Journal Navigation
Special Issue on ICCWS 2016: Part 2
Volume 7
Guest Editorial Preface
For Volume 7, Issue 4
View Full Issue
Graeme Pye, Brett van Niekerk
Published: Oct 1, 2017
DOI: 10.4018/IJCWT.2017100101
Volume 7
David Ormrod, Benjamin Turnbull
Modern military forces rely heavily on cyber-enabled systems; for logistics, communication, and control. Modern military platforms are heavily integrated with computing capability. This integration... Show More
Download Sample (PDF): Article
Cite Article

MLA

Ormrod, David, and Benjamin Turnbull. "Developing a Military Cyber Maturity Model for Multi-Domain Battle Mission Resilience and Success." IJCWT vol.7, no.4 2017: pp.1-13. http://doi.org/10.4018/IJCWT.2017100101

APA

Ormrod, D. & Turnbull, B. (2017). Developing a Military Cyber Maturity Model for Multi-Domain Battle Mission Resilience and Success. International Journal of Cyber Warfare and Terrorism (IJCWT), 7(4), 1-13. http://doi.org/10.4018/IJCWT.2017100101

Chicago

Ormrod, David, and Benjamin Turnbull. "Developing a Military Cyber Maturity Model for Multi-Domain Battle Mission Resilience and Success," International Journal of Cyber Warfare and Terrorism (IJCWT) 7, no.4: 1-13. http://doi.org/10.4018/IJCWT.2017100101

Export Reference

Mendeley
Published: Oct 1, 2017
DOI: 10.4018/IJCWT.2017100102
Volume 7
Jim Q. Chen
Current approaches in cyber defense are flawed as they are fortress-based and generally static in nature. They are not flexible in dealing with variations of attacks, especially zero-day attacks. To... Show More
Download Sample (PDF): Article
Cite Article

MLA

Chen, Jim Q. "A New Dynamic Cyber Defense Framework." IJCWT vol.7, no.4 2017: pp.14-22. http://doi.org/10.4018/IJCWT.2017100102

APA

Chen, J. Q. (2017). A New Dynamic Cyber Defense Framework. International Journal of Cyber Warfare and Terrorism (IJCWT), 7(4), 14-22. http://doi.org/10.4018/IJCWT.2017100102

Chicago

Chen, Jim Q. "A New Dynamic Cyber Defense Framework," International Journal of Cyber Warfare and Terrorism (IJCWT) 7, no.4: 14-22. http://doi.org/10.4018/IJCWT.2017100102

Export Reference

Mendeley
Published: Oct 1, 2017
DOI: 10.4018/IJCWT.2017100103
Volume 7
John S. Hurley
In this paper, we examine the benefits of a more quantifiable way to make decisions that enable senior leaders to better manage disruption of and attacks on the critical infrastructure. Most of the... Show More
Download Sample (PDF): Article
Cite Article

MLA

Hurley, John S. "Quantifying Decision Making in the Critical Infrastructure via the Analytic Hierarchy Process (AHP)." IJCWT vol.7, no.4 2017: pp.23-34. http://doi.org/10.4018/IJCWT.2017100103

APA

Hurley, J. S. (2017). Quantifying Decision Making in the Critical Infrastructure via the Analytic Hierarchy Process (AHP). International Journal of Cyber Warfare and Terrorism (IJCWT), 7(4), 23-34. http://doi.org/10.4018/IJCWT.2017100103

Chicago

Hurley, John S. "Quantifying Decision Making in the Critical Infrastructure via the Analytic Hierarchy Process (AHP)," International Journal of Cyber Warfare and Terrorism (IJCWT) 7, no.4: 23-34. http://doi.org/10.4018/IJCWT.2017100103

Export Reference

Mendeley
Published: Oct 1, 2017
DOI: 10.4018/IJCWT.2017100104
Volume 7
Ivan D. Burke, Renier P. van Heerden
Data breaches are becoming more common and numerous every day, where huge amount of data (corporate and personal) are leaked more frequently than ever. Corporate responses to data breaches are... Show More
Download Sample (PDF): Article
Cite Article

MLA

Burke, Ivan D., and Renier P. van Heerden. "The World is Polluted With Leaked Cyber Data." IJCWT vol.7, no.4 2017: pp.35-51. http://doi.org/10.4018/IJCWT.2017100104

APA

Burke, I. D. & van Heerden, R. P. (2017). The World is Polluted With Leaked Cyber Data. International Journal of Cyber Warfare and Terrorism (IJCWT), 7(4), 35-51. http://doi.org/10.4018/IJCWT.2017100104

Chicago

Burke, Ivan D., and Renier P. van Heerden. "The World is Polluted With Leaked Cyber Data," International Journal of Cyber Warfare and Terrorism (IJCWT) 7, no.4: 35-51. http://doi.org/10.4018/IJCWT.2017100104

Export Reference

Mendeley
Volume 7
Maximiliano Emanuel Korstanje
IGI Global Open Access Collection

IGI Global Open Access Collection provides all of IGI Global’s open access content in one convenient location and user-friendly interface that can easily searched or integrated into library discovery systems. Browse IGI Global Open
Access Collection

Contact
Submission-Related Inquiries
Brett van Niekerk
Editor-in-Chief
International Journal of Cyber Warfare and Terrorism
E-mail: brettvn@gmail.com



Author Services Inquiries
For inquiries involving pre-submission concerns, please contact the Journal Development Division:
journaleditor@igi-global.com

Open Access Inquiries
For inquiries involving publishing costs, APCs, etc., please contact the Open Access Division:
openaccessadmin@igi-global.com

Production-Related Inquiries
For inquiries involving accepted manuscripts currently in production or post-production, please contact the Journal Production Division:
journalproofing@igi-global.com

Rights and Permissions Inquiries
For inquiries involving permissions, rights, and reuse, please contact the Intellectual Property & Contracts Division:
contracts@igi-global.com

Publication-Related Inquiries
For inquiries involving journal publishing, please contact the Acquisitions Division:
acquisition@igi-global.com

Discoverability Inquiries
For inquiries involving sharing, promoting, and indexing of manuscripts, please contact the Citation Metrics & Indexing Division:
indexing@igi-global.com

Editorial Office
701 E. Chocolate Ave.
Hershey, PA 17033, USA
717-533-8845 x100