Статті в журналах з теми "Jihadist cyber - Digital identity"
Оформте джерело за APA, MLA, Chicago, Harvard та іншими стилями
Ознайомтеся з топ-50 статей у журналах для дослідження на тему "Jihadist cyber - Digital identity".
Біля кожної праці в переліку літератури доступна кнопка «Додати до бібліографії». Скористайтеся нею – і ми автоматично оформимо бібліографічне посилання на обрану працю в потрібному вам стилі цитування: APA, MLA, «Гарвард», «Чикаго», «Ванкувер» тощо.
Також ви можете завантажити повний текст наукової публікації у форматі «.pdf» та прочитати онлайн анотацію до роботи, якщо відповідні параметри наявні в метаданих.
Переглядайте статті в журналах для різних дисциплін та оформлюйте правильно вашу бібліографію.
Pradhuka, Briant Nor, Prahastiwi Utari, and Sudarmo Sudarmo. "Digital queer: identitas komunikasi genderqueer selebgram Mimi Peri." Jurnal Studi Komunikasi (Indonesian Journal of Communications Studies) 4, no. 1 (March 5, 2020): 143. http://dx.doi.org/10.25139/jsk.v4i1.1582.
Повний текст джерелаSusanto, Edy, Lady Antira, Kevin Kevin, Edo Stanzah, and Assyeh Annasrul Majid. "MANAJEMEN KEAMANAN CYBER DI ERA DIGITAL." Journal of Business And Entrepreneurship 11, no. 1 (June 14, 2023): 23. http://dx.doi.org/10.46273/jobe.v11i1.365.
Повний текст джерелаMantello, Peter. "Fatal portraits: The selfie as agent of radicalization." Sign Systems Studies 49, no. 3-4 (December 31, 2021): 566–89. http://dx.doi.org/10.12697/sss.2021.49.3-4.16.
Повний текст джерелаBinhammad, Mohammad, Shaikha Alqaydi, Azzam Othman, and Laila Hatim Abuljadayel. "The Role of AI in Cyber Security: Safeguarding Digital Identity." Journal of Information Security 15, no. 02 (2024): 245–78. http://dx.doi.org/10.4236/jis.2024.152015.
Повний текст джерелаKhariroh, Riri. "Cyber Muslims." ISLAM NUSANTARA:Journal for the Study of Islamic History and Culture 3, no. 2 (July 31, 2022): 101–13. http://dx.doi.org/10.47776/islamnusantara.v3i2.375.
Повний текст джерелаDahiya, Kashish. "Trends in Cyber Crime in India." International Journal for Research in Applied Science and Engineering Technology 11, no. 5 (May 31, 2023): 6393–404. http://dx.doi.org/10.22214/ijraset.2023.53073.
Повний текст джерелаShinkaretskaya, Galina Georgievna, and Alisa Mikhailovna Berman. "Cyber-attacks – an unlawful use of digital technologies." Международное право, no. 1 (January 2022): 40–50. http://dx.doi.org/10.25136/2644-5514.2022.1.37271.
Повний текст джерелаMomcheva, Galina, Teodora Bakardjieva, Veselina Spasova, and Antonina Ivanova. "VARNA FREE UNIVERSITY’S PROJECTS FOR DEVELOPING OF CYBERSECURITY EDUCATION AND TRAINING – “CYBERMAGICIANS” PROJECT." Education and Technologies Journal 12, no. 2 (August 1, 2021): 516–18. http://dx.doi.org/10.26883/2010.212.3903.
Повний текст джерелаChałubińska-Jentkiewicz, Katarzyna. "Digital Single Market. Cyber Threats and the Protection of Digital Contents: An Overview." Santander Art and Culture Law Review, no. 2 (6) (2020): 279–92. http://dx.doi.org/10.4467/2450050xsnr.20.020.13023.
Повний текст джерелаBetts, Lucy R., and Karin A. Spenser. "“A Large Can of Worms”." International Journal of Cyber Behavior, Psychology and Learning 5, no. 2 (April 2015): 15–29. http://dx.doi.org/10.4018/ijcbpl.2015040102.
Повний текст джерелаOstrovskaya, Elena, Timur Badmatsyrenov, Fyodor Khandarov, and Innokentii Aktamov. "Russian-Speaking Digital Buddhism: Neither Cyber, nor Sangha." Religions 12, no. 6 (June 17, 2021): 449. http://dx.doi.org/10.3390/rel12060449.
