Journal articles on the topic 'Jihadist cyber - Digital identity'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the top 50 journal articles for your research on the topic 'Jihadist cyber - Digital identity.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.
Pradhuka, Briant Nor, Prahastiwi Utari, and Sudarmo Sudarmo. "Digital queer: identitas komunikasi genderqueer selebgram Mimi Peri." Jurnal Studi Komunikasi (Indonesian Journal of Communications Studies) 4, no. 1 (March 5, 2020): 143. http://dx.doi.org/10.25139/jsk.v4i1.1582.
Full textSusanto, Edy, Lady Antira, Kevin Kevin, Edo Stanzah, and Assyeh Annasrul Majid. "MANAJEMEN KEAMANAN CYBER DI ERA DIGITAL." Journal of Business And Entrepreneurship 11, no. 1 (June 14, 2023): 23. http://dx.doi.org/10.46273/jobe.v11i1.365.
Full textMantello, Peter. "Fatal portraits: The selfie as agent of radicalization." Sign Systems Studies 49, no. 3-4 (December 31, 2021): 566–89. http://dx.doi.org/10.12697/sss.2021.49.3-4.16.
Full textBinhammad, Mohammad, Shaikha Alqaydi, Azzam Othman, and Laila Hatim Abuljadayel. "The Role of AI in Cyber Security: Safeguarding Digital Identity." Journal of Information Security 15, no. 02 (2024): 245–78. http://dx.doi.org/10.4236/jis.2024.152015.
Full textKhariroh, Riri. "Cyber Muslims." ISLAM NUSANTARA:Journal for the Study of Islamic History and Culture 3, no. 2 (July 31, 2022): 101–13. http://dx.doi.org/10.47776/islamnusantara.v3i2.375.
Full textDahiya, Kashish. "Trends in Cyber Crime in India." International Journal for Research in Applied Science and Engineering Technology 11, no. 5 (May 31, 2023): 6393–404. http://dx.doi.org/10.22214/ijraset.2023.53073.
Full textShinkaretskaya, Galina Georgievna, and Alisa Mikhailovna Berman. "Cyber-attacks – an unlawful use of digital technologies." Международное право, no. 1 (January 2022): 40–50. http://dx.doi.org/10.25136/2644-5514.2022.1.37271.
Full textMomcheva, Galina, Teodora Bakardjieva, Veselina Spasova, and Antonina Ivanova. "VARNA FREE UNIVERSITY’S PROJECTS FOR DEVELOPING OF CYBERSECURITY EDUCATION AND TRAINING – “CYBERMAGICIANS” PROJECT." Education and Technologies Journal 12, no. 2 (August 1, 2021): 516–18. http://dx.doi.org/10.26883/2010.212.3903.
Full textChałubińska-Jentkiewicz, Katarzyna. "Digital Single Market. Cyber Threats and the Protection of Digital Contents: An Overview." Santander Art and Culture Law Review, no. 2 (6) (2020): 279–92. http://dx.doi.org/10.4467/2450050xsnr.20.020.13023.
Full textBetts, Lucy R., and Karin A. Spenser. "“A Large Can of Worms”." International Journal of Cyber Behavior, Psychology and Learning 5, no. 2 (April 2015): 15–29. http://dx.doi.org/10.4018/ijcbpl.2015040102.
Full textOstrovskaya, Elena, Timur Badmatsyrenov, Fyodor Khandarov, and Innokentii Aktamov. "Russian-Speaking Digital Buddhism: Neither Cyber, nor Sangha." Religions 12, no. 6 (June 17, 2021): 449. http://dx.doi.org/10.3390/rel12060449.
Full textPeteva, Irena, Daniela Pavlova, and Ivanka Pavlova. "The Impact of Cloud Technologies on Preserving and Promoting Cultural Identity." Digital Presentation and Preservation of Cultural and Scientific Heritage 13 (September 1, 2023): 269–74. http://dx.doi.org/10.55630/dipp.2023.13.26.
