Open Access

Cybersecurity in the Making – Policy and Law: a Case Study of Georgia


Cite

AMORETTI, Francesco. ICTs Policies: E-Democracy and E-Government for Political Development, 2007.10.1111/j.1541-1338.2007.00286.xSearch in Google Scholar

BEBBER, Robert “Jake”. Cyber power and cyber effectiveness: An analytic framework. Comparative Strategy, 2017, vol. 36, no. 5, pp. 426–436.10.1080/01495933.2017.1379833Search in Google Scholar

BOYD, Stephen, ---amp--- KEROMYTIS, Angelos, SQLrand: Preventing SQL injection attacks. In International Conference on Applied Cryptography and Network Security, 2004, pp. 292–302. Springer, Berlin, Heidelberg.10.1007/978-3-540-24852-1_21Search in Google Scholar

CARR, Madeline. Public–private partnerships in national cyber-security strategies. International Affairs, 2016, vol. 92, no. 1, pp. 43–62.10.1111/1468-2346.12504Search in Google Scholar

CHEE-WOOI, Ten. CHEN-CHING, Liu. GOVINDARSU, Manimaran. Vulnerability assessment of cybersecurity for SCADA systems. IEEE Transactions on Power Systems, 2008, vol. 23, no. 4, pp. 1836–1846.10.1109/TPWRS.2008.2002298Search in Google Scholar

CHOCHIA, Archil ---amp--- POPJANEVSKI, Johanna. Change of Power and Its Influence on Country’s Europeanization Process. Case Study: Georgia. In: KERIKMÄE, Tanel. CHOCHIA, A. (Eds.). Political and Legal Perspectives of the EU Eastern Partnership Policy, Cham: Springer, 2016, pp. 197–210.Search in Google Scholar

CHOCHIA, Archil ---amp--- KERIKMÄE, Tanel. Digital Single Market as an Element in EU-Georgian Cooperation. Baltic Journal of European Studies, 2018, vol. 8, no. 2, pp. 3–6.10.1515/bjes-2018-0012Search in Google Scholar

CHARAIA, Vakhtang, CHOCHIA, Archil, LASHKHI, Mariam. Caucasus 3 plus Baltic 3 and Economic Cooperation with China. Baltic Journal of European Studies, 2018, vol. 8, no. 2, pp. 44–64.10.1515/bjes-2018-0015Search in Google Scholar

DE BRUIJN, Hans ---amp--- JANSSEN, Marijn. Building cybersecurity awareness: The need for evidence-based framing strategies. Government Information Quarterly, 2017, vol. 34, no. 1, pp. 1–7.10.1016/j.giq.2017.02.007Search in Google Scholar

DADIANI, Natalia. Kindergarten web-portal failure. Online, Retrieved from: https://www.ambebi.ge/article/106265-sabavshvo-bagis-garet-darchenili-bavshvebida-gamcarebuli-mshoblebi-mougvarebeli-problemis-mizezebi-da-shedegebi/ Accessed: 12.11.2019.Search in Google Scholar

DUNN CAVELTY, Myriam. Europe’s cyber-power. European Politics and Society, 2018, vol. 19, no. 3, pp. 304–320.10.1080/23745118.2018.1430718Search in Google Scholar

E-Governance Academy. NCSI-National Cyber Security Index, 2018. Online; Available at: https://ega.ee/wp-content/uploads/2018/05/ncsi_digital_smaller.pdf; Accessed: 15.09.2019.Search in Google Scholar

European Union Agency for Cybersecurity (ENISA). National Cybersecurity Strategies Evaluation Tool. Available at: https://www.enisa.europa.eu/topics/national-cyber-security-strategies/national-cyber-security-strategies-guidelines-tools/national-cyber-security-strategies-evaluation-tool Accessed: 10.11.2019.Search in Google Scholar

HEEKS, Richard. Understanding e-governance for development. Manchester: Institute for Development Policy and Management, 2001.10.2139/ssrn.3540058Search in Google Scholar

International Telecommunication Union. Global Cybersecurity Index (GCI) 2017. Online; Available at: https://www.itu.int/dms_pub/itu-d/opb/str/D-STR-GCI.01-2017-PDF-E.pdf; Accessed: 15.09.2019.Search in Google Scholar

International Telecommunication Union. Global Cybersecurity Index (GCI) 2018. Online. Available at https://www.itu.int/dms_pub/itu-d/opb/str/D-STR-GCI.01-2018-PDF-E.pdf; Accessed: 15.09.2019.Search in Google Scholar

International Telecommunication Union. Definition of cybersecurity. Online; Available at: https://www.itu.int/en/ITU-T/studygroups/com17/Pages/cybersecurity.aspx; Accessed: 15.09.2019Search in Google Scholar

KERIKMÄE, Tanel ---amp--- RULL, Addi. The Future of Law and eTechnologies. Heidelberg: Springer-Verlag, 2016.10.1007/978-3-319-26896-5Search in Google Scholar

KERIKMÄE, Tanel, HOFFMANN, Thomas, CHOCHIA, Archil. Legal Technology for Law Firms: Determining Roadmaps for Innovation. Croatian International Relations Review, 2018, vol. 24, no. 81, pp. 91–112.10.2478/cirr-2018-0005Search in Google Scholar

LEPIK, Toomas ---amp--- TABATADZE, David. Estoniana ---amp--- Georgian Cyber Attacks. 21stAnnual FIRST Conference, Kyoto, June 28 – July 3, 2009. Online, Available at: https://www.first.org/resources/papers/conference2009/lepiktabatadze-sliders.pdf Accessed: 15.10.2019.Search in Google Scholar