Повний текст джерелаPeteva, Irena, Daniela Pavlova, and Ivanka Pavlova. "The Impact of Cloud Technologies on Preserving and Promoting Cultural Identity." Digital Presentation and Preservation of Cultural and Scientific Heritage 13 (September 1, 2023): 269–74. http://dx.doi.org/10.55630/dipp.2023.13.26.
Повний текст джерелаKoulos, Thanos. "A digital territory to be appropriated: the state and the nationalization of cyberspace." Open Research Europe 1 (March 28, 2022): 119. http://dx.doi.org/10.12688/openreseurope.14010.2.
Повний текст джерелаKoulos, Thanos. "A digital territory to be appropriated: the state and the nationalization of cyberspace." Open Research Europe 1 (October 6, 2021): 119. http://dx.doi.org/10.12688/openreseurope.14010.1.
Повний текст джерелаGerbaudo, Paolo. "From Cyber-Autonomism to Cyber-Populism: An Ideological Analysis of the Evolution of Digital Activism." tripleC: Communication, Capitalism & Critique. Open Access Journal for a Global Sustainable Information Society 15, no. 2 (May 29, 2017): 477–89. http://dx.doi.org/10.31269/triplec.v15i2.773.
Повний текст джерелаJ.A Pakai, Asra. "PERAN PENDIDIKAN TERHADAP SISWA DALAM PENCEGAHAN PERILAKU CYBER BULLYING DI ERA DIGITAL." Moderasi: Jurnal Studi Ilmu Pengetahuan Sosial 2, no. 2 (December 30, 2021): 42–50. http://dx.doi.org/10.24239/moderasi.vol2.iss2.46.
Повний текст джерелаSahren, Sahren, Irianto Irianto, and Afrisawati Afrisawati. "PELATIHAN SECURITY AWARNESS PENGGUNAAN MEDIA SOSIAL UNTUK PEMASARAN PADA KELOMPOK PENGRAJIN BATU BATA PULO BANDRING." Jurnal Pemberdayaan Sosial dan Teknologi Masyarakat 2, no. 2 (January 12, 2023): 181. http://dx.doi.org/10.54314/jpstm.v2i2.1091.
Повний текст джерелаAntwi, Paul. "Device Information for Forensic Analysis." Advances in Multidisciplinary and scientific Research Journal Publication 1, no. 1 (July 26, 2022): 373–78. http://dx.doi.org/10.22624/aims/crp-bk3-p59.
Повний текст джерелаLapadat, Judith C. "Bloggers on FIRE Performing Identity and Building Community: Considerations for Cyber-Autoethnography." International Review of Qualitative Research 13, no. 3 (October 12, 2020): 332–50. http://dx.doi.org/10.1177/1940844720939847.
Повний текст джерелаTriberti, Stefano, Ilaria Durosini, Filippo Aschieri, Daniela Villani, and Giuseppe Riva. "Changing Avatars, Changing Selves? The Influence of Social and Contextual Expectations on Digital Rendition of Identity." Cyberpsychology, Behavior, and Social Networking 20, no. 8 (August 2017): 501–7. http://dx.doi.org/10.1089/cyber.2016.0424.
Повний текст джерелаAjitha, P., Malemarpuram Chaitanya Sai, Dheeraj, and A. Sivasangari. "A Joint Optimization Approach to Security- and Insurance Management System on Cloud." Journal of Computational and Theoretical Nanoscience 17, no. 11 (November 1, 2020): 4944–48. http://dx.doi.org/10.1166/jctn.2020.9245.
Повний текст джерелаDeri Firmansyah, Asep Achamd Rifa’i, Asep Suryana, and A Idun Suwarna. "SELF IDENTITY MANAGEMENT UMKM DALAM CYBERSPACE : PERSPECTIF PASCA TRANSFORMASI DIGITAL UMKM DI KAWASAN DESTINASI WISATA GEOPARK CILEUTUH." J-ABDI: Jurnal Pengabdian kepada Masyarakat 1, no. 6 (November 2, 2021): 1075–84. http://dx.doi.org/10.53625/jabdi.v1i6.529.
Повний текст джерелаSydorenko, Svitlana. "The Development of Digitalization During the War as a Sociocultural Phenomenon." Mediaforum : Analytics, Forecasts, Information Management, no. 11 (December 14, 2022): 298–309. http://dx.doi.org/10.31861/mediaforum.2022.11.298-309.
