Skip to main content

CSDM Logo

Information Techologies for Security

JTSAC logo

  • IT for Security
  • Team
    • Researchers
    • Associates
    • Support Staff
    • PHD Students
  • Projects
    • Ongoing
    • Upcoming
    • Finalized
  • Courses
    • Defence policy
    • Security Studies
    • Cybersecurity
    • Administration
    • Management
    • Economics
    • Innovations
    • Themes
    • all courses
  • Resources
    • Publications
    • IT4Sec Reports
    • CSDM Views
    • Presentations
    • Books
  • Events
  • Partners
  • Contact

You are here

Home»Cybersecurity»Policy and strategy

Policy and strategy

Policy and strategy

Cybersecurity policy; Cybersecurity strategy

Cybersecurity Strategy’s Role in Raising Kenyan Awareness of Mobile Internet Threats

Okuku, Angela, Karen Renaud, and Brandon Valeriano. "Cybersecurity Strategy’s Role in Raising Kenyan Awareness of Mobile Internet Threats." Information & Security: An International Journal 32, no. 2 (2015): 155-174.
Kenyan Awareness of Mobile Internet Threats — Downloaded 9552 times
  • Read more about Cybersecurity Strategy’s Role in Raising Kenyan Awareness of Mobile Internet Threats
  • 22085 reads
  • Google Scholar
  • DOI
  • RTF
  • EndNote XML

Macedonian Path Towards Cybersecurity

Tasevski, Predrag. "Macedonian Path Towards Cybersecurity." Information & Security: An International Journal 32, no. 2 (2015): 109-119.
Macedonian Path Towards Cybersecurity — Downloaded 11187 times
  • Read more about Macedonian Path Towards Cybersecurity
  • 22094 reads
  • Google Scholar
  • DOI
  • RTF
  • EndNote XML

French Cyber Security and Defence: An Overview

Vitel, Philippe, and Henrik Bilddal. "French Cyber Security and Defence: An Overview." Information & Security: An International Journal 32, no. 1 (2015): 29-41.
French Cyber Security and Defence: An Overview — Downloaded 18719 times
  • Read more about French Cyber Security and Defence: An Overview
  • 19452 reads
  • Google Scholar
  • DOI
  • RTF
  • EndNote XML

Pages

  • « first
  • ‹ previous
  • 1
  • 2
  • 3
  • 4
  • English
  • Български
  • Facebook icon
  • Twitter icon
  • LinkedIn icon

Search form

Resources

  • Security policy
  • Cybersecurity
    • Policy and strategy
    • Organization
    • Cyber threats
    • Cyberwar & Cyberdefence
    • Standards & Technologies
    • Education & Training
    • Democratic oversight
  • Intelligence
  • Law Enforcement
  • Terrorism
  • Operations
  • Technologies & Industry
  • Personnel management
  • Acquisition Management
  • Strategy
  • Concepts and doctrine
  • Management
  • Defence economics
  • Financial management
  • Information & knowledge management
  • Simulation and Training
  • Change management
  • Decision-making
  • Good governance

Partner sites

Information & Security: An International JournalSecurity & Defence Mangement siteConnectins: The Quarterly Journal

IT4Sec News

TV interview on the forthcoming NATO summit

read more >>

Driver+ Trial 1

read more >>

Launching the Romanian edition of the BI Compendium

read more >>

Developing and implementing integrity plans in the defence

read more >>

International Cooperation in Responding to Common Challenges and Threats

read more >>
view all

  

 Trade mark of IIKT bas-logo

© IT for Security Department, Institute of ICT, 2010 -