1 - 6 of 6 articles
The Internet provides the opportunity for jihadists to interact with each other. The purpose of the interactions is many fold. First, it provides jihadists with the emotional support and increases their resolve. Secondly it provides the justification for engaging in indiscriminate terror. Third,...
This analysis seeks to attain two primary objectives. The first is to illustrate how U.S.-based information policy has been shaped and affected following the 9/11 terrorist attacks on the United States. The second is to produce a valid, qualitative evaluation regarding policy effectiveness, the...
This review focuses on the criteria a lighting system should satisfy with regard to security and safety issues of outdoor spaces and then lists the technologies most appropriate to meet the needs of different cases.
This study investigates whether the intervention of 9/11 security practices has reduced larcenies at the Atlanta International Airport in the context of the rational choice perspective. Data was recovered from the Atlanta Police Department from January 2000 through September 2010, and the data...
Data security breaches involving personal and sensitive information have significantly grown over the last few years. The stolen personal information—which includes social security number (SSN), medical records, date of birth, etc.—has been used to launch fraud against individuals and...
Read and print from thousands of top scholarly journals.
Already have an account? Log in
Bookmark this article. You can see your Bookmarks on your DeepDyve Library.
To save an article, log in first, or sign up for a DeepDyve account if you don’t already have one.
Sign Up Log In
To subscribe to email alerts, please log in first, or sign up for a DeepDyve account if you don’t already have one.
To get new article updates from a journal on your personalized homepage, please log in first, or sign up for a DeepDyve account if you don’t already have one.