, 2024
Converted to Gold OA:
DOI: 10.4018/IJCWT.343315
Volume 14
Ruwan Nagahawatta, Matthew Warren, Scott Salzman, Sachithra Lokuge
The advent of digital technologies such as cloud computing has provided enormous opportunities for small and medium-sized enterprises (SMEs) to digitalise their businesses. However, with increasing...
Show More
The advent of digital technologies such as cloud computing has provided enormous opportunities for small and medium-sized enterprises (SMEs) to digitalise their businesses. However, with increasing cloud computing adoption, the security and privacy threats to the SMEs are on the rise. By conducting an extensive review of literature, this paper examines and identifies the security factors that influence cloud computing adoption specifically by SMEs. The literature review focused on papers published in ten years related to the security requirements and associated cloud computing adoption factors by SMEs. The framework focused on understanding socio-technical factors that influence the intent to adopt cloud computing by SMEs. The findings attest to the impacts of key security and privacy-related factors (including cloud security standard, data privacy concerns, data security concerns, skilled personnel, technology readiness, perceived cloud security benefits, legal compliance and trust in cloud service providers) on SMEs' intent to adopt cloud computing.
Content Forthcoming
Add to Your Personal Library: Article
Cite Article
Cite Article
MLA
Nagahawatta, Ruwan, et al. "Towards an Understanding of Cloud Computing Adoption in SMEs: The Role of Security and Privacy Factors." IJCWT vol.14, no.1 2024: pp.1-13. http://doi.org/10.4018/IJCWT.343315
APA
Nagahawatta, R., Warren, M., Salzman, S., & Lokuge, S. (2024). Towards an Understanding of Cloud Computing Adoption in SMEs: The Role of Security and Privacy Factors. International Journal of Cyber Warfare and Terrorism (IJCWT), 14(1), 1-13. http://doi.org/10.4018/IJCWT.343315
Chicago
Nagahawatta, Ruwan, et al. "Towards an Understanding of Cloud Computing Adoption in SMEs: The Role of Security and Privacy Factors," International Journal of Cyber Warfare and Terrorism (IJCWT) 14, no.1: 1-13. http://doi.org/10.4018/IJCWT.343315
Export Reference
Published: Aug 7, 2024
Converted to Gold OA:
DOI: 10.4018/IJCWT.350049
Volume 14
Taeyoung Kim, Jeongwan Park, Julak Lee
Recognizing the pivotal role of casualties as a metric for assessing the success of terrorist acts, this study endeavors to unravel the underlying factors shaping the casualty count in drone...
Show More
Recognizing the pivotal role of casualties as a metric for assessing the success of terrorist acts, this study endeavors to unravel the underlying factors shaping the casualty count in drone terrorist attacks across the globe. By applying Zero Negative Binomial Regression Analysis on data sourced from the Global Terrorism Database, we discern significant factors influencing the number of terrorist casualties. Our findings reveal the paramount importance of the target facility's significance, the attack type, the utilization of remote-controlled drones, the deployment of suicide drones equipped with explosive payloads, and the audacious strategy of swarming drone attacks.
Content Forthcoming
Add to Your Personal Library: Article
Cite Article
Cite Article
MLA
Kim, Taeyoung, et al. "An Empirical Study of Factors Influencing Drone Terrorist Attack Casualties." IJCWT vol.14, no.1 2024: pp.1-16. http://doi.org/10.4018/IJCWT.350049
APA
Kim, T., Park, J., & Lee, J. (2024). An Empirical Study of Factors Influencing Drone Terrorist Attack Casualties. International Journal of Cyber Warfare and Terrorism (IJCWT), 14(1), 1-16. http://doi.org/10.4018/IJCWT.350049
Chicago
Kim, Taeyoung, Jeongwan Park, and Julak Lee. "An Empirical Study of Factors Influencing Drone Terrorist Attack Casualties," International Journal of Cyber Warfare and Terrorism (IJCWT) 14, no.1: 1-16. http://doi.org/10.4018/IJCWT.350049
Export Reference
IGI Global Open Access Collection provides all of IGI Global’s open access content in one convenient location and user-friendly interface
that can easily searched or integrated into library discovery systems.
Browse IGI Global Open
Access Collection
All inquiries regarding IJCWT should be directed to the attention of:
Submission-Related InquiriesBrett van Niekerk
Editor-in-Chief
International Journal of Cyber Warfare and Terrorism
E-mail:
brettvn@gmail.comAuthor Services Inquiries
For inquiries involving pre-submission concerns, please contact the Journal Development Division:
journaleditor@igi-global.comOpen Access Inquiries
For inquiries involving publishing costs, APCs, etc., please contact the Open Access Division:
openaccessadmin@igi-global.comProduction-Related Inquiries
For inquiries involving accepted manuscripts currently in production or post-production, please contact the Journal Production Division:
journalproofing@igi-global.comRights and Permissions Inquiries
For inquiries involving permissions, rights, and reuse, please contact the Intellectual Property & Contracts Division:
contracts@igi-global.comPublication-Related Inquiries
For inquiries involving journal publishing, please contact the Acquisitions Division:
acquisition@igi-global.comDiscoverability Inquiries
For inquiries involving sharing, promoting, and indexing of manuscripts, please contact the Citation Metrics & Indexing Division:
indexing@igi-global.com Editorial Office
701 E. Chocolate Ave.
Hershey, PA 17033, USA
717-533-8845 x100