Academic literature on the topic 'Cybersecurity ethics'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'Cybersecurity ethics.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Journal articles on the topic "Cybersecurity ethics"

1

Rajamäki, Jyri, and Heikki Hämäläinen. "Ethics of Cybersecurity and Biomedical Ethics: Case SHAPES." Information & Security: An International Journal 50 (2021): 103–16. http://dx.doi.org/10.11610/isij.5002.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Timmers, Paul. "Ethics of AI and Cybersecurity When Sovereignty is at Stake." Minds and Machines 29, no. 4 (October 11, 2019): 635–45. http://dx.doi.org/10.1007/s11023-019-09508-4.

Full text
Abstract:
Abstract Sovereignty and strategic autonomy are felt to be at risk today, being threatened by the forces of rising international tensions, disruptive digital transformations and explosive growth of cybersecurity incidents. The combination of AI and cybersecurity is at the sharp edge of this development and raises many ethical questions and dilemmas. In this commentary, I analyse how we can understand the ethics of AI and cybersecurity in relation to sovereignty and strategic autonomy. The analysis is followed by policy recommendations, some of which may appear to be controversial, such as the strategic use of ethics. I conclude with a reflection on underlying concepts as an invitation for further research. The goal is to inspire policy-makers, academics and business strategists in their work, and to be an input for public debate.
APA, Harvard, Vancouver, ISO, and other styles
3

Formosa, Paul, Michael Wilson, and Deborah Richards. "A principlist framework for cybersecurity ethics." Computers & Security 109 (October 2021): 102382. http://dx.doi.org/10.1016/j.cose.2021.102382.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Macnish, Kevin, and Jeroen van der Ham. "Ethics in cybersecurity research and practice." Technology in Society 63 (November 2020): 101382. http://dx.doi.org/10.1016/j.techsoc.2020.101382.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Mullahmetova, Diana I., and Andrey A. Kudelin. "Impact of Islamic Ethics on cybersecurity policy in Iran." RUDN Journal of World History 14, no. 1 (February 26, 2022): 33–42. http://dx.doi.org/10.22363/2312-8127-2022-14-1-33-42.

Full text
Abstract:
This article tries to investigate whether there is an influence of Islamic Ethics on cybersecurity policy in Iran. It represents the governments approaches towards formulating cybersecurity policy in the country. Islamic Ethics is vital because it is a backbone of a good society. Every Muslim should conduct in accordance with Islamic law and must remember that all actions have certain consequences and man is in charge of his behavior. Therefore, people will be able to live in peace and there wont be need to be afraid of criminals. Many recent studies have focused on the problem of Islamic ethics and its influence on different aspects of life of Muslims. It seems interesting to explore the relationships between Islamic ethics and IT because IT gets deeper into peoples life becoming the aspect that it is difficult - if not impossible - to imagine life without it nowadays. With the advent of information and communication technologies it is needed to concentrate on ethical foundations that are able to regulate cyberspace.
APA, Harvard, Vancouver, ISO, and other styles
6

Shoemaker, Dan, Anne Kohnke, and Greg Laidlaw. "ETHICS AND CYBERSECURITY ARE NOT MUTUALLY EXCLUSIVE." EDPACS 60, no. 1 (July 3, 2019): 1–10. http://dx.doi.org/10.1080/07366981.2019.1651516.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Loi, Michele, Markus Christen, Nadine Kleine, and Karsten Weber. "Cybersecurity in health – disentangling value tensions." Journal of Information, Communication and Ethics in Society 17, no. 2 (May 13, 2019): 229–45. http://dx.doi.org/10.1108/jices-12-2018-0095.

Full text
Abstract:
Purpose Cybersecurity in healthcare has become an urgent matter in recent years due to various malicious attacks on hospitals and other parts of the healthcare infrastructure. The purpose of this paper is to provide an outline of how core values of the health systems, such as the principles of biomedical ethics, are in a supportive or conflicting relation to cybersecurity. Design/methodology/approach This paper claims that it is possible to map the desiderata relevant to cybersecurity onto the four principles of medical ethics, i.e. beneficence, non-maleficence, autonomy and justice, and explore value conflicts in that way. Findings With respect to the question of how these principles should be balanced, there are reasons to think that the priority of autonomy relative to beneficence and non-maleficence in contemporary medical ethics could be extended to value conflicts in health-related cybersecurity. Research limitations/implications However, the tension between autonomy and justice, which relates to the desideratum of usability of information and communication technology systems, cannot be ignored even if one assumes that respect for autonomy should take priority over other moral concerns. Originality/value In terms of value conflicts, most discussions in healthcare deal with the conflict of balancing efficiency and privacy given the sensible nature of health information. In this paper, the authors provide a broader and more detailed outline.
APA, Harvard, Vancouver, ISO, and other styles
8

Weber, Karsten, Michele Loi, Markus Christen, and Nadine Kleine. "Digital Medicine, Cybersecurity, and Ethics: An Uneasy Relationship." American Journal of Bioethics 18, no. 9 (September 2, 2018): 52–53. http://dx.doi.org/10.1080/15265161.2018.1498935.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Pattison, James. "From defence to offence: The ethics of private cybersecurity." European Journal of International Security 5, no. 2 (May 19, 2020): 233–54. http://dx.doi.org/10.1017/eis.2020.6.

