:::

詳目顯示

回上一頁
題名:初探網路恐怖主義
書刊名:中央警察大學國境警察學報
作者:張維平
作者(外文):Chang, Wei-Ping
出版日期:2007
卷期:8
頁次:頁271-289
主題關鍵詞:恐怖主義網路恐怖主義資訊戰網路犯罪資訊安全TerrorismCyberterrorismInformation warfareCybercrimeInformation security
原始連結:連回原系統網址new window
相關次數:
  • 被引用次數被引用次數:期刊(0) 博士論文(0) 專書(0) 專書論文(0)
  • 排除自我引用排除自我引用:0
  • 共同引用共同引用:5
  • 點閱點閱:26
Other
1.(20020110)。駭客組織反美攻擊以臺灣當跳板。  延伸查詢new window
2.(20010926)。投票病毒藉911散佈。  延伸查詢new window
3.(20010501)。國內首宗駭客入侵網路銀行盜領存款百餘萬元。  延伸查詢new window
4.(20010703)。駭客入侵券商網路下單遭破解。  延伸查詢new window
5.(20000525)。電信飛客新的電腦犯罪方式。  延伸查詢new window
6.(20070705)。Reuters, First ever UK conviction for internet terrorism。  new window
期刊論文
1.彭慧鸞(20041100)。數位時代的國家安全與全球治理。問題與研究,43(6),29-52。new window  延伸查詢new window
2.Qin, J.、Zhou, Y.、Reid, E.、Lai, G.、Chen, H.(2007)。Analyzing Terror Campaigns on the Internet: Technical Sophistication, Content Richness, and Web Interactivity。International Journal of Human-Computer Studies,65,71-84。  new window
會議論文
1.Pollitt, Mark M.(1997)。A Cyberterrorism Fact or Fancy?。20th National Information Systems Security Conference。Kojetínská:Czech Space Research Center。285-289。  new window
2.Conway, Maura(2005)。Terrorist 'use' of the Internet and fighting back。Conference Cybersafety: Safety and Security in a Networked World: Balancing Cyber-Rights and Responsibilities。UK:Oxford University。  new window
3.Watts, David(2003)。Security & Vulnerability in Electric Power Systems。35th North American Power Symposium,(會議日期: 2003/10/20-10/21)。Missouri:University of Missouri-Rolla in Rolla。559-566。  new window
4.Collin, Barry C.(1996)。The Future of Cyber Terrorism: Where the Physical and Virtual Worlds Converge。11th Annual International Symposium on Criminal Justice Issues。The University of Illinois at Chicago。15-18。  new window
圖書
1.Reno, Janet(20000405)。Opening Remarks of Attorney General Janet Reno at the Cybercrime Summit。  new window
2.Information Analysis and Infrastructure Protection, Department of Homeland Security(20040915)。How Terrorists Might Exploit a Hurricane。Information Analysis and Infrastructure Protection, Department of Homeland Security。  new window
3.Erbschloe, Michael(2001)。Information Warfare: How to Survive Cyber Attacks。McGraw-Hill Company。  new window
其他
1.United Nations。Proposed Definitions of Terrorism,http://www.unodc.org/unodc/terrorismdefinitions.html。  new window
圖書論文
1.Eppright, Charles T.(1997)。Counterterrorism and Conventional Military Force: The Relationship Between Political Effect and Utility。Studies in Conflict and Terrorism。Taylor & Francis。  new window
2.O'Brien, Conor Cruise(1983)。Terrorism Under Democratic Conditions: The Case of the IRA。Terrorism, Legitimacy and Power: The Consequences of Political Violence。Manufactured:Wesleyan University。  new window
 
 
 
 
第一頁 上一頁 下一頁 最後一頁 top