Skip to main content

CSDM Logo

Information Techologies for Security

JTSAC logo

  • IT for Security
  • Team
    • Researchers
    • Associates
    • Support Staff
    • PHD Students
  • Projects
    • Ongoing
    • Upcoming
    • Finalized
  • Courses
    • Defence policy
    • Security Studies
    • Cybersecurity
    • Administration
    • Management
    • Economics
    • Innovations
    • Themes
    • all courses
  • Resources
    • Publications
    • IT4Sec Reports
    • CSDM Views
    • Presentations
    • Books
  • Events
  • Partners
  • Contact

You are here

Home»Cybersecurity»Policy and strategy

Policy and strategy

Policy and strategy

Cybersecurity policy; Cybersecurity strategy

Cybersecurity Strategy’s Role in Raising Kenyan Awareness of Mobile Internet Threats

Okuku, Angela, Karen Renaud, and Brandon Valeriano. "Cybersecurity Strategy’s Role in Raising Kenyan Awareness of Mobile Internet Threats." Information & Security: An International Journal 32, no. 2 (2015): 155-174.
Kenyan Awareness of Mobile Internet Threats — Downloaded 9435 times
  • Read more about Cybersecurity Strategy’s Role in Raising Kenyan Awareness of Mobile Internet Threats
  • 22003 reads
  • Google Scholar
  • DOI
  • RTF
  • EndNote XML

Macedonian Path Towards Cybersecurity

Tasevski, Predrag. "Macedonian Path Towards Cybersecurity." Information & Security: An International Journal 32, no. 2 (2015): 109-119.
Macedonian Path Towards Cybersecurity — Downloaded 11087 times
  • Read more about Macedonian Path Towards Cybersecurity
  • 21910 reads
  • Google Scholar
  • DOI
  • RTF
  • EndNote XML

French Cyber Security and Defence: An Overview

Vitel, Philippe, and Henrik Bilddal. "French Cyber Security and Defence: An Overview." Information & Security: An International Journal 32, no. 1 (2015): 29-41.
French Cyber Security and Defence: An Overview — Downloaded 18554 times
  • Read more about French Cyber Security and Defence: An Overview
  • 19306 reads
  • Google Scholar
  • DOI
  • RTF
  • EndNote XML

Pages

  • « first
  • ‹ previous
  • 1
  • 2
  • 3
  • 4
  • English
  • Български
  • Facebook icon
  • Twitter icon
  • LinkedIn icon

Search form

Resources

  • Security policy
  • Cybersecurity
    • Policy and strategy
    • Organization
    • Cyber threats
    • Cyberwar & Cyberdefence
    • Standards & Technologies
    • Education & Training
    • Democratic oversight
  • Intelligence
  • Law Enforcement
  • Terrorism
  • Operations
  • Technologies & Industry
  • Personnel management
  • Acquisition Management
  • Strategy
  • Concepts and doctrine
  • Management
  • Defence economics
  • Financial management
  • Information & knowledge management
  • Simulation and Training
  • Change management
  • Decision-making
  • Good governance

Partner sites

Information & Security: An International JournalSecurity & Defence Mangement siteConnectins: The Quarterly Journal

IT4Sec News

Crisis Management study tour to France

read more >>

Information Security Workshop, 26-28 Sep 2019

read more >>

Interview on the expectations from the NATO summit in Wales

read more >>

Forum: Future Digital Society Resilience in the New Digital Age

read more >>

IT4Sec researcher defends her dissertation

read more >>
view all

  

 Trade mark of IIKT bas-logo

© IT for Security Department, Institute of ICT, 2010 -