Full textKoulos, Thanos. "A digital territory to be appropriated: the state and the nationalization of cyberspace." Open Research Europe 1 (March 28, 2022): 119. http://dx.doi.org/10.12688/openreseurope.14010.2.
Full textKoulos, Thanos. "A digital territory to be appropriated: the state and the nationalization of cyberspace." Open Research Europe 1 (October 6, 2021): 119. http://dx.doi.org/10.12688/openreseurope.14010.1.
Full textGerbaudo, Paolo. "From Cyber-Autonomism to Cyber-Populism: An Ideological Analysis of the Evolution of Digital Activism." tripleC: Communication, Capitalism & Critique. Open Access Journal for a Global Sustainable Information Society 15, no. 2 (May 29, 2017): 477–89. http://dx.doi.org/10.31269/triplec.v15i2.773.
Full textJ.A Pakai, Asra. "PERAN PENDIDIKAN TERHADAP SISWA DALAM PENCEGAHAN PERILAKU CYBER BULLYING DI ERA DIGITAL." Moderasi: Jurnal Studi Ilmu Pengetahuan Sosial 2, no. 2 (December 30, 2021): 42–50. http://dx.doi.org/10.24239/moderasi.vol2.iss2.46.
Full textSahren, Sahren, Irianto Irianto, and Afrisawati Afrisawati. "PELATIHAN SECURITY AWARNESS PENGGUNAAN MEDIA SOSIAL UNTUK PEMASARAN PADA KELOMPOK PENGRAJIN BATU BATA PULO BANDRING." Jurnal Pemberdayaan Sosial dan Teknologi Masyarakat 2, no. 2 (January 12, 2023): 181. http://dx.doi.org/10.54314/jpstm.v2i2.1091.
Full textAntwi, Paul. "Device Information for Forensic Analysis." Advances in Multidisciplinary and scientific Research Journal Publication 1, no. 1 (July 26, 2022): 373–78. http://dx.doi.org/10.22624/aims/crp-bk3-p59.
Full textLapadat, Judith C. "Bloggers on FIRE Performing Identity and Building Community: Considerations for Cyber-Autoethnography." International Review of Qualitative Research 13, no. 3 (October 12, 2020): 332–50. http://dx.doi.org/10.1177/1940844720939847.
Full textTriberti, Stefano, Ilaria Durosini, Filippo Aschieri, Daniela Villani, and Giuseppe Riva. "Changing Avatars, Changing Selves? The Influence of Social and Contextual Expectations on Digital Rendition of Identity." Cyberpsychology, Behavior, and Social Networking 20, no. 8 (August 2017): 501–7. http://dx.doi.org/10.1089/cyber.2016.0424.
Full textAjitha, P., Malemarpuram Chaitanya Sai, Dheeraj, and A. Sivasangari. "A Joint Optimization Approach to Security- and Insurance Management System on Cloud." Journal of Computational and Theoretical Nanoscience 17, no. 11 (November 1, 2020): 4944–48. http://dx.doi.org/10.1166/jctn.2020.9245.
Full textDeri Firmansyah, Asep Achamd Rifa’i, Asep Suryana, and A Idun Suwarna. "SELF IDENTITY MANAGEMENT UMKM DALAM CYBERSPACE : PERSPECTIF PASCA TRANSFORMASI DIGITAL UMKM DI KAWASAN DESTINASI WISATA GEOPARK CILEUTUH." J-ABDI: Jurnal Pengabdian kepada Masyarakat 1, no. 6 (November 2, 2021): 1075–84. http://dx.doi.org/10.53625/jabdi.v1i6.529.
Full textSydorenko, Svitlana. "The Development of Digitalization During the War as a Sociocultural Phenomenon." Mediaforum : Analytics, Forecasts, Information Management, no. 11 (December 14, 2022): 298–309. http://dx.doi.org/10.31861/mediaforum.2022.11.298-309.
Full textS.Thangamayan, Et al. "Cyber Crime and Cyber Law’s In India: A Comprehensive Study with Special Reference to Information Technology." International Journal on Recent and Innovation Trends in Computing and Communication 11, no. 9 (November 5, 2023): 2903–6. http://dx.doi.org/10.17762/ijritcc.v11i9.9379.
