Добірка наукової літератури з теми "Jihadist cyber - Digital identity"
Оформте джерело за APA, MLA, Chicago, Harvard та іншими стилями
Ознайомтеся зі списками актуальних статей, книг, дисертацій, тез та інших наукових джерел на тему "Jihadist cyber - Digital identity".
Біля кожної праці в переліку літератури доступна кнопка «Додати до бібліографії». Скористайтеся нею – і ми автоматично оформимо бібліографічне посилання на обрану працю в потрібному вам стилі цитування: APA, MLA, «Гарвард», «Чикаго», «Ванкувер» тощо.
Також ви можете завантажити повний текст наукової публікації у форматі «.pdf» та прочитати онлайн анотацію до роботи, якщо відповідні параметри наявні в метаданих.
Статті в журналах з теми "Jihadist cyber - Digital identity"
Pradhuka, Briant Nor, Prahastiwi Utari, and Sudarmo Sudarmo. "Digital queer: identitas komunikasi genderqueer selebgram Mimi Peri." Jurnal Studi Komunikasi (Indonesian Journal of Communications Studies) 4, no. 1 (March 5, 2020): 143. http://dx.doi.org/10.25139/jsk.v4i1.1582.
Повний текст джерелаSusanto, Edy, Lady Antira, Kevin Kevin, Edo Stanzah, and Assyeh Annasrul Majid. "MANAJEMEN KEAMANAN CYBER DI ERA DIGITAL." Journal of Business And Entrepreneurship 11, no. 1 (June 14, 2023): 23. http://dx.doi.org/10.46273/jobe.v11i1.365.
Повний текст джерелаMantello, Peter. "Fatal portraits: The selfie as agent of radicalization." Sign Systems Studies 49, no. 3-4 (December 31, 2021): 566–89. http://dx.doi.org/10.12697/sss.2021.49.3-4.16.
Повний текст джерелаBinhammad, Mohammad, Shaikha Alqaydi, Azzam Othman, and Laila Hatim Abuljadayel. "The Role of AI in Cyber Security: Safeguarding Digital Identity." Journal of Information Security 15, no. 02 (2024): 245–78. http://dx.doi.org/10.4236/jis.2024.152015.
Повний текст джерелаKhariroh, Riri. "Cyber Muslims." ISLAM NUSANTARA:Journal for the Study of Islamic History and Culture 3, no. 2 (July 31, 2022): 101–13. http://dx.doi.org/10.47776/islamnusantara.v3i2.375.
Повний текст джерелаDahiya, Kashish. "Trends in Cyber Crime in India." International Journal for Research in Applied Science and Engineering Technology 11, no. 5 (May 31, 2023): 6393–404. http://dx.doi.org/10.22214/ijraset.2023.53073.
Повний текст джерелаShinkaretskaya, Galina Georgievna, and Alisa Mikhailovna Berman. "Cyber-attacks – an unlawful use of digital technologies." Международное право, no. 1 (January 2022): 40–50. http://dx.doi.org/10.25136/2644-5514.2022.1.37271.
Повний текст джерелаMomcheva, Galina, Teodora Bakardjieva, Veselina Spasova, and Antonina Ivanova. "VARNA FREE UNIVERSITY’S PROJECTS FOR DEVELOPING OF CYBERSECURITY EDUCATION AND TRAINING – “CYBERMAGICIANS” PROJECT." Education and Technologies Journal 12, no. 2 (August 1, 2021): 516–18. http://dx.doi.org/10.26883/2010.212.3903.
Повний текст джерелаChałubińska-Jentkiewicz, Katarzyna. "Digital Single Market. Cyber Threats and the Protection of Digital Contents: An Overview." Santander Art and Culture Law Review, no. 2 (6) (2020): 279–92. http://dx.doi.org/10.4467/2450050xsnr.20.020.13023.
Повний текст джерелаBetts, Lucy R., and Karin A. Spenser. "“A Large Can of Worms”." International Journal of Cyber Behavior, Psychology and Learning 5, no. 2 (April 2015): 15–29. http://dx.doi.org/10.4018/ijcbpl.2015040102.
Повний текст джерелаДисертації з теми "Jihadist cyber - Digital identity"
Reyhan, Dilnur. "Le rôle des technologies d'information et de communication (TIC) dans la contruction des nouvelles diasporas : le cas de la diaspora Ouïghoure." Thesis, Strasbourg, 2017. http://www.theses.fr/2017STRAG003.