Повний текст джерелаS.Thangamayan, Et al. "Cyber Crime and Cyber Law’s In India: A Comprehensive Study with Special Reference to Information Technology." International Journal on Recent and Innovation Trends in Computing and Communication 11, no. 9 (November 5, 2023): 2903–6. http://dx.doi.org/10.17762/ijritcc.v11i9.9379.
Повний текст джерелаApsimet, Nurdaulet, Akmaral Smanova, and Gulzat Utegenova. "The role of the Internet in the evolution of fraud: a historical aspect." BULLETIN of L.N. Gumilyov Eurasian National University LAW Series 146, no. 1 (2024): 247–57. http://dx.doi.org/10.32523/2616-6844-2024-1-247-257.
Повний текст джерелаRizkil, Mia, Augustin Rina Herawati, and Slamet Santoso. "Protection of Personal Data in the Use of Digital ID Cards against Misuse of Data from Cyber Hack." Journal La Sociale 5, no. 2 (April 1, 2024): 471–78. http://dx.doi.org/10.37899/journal-la-sociale.v5i2.1132.
Повний текст джерелаWang, Shipeng, Lizhen Cui, Lei Liu, Xudong Lu, and Qingzhong Li. "Projecting real world into CrowdIntell network: a methodology." International Journal of Crowd Science 3, no. 2 (August 30, 2019): 138–54. http://dx.doi.org/10.1108/ijcs-01-2019-0006.
Повний текст джерелаYoung, Oran R., Jian Yang, and Dan Guttman. "Meeting Cyber Age Needs for Governance in a Changing Global Order." Sustainability 12, no. 14 (July 10, 2020): 5557. http://dx.doi.org/10.3390/su12145557.
Повний текст джерелаStephen, Bijan. "Crime Online." Dissent 70, no. 3 (September 2023): 150–54. http://dx.doi.org/10.1353/dss.2023.a906672.
Повний текст джерелаNakamura, Lisa. "Cyberrace." PMLA/Publications of the Modern Language Association of America 123, no. 5 (October 2008): 1673–82. http://dx.doi.org/10.1632/pmla.2008.123.5.1673.
Повний текст джерелаLehto, Martti, Aki-Mauri Huhtinen, and Saara Jantunen. "The Open Definition of Cyber." International Journal of Cyber Warfare and Terrorism 1, no. 2 (April 2011): 1–9. http://dx.doi.org/10.4018/ijcwt.2011040101.
Повний текст джерелаRahardi, R. Kunjana. "MEMERIKAN FUNGSI KONTEKS SITUASI DALAM PERSPEKTIF PRAGMATIK SIBER." Linguistik Indonesia 40, no. 2 (August 2, 2022): 197–211. http://dx.doi.org/10.26499/li.v40i2.286.
Повний текст джерелаKharisma, Rikha Ayu Minda, and Rahmawati Zulfiningrum. "REPRESENTASI CYBER SOCIETY DALAM FILM “SEARCHING”." Jurnal Audience 3, no. 2 (October 26, 2020): 250–72. http://dx.doi.org/10.33633/ja.v3i2.4066.
Повний текст джерелаTavares, Carla Nunes Vieira. "Projeções identitárias no dizer sobre imigrantes das américas no Brasil." Cadernos de Linguagem e Sociedade 22, no. 2 (December 19, 2021): 62–78. http://dx.doi.org/10.26512/les.v22i2.32723.
Повний текст джерелаCebrián-Robles, Violeta, Francisco José Ruíz-Rey, Manuela Raposo-Rivas, and Manuel Cebrián-de-la-Serna. "Impact of Digital Contexts in the Training of University Education Students." Education Sciences 13, no. 9 (September 11, 2023): 923. http://dx.doi.org/10.3390/educsci13090923.
Повний текст джерелаNie, Haolan. "Gender Inequality in the Digital Field and Potential Remedial Measures." Lecture Notes in Education Psychology and Public Media 21, no. 1 (November 20, 2023): 52–57. http://dx.doi.org/10.54254/2753-7048/21/20230050.
Повний текст джерелаCasadei, Roberto, Danilo Pianini, Mirko Viroli, and Danny Weyns. "Digital Twins, Virtual Devices, and Augmentations for Self-Organising Cyber-Physical Collectives." Applied Sciences 12, no. 1 (December 30, 2021): 349. http://dx.doi.org/10.3390/app12010349.
