Search Results

1 - 10 of 91 items :

  • "cybersecurity" x
Clear All

References AMORETTI, Francesco. ICTs Policies: E-Democracy and E-Government for Political Development , 2007. BEBBER, Robert “Jake”. Cyber power and cyber effectiveness: An analytic framework. Comparative Strategy , 2017, vol. 36, no. 5, pp. 426–436. BOYD, Stephen, ---amp--- KEROMYTIS, Angelos, SQLrand: Preventing SQL injection attacks. In International Conference on Applied Cryptography and Network Security , 2004, pp. 292–302. Springer, Berlin, Heidelberg. CARR, Madeline. Public–private partnerships in national cyber-security strategies. International

enemy as animal: Symmetric dehumanization during asymmetric warfare. PloS one , Vol. 12, Issue 7 . Cheung, R. S., Cohen, J. P., Lo, H. Z., & Elia, F. (2011). Challenge based learning in cybersecurity education. In Proceedings of the International Conference on Security and Management (SAM) (p. 1). The Steering Committee of The World Congress in Computer Science, Computer Engineering and Applied Computing (WorldComp), Las Vegas Nevada, USA: CSREA Press. Cielen, D., Meysman, A., & Ali, M. (2016). Introducing data science: big data, machine learning, and more, using

References Babinski A. (2015): State Activities in the Securing of Cyberspace. Internal Security 7 (2): 217-236. Bossong, R - Wagner. B. (2017): A typology of cybersecurity and public‑private partnerships in the context of the EU. Crime, Law and Social Change 67 (3): 265-288. Cyber attack temporarily shuts Hungarian government website, „The Independent”, 2 April 2018, available at https://www.independent.ie/world‑news/europe/cyber‑attack‑temporarily‑shuts‑hungarian‑government‑website-34593756.html (20 April 2018). Czyz, A (2007): What is the Future of the

emerging arms race in cyberspace‘‘. Bulletin of the Atomic Scientists vol. 67, 1-8. Dunn Cavelty M., 2013. ’’From Cyber-Bomb to Political Fallout: Threat Representations with an Impact in the Cybersecurity Discourse’’. International Studies Review, 15(1), 105-122. Hansen L., Nissenbaum H., 2009. ‘‘Digital Disaster, Cyber Security, and the Copenhagen School‘‘. International Studies Quarterly no. 5 3: 1155-1175. Available at <https://www.nyu.edu/projects/nissenbaum/papers/digital%20disaster.pdf> [Accessed 23 January, 2016]. Harnett R. J., Stever J., 2009. ‘‘The

/09/23/us/tourism-hurricane-economy-caribbean-islands.html , accessed on: July 19, 2018. Case, D. U. (2016). Analysis of the cyber attack on the Ukrainian power grid . Electricity Information Sharing and Analysis Center (E-ISAC). Clark, F. (2015). Generalities of the cybersecurity regulation in the members States of COMTELCA , available at: https://www.itu.int/en/ITU-D/Regional-Presence/Americas/Documents/EVENTS/2015/0910-PA-IXP/6%20Viernes%20SIT%20Clark%20Generalidades%20Regulaci%C3%B3n%20Ciberseguridad.pdf Dawson, M. (2017). Hyper-connectivity: Intricacies of

innovation. Issues in Informing Science and Information Technology , 8 (unknown), 093-109. [8] Blair, T. (2017). Investigating the cybersecurity skills gap (Order No. 10623377). Available from ProQuest Dissertations &Theses Global. (1989786177). Retrieved from http://search.proquest.com.ezproxy.libproxy.db.erau.edu/docview/1989786177?accountid=27203 [9] Bureau, S. (2018). Human-centered cybersecurity: A new approach to securing networks. Research at RIT. Rochester Institute of Technology Research Report, Fall/Winter 2017-2018. [10]Burkhead, R. L. (2014). A

://ezproxy.nu.edu.kz/login?url=https://ezproxy.nu.edu.kz:2358/login.aspx?direct=true&db=bth&AN=114825419&site=eds-live&scope=site (last accessed 2 February 2019). Clark, David, Thomas Berson, and Herbert S. Lin. 2014. At the Nexus of Cybersecurity and Public Policy: Some Basic Concepts and Issues. Washington DC: The National Academies Press. Computer incident response service of the Republican state enterprise “State technical service” of the National Security Committee of the Republic of Kazakh-stan (KZ-CERT). Available at http://www.kz-cert.kz/ru/infographics (last accessed 22 October 2019). Decree of the President

1 Introduction Cybersecurity is the sum of the effort and steps taken to prevent the deliberate use of an information system in a way not intended by the system owners. It is very often considered by an enterprise as an investment that needs to be justified, i.e., it should yield the expected economic results. In general, it is difficult to assign value to information technology (IT), and a similar challenge concerns cybersecurity tools too. In this paper, we focus on treating cybersecurity knowledge as a subject with value of its own. This paper aims to propose

, IEEE, Tallinn. BREENE, Keith. Who are the cyberwar superpowers? World Economic Forum, 04.05.2016. Available https://www.weforum.org/agenda/2016/05/who-are-the-cyberwar-super-powers/ (accessed 13.09.2019) CARBERRY, Sean D. Why the private sector is key to cybersecurity ? FCW: The Business of Federal Technology , 01.03.2017. Available https://fcw.com/articles/2017/03/01/whythe-private-sector-is-key-to-cybersecurity.aspx (accessed 13.09.2019) CASEY, William. et al. Cyber Security via Signaling Games: Toward a Science of Cyber Security. In NATARAJAN, R

References [1] Anderson, A. (2011). Engaging resistance: How ordinary people successfully champion Change . Palo Alto, CA: Stanford University Press. [2] Artto, A. Karlos, & Dietrich, Perttu H. in Morris and pinto. (2014). Strategic business management through multiple projects. Hoboken, NJ: Wiley. [3] Boyd, A. (2018, March). It Takes More Than Tech Skills To Be a Strong Cyber Leader. NextGov. Retrieved from: https://www.nextgov.com/cybersecurity/2018/03/it-takes-more-tech-skills-be-strong-cyber-leader/146520/ [4] Burrell, D.N., Nobles, C. Aridi, A.S., (2018