Повний текст джерелаThis thesis focuses on the constitutive role of Information and Communication Technologies (ICT) in the Uyghur diaspora. The sociological approach adopted in this thesis not only examines the aspects of politics and communication of this issue, but also allows a historical and geographical study which also takes into account the ideological, social, institutional and organizational points of view, as Uyghur communities abroad start to be visible and create formal organizations representing their cause. The first section of the thesis highlights, through ICT, a complex network of institutionalized Uyghur communities that interact with each other and their countries of origin, and demonstrates that the World Uyghur Congress is the most dominant of these associations. The second section shows, through quantitative and qualitative analysis of the mapping of the Uyghur web in 2010 and in 2016, the contributions and limitations of ICT in the diaspora construction process. This cross analysis sheds light in the third section on the forms of identities that are constructed, such as ethno-national, ethno-cultural or ethno-religious identity, and the social compromises tentatively formed through the negotiation process in virtual space and in the institutions. This study reveals the different purposes sought by both official and lambda actors and examines how new forms of regulation are likely to reach a new compromise between the actors. Presently, however, there is neither a common strategy, particularly vis-a-vis the political dealings with China, nor a common identity, but different identities of the Uyghur migration
"A Cyber(space) of Their Own: Female Iberian and Latin American Artists and Writers of the Digital. A Transatlantic Analysis from Identity (De)Construction, Political Dissidence and Activism, to the Posthuman." Doctoral diss., 2019. http://hdl.handle.net/2286/R.I.53494.
Повний текст джерелаDissertation/Thesis
Doctoral Dissertation Spanish 2019
Книги з теми "Jihadist cyber - Digital identity"
Cyber Zen. Routledge, 2016.
Знайти повний текст джерелаSelby, Nick, and Heather Vescent. Cyber Attack Survival Manual: Tools for Surviving Everything from Identity Theft to the Digital Apocalypse. Weldon Owen, Incorporated, 2017.
Знайти повний текст джерелаauthor, Vescent Heather, Chow Eric illustrator, and Buckley Conor illustrator, eds. The cyber attack survival manual: Tools for surviving everything from identity theft to the digital apocalypse. Weldon Owen, 2017.
Знайти повний текст джерелаGrieve, Gregory Price. Cyber Zen: Imagining Authentic Buddhist Identity, Community, and Practices in the Virtual World of Second Life. Taylor & Francis Group, 2016.
Знайти повний текст джерелаGrieve, Gregory Price. Cyber Zen: Imagining Authentic Buddhist Identity, Community, and Practices in the Virtual World of Second Life. Taylor & Francis Group, 2016.
Знайти повний текст джерелаGrieve, Gregory Price. Cyber Zen: Imagining Authentic Buddhist Identity, Community, and Practices in the Virtual World of Second Life. Routledge, 2016.
Знайти повний текст джерелаCyber Security: How to Protect Your Digital Life, Avoid Identity Theft, Prevent Extortion, and Secure Your Social Privacy in 2020 and Beyond. Independently Published, 2019.
Знайти повний текст джерелаЧастини книг з теми "Jihadist cyber - Digital identity"
Ladouceur, Rachel, and Fehmi Jaafar. "Cyber Influence Stakes." In Blockchain and Artificial Intelligence-Based Solution to Enhance the Privacy in Digital Identity and IoT, 155–74. Boca Raton: CRC Press, 2023. http://dx.doi.org/10.1201/9781003227656-11.
Повний текст джерелаVasileva, Violeta. "Application of a Human-Centric Approach in Security by Design for IoT Architecture Development." In Communications in Computer and Information Science, 13–22. Cham: Springer International Publishing, 2022. http://dx.doi.org/10.1007/978-3-031-09357-9_2.
Повний текст джерелаJones, David Martin. "Surveillance and Resistance." In Advances in Digital Crime, Forensics, and Cyber Terrorism, 122–43. IGI Global, 2016. http://dx.doi.org/10.4018/978-1-4666-9661-7.ch007.
Повний текст джерелаMcNeal, Ramona Sue, and Mary Schmeida. "Digital Paranoia." In Cyber Law, Privacy, and Security, 1295–312. IGI Global, 2019. http://dx.doi.org/10.4018/978-1-5225-8897-9.ch064.
Повний текст джерелаKirwan, Gráinne, and Andrew Power. "Identity Theft and Online Fraud." In Advances in Digital Crime, Forensics, and Cyber Terrorism, 94–112. IGI Global, 2012. http://dx.doi.org/10.4018/978-1-61350-350-8.ch006.
Повний текст джерелаNisa, Eva. "Muslims Enacting Identity." In The Oxford Handbook of Digital Religion, C33.S1—C33.S9. Oxford University Press, 2022. http://dx.doi.org/10.1093/oxfordhb/9780197549803.013.33.
Повний текст джерелаEjazi, Farzaneh. "Performance of Virtual Terrorism in Cyber Space." In Advances in Digital Crime, Forensics, and Cyber Terrorism, 224–36. IGI Global, 2022. http://dx.doi.org/10.4018/978-1-7998-9755-2.ch013.
