{"title":"Four internets: data, geopolitics, and the governance of cyberspace","authors":"L. Sharma","doi":"10.1080/23738871.2022.2125331","DOIUrl":"https://doi.org/10.1080/23738871.2022.2125331","url":null,"abstract":"","PeriodicalId":124998,"journal":{"name":"Journal of Cyber Policy","volume":"111 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-09-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124114201","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Who’s in charge and how does it work? US cybersecurity of critical infrastructure","authors":"C. Bronk, W. A. Conklin","doi":"10.1080/23738871.2022.2116346","DOIUrl":"https://doi.org/10.1080/23738871.2022.2116346","url":null,"abstract":"","PeriodicalId":124998,"journal":{"name":"Journal of Cyber Policy","volume":"29 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-09-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128581341","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Responding to large-scale cyberattacks: a toolbox for policymakers","authors":"Sico van der Meer","doi":"10.1080/23738871.2022.2116345","DOIUrl":"https://doi.org/10.1080/23738871.2022.2116345","url":null,"abstract":"","PeriodicalId":124998,"journal":{"name":"Journal of Cyber Policy","volume":"67 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-08-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131713061","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Cyber information operations: Cambridge Analytica’s challenge to democratic legitimacy","authors":"M. Dowling","doi":"10.1080/23738871.2022.2081089","DOIUrl":"https://doi.org/10.1080/23738871.2022.2081089","url":null,"abstract":"","PeriodicalId":124998,"journal":{"name":"Journal of Cyber Policy","volume":"22 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-05-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129394353","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"The cryptopians: idealism, greed, lies, and the making of the first big cryptocurrency craze","authors":"Ayden Férdeline","doi":"10.1080/23738871.2022.2071748","DOIUrl":"https://doi.org/10.1080/23738871.2022.2071748","url":null,"abstract":"","PeriodicalId":124998,"journal":{"name":"Journal of Cyber Policy","volume":"116 11 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-05-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130733530","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Industrial policy and governments’ cybersecurity capacity: a tale of two developments?","authors":"Walid Tijerina","doi":"10.1080/23738871.2022.2071747","DOIUrl":"https://doi.org/10.1080/23738871.2022.2071747","url":null,"abstract":"","PeriodicalId":124998,"journal":{"name":"Journal of Cyber Policy","volume":"45 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-05-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129137080","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Lance Y. Hunter, C. Albert, Eric Garrett, Josh Rutland
{"title":"Democracy and cyberconflict: how regime type affects state-sponsored cyberattacks","authors":"Lance Y. Hunter, C. Albert, Eric Garrett, Josh Rutland","doi":"10.1080/23738871.2022.2041060","DOIUrl":"https://doi.org/10.1080/23738871.2022.2041060","url":null,"abstract":"","PeriodicalId":124998,"journal":{"name":"Journal of Cyber Policy","volume":"11 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-04-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124114491","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"The hacker and the state: cyber attacks and the new normal of geopolitics","authors":"G. Berry","doi":"10.1080/23738871.2022.2059385","DOIUrl":"https://doi.org/10.1080/23738871.2022.2059385","url":null,"abstract":"","PeriodicalId":124998,"journal":{"name":"Journal of Cyber Policy","volume":"2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-04-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124027792","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Digital identity for development should keep pace with national cybersecurity capacity: Nigeria in focus","authors":"Babatunde O. Okunoye","doi":"10.1080/23738871.2022.2057865","DOIUrl":"https://doi.org/10.1080/23738871.2022.2057865","url":null,"abstract":"","PeriodicalId":124998,"journal":{"name":"Journal of Cyber Policy","volume":"3 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128833001","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Assessing Japan’s cybersecurity policy: change and continuity from 2017 to 2020","authors":"Noriyuki Katagiri","doi":"10.1080/23738871.2022.2033805","DOIUrl":"https://doi.org/10.1080/23738871.2022.2033805","url":null,"abstract":"","PeriodicalId":124998,"journal":{"name":"Journal of Cyber Policy","volume":"94 6","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-03-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132365074","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}