The Use of Governance to Identify Cyber Threats Through Social Media
暂无分享,去创建一个
[1] Bob Jessop,et al. Capitalism and its future: remarks on regulation, government and governance , 1997 .
[2] R. Rhodes,et al. The New Governance: Governing without Government , 1996 .
[3] V. Lal. Virtual Terrorism: How Modern Terrorists Use the Internet , 2008 .
[4] E. Loo. The Internet: Simulacrum of Democracy? , 2007 .
[5] S. Sassen. Globalization or denationalization? , 2003 .
[6] Jarret Brachman. Global Jihadism: Theory and Practice , 2008 .
[7] D. M. Kaplan. Readings in the Philosophy of Technology , 2003 .
[8] Geoffry L. Taubman. A Not-So World Wide Web: The Internet, China, and the Challenges to Nondemocratic Rule , 1998 .
[9] D. Osborne,et al. Reinventing government , 1993, Nature.
[10] D. Denning. Activism, Hacktivism, and Cyberterrorism: the Internet As a Tool for Influencing Foreign Policy , 2001 .
[11] Charles P. Pfleeger,et al. Security in computing , 1988 .
[12] R. Ramakrishna. Radical pathways : understanding Muslim radicalization in Indonesia , 2009 .
[13] S. Sassen,et al. Digital formations: Constructing an object of study , 2005 .
[14] Mark Bevir,et al. Key Concepts in Governance , 2008 .
[15] J. Kooiman,et al. Modern Governance: New Government-Society Interactions , 1993 .
[16] W. Walters. Some Critical Notes on “Governance” , 2004 .
[17] A. Schmid,et al. Violence as Communication: Insurgent Terrorism and the Western News Media , 1982 .
[18] Marc Sageman,et al. Leaderless Jihad , 2011 .
[19] The Internet and Governance in Asia: A Critical Reader , 2007 .