Skip to main content

CSDM Logo

Information Techologies for Security

JTSAC logo

  • IT for Security
  • Team
    • Researchers
    • Associates
    • Support Staff
    • PHD Students
  • Projects
    • Ongoing
    • Upcoming
    • Finalized
  • Courses
    • Defence policy
    • Security Studies
    • Cybersecurity
    • Administration
    • Management
    • Economics
    • Innovations
    • Themes
    • all courses
  • Resources
    • Publications
    • IT4Sec Reports
    • CSDM Views
    • Presentations
    • Books
  • Events
  • Partners
  • Contact

You are here

Home»Cybersecurity»Policy and strategy

Policy and strategy

Policy and strategy

Cybersecurity policy; Cybersecurity strategy

Cybersecurity Strategy’s Role in Raising Kenyan Awareness of Mobile Internet Threats

Okuku, Angela, Karen Renaud, and Brandon Valeriano. "Cybersecurity Strategy’s Role in Raising Kenyan Awareness of Mobile Internet Threats." Information & Security: An International Journal 32, no. 2 (2015): 155-174.
Kenyan Awareness of Mobile Internet Threats — Downloaded 8932 times
  • Read more about Cybersecurity Strategy’s Role in Raising Kenyan Awareness of Mobile Internet Threats
  • 21504 reads
  • Google Scholar
  • DOI
  • RTF
  • EndNote XML

Macedonian Path Towards Cybersecurity

Tasevski, Predrag. "Macedonian Path Towards Cybersecurity." Information & Security: An International Journal 32, no. 2 (2015): 109-119.
Macedonian Path Towards Cybersecurity — Downloaded 10557 times
  • Read more about Macedonian Path Towards Cybersecurity
  • 21237 reads
  • Google Scholar
  • DOI
  • RTF
  • EndNote XML

French Cyber Security and Defence: An Overview

Vitel, Philippe, and Henrik Bilddal. "French Cyber Security and Defence: An Overview." Information & Security: An International Journal 32, no. 1 (2015): 29-41.
French Cyber Security and Defence: An Overview — Downloaded 17811 times
  • Read more about French Cyber Security and Defence: An Overview
  • 18551 reads
  • Google Scholar
  • DOI
  • RTF
  • EndNote XML

Pages

  • « first
  • ‹ previous
  • 1
  • 2
  • 3
  • 4
  • English
  • Български
  • Facebook icon
  • Twitter icon
  • LinkedIn icon

Search form

Resources

  • Security policy
  • Cybersecurity
    • Policy and strategy
    • Organization
    • Cyber threats
    • Cyberwar & Cyberdefence
    • Standards & Technologies
    • Education & Training
    • Democratic oversight
  • Intelligence
  • Law Enforcement
  • Terrorism
  • Operations
  • Technologies & Industry
  • Personnel management
  • Acquisition Management
  • Strategy
  • Concepts and doctrine
  • Management
  • Defence economics
  • Financial management
  • Information & knowledge management
  • Simulation and Training
  • Change management
  • Decision-making
  • Good governance

Partner sites

Information & Security: An International JournalSecurity & Defence Mangement siteConnectins: The Quarterly Journal

IT4Sec News

Study on 2035 scenarios on defence resource allocation

read more >>

Contribution to the Inter-Parliamentary Conference on CFSP and CSDP

read more >>

Vol. 29 of I&S on Scenario-based Security Foresight is available online

read more >>

Crisis Management study tour to France

read more >>

Information Security Workshop, 26-28 Sep 2019

read more >>
view all

  

 Trade mark of IIKT bas-logo

© IT for Security Department, Institute of ICT, 2010 -