Skip to main content
IT for Security
Team
Researchers
Associates
Support Staff
PHD Students
Projects
Ongoing
Upcoming
Finalized
Courses
Defence policy
Security Studies
Cybersecurity
Administration
Management
Economics
Innovations
Themes
all courses
Resources
Publications
IT4Sec Reports
CSDM Views
Presentations
Books
Events
Partners
Contact
You are here
Home
»
Cybersecurity
»
Organization
Organization
Organization
Organization; Cybersecurity responsibilities, interagency cooperation, coordination
The Persistent Need to Reform Cyber Security Services: A Case Study on France
Zenati, Houssam
.
"
The Persistent Need to Reform Cyber Security Services: A Case Study on France
."
Information & Security: An International Journal
37 (2017): 57-67.
3705_cybersecurity_france.pdf
— Downloaded 1083 times
Read more
about The Persistent Need to Reform Cyber Security Services: A Case Study on France
12054 reads
Google Scholar
DOI
RTF
EndNote XML
Cyber Security and Resilience of Modern Societies: A Research Management Architecture
Tagarev, Todor
,
George Sharkov
, and
Nikolai Stoianov
.
"
Cyber Security and Resilience of Modern Societies: A Research Management Architecture
."
Information & Security: An International Journal
38 (2017): 93-108.
3807_Cybersecurity Research Management Architecture
— Downloaded 6661 times
Read more
about Cyber Security and Resilience of Modern Societies: A Research Management Architecture
16175 reads
Google Scholar
DOI
RTF
EndNote XML
Cybersecurity: A Generic Reference Curriculum
Costigan, Sean S.
,
Michael A. Hennessy
,
Scott Knight
,
Dinos Kerigan-Kyrou
,
Philip Lark
,
Chris Pallaris
,
Daniel Peder Bagge
,
Gigi Roman
,
Natalia Spinu
,
Todor Tagarev
et al.
Cybersecurity: A Generic Reference Curriculum
. Kingston, ON: National Defence, 2016.
Read more
about Cybersecurity: A Generic Reference Curriculum
15008 reads
Google Scholar
RTF
EndNote XML
Cybersecurity Innovation in NATO: Lessons Learned and Recommendations
Wrona, Konrad
,
Tamsin Moye
,
Philippe Lagadec
,
Michael Street
,
Peter Lenk
, and
Frederic Jordan
.
"
Cybersecurity Innovation in NATO: Lessons Learned and Recommendations
."
Information & Security: An International Journal
36 (2017).
Cybersecurity Innovation in NATO
— Downloaded 6777 times
Read more
about Cybersecurity Innovation in NATO: Lessons Learned and Recommendations
15796 reads
Google Scholar
RTF
EndNote XML
The Obama Administration and Incident Response: A Report
Collier, Raymond
.
"
The Obama Administration and Incident Response: A Report
."
Information & Security: An International Journal
34, no. 2 (2016): 105-120.
3408_collier_us_incident_response.pdf
— Downloaded 3634 times
Read more
about The Obama Administration and Incident Response: A Report
15542 reads
Google Scholar
DOI
RTF
EndNote XML
Multi-stakeholder Approach to Cybersecurity and Resilience
Tagarev, Todor
, and
George Sharkov
.
"
Multi-stakeholder Approach to Cybersecurity and Resilience
."
Information & Security: An International Journal
34, no. 1 (2016): 59-68.
3405_multi-stakeholder_cybersecurity.pdf
— Downloaded 1857 times
Read more
about Multi-stakeholder Approach to Cybersecurity and Resilience
13525 reads
Google Scholar
DOI
RTF
EndNote XML
“We Have Problems for Solutions”: The State of Cybersecurity in Bosnia and Herzegovina
Baraković, Sabina
, and
Jasmina Baraković Husić
.
"
“We Have Problems for Solutions”: The State of Cybersecurity in Bosnia and Herzegovina
."
Information & Security: An International Journal
32, no. 2 (2015): 131-154.
The State of Cybersecurity in Bosnia and Herzegvina
— Downloaded 9597 times
Read more
about “We Have Problems for Solutions”: The State of Cybersecurity in Bosnia and Herzegovina
18659 reads
Google Scholar
DOI
RTF
EndNote XML
Towards a More Resilient Cyberspace: The Case of Albania
Bahiti, Rovena
, and
Jona Josifi
.
"
Towards a More Resilient Cyberspace: The Case of Albania
."
Information & Security: An International Journal
32, no. 2 (2015): 120-130.
Towards a More Resilient Cyberspace - The Case of Albania
— Downloaded 7742 times
Read more
about Towards a More Resilient Cyberspace: The Case of Albania
11929 reads
Google Scholar
DOI
RTF
EndNote XML
Macedonian Path Towards Cybersecurity
Tasevski, Predrag
.
"
Macedonian Path Towards Cybersecurity
."
Information & Security: An International Journal
32, no. 2 (2015): 109-119.
Macedonian Path Towards Cybersecurity
— Downloaded 10023 times
Read more
about Macedonian Path Towards Cybersecurity
20311 reads
Google Scholar
DOI
RTF
EndNote XML
Creating and Strengthening Cybersecurity in the Republic of Moldova
Spinu, Natalia
.
"
Creating and Strengthening Cybersecurity in the Republic of Moldova
."
Information & Security: An International Journal
32, no. 2 (2015): 97-108.
Creating and Strengthening Cybersecurity in the Republic of Moldova
— Downloaded 7806 times
Read more
about Creating and Strengthening Cybersecurity in the Republic of Moldova
15015 reads
Google Scholar
DOI
RTF
EndNote XML
Pages
« first
‹ previous
1
2
3
4
5
next ›
last »
English
Български
Search form
Search
Resources
Security policy
Cybersecurity
Policy and strategy
Organization
Cyber threats
Cyberwar & Cyberdefence
Standards & Technologies
Education & Training
Democratic oversight
Intelligence
Law Enforcement
Terrorism
Operations
Technologies & Industry
Personnel management
Acquisition Management
Strategy
Concepts and doctrine
Management
Defence economics
Financial management
Information & knowledge management
Simulation and Training
Change management
Decision-making
Good governance