Article
Licensed
Unlicensed
Requires Authentication
Transforming the UK Home Office into a Department for Homeland Security: Reflecting on an Interview with a Litigant Defending Against Online Retaliatory Feedback in the US
This article has been retracted.
Retraction note.
Published/Copyright:
November 12, 2014
Published Online: 2014-11-12
Published in Print: 2014-12-1
©2014 by De Gruyter
You are currently not able to access this content.
You are currently not able to access this content.
Articles in the same Issue
- Frontmatter
- Editorial
- Special Issue on Cybersecurity, Cybercrime, Cyberwar
- Articles
- A Criminological Perspective on Power Grid Cyber attacks: Using Routine Activities Theory to Rational Choice Perspective to Explore Adversarial Decision-Making
- From Weakest Link to Security Hero: Transforming Staff Security Behavior
- Transforming the UK Home Office into a Department for Homeland Security: Reflecting on an Interview with a Litigant Defending Against Online Retaliatory Feedback in the US
- Enhancing the Security of Cloud Manufacturing by Restricting Resource Access
- Evaluation of Efficiency of Transcoding Steganography
- Light Weight Tabletop Exercise for Cybersecurity Education
Articles in the same Issue
- Frontmatter
- Editorial
- Special Issue on Cybersecurity, Cybercrime, Cyberwar
- Articles
- A Criminological Perspective on Power Grid Cyber attacks: Using Routine Activities Theory to Rational Choice Perspective to Explore Adversarial Decision-Making
- From Weakest Link to Security Hero: Transforming Staff Security Behavior
- Transforming the UK Home Office into a Department for Homeland Security: Reflecting on an Interview with a Litigant Defending Against Online Retaliatory Feedback in the US
- Enhancing the Security of Cloud Manufacturing by Restricting Resource Access
- Evaluation of Efficiency of Transcoding Steganography
- Light Weight Tabletop Exercise for Cybersecurity Education