Expanding emerging and technology-based threats from adversaries and using cyberspace to conduct various operations towards land and specially armed forces can cause a strategic surprise if do not consider it well. Also, due to the existence of valuable information in IRI Army networks and the possibility of accessing, sabotaging, disclosing and stealing this information, the need for cybersecurity to deal with such activities has become increasingly clear.The purpose of this research is to "identify I.R.I Army general staff cybersecurity effective factors". The method of collecting information was field and library and their collection was through interviews, questionnaires, documents and internet sites. For the interview, elites and exper...
Includes supplementary materialFor the first time since the creation of the Special Forces branch in...
The federal government is devoted to an open, safe, free, and dependable cyberspace that empowers in...
The emergence of cyber threats has outstripped the cyber defense firm's budgetary capital and human ...
The United States relies on networked computing for all manner of economic, social, and civic activi...
The increase in the number of cases of failure of information and telecommunication networks due to ...
The increase in the number of cases of failure of information and telecommunication networks due to ...
The purpose of this study was to identify the team behaviors that cybersecurity professionals should...
Yeoh, W., Wang, S., Popovič, A., & Chowdhury, N. H. (2022). A Systematic Synthesis of Critical Succe...
Cybersecurity have drawn special attention of organizations in the 21st century because of the preva...
Historical assessments of combat fratricide reveal principal contributing factors in the effects of ...
Information systems have been used in all parts of our world and with the help of information system...
This paper will examine why its become important for organizations to develop an comprehensive Infor...
The rapid development in internet services led to a significant increase in cyberattacks. The need t...
How have military cyber operations, a diverse set of activities that often differ little from civili...
The changed role of the military in contemporary conflicts and new tendencies in Rade V. Slavković a...
Includes supplementary materialFor the first time since the creation of the Special Forces branch in...
The federal government is devoted to an open, safe, free, and dependable cyberspace that empowers in...
The emergence of cyber threats has outstripped the cyber defense firm's budgetary capital and human ...
The United States relies on networked computing for all manner of economic, social, and civic activi...
The increase in the number of cases of failure of information and telecommunication networks due to ...
The increase in the number of cases of failure of information and telecommunication networks due to ...
The purpose of this study was to identify the team behaviors that cybersecurity professionals should...
Yeoh, W., Wang, S., Popovič, A., & Chowdhury, N. H. (2022). A Systematic Synthesis of Critical Succe...
Cybersecurity have drawn special attention of organizations in the 21st century because of the preva...
Historical assessments of combat fratricide reveal principal contributing factors in the effects of ...
Information systems have been used in all parts of our world and with the help of information system...
This paper will examine why its become important for organizations to develop an comprehensive Infor...
The rapid development in internet services led to a significant increase in cyberattacks. The need t...
How have military cyber operations, a diverse set of activities that often differ little from civili...
The changed role of the military in contemporary conflicts and new tendencies in Rade V. Slavković a...
Includes supplementary materialFor the first time since the creation of the Special Forces branch in...
The federal government is devoted to an open, safe, free, and dependable cyberspace that empowers in...
The emergence of cyber threats has outstripped the cyber defense firm's budgetary capital and human ...