You are required to read and agree to the below before accessing a full-text version of an article in the IDE article repository.
The full-text document you are about to access is subject to national and international copyright laws. In most cases (but not necessarily all) the consequence is that personal use is allowed given that the copyright owner is duly acknowledged and respected. All other use (typically) require an explicit permission (often in writing) by the copyright owner.
For the reports in this repository we specifically note that
By accepting I agree to acknowledge and respect the rights of the copyright owner of the document I am about to access.
If you are in doubt, feel free to contact firstname.lastname@example.org
Many study programs at universities nowadays are interdisciplinary in their very nature. Still, there are different "levels" of interdisciplinarity. Setting up and running interdisciplinary study programs should start from a clear understanding of these different levels. The talk explains important details about these different levels using two interdisciplinary study programs running at the University of Belgrade, Serbia. It also walks through the concept of interdisciplinarity in the area of cyber terrorism and cyber warfare, touching also upon practical issues of cyber security in general and using examples to illustrate these issues. The introductory part of the talk will present the University of Belgrade from the perspective of interdisciplinary study programs and ongoing research.