5,319
Views
29
CrossRef citations to date
0
Altmetric
Articles

Institutions for Cyber Security: International Responses and Global Imperatives

, &

Keep up to date with the latest research on this topic with citation updates for this article.

Read on this site (3)

Frank Smith & Graham Ingram. (2017) Organising cyber security in Australia and beyond. Australian Journal of International Affairs 71:6, pages 642-660.
Read now
Nadine Barrett-Maitland, Corlane Barclay & Kweku-Muata Osei-Bryson. (2016) Security in Social Networking Services: A Value-Focused Thinking Exploration in Understanding Users’ Privacy and Security Concerns. Information Technology for Development 22:3, pages 464-486.
Read now

Articles from other publishers (26)

Noman H. Chowdhury, Marc T.P. Adam & Timm Teubner. (2023) Rushing for security: a document analysis on the sources and effects of time pressure on organizational cybersecurity. Information & Computer Security 31:4, pages 504-526.
Crossref
João Marcos Barbosa Oliveira, Eduardo Stefani & Ivanir Costa. (2023) SILENT SKIRMISHES: CYBER WARFARE'S EROSION OF WESTPHALIAN PRINCIPLES IN THE PRELUDE TO THE 2022 RUSSIAN-UKRAINIAN WAR. Revista Contemporânea 3:9, pages 13420-13440.
Crossref
Mürsel Doğrul, Haydar Yalçın & Tugrul U. Daim. 2023. Cybersecurity. Cybersecurity 3 21 .
Andrey Makarychev & Elizabeth Wishnick. (2022) Anti-Pandemic Policies in Estonia and Taiwan: Digital Power, Sovereignty and Biopolitics. Social Sciences 11:3, pages 112.
Crossref
Justin K Haner & Robert K Knake. (2021) Breaking botnets: A quantitative analysis of individual, technical, isolationist, and multilateral approaches to cybersecurity. Journal of Cybersecurity 7:1.
Crossref
Balsing RajputBalsing Rajput. 2020. Cyber Economic Crime in India. Cyber Economic Crime in India 3 12 .
Michael Robinson, Kevin Jones, Helge Janicke & Leandros Maglaras. (2019) Developing cyber peacekeeping: Observation, monitoring and reporting. Government Information Quarterly 36:2, pages 276-293.
Crossref
Michael Losavio, Deborah Keeling, Jason Gainous, Jeff Sun, Matt Bergman, Jarrod Hinton, Kyra Fritz, Adrian Lauf, Jeff Hieb, Ghiyoung Im, Andrew Wright, John Reed & Adel Elmaghraby. (2019) STEM for Public Safety in Cyber: Training for Local Law Enforcement and Cyber Security. STEM for Public Safety in Cyber: Training for Local Law Enforcement and Cyber Security.
Mustafa Küçük Firat. 2019. Applying Methods of Scientific Inquiry Into Intelligence, Security, and Counterterrorism. Applying Methods of Scientific Inquiry Into Intelligence, Security, and Counterterrorism 203 239 .
Feren Calderwood & Iskra Popova. 2019. Emerging Technologies for Developing Countries. Emerging Technologies for Developing Countries 79 86 .
Otto Hellwig, Gerald Quirchmayr, Walter Hötzendorfer, Christof Tschohl, Edith Huber, Franz Vock, Florian Nentwich, Bettina Pospisil, Matthias Gusenbauer & Gregor Langner. (2018) A GDPR compliance module for supporting the exchange of information between CERTs. A GDPR compliance module for supporting the exchange of information between CERTs.
Sergei Boeke. (2017) National cyber crisis management: Different European approaches. Governance 31:3, pages 449-464.
Crossref
Yesem Peker, Lydia Ray & Stephanie da Silva. (2018) Online Cybersecurity Awareness Modules for College and High School Students. Online Cybersecurity Awareness Modules for College and High School Students.
Dirk Dohse & Cheng Yee Lim. (2017) “Bad Neighborhood” and Internet Adoption in Poor Countries: What is behind the Persistent Digital Gap?. Growth and Change 49:1, pages 241-262.
Crossref
Marek Górka. (2018) Cybersecurity as a challenge for modern state and society. Zeszyty Naukowe Uniwersytetu Szczecińskiego. Acta Politica 44, pages 29-39.
Crossref
Tarun Chaudhary, Jenna Jordan, Michael Salomone & Phil Baxter. (2018) Patchwork of confusion: the cybersecurity coordination problem. Journal of Cybersecurity 4:1.
Crossref
Brenden Kuerbis & Farzaneh Badiei. (2017) Mapping the cybersecurity institutional landscape. Digital Policy, Regulation and Governance 19:6, pages 466-492.
Crossref
Sangbae Kim. (2017) World Politics of International Norms in Cyber Security: Frame Competition for Transforming Global Order. National Strategy 23:3, pages 153-180.
Crossref
유호근 & Gyoosang Seol. (2017) Cyber Security System: Issues of Governance Formation and Korea. Journal of Korean Political and Diplomatic History 38:2, pages 237-270.
Crossref
Jukka Ruohonen, Sami Hyrynsalmi & Ville Leppänen. (2016) An outlook on the institutional evolution of the European Union cyber security apparatus. Government Information Quarterly 33:4, pages 746-756.
Crossref
Anja P. Jakobi & Jasmin Haunschild. (2015) Global Crime Governance: Perspektiven und Grenzen transnationaler KooperationGlobal Crime Governance: Perspectives and Limits of Transnational Cooperation. Zeitschrift für Außen- und Sicherheitspolitik 9:1, pages 1-11.
Crossref
Manmohan Chaturvedi, Aynur Unal, Preeti Aggarwal, Shilpa Bahl & Sapna Malik. (2014) International cooperation in cyber space to combat cyber crime and terrorism. International cooperation in cyber space to combat cyber crime and terrorism.
Cecilia Testart. (2016) Understanding the Institutional Landscape of Cyber Security. SSRN Electronic Journal.
Crossref
Nazli Choucri & Chrisma Jackson. (2016) Perspectives on Cybersecurity: A Collaborative Study. SSRN Electronic Journal.
Crossref
Ghita Mezzour, L. Richard Carley & Kathleen M. Carley. (2014) Global Mapping of Cyber Attacks. SSRN Electronic Journal.
Crossref
Samantha Bradshaw. (2015) Combating Cyber Threats: CSIRTs and Fostering International Cooperation on Cybersecurity. SSRN Electronic Journal.
Crossref

Reprints and Corporate Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

To request a reprint or corporate permissions for this article, please click on the relevant link below:

Academic Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

Obtain permissions instantly via Rightslink by clicking on the button below:

If you are unable to obtain permissions via Rightslink, please complete and submit this Permissions form. For more information, please visit our Permissions help page.