Bibliography on Cyber Threats

Database

BIBLIOGRAPHY ON CYBER THREATS

Author   Title   Year  

96 documents found [Next]

2014

Allenby, Braden R., Are New Technologies Undermining the Laws of War?. Bulletin of the Atomic Scientists - Vol.70, n°1, 2014: 21-31.

Anderson, Jessica, Online Communities Utilising Emerging Technologies to Improve Crime Prevention Knowledge, Practice and Dissemination. Trends and Issues in Crime and Criminal Justice, Vol. 462, 2014, 1-10. [WWW]

Awan, Imran (2014), Debating The Term Cyber Terrorism. Issues and Problems, Birmingham, The Internet Journal of Criminology. [WWW]

Burt, David; Nicholas, Paul; Sullivan, Kevin; Scoles, Travis (2014), The Cybersecurity Risk Paradox: Impact of Social, Economic, and Technological Factors on Rates of Malware, Redmond, Microsoft Corporation. [WWW]

Çalışkan, Emin (2014), IPv6 Transition and Security Threat Report, Talliin, NATO Cooperative Cyber Defence Centre of Excellence (CCDCOE). [WWW]

Cashmore, Jordan (2014), The Fear of Crime Media Feedback Cycle, Nottingham, The Internet Journal of Criminology. [WWW]

Cross, Cassandra ; Smith, Russell G; Richards, Kelly, Challenges of Responding to Online Fraud Victimisation in Australia. Trends and Issues in Crime and Criminal Justice, Vol. 474, 2014, 1-6. [WWW]

Geers, Kenneth (2014), Pandemonium: Nation States, National Security and the Internet: Vol. 1, Talliin, NATO Cooperative Cyber Defence Centre of Excellence (CCDCOE). [WWW]

Jouinia, Mouna ; Arfa Rabaia, Latifa Ben; Aissab, Anis Ben, Classification of Security Threats in Information Systems. Procedia Computer Science - Vol.32, 2014: 489–496. [WWW]

Leslie, Daniel Adeoyé (2014), Legal Principles to Combat Cyberlaundering, Geneva, Springer. [WWW]

Libicki, Martin C.; Senty, David; Pollak, Julia (2014), Hackers Wanted: an Examination of the Cybersecurity, Santa Monica, CA, RAND Corporation. [WWW]

Stockton, Paul N.; Golabek - Goldman, Michele, Prosecuting Cyberterrorists: Applying Traditional Jurisdictional Framework to a Modern Threat. Stanford Law and Police Review - Vol. 25, n° 211, 2014: 212-268. [WWW]

Telstra Corporation Limited (2014), Addressing the Cyber Safety Challenge: from Risk to Resilience, Sydney, Telstra Corporation Limited. [WWW]

Vihul, Liis (2014), The Liability of Software Manufacturers for Defective Products: Vol.2, Talliin, NATO Cooperative Cyber Defence Centre of Excellence (CCDCOE). [WWW]

World Economic Forum (2014), Risk and Responsibility in a Hyperconnected World: Insight Report, Geneva, World Economic Forum. [WWW]


2013

Broadhurst, Roderic; Grabosky, Peter; Alazab, Mamoun; Bouhours, Brigitte; Chon, Steve; Da, Chen (2013), Crime in Cyberspace: Offenders and the Role of Organized Crime Groups: Working Paper, Canberra, Australian National University. [WWW]

Cerf, Vint; Ryan, Patrick; Senges, Max (2013), Internet Governance is Our Shared Responsibility, Columbus, I/S: A Journal of Law and Policy for the Information Society. [WWW]

Council of Europe (2013), Council of Europe Guide on Human Rights for Internet Users: Draft, Brussels, Council of Europe. [WWW]

Council of Europe. Data Protection and Cybercrime Division (2013), Capacity Building on Cybercrime: Discussion Paper, Strasbourg, Council of Europe. [WWW]

Deeks, Ashley, Geography of Cyber Conflict: Through a Glass Darkly. International Law Studies - Vol. 89, n°1, 2013: 1-20. [WWW]

European Commission, Joint Communication to the European Parliament, the Council, the European Economic and Social Committee and the Committee of the Regions: Cybersecurity Strategy of the European Union: An Open, Safe and Secure Cyberspace (JOIN(2013) 1 final JOINT). [WWW]

Gartzke, Erik, The Myth of Cyberwar: Bringing War in Cyberspace Back Down to Earth. International Security - Vol.38, n° 2, Fall 2013: 41-73.

Gercke, Marco (2013), Regional Harmonization of ICT Legislation in ACP Countries, Geneva, International Telecommunication Union (ITU).

Giacomello, Giampiero. University of Bologna (2013), Cybersecurity and Critical Information Infrastructures, Milan, Istituto per gli Studi di Politica Internazionale (ISPI). [WWW]

Goodwin, Cristin Flynn; Nicholas, J. Paul (2013), Developing a National Strategy for Cybersecurity: Foundations for Security, Growth and Innovation, Redmond, Microsoft Corporation. [WWW]

Greiman, Virginia. Boston University; Bain, Christina. Harvard Kennedy School (2013), The Emergence of Cyber Activity as a Gateway to Human Trafficking. Proceedings of: International Conference on Information Warfare & Security (Denver, Colorado, 25-26 March 2013), Sonning Common, Academic Conferences & Publishing International Ltd..

