Skip to main content
IT for Security
Team
Researchers
Associates
Support Staff
PHD Students
Projects
Ongoing
Upcoming
Finalized
Courses
Defence policy
Security Studies
Cybersecurity
Administration
Management
Economics
Innovations
Themes
all courses
Resources
Publications
IT4Sec Reports
CSDM Views
Presentations
Books
Events
Partners
Contact
Biblio
Export 14 results:
RTF
EndNote XML
Filters:
Author
is
Myriam Dunn Cavelty
[Clear All Filters]
2015
Cavelty, Myriam Dunn
.
"
Die materiellen Ursachen des Cyberkriegs Cybersicherheitspolitik jenseits diskursiver Erklär ungen
."
Journal of self-regulation and regulation
01 (2015).
DOI
Google Scholar
RTF
EndNote XML
Cavelty, Myriam Dunn
.
"
Die materiellen Ursachen des Cyberkriegs Cybersicherheitspolitik jenseits diskursiver Erklärungen
."
Journal of self-regulation and regulation
01 (2015).
Google Scholar
RTF
EndNote XML
2013
Cavelty, Myriam Dunn
.
"
From Cyber-Bombs to Political Fallout: Threat Representations with an Impact in the Cyber-Security Discourse
."
International Studies Review
15 (2013): 105-122.
Google Scholar
RTF
EndNote XML
Cavelty, Myriam Dunn
, and
Tim Prior
.
"
Resilience in Security Policy: Present and Future
."
CSS Analysis in Security Policy
142 (2013): 142.
Google Scholar
RTF
EndNote XML
2012
Cavelty, Myriam Dunn
.
"
Cyber(Un)Sicherheit: Grundlagen, Trends und Herausforderungen
."
Polit Bild
(2012).
Google Scholar
RTF
EndNote XML
Hagmann, Jonas
, and
Myriam Dunn Cavelty
.
"
National risk registers: Security scientism and the propagation of permanent insecurity
."
Security Dialogue
43, no. 79 (2012).
Google Scholar
RTF
EndNote XML
2011
Brönnimann, Gabriel
,
Thomas Gartmann
,
Jennifer Giroux
,
Manuel Suter
, and
Myriam Dunn Cavelty
.
Using scenarios to assess risks examining trends in the public sector
., 2011.
Google Scholar
RTF
EndNote XML
2009
Eriksson, Johan
,
Giampiero Giacomello
,
Hamoud Salhi
,
Myriam Dunn Cavelty
,
J. P. Singh
, and
M. I. Franklin
.
"
Who Controls the Internet? Beyond the Obstinacy or Obsolescence of the State
."
International Studies Review
11, no. 1 (2009): 205-230 .
Google Scholar
RTF
EndNote XML
2008
Cavelty, Myriam Dunn
.
Critical Information Infrastructure Protection, Overview
. ETH Zurich, Switzerland.: Center for Security Studies (CSS), 2008.
Google Scholar
RTF
EndNote XML
Cavelty, Myriam Dunn
.
"
Like a Phoenix from the Ashes: The Reinvention of Critical Infrastructure Protection as Distributed Security
." In
Securing the homeland
. London: Routledge, 2008.
Google Scholar
RTF
EndNote XML
2007
Cavelty, Myriam Dunn
.
Critical information infrastructure: vulnerabilities, threats and responses
In
Disarmament Forum
., 2007.
Google Scholar
RTF
EndNote XML
Cavelty, Myriam Dunn
.
Cyber-security and threat politics: US efforts to secure the information age
. London: Routledge, 2007.
Google Scholar
RTF
EndNote XML
Cavelty, Myriam Dunn
.
"
Cyber-Terror– Looming Threat or Phantom Menace? The Framing of the US Cyber-Threat Debate
."
Journal of Information Technology & Politics
4, no. 1 (2007).
Google Scholar
RTF
EndNote XML
Cavelty, Myriam Dunn
, and
Elgin M. Brunner
.
"
Introduction: Information, Power, and Security – An Outline of Debates and Implications
." In
Power and Security in the Information Age
. London: Routledge, 2007.
Google Scholar
RTF
EndNote XML
English
Български
Search form
Search
Resources
Security policy
Cybersecurity
Intelligence
Law Enforcement
Terrorism
Operations
Technologies & Industry
Personnel management
Acquisition Management
Strategy
Concepts and doctrine
Management
Defence economics
Financial management
Information & knowledge management
Simulation and Training
Change management
Decision-making
Good governance