Повний текст джерелаRuta Vaidya, Trupti Gaikwad, Snehal Jadhav, and Jyoti Malusare. "Study of Cyber Crimes Using Data Science." international journal of engineering technology and management sciences 7, no. 5 (2023): 480–86. http://dx.doi.org/10.46647/ijetms.2023.v07i05.059.
Повний текст джерелаKhan, Tayyeb. "Cybersecurity Problem Impacting Online Banking in FR Peshawar." Journal of Education and Finance Review 1, no. 1 (December 30, 2022): 43–54. http://dx.doi.org/10.62843/jefr/2022.3477305.
Повний текст джерелаVilic, Vida. "Phishing as a form of fraud identity theft in healthcare: Victimization during COVID-19 pandemic." Temida 25, no. 1 (2022): 53–78. http://dx.doi.org/10.2298/tem2201053v.
Повний текст джерелаFebriani, Meina, Nas Haryati Setyaningsih, and Azis Nugroho. "Konstruksi Baru Identitas Banyumasan dalam Penggunaan Bahasa Pada Generasi Y: Studi Kasus Platform Instagram." Jurnal Sastra Indonesia 11, no. 1 (March 26, 2022): 1–11. http://dx.doi.org/10.15294/jsi.v11i1.54126.
Повний текст джерелаAamna Rafiq. "Challenges of Securitising Cyberspace in Pakistan." Strategic Studies 39, no. 1 (April 24, 2019): 90–101. http://dx.doi.org/10.53532/ss.039.01.00126.
Повний текст джерелаS, Smys, Haoxiang Wang, and Abul Basar. "5G Network Simulation in Smart Cities using Neural Network Algorithm." March 2021 3, no. 1 (March 29, 2021): 43–52. http://dx.doi.org/10.36548/jaicn.2021.1.004.
Повний текст джерелаDevlekar, Sanket, and Vidyavati Ramteke. "Identity and Access Management: High-level Conceptual Framework." Revista Gestão Inovação e Tecnologias 11, no. 4 (August 24, 2021): 4885–97. http://dx.doi.org/10.47059/revistageintec.v11i4.2511.
Повний текст джерелаS., Devlekar,, and Ramteke, V. "Identity and Access Management: High-level Conceptual Framework." CARDIOMETRY, no. 24 (November 30, 2022): 393–99. http://dx.doi.org/10.18137/cardiometry.2022.24.393399.
Повний текст джерелаTaufik, Zulfan, and Muhammad Taufik. "Mediated Tarekat Qadiriyah wa Naqshabandiyah in the Digital Era: An Ethnographic Overview." ESENSIA: Jurnal Ilmu-Ilmu Ushuluddin 22, no. 1 (May 29, 2021): 35. http://dx.doi.org/10.14421/esensia.v22i1.2511.
Повний текст джерелаV. Smrithy, Singh, Robin D. Doreen, and Robin C. R. Rene. "A censorious interpretation of cyber theft and its footprints." i-manager's Journal on Information Technology 12, no. 1 (2023): 23. http://dx.doi.org/10.26634/jit.12.1.19394.
Повний текст джерелаSalwa Shakir Mahmood, Et al. "Enhancing Network Security Through Blockchain Technology: Challenges And Opportunities." International Journal on Recent and Innovation Trends in Computing and Communication 11, no. 10 (November 2, 2023): 1670–77. http://dx.doi.org/10.17762/ijritcc.v11i10.8729.
Повний текст джерелаRinta Ariani, Mahayu, Wahyu Widodo, and Toebagus Galang Windi Pratama. "Juridicial Review of Legal Protection Victims of Cyber Gender-Based Violence (Case Study of High Court Decision Number 150/PID/2020/PT BDG)." Widya Pranata Hukum : Jurnal Kajian dan Penelitian Hukum 5, no. 1 (March 3, 2023): 66–73. http://dx.doi.org/10.37631/widyapranata.v5i1.846.
Повний текст джерелаMishra, Pankaj, and Dev Ratna Singh. "Biometric Approach for Confidentiality in Cloud Computing." SAMRIDDHI : A Journal of Physical Sciences, Engineering and Technology 10, no. 01 (July 25, 2018): 65–70. http://dx.doi.org/10.18090/samriddhi.v10i01.9.
Повний текст джерела