Full text
Abstract:
AbstractThe cyber realm is increasingly vital to national security, but much of cybersecurity is provided privately. Private firms provide a range of roles, from purely defensive operations to more controversial ones, such as active-cyber defense (ACD) and ‘hacking back’. As with the outsourcing of traditional military and security services to private military and security companies (PMSCs), the reliance on private firms raises the ethical question of to what extent the private sector should be involved in providing security services. In this article, I consider this question. I argue that a moderately restrictive approach should be adopted, which holds that private firms can justifiably launch some cybersecurity services – defensive measures – but are not permitted to perform others – offensive measures.
APA, Harvard, Vancouver, ISO, and other styles
10

Bhargava, Nimisha, Mani Kumari Madala, and Darrell Norman Burrell. "Emotional Acumen on the Propensity of Graduating Technology Students to Whistle-Blow About Organizational Cyber Security Breaches." International Journal of Smart Education and Urban Society 9, no. 4 (October 2018): 1–14. http://dx.doi.org/10.4018/ijseus.2018100101.

Full text
Abstract:
Emotional acumen is relatively a new concept compared to the other decision-making variables in the existing literature. Comprehending the procedure in which the individuals captivate themselves in ethical decision-making and the factors stimulating this procedure may be imperative for burgeoning more efficient education for ethics. The U.S. Securities and Exchange Commission issued new guidance calling on public companies to be more forthcoming when disclosing nature and scope of cybersecurity breaches. The statement also warns that corporate insiders must not trade shares when they have information about cybersecurity issues that is not public yet. Understanding the emotional underpinnings is critical to guiding how individuals deal with the complex nature of morally infused predicaments, their awareness of the moral dilemma, judgments about the potential consequences and their intention to act or propensity to whistle-blow related to cybersecurity breaches are significantly affected by the emotional acumen.
APA, Harvard, Vancouver, ISO, and other styles

Dissertations / Theses on the topic "Cybersecurity ethics"

1

GARZA, ADRIANA BEATRIZ. "AN ANALYSIS OF THE ETHICS BEHIND CYBERSECURITY MANAGEMENT." Thesis, The University of Arizona, 2016. http://hdl.handle.net/10150/618707.

Full text
Abstract:
This paper will explore cyber breaches, and the ethics behind a company’s decisionmaking when it comes to cyber security. At a time when cyber attacks and breaches against wellknown, and reputable companies were at an all-time high, an interest to study different cyber breaches and a company’s reaction to the cyber breach began to develop. In order to analyze the various cyber attacks that had taken place in recent years, a case study was completed, examining three different companies in North America that had gone through a cyber attack – Target, Ashley Madison, and Liverpool. Additionally, research of the different types of cyber attacks and the various tactics companies utilize to avoid a cyber attack was conducted. The research was guided by the question of whether Target, Ashley Madison, and Liverpool were ethical in their response that followed their respective cyber breaches. Thus, this paper will discuss the many facets of cyber security most relevant to companies, in addition to an ethical analysis of each company’s actions following their respective cyber breach.
APA, Harvard, Vancouver, ISO, and other styles
2

Hoskins, Brittany Noel. "The Rhetoric of Commoditized Vulnerabilities: Ethical Discourses in Cybersecurity." Thesis, Virginia Tech, 2015. http://hdl.handle.net/10919/52943.