Full textApsimet, Nurdaulet, Akmaral Smanova, and Gulzat Utegenova. "The role of the Internet in the evolution of fraud: a historical aspect." BULLETIN of L.N. Gumilyov Eurasian National University LAW Series 146, no. 1 (2024): 247–57. http://dx.doi.org/10.32523/2616-6844-2024-1-247-257.
Full textRizkil, Mia, Augustin Rina Herawati, and Slamet Santoso. "Protection of Personal Data in the Use of Digital ID Cards against Misuse of Data from Cyber Hack." Journal La Sociale 5, no. 2 (April 1, 2024): 471–78. http://dx.doi.org/10.37899/journal-la-sociale.v5i2.1132.
Full textWang, Shipeng, Lizhen Cui, Lei Liu, Xudong Lu, and Qingzhong Li. "Projecting real world into CrowdIntell network: a methodology." International Journal of Crowd Science 3, no. 2 (August 30, 2019): 138–54. http://dx.doi.org/10.1108/ijcs-01-2019-0006.
Full textYoung, Oran R., Jian Yang, and Dan Guttman. "Meeting Cyber Age Needs for Governance in a Changing Global Order." Sustainability 12, no. 14 (July 10, 2020): 5557. http://dx.doi.org/10.3390/su12145557.
Full textStephen, Bijan. "Crime Online." Dissent 70, no. 3 (September 2023): 150–54. http://dx.doi.org/10.1353/dss.2023.a906672.
Full textNakamura, Lisa. "Cyberrace." PMLA/Publications of the Modern Language Association of America 123, no. 5 (October 2008): 1673–82. http://dx.doi.org/10.1632/pmla.2008.123.5.1673.
Full textLehto, Martti, Aki-Mauri Huhtinen, and Saara Jantunen. "The Open Definition of Cyber." International Journal of Cyber Warfare and Terrorism 1, no. 2 (April 2011): 1–9. http://dx.doi.org/10.4018/ijcwt.2011040101.
Full textRahardi, R. Kunjana. "MEMERIKAN FUNGSI KONTEKS SITUASI DALAM PERSPEKTIF PRAGMATIK SIBER." Linguistik Indonesia 40, no. 2 (August 2, 2022): 197–211. http://dx.doi.org/10.26499/li.v40i2.286.
Full textKharisma, Rikha Ayu Minda, and Rahmawati Zulfiningrum. "REPRESENTASI CYBER SOCIETY DALAM FILM “SEARCHING”." Jurnal Audience 3, no. 2 (October 26, 2020): 250–72. http://dx.doi.org/10.33633/ja.v3i2.4066.
Full textTavares, Carla Nunes Vieira. "Projeções identitárias no dizer sobre imigrantes das américas no Brasil." Cadernos de Linguagem e Sociedade 22, no. 2 (December 19, 2021): 62–78. http://dx.doi.org/10.26512/les.v22i2.32723.
Full textCebrián-Robles, Violeta, Francisco José Ruíz-Rey, Manuela Raposo-Rivas, and Manuel Cebrián-de-la-Serna. "Impact of Digital Contexts in the Training of University Education Students." Education Sciences 13, no. 9 (September 11, 2023): 923. http://dx.doi.org/10.3390/educsci13090923.
Full textNie, Haolan. "Gender Inequality in the Digital Field and Potential Remedial Measures." Lecture Notes in Education Psychology and Public Media 21, no. 1 (November 20, 2023): 52–57. http://dx.doi.org/10.54254/2753-7048/21/20230050.
Full textCasadei, Roberto, Danilo Pianini, Mirko Viroli, and Danny Weyns. "Digital Twins, Virtual Devices, and Augmentations for Self-Organising Cyber-Physical Collectives." Applied Sciences 12, no. 1 (December 30, 2021): 349. http://dx.doi.org/10.3390/app12010349.