Повний текст джерелаTellería, Ana Serrano. "The Role of the Profile and the Digital Identity on the Mobile Content." In Cyber Law, Privacy, and Security, 1645–64. IGI Global, 2019. http://dx.doi.org/10.4018/978-1-5225-8897-9.ch080.
Повний текст джерелаPereira, Filipa da Silva, Marlene Alexandra Veloso de Matos, and Álvaro Miguel do Céu Gramaxo Olivei Sampaio. "Cyber-Crimes against Adolescents." In Advances in Digital Crime, Forensics, and Cyber Terrorism, 211–30. IGI Global, 2015. http://dx.doi.org/10.4018/978-1-4666-6324-4.ch014.
Повний текст джерелаSaharan, Sameer, Shailja Singh, Ajay Kumar Bhandari, and Bhuvnesh Yadav. "The Future of Cyber-Crimes and Cyber War in the Metaverse." In Advances in Digital Crime, Forensics, and Cyber Terrorism, 126–48. IGI Global, 2023. http://dx.doi.org/10.4018/979-8-3693-0220-0.ch007.
Повний текст джерелаТези доповідей конференцій з теми "Jihadist cyber - Digital identity"
Holm, Eric. "Identity crime: The challenges in the regulation of identity crime." In 2012 International Conference on Cyber Security, Cyber Warfare and Digital Forensic (CyberSec). IEEE, 2012. http://dx.doi.org/10.1109/cybersec.2012.6246078.
Повний текст джерелаNirkhi, S. M., R. V. Dharaskar, and V. M. Thakre. "Analysis of online messages for identity tracing in cybercrime investigation." In 2012 International Conference on Cyber Security, Cyber Warfare and Digital Forensic (CyberSec). IEEE, 2012. http://dx.doi.org/10.1109/cybersec.2012.6246131.
Повний текст джерелаHolm, Eric, and Geraldine Mackenzie. "The importance of mandatory data breach notification to identity crime." In 2014 Third International Conference on Cyber Security, Cyber Warfare and Digital Forensic (CyberSec). IEEE, 2014. http://dx.doi.org/10.1109/cybersec.2014.6913963.
Повний текст джерелаMoore, Erik. "Managing the loss of control over cyber identity." In 2016 Third International Conference on Digital Information Processing, Data Mining, and Wireless Communications (DIPDMWC). IEEE, 2016. http://dx.doi.org/10.1109/dipdmwc.2016.7529395.
Повний текст джерелаAlkhalifah, Ali, and John D'Ambra. "The role of Identity Management Systems in enhancing protection of user privacy." In 2012 International Conference on Cyber Security, Cyber Warfare and Digital Forensic (CyberSec). IEEE, 2012. http://dx.doi.org/10.1109/cybersec.2012.6246091.
Повний текст джерелаSheik, A. T., C. Maple, G. Epiphaniou, and U. I. Atmaca. "A Comparative Study of Cyber Threats on Evolving Digital Identity Systems." In Competitive Advantage in the Digital Economy (CADE 2021). Institution of Engineering and Technology, 2021. http://dx.doi.org/10.1049/icp.2021.2428.
Повний текст джерелаAgbaje, Micheal, Oludele Awodele, and Chibueze Ogbonna. "Applications of Digital Watermarking to Cyber Security (Cyber Watermarking)." In InSITE 2015: Informing Science + IT Education Conferences: USA. Informing Science Institute, 2015. http://dx.doi.org/10.28945/2138.
Повний текст джерелаAbubakar, Aisha, Pooneh Bagheri Zadeh, Helge Janicke, and Richard Howley. "Root cause analysis (RCA) as a preliminary tool into the investigation of identity theft." In 2016 International Conference On Cyber Security And Protection Of Digital Services (Cyber Security). IEEE, 2016. http://dx.doi.org/10.1109/cybersecpods.2016.7502349.
Повний текст джерелаSaragih, Taruly Karlina, Eric Tanuwijaya, and Gunawan Wang. "The Use of Blockchain for Digital Identity Management in Healthcare." In 2022 10th International Conference on Cyber and IT Service Management (CITSM). IEEE, 2022. http://dx.doi.org/10.1109/citsm56380.2022.9935935.
Повний текст джерелаZhu, Jiali, and Zhenxin Wu. "An Open Sharing Method for Digital Heritage Assets Based on Self-Sovereign Identity Technology." In 2023 IEEE International Conference on Cyber Security and Resilience (CSR). IEEE, 2023. http://dx.doi.org/10.1109/csr57506.2023.10224909.
Повний текст джерела