Volume 4
The Secret War of Cyber Influence Operations and How to Identify Them
Cyber, Intelligence, and Security | Volume 4 | No. 1 | March 2020
Iran’s Activity in Cyberspace: Identifying Patterns and Understanding the Strategy
Cyber, Intelligence, and Security | Volume 4 | No. 1 | March 2020
Ambiguous Approach— All Shades of Gray
Cyber, Intelligence, and Security | Volume 4 | No. 1 | March 2020
Cybersecurity and Information Security: Force Structure Modernizations in the Chinese People’s Liberation Army
Cyber, Intelligence, and Security | Volume 4 | No. 1 | March 2020
Chinese investments in Sri Lanka: Implications for Israel
Cyber, Intelligence, and Security | Volume 4 | No. 1 | March 2020
Criminal Law as a Tool for Dealing with Online Violence among Youth
Cyber, Intelligence, and Security | Volume 4 | No. 1 | March 2020
National Cybersecurity Strategies in the Healthcare Industry of Israel and the Netherlands: A Comparative Overview
Cyber, Intelligence, and Security | Volume 4 | No. 1 | March 2020
Cyber and Artificial Intelligence— Technological Trends and National Challenges
Cyber, Intelligence, and Security | Volume 4 | No. 1 | March 2020
Cyber Colonization: The Dangerous Fusion of Artificial Intelligence and Authoritarian Regimes
Cyber, Intelligence, and Security | Volume 4 | No. 1 | March 2020
Volume 3
European Countries Facing the Challenge of Foreign Influence on Democracy—Comparative Research
Cyber, Intelligence, and Security, Volume 3, No. 1, May 2019
The Threat of Foreign Interference in the 2019 Elections in Israel and Ways of Handling it
Cyber, Intelligence, and Security, Volume 3, No. 1, May 2019
The INF Treaty and New START: Escalation Control, Strategic Fatalism, and the Role of Cyber
Cyber, Intelligence, and Security, Volume 3, No. 1, May 2019
Iranian Cyber Capabilities: Assessing the Threat to Israeli Financial and Security Interests
Cyber, Intelligence, and Security, Volume 3, No. 1, May 2019
Outsourcing in Intelligence and Defense Agencies: A Risk of an Increase in the Proliferation of Cyber Weapons?
Cyber, Intelligence, and Security, Volume 3, No. 1, May 2019
The Academization of Intelligence: A Comparative Overview of Intelligence Studies in the West
Cyber, Intelligence, and Security, Volume 3, No. 1, May 2019
Forty-Five Years Since the Yom Kippur War: Intelligence and Risk Management in the Thirty Hours Preceding the War
Cyber, Intelligence, and Security, Volume 3, No. 1, May 2019
National Cyber Security in Israel
Cyber, Intelligence, and Security, Volume 3, No. 1, May 2019
The Space Arms Race: Global Trends and State Interests
Cyber, Intelligence, and Security, Volume 3, No. 2, October 2019
Sectoral Ability to Manage Cyber Risks in the Supply Chain
Cyber, Intelligence, and Security, Volume 3, No. 2, October 2019
Technology and Intelligence: Changing Trends in the IDF’s Intelligence Process in the Post-Information Revolution Period
Cyber, Intelligence, and Security, Volume 3, No. 2, October 2019
Cyber Influence Campaigns in the Dark Web
Cyber, Intelligence, and Security, Volume 3, No. 2, October 2019
Social Change Through Computerized Accessibility of Legal Rules
Cyber, Intelligence, and Security, Volume 3, No. 2, October 2019
The Use of Biometric Technologies—Normative and Legal Aspects
Cyber, Intelligence, and Security, Volume 3, No. 2, October 2019
Volume 2
When Less is More: Cognition and the Outcome of Cyber Coercion
Cyber, Intelligence, and Security, Volume 2, No. 1, May 2018
Developing Organizational Capabilities to Manage Cyber Crises
Cyber, Intelligence, and Security, Volume 2, No. 1, May 2018
Turkey—Challenges to the Struggle against Cyber Threats
Cyber, Intelligence, and Security, Volume 2, No. 1, May 2018
Germany’s Cyber Strategy—Government and Military Preparations for Facing Cyber Threats
Cyber, Intelligence, and Security, Volume 2, No. 1, May 2018
The Cybersphere Obligates and Facilitates a Revolution in Intelligence Affairs
Cyber, Intelligence, and Security, Volume 2, No. 1, May 2018
Developing a Doctrine for Cyberwarfare in the Conventional Campaign
Cyber, Intelligence, and Security, Volume 2, No. 1, May 2018
Cyber Intelligence: In Pursuit of a Better Understanding for an Emerging Practice
Cyber, Intelligence, and Security, Volume 2, No. 1, May 2018
The Cognitive Campaign: The Second Lebanon War as a Case Study
Cyber, Intelligence, and Security, Volume 2, No. 2, September 2018
Guidelines for the Management of Cyber Risks
Cyber, Intelligence, and Security, Volume 2, No. 2, September 2018
Securing Critical Supply Chains: Strategic Opportunities for the Cyber Product International Certification (CPICTm) Initiative
Cyber, Intelligence, and Security, Volume 2, No. 2, September 2018
Nuclear Crisis Management and Deterrence: Stalked by Cyberwar?
