Skip to main content
Mobile menu invoker
Open menu
Infosec main menu
News
Aims and scope
Instructions for authors
Fees
Journal information
Ethics in Publishing
Editorial Board
Calls for Articles
Contributors
Peer-reviewed open-access journal
published since 1998 by
Procon Ltd
.
Volume
55
ISIJ 55: Open Source Intelligence, Artificial Intelligence, and Human-centered Approaches to Cybersecurity and Countering Disinformation
Information and security top menu
Browse list of volumes
Submit an article
Search
Social menu IS
Follow us on Twitter
Connect with us on LinkedIN
Like us on Facebook
Infosec subscribtion
Get content alerts
ISIJ 32: Organizing for Cybersecurity: National Case Studies
36 views
Reviewed articles
Predrag Tasevski
Macedonian Path Towards Cybersecurity
32,
no. 2
(2015):
109-119.
Rovena Bahiti
,
Jona Josifi
Towards a More Resilient Cyberspace: The Case of Albania
32,
no. 2
(2015):
120-130.
Sabina Baraković
,
Jasmina Husić
“We Have Problems for Solutions”: The State of Cybersecurity in Bosnia and Herzegovina
32,
no. 2
(2015):
131-154.
Angela Okuku
,
Karen Renaud
,
Brandon Valeriano
Cybersecurity Strategy’s Role in Raising Kenyan Awareness of Mobile Internet Threats
32,
no. 2
(2015):
155-174.
Philippe Vitel
,
Henrik Bilddal
French Cyber Security and Defence: An Overview
32,
no. 1
(2015):
29-41.
Ata Atalay
,
Gurur Sanci
Cyberterrorism and Turkey’s Counter-Cyberterrorism Efforts
32,
no. 1
(2015):
42-64.
Sean Costigan
,
Todor Tagarev
Good Practices and Challenges in Organizing for Cybersecurity
32,
no. 1
(2015):
5-8.
Michel Rademaker
,
Marc Gauw
Trusted Networks Initiative: The Netherlands’ Response to DDoS Attacks
32,
no. 1
(2015):
65-70.
Oleksandr Potii
,
Oleksandr Korneyko
,
Yrii Gorbenko
Cybersecurity in Ukraine: Problems and Perspectives
32,
no. 1
(2015):
71-94.
Sarah Backman
Organising National Cybersecurity Centres
32,
no. 1
(2015):
9-26.
Natalia Spinu
Creating and Strengthening Cybersecurity in the Republic of Moldova
32,
no. 2
(2015):
97-108.
Field of application
Cybersecurity
Defence
Internal security
Intelligence
Terrorism
Operations
Critical Infrastructures
Emergency Management
Supply chains
Education & Training
Concepts and Implementation
Policy, strategy and doctrine
C2 and coordination
Hybrid Threats
Resilience
IT Governance
Process Improvement
Foresight
Risk Management
Innovation
Technologies
C4ISR
Architectures
Modelling and Simulation
OR & Systems Analysis
Cryptography
Data mining
Deep Learning & AI
Emerging Technologies
Link to top
Back to top