{"title":"Original sin: power, technology and war in outer space","authors":"Julia Cournoyer","doi":"10.1080/23738871.2023.2237522","DOIUrl":"https://doi.org/10.1080/23738871.2023.2237522","url":null,"abstract":"","PeriodicalId":124998,"journal":{"name":"Journal of Cyber Policy","volume":"27 5","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-07-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132358983","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"The soft underbelly of cyber defence in democracy: how interest groups soften Japan’s cyber policy","authors":"Noriyuki Katagiri","doi":"10.1080/23738871.2023.2192227","DOIUrl":"https://doi.org/10.1080/23738871.2023.2192227","url":null,"abstract":"","PeriodicalId":124998,"journal":{"name":"Journal of Cyber Policy","volume":"61 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-03-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122765327","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"China’s use of rhetorical adaptation in development of a global cyber order: a case study of the norm of the protection of the public core of the internet","authors":"Courtney J. Fung","doi":"10.1080/23738871.2023.2178946","DOIUrl":"https://doi.org/10.1080/23738871.2023.2178946","url":null,"abstract":"","PeriodicalId":124998,"journal":{"name":"Journal of Cyber Policy","volume":"57 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-03-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116290208","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Exploring the relationship between IT development, poverty and cybercrime: an Armenia case study","authors":"T. Hall, Ulrike Ziemer","doi":"10.1080/23738871.2023.2192234","DOIUrl":"https://doi.org/10.1080/23738871.2023.2192234","url":null,"abstract":"","PeriodicalId":124998,"journal":{"name":"Journal of Cyber Policy","volume":"108 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-03-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116671333","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A sliding scale of secrecy: toward a better understanding of the role of publicity in offensive cyber operations","authors":"Gil Baram","doi":"10.1080/23738871.2023.2184708","DOIUrl":"https://doi.org/10.1080/23738871.2023.2184708","url":null,"abstract":"","PeriodicalId":124998,"journal":{"name":"Journal of Cyber Policy","volume":"3 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-03-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128123630","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Anthony J. S. Craig, Richard A. I. Johnson, Max Gallop
{"title":"Building cybersecurity capacity: a framework of analysis for national cybersecurity strategies","authors":"Anthony J. S. Craig, Richard A. I. Johnson, Max Gallop","doi":"10.1080/23738871.2023.2178318","DOIUrl":"https://doi.org/10.1080/23738871.2023.2178318","url":null,"abstract":"","PeriodicalId":124998,"journal":{"name":"Journal of Cyber Policy","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-02-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130775910","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Cyberattacks on local governments 2020: findings from a key informant survey*","authors":"D. Norris, Laura K. Mateczun","doi":"10.1080/23738871.2023.2178319","DOIUrl":"https://doi.org/10.1080/23738871.2023.2178319","url":null,"abstract":"","PeriodicalId":124998,"journal":{"name":"Journal of Cyber Policy","volume":"18 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-02-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128924826","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Cybersecurity discourses and their policy implications","authors":"Robert Siudak","doi":"10.1080/23738871.2023.2167607","DOIUrl":"https://doi.org/10.1080/23738871.2023.2167607","url":null,"abstract":"","PeriodicalId":124998,"journal":{"name":"Journal of Cyber Policy","volume":"7 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-02-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117011474","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"The need for cybersecurity data and metrics: empirically assessing cyberthreat","authors":"B. Valeriano","doi":"10.1080/23738871.2022.2111997","DOIUrl":"https://doi.org/10.1080/23738871.2022.2111997","url":null,"abstract":"","PeriodicalId":124998,"journal":{"name":"Journal of Cyber Policy","volume":"24 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-10-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122651669","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}