Journal of Cyber Policy最新文献

筛选
英文 中文
Original sin: power, technology and war in outer space 原罪:外太空的权力、技术和战争
Journal of Cyber Policy Pub Date : 2023-07-19 DOI: 10.1080/23738871.2023.2237522
Julia Cournoyer
{"title":"Original sin: power, technology and war in outer space","authors":"Julia Cournoyer","doi":"10.1080/23738871.2023.2237522","DOIUrl":"https://doi.org/10.1080/23738871.2023.2237522","url":null,"abstract":"","PeriodicalId":124998,"journal":{"name":"Journal of Cyber Policy","volume":"27 5","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-07-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132358983","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
The soft underbelly of cyber defence in democracy: how interest groups soften Japan’s cyber policy 民主国家网络防御的软肋:利益集团如何软化日本的网络政策
Journal of Cyber Policy Pub Date : 2023-03-28 DOI: 10.1080/23738871.2023.2192227
Noriyuki Katagiri
{"title":"The soft underbelly of cyber defence in democracy: how interest groups soften Japan’s cyber policy","authors":"Noriyuki Katagiri","doi":"10.1080/23738871.2023.2192227","DOIUrl":"https://doi.org/10.1080/23738871.2023.2192227","url":null,"abstract":"","PeriodicalId":124998,"journal":{"name":"Journal of Cyber Policy","volume":"61 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-03-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122765327","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Cyber Threats and Nuclear Weapons 网络威胁和核武器
Journal of Cyber Policy Pub Date : 2023-03-27 DOI: 10.1080/23738871.2023.2193606
Elia Duran-Smith
{"title":"Cyber Threats and Nuclear Weapons","authors":"Elia Duran-Smith","doi":"10.1080/23738871.2023.2193606","DOIUrl":"https://doi.org/10.1080/23738871.2023.2193606","url":null,"abstract":"","PeriodicalId":124998,"journal":{"name":"Journal of Cyber Policy","volume":"6 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-03-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125589293","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
China’s use of rhetorical adaptation in development of a global cyber order: a case study of the norm of the protection of the public core of the internet 中国在全球网络秩序发展中的修辞适应:以保护互联网公共核心的规范为例
Journal of Cyber Policy Pub Date : 2023-03-22 DOI: 10.1080/23738871.2023.2178946
Courtney J. Fung
{"title":"China’s use of rhetorical adaptation in development of a global cyber order: a case study of the norm of the protection of the public core of the internet","authors":"Courtney J. Fung","doi":"10.1080/23738871.2023.2178946","DOIUrl":"https://doi.org/10.1080/23738871.2023.2178946","url":null,"abstract":"","PeriodicalId":124998,"journal":{"name":"Journal of Cyber Policy","volume":"57 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-03-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116290208","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Exploring the relationship between IT development, poverty and cybercrime: an Armenia case study 探讨资讯科技发展、贫穷与网路犯罪之间的关系:以亚美尼亚为例
Journal of Cyber Policy Pub Date : 2023-03-22 DOI: 10.1080/23738871.2023.2192234
T. Hall, Ulrike Ziemer
{"title":"Exploring the relationship between IT development, poverty and cybercrime: an Armenia case study","authors":"T. Hall, Ulrike Ziemer","doi":"10.1080/23738871.2023.2192234","DOIUrl":"https://doi.org/10.1080/23738871.2023.2192234","url":null,"abstract":"","PeriodicalId":124998,"journal":{"name":"Journal of Cyber Policy","volume":"108 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-03-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116671333","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
A sliding scale of secrecy: toward a better understanding of the role of publicity in offensive cyber operations 保密程度的变化:更好地理解公开在攻击性网络行动中的作用
Journal of Cyber Policy Pub Date : 2023-03-06 DOI: 10.1080/23738871.2023.2184708
Gil Baram
{"title":"A sliding scale of secrecy: toward a better understanding of the role of publicity in offensive cyber operations","authors":"Gil Baram","doi":"10.1080/23738871.2023.2184708","DOIUrl":"https://doi.org/10.1080/23738871.2023.2184708","url":null,"abstract":"","PeriodicalId":124998,"journal":{"name":"Journal of Cyber Policy","volume":"3 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-03-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128123630","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Building cybersecurity capacity: a framework of analysis for national cybersecurity strategies 网络安全能力建设:国家网络安全战略分析框架
Journal of Cyber Policy Pub Date : 2023-02-21 DOI: 10.1080/23738871.2023.2178318
Anthony J. S. Craig, Richard A. I. Johnson, Max Gallop
{"title":"Building cybersecurity capacity: a framework of analysis for national cybersecurity strategies","authors":"Anthony J. S. Craig, Richard A. I. Johnson, Max Gallop","doi":"10.1080/23738871.2023.2178318","DOIUrl":"https://doi.org/10.1080/23738871.2023.2178318","url":null,"abstract":"","PeriodicalId":124998,"journal":{"name":"Journal of Cyber Policy","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-02-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130775910","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Cyberattacks on local governments 2020: findings from a key informant survey* 2020年针对地方政府的网络攻击:一项关键线人调查的结果*
Journal of Cyber Policy Pub Date : 2023-02-16 DOI: 10.1080/23738871.2023.2178319
D. Norris, Laura K. Mateczun
{"title":"Cyberattacks on local governments 2020: findings from a key informant survey*","authors":"D. Norris, Laura K. Mateczun","doi":"10.1080/23738871.2023.2178319","DOIUrl":"https://doi.org/10.1080/23738871.2023.2178319","url":null,"abstract":"","PeriodicalId":124998,"journal":{"name":"Journal of Cyber Policy","volume":"18 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-02-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128924826","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Cybersecurity discourses and their policy implications 网络安全话语及其政策含义
Journal of Cyber Policy Pub Date : 2023-02-02 DOI: 10.1080/23738871.2023.2167607
Robert Siudak
{"title":"Cybersecurity discourses and their policy implications","authors":"Robert Siudak","doi":"10.1080/23738871.2023.2167607","DOIUrl":"https://doi.org/10.1080/23738871.2023.2167607","url":null,"abstract":"","PeriodicalId":124998,"journal":{"name":"Journal of Cyber Policy","volume":"7 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-02-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117011474","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
The need for cybersecurity data and metrics: empirically assessing cyberthreat 对网络安全数据和指标的需求:经验评估网络威胁
Journal of Cyber Policy Pub Date : 2022-10-10 DOI: 10.1080/23738871.2022.2111997
B. Valeriano
{"title":"The need for cybersecurity data and metrics: empirically assessing cyberthreat","authors":"B. Valeriano","doi":"10.1080/23738871.2022.2111997","DOIUrl":"https://doi.org/10.1080/23738871.2022.2111997","url":null,"abstract":"","PeriodicalId":124998,"journal":{"name":"Journal of Cyber Policy","volume":"24 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-10-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122651669","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信