Cyber, Intelligence, and Security, Volume 2, No. 2, September 2018
Broad Economic Warfare in the Cyber Era
Cyber, Intelligence, and Security, Volume 2, No. 2, September 2018
How a Comparative View and Mutual Study of National Strategic Intelligence and Competitive Intelligence Can Benefit Each Other
Cyber, Intelligence, and Security, Volume 2, No. 2, September 2018
Identity Theft and Exposure to Harmful Content- Internet Risks for Teenagers
Cyber, Intelligence, and Security, Volume 2, No. 2, December 2018
Ubiquitous Presence: Protecting Privacy and Forbidding Intrusion into a Person’s Records in Jewish Law
Cyber, Intelligence, and Security, Volume 2, No. 2, December 2018
Cyberspace: The Next Arena for the Saudi-Iranian Conflict?
Cyber, Intelligence, and Security, Volume 2, No. 2, December 2018
Jihadi Johns: Virtual Democracy and Countering Violent Extremism Propaganda
Cyber, Intelligence, and Security, Volume 2, No. 2, December 2018
The European Union’s Foreign Policy Toolbox in International Cyber Diplomacy
Cyber, Intelligence, and Security, Volume 2, No. 2, December 2018
Global Changes in the Proliferation of Armed UAVs: Risks, Challenges, and Opportunities Facing Israel
Cyber, Intelligence, and Security, Volume 2, No. 2, December 2018
Operations in Cyberspace from the Perspective of International Law
Cyber, Intelligence, and Security, Volume 2, No. 2, December 2018
Cyberspace and the Israel Defense Forces
Cyber, Intelligence, and Security, Volume 2, No. 2, December 2018
Volume 1
The United States’ Cyber Warfare History: Implications on Modern Cyber Operational Structures and Policymaking
Cyber, Intelligence, and Security, Volume 1, No. 1, January 2017
Lessons Learned from the “Viral Caliphate”: Viral Effect as a New PSYOPS Tool?
Cyber, Intelligence, and Security, Volume 1, No. 1, January 2017
An Intelligence Civil War: “HUMINT’” vs. “TECHINT”
Cyber, Intelligence, and Security, Volume 1, No. 1, January 2017
Israeli Cyberspace Regulation: A Conceptual Framework, Inherent Challenges, and Normative Recommendations
Cyber, Intelligence, and Security, Volume 1, No. 1, January 2017
Artificial Intelligence in Cybersecurity
Cyber, Intelligence, and Security, Volume 1, No. 1, January 2017
Pedal to the Metal? The Race to Develop Secure Autonomous Cars
Cyber, Intelligence, and Security, Volume 1, No. 1, January 2017
Imposing and Evading Cyber Borders: The Sovereignty Dilemma
Cyber, Intelligence, and Security, Volume 1, No. 1, June 2017
Four Big “Ds” and a Little “r”: A New Model for Cyber Defense
Cyber, Intelligence, and Security, Volume 1, No. 1, June 2017
Proportional Response to Cyberattacks
Cyber, Intelligence, and Security, Volume 1, No. 1, June 2017
Human Terrain and Cultural Intelligence in the Test of American and Israeli Theaters of Confrontation
Cyber, Intelligence, and Security, Volume 1, No. 1, June 2017
A Cooperative Approach between Intelligence and Policymakers at the National Level: Does it Have a Chance?
Cyber, Intelligence, and Security, Volume 1, No. 1, June 2017
Comparative Assessment of Indian and Israeli Military Strategy in Countering Terrorism
Cyber, Intelligence, and Security, Volume 1, No. 1, June 2017
Framing the Cyberthreat through the Terror-Ballistics Analogy
Cyber, Intelligence, and Security, Volume 1, No. 1, June 2017
Cybersecurity and Economic Espionage: The Case of Chinese Investments in the Middle East
Cyber, Intelligence, and Security, Volume 1, No. 3, December 2017
The British Response to Threats in Cyberspace
Cyber, Intelligence, and Security, Volume 1, No. 3, December 2017
Campaign in Cyber or Cyber in the Campaign
Cyber, Intelligence, and Security, Volume 1, No. 3, December 2017
Cyber Threats to Democratic Processes
Cyber, Intelligence, and Security, Volume 1, No. 3, December 2017
“The Missing Effort:” Integrating the “Non-lethal” Dimension in the Israeli Military Lines of Operation
Cyber, Intelligence, and Security, Volume 1, No. 3, December 2017
Not Merely a Technological Advantage: The United States’ Organizational Change in Cyber Warfare
Cyber, Intelligence, and Security, Volume 1, No. 3, December 2017
The Vulnerable Architecture of Unmanned Aerial Systems: Mapping and Mitigating Cyberattack Threats
Cyber, Intelligence, and Security, Volume 1, No. 3, December 2017
Sorry, no posts match your search,
You can search for others ....