Skip to main content

CSDM Logo

Information Techologies for Security

JTSAC logo

  • IT for Security
  • Team
    • Researchers
    • Associates
    • Support Staff
    • PHD Students
  • Projects
    • Ongoing
    • Upcoming
    • Finalized
  • Courses
    • Defence policy
    • Security Studies
    • Cybersecurity
    • Administration
    • Management
    • Economics
    • Innovations
    • Themes
    • all courses
  • Resources
    • Publications
    • IT4Sec Reports
    • CSDM Views
    • Presentations
    • Books
  • Events
  • Partners
  • Contact

You are here

Home»Cybersecurity»Policy and strategy

Policy and strategy

Policy and strategy

Cybersecurity policy; Cybersecurity strategy

Cybersecurity Strategy’s Role in Raising Kenyan Awareness of Mobile Internet Threats

Okuku, Angela, Karen Renaud, and Brandon Valeriano. "Cybersecurity Strategy’s Role in Raising Kenyan Awareness of Mobile Internet Threats." Information & Security: An International Journal 32, no. 2 (2015): 155-174.
Kenyan Awareness of Mobile Internet Threats — Downloaded 9181 times
  • Read more about Cybersecurity Strategy’s Role in Raising Kenyan Awareness of Mobile Internet Threats
  • 21817 reads
  • Google Scholar
  • DOI
  • RTF
  • EndNote XML

Macedonian Path Towards Cybersecurity

Tasevski, Predrag. "Macedonian Path Towards Cybersecurity." Information & Security: An International Journal 32, no. 2 (2015): 109-119.
Macedonian Path Towards Cybersecurity — Downloaded 10811 times
  • Read more about Macedonian Path Towards Cybersecurity
  • 21635 reads
  • Google Scholar
  • DOI
  • RTF
  • EndNote XML

French Cyber Security and Defence: An Overview

Vitel, Philippe, and Henrik Bilddal. "French Cyber Security and Defence: An Overview." Information & Security: An International Journal 32, no. 1 (2015): 29-41.
French Cyber Security and Defence: An Overview — Downloaded 18189 times
  • Read more about French Cyber Security and Defence: An Overview
  • 19001 reads
  • Google Scholar
  • DOI
  • RTF
  • EndNote XML

Pages

  • « first
  • ‹ previous
  • 1
  • 2
  • 3
  • 4
  • English
  • Български
  • Facebook icon
  • Twitter icon
  • LinkedIn icon

Search form

Resources

  • Security policy
  • Cybersecurity
    • Policy and strategy
    • Organization
    • Cyber threats
    • Cyberwar & Cyberdefence
    • Standards & Technologies
    • Education & Training
    • Democratic oversight
  • Intelligence
  • Law Enforcement
  • Terrorism
  • Operations
  • Technologies & Industry
  • Personnel management
  • Acquisition Management
  • Strategy
  • Concepts and doctrine
  • Management
  • Defence economics
  • Financial management
  • Information & knowledge management
  • Simulation and Training
  • Change management
  • Decision-making
  • Good governance

Partner sites

Information & Security: An International JournalSecurity & Defence Mangement siteConnectins: The Quarterly Journal

IT4Sec News

Interview on the expectations from the NATO summit in Wales

read more >>

Forum: Future Digital Society Resilience in the New Digital Age

read more >>

IT4Sec researcher defends her dissertation

read more >>

Speaking to the conference of commandants of the African Union

read more >>

The website of the DRIVER project is officially launched

read more >>
view all

  

 Trade mark of IIKT bas-logo

© IT for Security Department, Institute of ICT, 2010 -