Constructing the Cyberterrorist最新文献

筛选
英文 中文
The discursive construction of the threat of cyberterrorism to the UK 网络恐怖主义对英国威胁的话语建构
Constructing the Cyberterrorist Pub Date : 2019-11-05 DOI: 10.4324/9780429274480-3
G. Mott
{"title":"The discursive construction of the threat of cyberterrorism to the UK","authors":"G. Mott","doi":"10.4324/9780429274480-3","DOIUrl":"https://doi.org/10.4324/9780429274480-3","url":null,"abstract":"","PeriodicalId":147944,"journal":{"name":"Constructing the Cyberterrorist","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-11-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114100807","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Locating the cyberterrorist 定位网络恐怖分子
Constructing the Cyberterrorist Pub Date : 2019-11-05 DOI: 10.4324/9780429274480-5
G. Mott
{"title":"Locating the cyberterrorist","authors":"G. Mott","doi":"10.4324/9780429274480-5","DOIUrl":"https://doi.org/10.4324/9780429274480-5","url":null,"abstract":"","PeriodicalId":147944,"journal":{"name":"Constructing the Cyberterrorist","volume":"95 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-11-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126269238","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Running out of time 没时间了
Constructing the Cyberterrorist Pub Date : 2019-11-05 DOI: 10.4324/9780429274480-4
Gareth Mott
{"title":"Running out of time","authors":"Gareth Mott","doi":"10.4324/9780429274480-4","DOIUrl":"https://doi.org/10.4324/9780429274480-4","url":null,"abstract":"","PeriodicalId":147944,"journal":{"name":"Constructing the Cyberterrorist","volume":"92 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-11-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116044177","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Interpreting the construction of hypothetical threatening actors in cyberspace 解读网络空间假想威胁行为体的构建
Constructing the Cyberterrorist Pub Date : 2019-11-05 DOI: 10.4324/9780429274480-2
G. Mott
{"title":"Interpreting the construction of hypothetical threatening actors in cyberspace","authors":"G. Mott","doi":"10.4324/9780429274480-2","DOIUrl":"https://doi.org/10.4324/9780429274480-2","url":null,"abstract":"","PeriodicalId":147944,"journal":{"name":"Constructing the Cyberterrorist","volume":"37 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-11-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123860613","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Narrating the cyberterrorist 讲述网络恐怖分子的故事
Constructing the Cyberterrorist Pub Date : 2019-11-05 DOI: 10.4324/9780429274480-6
G. Mott
{"title":"Narrating the cyberterrorist","authors":"G. Mott","doi":"10.4324/9780429274480-6","DOIUrl":"https://doi.org/10.4324/9780429274480-6","url":null,"abstract":"","PeriodicalId":147944,"journal":{"name":"Constructing the Cyberterrorist","volume":"142 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-11-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123410968","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Conclusion 结论
Constructing the Cyberterrorist Pub Date : 2019-11-05 DOI: 10.4324/9780429274480-7
G. Mott
{"title":"Conclusion","authors":"G. Mott","doi":"10.4324/9780429274480-7","DOIUrl":"https://doi.org/10.4324/9780429274480-7","url":null,"abstract":"","PeriodicalId":147944,"journal":{"name":"Constructing the Cyberterrorist","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-11-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129131391","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信