Years after the 11th Sept 2001 have led in researchers to re-structure intelligence and counter terrorism in technology information to overcome problems and issues related to terrorism. This work provides an updated research of Information and Communication Technology (ICT) related to re-structuring of intelligence and counter-terrorism. For this purpose, the objectives of this work is to conduct a survey on the conceptual view of the researchers who developed tools for electronic information sharing employed in intelligence and counter terrorism and summary of their works in this emerging field. The work discusses the different visions and views of information sharing, critical infrastructure, tools and key resources discussed by the resea...
Abstract. Ever since the 9-11 incident, the multidisciplinary field of terrorism has experienced tre...
The Global War on Terror is in its sixth year now, and the battle with the Islamist terrorists is be...
In this paper we show how the terrorist organizations use the possibilities given by the Internet to...
Years after the 11th Sept 2001 have led in researchers to re-structure intelligence and counter terr...
This thesis examines the impact information technologies have had on the age-old phenomenon of terro...
Today, the socio-political and technological transformation of mankind is being challenged by a seri...
The weakness of information sharing has appeared clearly with the events of 11th of Sep 2001 that di...
The use of the Internet by terrorists has greatly contributed to international terrorism. The Intern...
The weakness of information sharing has appeared clearly with the events of 11th of Sep 2001 that ca...
Explores both counter-terrorism and enabling policy dimensions of emerging information technologies ...
The objective of the study is to identify the key factors of the stability of state information in t...
This book presents revised versions of a selection of papers delivered at the NATO Advanced Research...
The problem of international terrorism has become one of the serious problems hindering the sustaina...
The aim of the contribution is to determine whether existing international conventions and other ins...
The article focuses on the destructive phenomenon of cyberterrorism as an atypical manifestation (fo...
Abstract. Ever since the 9-11 incident, the multidisciplinary field of terrorism has experienced tre...
The Global War on Terror is in its sixth year now, and the battle with the Islamist terrorists is be...
In this paper we show how the terrorist organizations use the possibilities given by the Internet to...
Years after the 11th Sept 2001 have led in researchers to re-structure intelligence and counter terr...
This thesis examines the impact information technologies have had on the age-old phenomenon of terro...
Today, the socio-political and technological transformation of mankind is being challenged by a seri...
The weakness of information sharing has appeared clearly with the events of 11th of Sep 2001 that di...
The use of the Internet by terrorists has greatly contributed to international terrorism. The Intern...
The weakness of information sharing has appeared clearly with the events of 11th of Sep 2001 that ca...
Explores both counter-terrorism and enabling policy dimensions of emerging information technologies ...
The objective of the study is to identify the key factors of the stability of state information in t...
This book presents revised versions of a selection of papers delivered at the NATO Advanced Research...
The problem of international terrorism has become one of the serious problems hindering the sustaina...
The aim of the contribution is to determine whether existing international conventions and other ins...
The article focuses on the destructive phenomenon of cyberterrorism as an atypical manifestation (fo...
Abstract. Ever since the 9-11 incident, the multidisciplinary field of terrorism has experienced tre...
The Global War on Terror is in its sixth year now, and the battle with the Islamist terrorists is be...
In this paper we show how the terrorist organizations use the possibilities given by the Internet to...