LOMIDZE, Irakli. Cyber Attacks Against Georgia. Report for Georgian It Innovations; Online; Data exchange agency, 2011; Retrieved from: http://dea.gov.ge/uploads/GITI%202011/GITI2011_3.pdf; Accessed: 15.09.2019.Search in Google Scholar

LUIIJF, Eric, BESSELING, Kim, SPOELSTRA, Maartje, GRAAF, Patrick. Ten National Cyber Security Strategies: a Comparison: Critical Information Infrastructure Security, 2013.10.1007/978-3-642-41476-3_1Search in Google Scholar

MADON, Shirin. Evaluating the developmental impact of e-governance initiatives: An exploratory framework. The Electronic Journal of Information Systems in Developing Countries, 2004, vol. 20, no. 1, pp. 1–13.10.1002/j.1681-4835.2004.tb00132.xSearch in Google Scholar

Ministry of Defence of Georgia. Threat Assessment Document for 2010–2013. Retrieved from: https://mod.gov.ge/uploads/2018/pdf/TAD-ENG.pdf Accessed: 02.10.2019.Search in Google Scholar

Ministry of Defence of Georgia. Cyber Security Bureau. Retrieved from: https://mod.gov.ge/en/page/59/cyber-security-bureau Accessed: 02.10.2019.Search in Google Scholar

Ministry of Internal Affairs of Georgia. Actions carried out by the ministry of internal affairs of Georgia. Retrieved from: https://police.ge/en/projects/kiberdanashauli/shinagan-saqmeta-saministros-mier-gankhortsielebuli-ghonisdziebebi Accessed: 02.10.2019Search in Google Scholar

MIRKOVIC, Jelena. ---amp--- REIHER, Peter. A taxonomy of DDoS attack and DDoS defense mechanisms. ACM SIGCOMM Computer Communication Review, 2004, vol. 34, no. 2, pp. 39–53.10.1145/997150.997156Search in Google Scholar

North Atlantic Treaty Organization (NATO). Cyber defence. Online. Retrieved from: https://www.nato.int/cps/en/natohq/topics_78170.htm; Accessed: 20.10.2019Search in Google Scholar

PALVIA, Shailendra. ---amp--- SHARMA, Sushil. E-government and e-governance: definitions/domain framework and status around the world. In International Conference on E-governance, 2007, pp. 1–12.Search in Google Scholar

RIOS, Billy. Sun Tzu was a hacker: An examination of the tactics and operations from a real world cyber attack. In: CZOSSEC, Christian ---amp--- Geers, Kenneth (Eds.) The Virtual Battlefield: Perspectives on Cyber Warfare, 2009, vol. 3, pp. 143–155.Search in Google Scholar

SCHLAMP, Johann. HOLZE, Ralph. JACQUEMART, Quentin. HEAP: reliable assessment of BGP hijacking attacks. IEEE Journal on Selected Areas in Communications, 2016, vol. 34, no. 6, pp. 1849–1861.10.1109/JSAC.2016.2558978Search in Google Scholar

SVANADZE, Vladimer. Akhali gamotsveva saqartvelos internet sivrcistvis [ახალი გამოწვევა საქართველოს ინტერნეტ სივრცისთვის]. Internet Development Initiative – IDI, 2015. Retrieved from: http://indein.net/wp-content/uploads/2015/09/New-Challenges-for-Georgian-Cyber-Space.pdf; Accessed: 15.09.2019;Search in Google Scholar

TAMBUR, Silver. How Estonia became a global heavyweight in cyber security, 2017. Online. Available at: http://estonianworld.com/security/estonia-became-global-heavyweight-cyber-security/; Accessed: 16.09.2019;Search in Google Scholar

TOLBERT, Caroline J., and MOSSBERGER, Karen. The effects of e-government on trust and confidence in government. Public administration review, 2006, vol. 66, no. 3, pp. 354–369.10.1111/j.1540-6210.2006.00594.xSearch in Google Scholar

UN E-Government Survey 2010; Online. Available at: https://publicadministration.un.org/egovkb/en-us/Reports/UN-E-Government-Survey-2010; Accessed: 16.09.2019.Search in Google Scholar

UN E-Government Survey 2018. Online. Available at: https://publicadministration.un.org/egovkb/en-us/Reports/UN-E-Government-Survey-2018; Accessed: 16.09.2019.Search in Google Scholar

VALUCH, Jozef; GÁBRIŠ, Tomáš; HAMUĽÁK, Ondrej. Cyber attacks, information attacks, and postmodern warfare. Baltic Journal of Law ---amp--- Politics, 2017, vol. 10, no. 1, pp. 63–89.10.1515/bjlp-2017-0003Search in Google Scholar

VALUCH, Jozef; HAMUĽÁK, Ondrej. Abuse of cyberspace within the crisis in Ukraine.” The Lawyer Quarterly, 2018, vol. 8, no. 2, 94–107.Search in Google Scholar

ZINETS, Natalia. Ukraine hit by 6,500 hack attacks, sees Russian ‘cyberwar’, Reuters. Online, Retrieved from: https://www.reuters.com/article/us-ukraine-crisis-cyber/ukraine-hit-by-6500-hack-attacks-sees-russian-cyberwar-idUSKBN14I1QC Accessed: 17.10.2019.Search in Google Scholar

eISSN:
2464-6601
Language:
English