Skip to main content
Mobile menu invoker
Open menu
Infosec main menu
News
Aims and scope
Instructions for authors
Fees
Journal information
Ethics in Publishing
Editorial Board
Calls for Articles
Contributors
Peer-reviewed open-access journal
published since 1998 by
Procon Ltd
.
Volume
55
ISIJ 55: Open Source Intelligence, Artificial Intelligence, and Human-centered Approaches to Cybersecurity and Countering Disinformation
Information and security top menu
Browse list of volumes
Submit an article
Search
Social menu IS
Follow us on Twitter
Connect with us on LinkedIN
Like us on Facebook
Infosec subscribtion
Get content alerts
ISIJ 30: Good Governance of Intelligence and Security Services
25 views
Editorial
Editorial
30,
no. 1
1-10.
Reviewed articles
Peter Gill
Should the Intelligence Agencies ‘Show More Leg’ or Have They Just Been Stripped Naked?
30,
no. 1
(2013):
11-28.
Michel Rademaker
Governance on Intelligence: Issues that Play a Role
30,
no. 1
(2013):
29-33.
Todor Tagarev
Good Governance of Intelligence from a Management Perspective
30,
no. 1
(2013):
34-40.
Gustavo Sibilla
Intelligence for a safe city model
30,
no. 2
(2014):
101-120.
Moses Ikoh
Nigeria’s Information Security Challenges in the Light of Multi-Ethnicity
30,
no. 2
(2014):
121-138.
Joop van Reijn
Resource management in an Intelligence and Security Service: a Dutch example
30,
no. 1
(2013):
41-54.
Leonid Polyakov
On Integrity of Intelligence in Countries of Eastern Europe
30,
no. 1
(2013):
55-63.
Petr Zeman
Intelligence Services of the Czech Republic: Current Legal Status and Its Development
30,
no. 2
(2014):
67-84.
Gustavo Hernandez
Reforming Intelligence Services In Mexico
30,
no. 2
(2014):
85-99.
Field of application
Cybersecurity
Defence
Internal security
Intelligence
Terrorism
Operations
Critical Infrastructures
Emergency Management
Supply chains
Education & Training
Concepts and Implementation
Policy, strategy and doctrine
C2 and coordination
Hybrid Threats
Resilience
IT Governance
Process Improvement
Foresight
Risk Management
Innovation
Technologies
C4ISR
Architectures
Modelling and Simulation
OR & Systems Analysis
Cryptography
Data mining
Deep Learning & AI
Emerging Technologies
Link to top
Back to top