Full textRuta Vaidya, Trupti Gaikwad, Snehal Jadhav, and Jyoti Malusare. "Study of Cyber Crimes Using Data Science." international journal of engineering technology and management sciences 7, no. 5 (2023): 480–86. http://dx.doi.org/10.46647/ijetms.2023.v07i05.059.
Full textKhan, Tayyeb. "Cybersecurity Problem Impacting Online Banking in FR Peshawar." Journal of Education and Finance Review 1, no. 1 (December 30, 2022): 43–54. http://dx.doi.org/10.62843/jefr/2022.3477305.
Full textVilic, Vida. "Phishing as a form of fraud identity theft in healthcare: Victimization during COVID-19 pandemic." Temida 25, no. 1 (2022): 53–78. http://dx.doi.org/10.2298/tem2201053v.
Full textFebriani, Meina, Nas Haryati Setyaningsih, and Azis Nugroho. "Konstruksi Baru Identitas Banyumasan dalam Penggunaan Bahasa Pada Generasi Y: Studi Kasus Platform Instagram." Jurnal Sastra Indonesia 11, no. 1 (March 26, 2022): 1–11. http://dx.doi.org/10.15294/jsi.v11i1.54126.
Full textAamna Rafiq. "Challenges of Securitising Cyberspace in Pakistan." Strategic Studies 39, no. 1 (April 24, 2019): 90–101. http://dx.doi.org/10.53532/ss.039.01.00126.
Full textS, Smys, Haoxiang Wang, and Abul Basar. "5G Network Simulation in Smart Cities using Neural Network Algorithm." March 2021 3, no. 1 (March 29, 2021): 43–52. http://dx.doi.org/10.36548/jaicn.2021.1.004.
Full textDevlekar, Sanket, and Vidyavati Ramteke. "Identity and Access Management: High-level Conceptual Framework." Revista Gestão Inovação e Tecnologias 11, no. 4 (August 24, 2021): 4885–97. http://dx.doi.org/10.47059/revistageintec.v11i4.2511.
Full textS., Devlekar,, and Ramteke, V. "Identity and Access Management: High-level Conceptual Framework." CARDIOMETRY, no. 24 (November 30, 2022): 393–99. http://dx.doi.org/10.18137/cardiometry.2022.24.393399.
Full textTaufik, Zulfan, and Muhammad Taufik. "Mediated Tarekat Qadiriyah wa Naqshabandiyah in the Digital Era: An Ethnographic Overview." ESENSIA: Jurnal Ilmu-Ilmu Ushuluddin 22, no. 1 (May 29, 2021): 35. http://dx.doi.org/10.14421/esensia.v22i1.2511.
Full textV. Smrithy, Singh, Robin D. Doreen, and Robin C. R. Rene. "A censorious interpretation of cyber theft and its footprints." i-manager's Journal on Information Technology 12, no. 1 (2023): 23. http://dx.doi.org/10.26634/jit.12.1.19394.
Full textSalwa Shakir Mahmood, Et al. "Enhancing Network Security Through Blockchain Technology: Challenges And Opportunities." International Journal on Recent and Innovation Trends in Computing and Communication 11, no. 10 (November 2, 2023): 1670–77. http://dx.doi.org/10.17762/ijritcc.v11i10.8729.
Full textRinta Ariani, Mahayu, Wahyu Widodo, and Toebagus Galang Windi Pratama. "Juridicial Review of Legal Protection Victims of Cyber Gender-Based Violence (Case Study of High Court Decision Number 150/PID/2020/PT BDG)." Widya Pranata Hukum : Jurnal Kajian dan Penelitian Hukum 5, no. 1 (March 3, 2023): 66–73. http://dx.doi.org/10.37631/widyapranata.v5i1.846.
Full textMishra, Pankaj, and Dev Ratna Singh. "Biometric Approach for Confidentiality in Cloud Computing." SAMRIDDHI : A Journal of Physical Sciences, Engineering and Technology 10, no. 01 (July 25, 2018): 65–70. http://dx.doi.org/10.18090/samriddhi.v10i01.9.
Full text