Helmbrecht, Udo; Purser, Steve; Cooper, Graeme; Ikonomou, Demosthenes; Marinos, Louis; Ouzounis, Evangelos; Thorbruegge, Marco; Mitrakas, Andreas; Capogrossi, Sarah (2013), Cybersecurity Cooperation: Defending the Digital Frontline, Heraklion, European Union Agency for Network and Information Security (ENISA). [WWW]

Intelligence and National Security Alliance (INSA) (2013), Operational Levels of Cyber Intelligence, Arlington, Intelligence and National Security Alliance (INSA). [WWW]

International Cyber Security Protection Alliance (ICSPA) (2013), Project 2020: Scenarios for the Future of Cybercrime-White Paper for Decision Makers, Chesham, International Cyber Security Protection Alliance (ICSPA). [WWW]

Kleiner, Aaron; Nicholas, Paul; Sullivan, Kevin. Microsoft Trustworthy Computing (2013), Linking Cybersecurity Policy and Performance, Redmond, Microsoft Corporation.

Lewis, James; Baker, Stewart. Center for Strategic and International Studies (CSIS) (2013), The Economic Impact of Cybercrime and Cyber Espionage: Report, Washington, D.C., Center for Strategic and International Studies (CSIS). [WWW]

Libicki, Martin C. (2013), Brandishing Cyberattack Capabilities, Santa Monica, RAND Corporation. [WWW]

NATO Cooperative Cyber Defence Centre of Excellence (CCDCOE) (2013), Cyber Defence Exercise Locked Shields 2013: After Action Report, Talliin, NATO Cooperative Cyber Defence Centre of Excellence (CCDCOE). [WWW]

NATO Cooperative Cyber Defence Centre of Excellence (CCDCOE) (2013), Cyber Security Status Watch: Q4 Report, Talliin, NATO Cooperative Cyber Defence Centre of Excellence (CCDCOE). [WWW]

Organization for Security and Cooperation in Europe (OSCE) (2013), Good Practices Guide on Non-Nuclear Critical Energy Infrastructure Protection (NNCEIP) from Terrorist Attacks Focusing on Threats Emanating from Cyberspace, Vienna, Organization for Security and Cooperation in Europe (OSCE).

Padullés, Joan Balcells; Cerrillo-i-Martínez, Agustí; Peguera Poch, Miquel; Peña-López, Ismael; Pifarré de Moner, María José; Vilasau Solana, Mònica (2013), Big Data: Challenges and Opportunities. Proceedings of: 9th International Conference on Internet, Law & Politics (Barcelona, 25-26 June 2013), Barcelona, Huygens Editorial. [WWW]

Paget, François. McAfee Labs (2013), L'hacktivisme, Paris, Fondation Saint-Cyr.

Rantapelkonen, Jari; Salminen, Mirva (2013), The Fog of Cyber Defence. Publication Series 2. Article Collection n°10, Helsinki, National Defence University. [WWW]

Richet, Jean-Loup (2013), Laundering Money Online: A Review of Cybercriminals’ Methods, Vienna, United Nations Office on Drugs and Crime (UNODC).

Shiryaev, Yaroslav (2013), Cyberterrorism in the Context of Contemporary International Law. Legal Studies Research Paper No. 2013-03, Coventry, University of Warwick. [WWW]

Shoemaker, Daniel (2013), A Practical Method for Minimization of Attack Surfaces in Information Warfare: Policy Brief n° 224, Milan, Istituto per gli Studi di Politica Internazionale (ISPI). [WWW]

Sommer, Peter (2013), Digital Evidence, Digital Investigations and E-Disclosure: A Guide to Forensic Readiness for Organisations, Security Advisers and Lawyers, Swindon, Information Assurance Advisory Council (IAAC). [WWW]

Stevens, Tim (2013), Apocalyptic Visions: Cyber War and the Politics of Time, London, King's College. [WWW]

SysSec Consortium (2013), The Red Book: A Roadmap for Systems Security Research, Brussels, SysSec Consortium. [WWW]

The Open Web Application Security Project (OWASP) (2013), OWASP Top 10-2013: The Ten Most Critical Web Application Security Risks, The Open Web Application Security Project (OWASP). [WWW]

TNS Opinion & Social, Special Eurobarometer 404: Cyber Security: Report. [WWW]

United Nations Office on Drugs and Crime (UNODC) (2013), Comprehensive Study on Cybercrime, Vienna, United Nations Office on Drugs and Crime (UNODC). [WWW]

Von Behr, Ines; Reding, Anais; Edwards Charlie; Gribbon, Luke (2013), Radicalisation in the Digital Era: The Use of the Internet in 15 Cases of Terrorism and Extremism, Santa Monica, RAND Corporation. [WWW]

Ziolkowski, Katharina (2013), Pacetime Regime for State Activities in Cyberspace: International Law, International Relations and Diplomacy, Talliin, NATO Cooperative Cyber Defence Centre of Excellence (CCDCOE). [WWW]


2012

Barnard-Wills, David; Ashenden, Debi (2012), Securing Virtual Space: Cyber War, Cyber Terror, and Risk, Thousand Oaks, SAGE Publications.

96 documents found [Next]

Contact Us Disclaimer | Acknowledgements