Skip to main content
IT for Security
Team
Researchers
Associates
Support Staff
PHD Students
Projects
Ongoing
Upcoming
Finalized
Courses
Defence policy
Security Studies
Cybersecurity
Administration
Management
Economics
Innovations
Themes
all courses
Resources
Publications
IT4Sec Reports
CSDM Views
Presentations
Books
Events
Partners
Contact
You are here
Home
»
Cybersecurity
»
Policy and strategy
Policy and strategy
Policy and strategy
Cybersecurity policy; Cybersecurity strategy
Conceptualizing the Role of Societal Resilience in Countering Hybrid Warfare
Yanakiev, Yantsislav
,
Petko Dimov
, and
Daniel Bachvarov
.
"
Conceptualizing the Role of Societal Resilience in Countering Hybrid Warfare
."
Information & Security: An International Journal
39, no. 1 (2018): 77-89.
3907_yanakiev_dimov_bachvarov_role_of_societal_resilience_hw.pdf
— Downloaded 4589 times
Read more
about Conceptualizing the Role of Societal Resilience in Countering Hybrid Warfare
14627 reads
Google Scholar
DOI
RTF
EndNote XML
The Persistent Need to Reform Cyber Security Services: A Case Study on France
Zenati, Houssam
.
"
The Persistent Need to Reform Cyber Security Services: A Case Study on France
."
Information & Security: An International Journal
37 (2017): 57-67.
3705_cybersecurity_france.pdf
— Downloaded 638 times
Read more
about The Persistent Need to Reform Cyber Security Services: A Case Study on France
11164 reads
Google Scholar
DOI
RTF
EndNote XML
Cybersecurity: A Generic Reference Curriculum
Costigan, Sean S.
,
Michael A. Hennessy
,
Scott Knight
,
Dinos Kerigan-Kyrou
,
Philip Lark
,
Chris Pallaris
,
Daniel Peder Bagge
,
Gigi Roman
,
Natalia Spinu
,
Todor Tagarev
et al.
Cybersecurity: A Generic Reference Curriculum
. Kingston, ON: National Defence, 2016.
Read more
about Cybersecurity: A Generic Reference Curriculum
13784 reads
Google Scholar
RTF
EndNote XML
Cybersecurity Innovation in NATO: Lessons Learned and Recommendations
Wrona, Konrad
,
Tamsin Moye
,
Philippe Lagadec
,
Michael Street
,
Peter Lenk
, and
Frederic Jordan
.
"
Cybersecurity Innovation in NATO: Lessons Learned and Recommendations
."
Information & Security: An International Journal
36 (2017).
Cybersecurity Innovation in NATO
— Downloaded 6175 times
Read more
about Cybersecurity Innovation in NATO: Lessons Learned and Recommendations
14732 reads
Google Scholar
RTF
EndNote XML
Cyber Operations and Gray Zones: Challenges for NATO
Fitton, Oliver
.
"
Cyber Operations and Gray Zones: Challenges for NATO
."
Connections: The Quarterly Journal
15, no. 2 (2016): 109-119.
Fitton, Cyber Gray Zones
— Downloaded 7599 times
Read more
about Cyber Operations and Gray Zones: Challenges for NATO
27784 reads
Google Scholar
DOI
RTF
EndNote XML
The Obama Administration and Incident Response: A Report
Collier, Raymond
.
"
The Obama Administration and Incident Response: A Report
."
Information & Security: An International Journal
34, no. 2 (2016): 105-120.
3408_collier_us_incident_response.pdf
— Downloaded 3114 times
Read more
about The Obama Administration and Incident Response: A Report
14408 reads
Google Scholar
DOI
RTF
EndNote XML
Security Sector Reform Wisdom for Cyber Security Institution Building: The Case of Serbia
Sekuloski, Milan
.
"
Security Sector Reform Wisdom for Cyber Security Institution Building: The Case of Serbia
."
Information & Security: An International Journal
34, no. 1 (2016): 69-90.
3406_sekuloski_sybersecurity_institution_building.pdf
— Downloaded 3106 times
Read more
about Security Sector Reform Wisdom for Cyber Security Institution Building: The Case of Serbia
9534 reads
Google Scholar
DOI
RTF
EndNote XML
Multi-stakeholder Approach to Cybersecurity and Resilience
Tagarev, Todor
, and
George Sharkov
.
"
Multi-stakeholder Approach to Cybersecurity and Resilience
."
Information & Security: An International Journal
34, no. 1 (2016): 59-68.
3405_multi-stakeholder_cybersecurity.pdf
— Downloaded 751 times
Read more
about Multi-stakeholder Approach to Cybersecurity and Resilience
12355 reads
Google Scholar
DOI
RTF
EndNote XML
A Method for the Development of Cyber Security Strategies
Klaic, Aleksandar
.
"
A Method for the Development of Cyber Security Strategies
."
Information & Security: An International Journal
34, no. 1 (2016): 37-55.
3403_Klaic_Method_Development_of_Cyber_Strategies
— Downloaded 3186 times
Read more
about A Method for the Development of Cyber Security Strategies
15610 reads
Google Scholar
DOI
RTF
EndNote XML
Cybersecurity Strategy’s Role in Raising Kenyan Awareness of Mobile Internet Threats
Okuku, Angela
,
Karen Renaud
, and
Brandon Valeriano
.
"
Cybersecurity Strategy’s Role in Raising Kenyan Awareness of Mobile Internet Threats
."
Information & Security: An International Journal
32, no. 2 (2015): 155-174.
Kenyan Awareness of Mobile Internet Threats
— Downloaded 7928 times
Read more
about Cybersecurity Strategy’s Role in Raising Kenyan Awareness of Mobile Internet Threats
19303 reads
Google Scholar
DOI
RTF
EndNote XML
Pages
« first
‹ previous
1
2
3
4
next ›
last »
English
Български
Search form
Search
Resources
Security policy
Cybersecurity
Policy and strategy
Organization
Cyber threats
Cyberwar & Cyberdefence
Standards & Technologies
Education & Training
Democratic oversight
Intelligence
Law Enforcement
Terrorism
Operations
Technologies & Industry
Personnel management
Acquisition Management
Strategy
Concepts and doctrine
Management
Defence economics
Financial management
Information & knowledge management
Simulation and Training
Change management
Decision-making
Good governance