Full text
Abstract:
The field of cybersecurity is relatively uncharted by rhetoricians and sociologists but nevertheless laden with terminological assumptions, violent metaphors, and ethical conflicts. This study explores the discourse surrounding the morally contentious practice of hackers selling software vulnerabilities to third parties instead of disclosing them to the affected technology companies. Drawing on grounded theory, I utilize a combination of quantitative word-level analysis and qualitative coding to assess how notions of right and wrong on this topic are framed by three groups: 1) the hackers themselves, 2) technology companies, and 3) reporters. The results show that the most commonly constructed argument was based on a "greater good" ethic, in which rhetors argue for reducing risk to "us all" or to innocent computer users. Additionally, the technology companies and hackers assiduously build their ethos to increase their trustworthiness in the public mind. Ultimately, studying this unexplored area of "gray hat hacking" has important implications for policymakers creating new cybersecurity legislation, reporters attempting to accurately frame the debate, and information technology professionals whose livelihoods are affected by evolving social norms.
Master of Arts
APA, Harvard, Vancouver, ISO, and other styles
3

Florez, Cardenas Mateo, and Gabriel Acar. "Ethical Hacking of a Smart Fridge : Evaluating the cybersecurity of an IoT device through gray box hacking." Thesis, KTH, Skolan för elektroteknik och datavetenskap (EECS), 2021. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-302373.

Full text
Abstract:
With the increasing popularity of Internet of Things (IoT) devices, a complete smart home is becoming more of a reality. Thus the security of said devices is becoming increasingly more important. Unsecured IoT devices could lead to potential consequences of societal proportion. Therefore there is an entire industry dedicated to mitigating such security threats and contributing to a sustainable society. The security of a Samsung Smart Refrigerator was evaluated in this thesis. The methodology implemented followed a gray box approach and consisted of initially creating a threat model, indicating potential vulnerabilities, and then using the said model to design penetration tests to assess the findings. It was concluded that the fridge was secure in the scope of this thesis. However, grounds for further research were discovered.
Med den ökande populariteten för IoT-enheter (Internet of Things) blir ett komplett smart hem alltmer verklighet. Säkerheten för dessa enheter blir därför allt viktigare. Osäkrade IoT-enheter kan leda till potentiella konsekvenser av samhällelig omfattning. Därför finns det en hel industri som ägnar sig åt att mildra sådana säkerhetshot och bidra till ett hållbart samhälle. Säkerheten hos ett smart kylskåp från Samsung utvärderades i denna avhandling. Den metod som tillämpades följde en grå box-strategi och bestod av att först skapa en hot modell, ange potentiella sårbarheter och sedan använda nämnda modell för att utforma penetrationstester för att bedöma resultaten. Slutsatsen blev att kylskåpet var säkert inom ramen för denna avhandling. Det upptäcktes dock skäl för ytterligare forskning.
APA, Harvard, Vancouver, ISO, and other styles
4

Paučo, Daniel. "Bezpečnostní cvičení pro etický hacking." Master's thesis, Vysoké učení technické v Brně. Fakulta elektrotechniky a komunikačních technologií, 2020. http://www.nusl.cz/ntk/nusl-413068.

Full text
Abstract:
This master thesis deals with penetration testing and ethical hacking. Regarding to the layout of the thesis there was prepared appropiate enviroment to realize Red/Blue team exercise, where Red team is in a role of the attacker and Blue team is in a role of defender of the network infrastructure. Whole infrastructure is implemented in a cloud virtual enviroment of VMware vSphere. Second part of the thesis consists of preparation and creation of the exercise to test web application security. Third part of the thesis is dedicating to the automatization of redteaming. Main focus of this master thesis is to demonstrate different attack vectors how to attack the network infrastructure and web applications and use of the defense mechanisms to avoid this kinds of attacks.
APA, Harvard, Vancouver, ISO, and other styles
5

Abu-Shaqra, Baha. "Technoethics and Sensemaking: Risk Assessment and Knowledge Management of Ethical Hacking in a Sociotechnical Society." Thesis, Université d'Ottawa / University of Ottawa, 2020. http://hdl.handle.net/10393/40393.

Full text
Abstract:
Cyber attacks by domestic and foreign threat actors are increasing in frequency and sophistication. Cyber adversaries exploit a cybersecurity skill/knowledge gap and an open society, undermining the information security/privacy of citizens and businesses and eroding trust in governments, thus threatening social and political stability. The use of open digital hacking technologies in ethical hacking in higher education and within broader society raises ethical, technical, social, and political challenges for liberal democracies. Programs teaching ethical hacking in higher education are steadily growing but there is a concern that teaching students hacking skills increases crime risk to society by drawing students toward criminal acts. A cybersecurity skill gap undermines the security/viability of business and government institutions. The thesis presents an examination of opportunities and risks involved in using AI powered intelligence gathering/surveillance technologies in ethical hacking teaching practices in Canada. Taking a qualitative exploratory case study approach, technoethical inquiry theory (Bunge-Luppicini) and Weick’s sensemaking model were applied as a sociotechnical theory (STEI-KW) to explore ethical hacking teaching practices in two Canadian universities. In-depth interviews with ethical hacking university experts, industry practitioners, and policy experts, and a document review were conducted. Findings pointed to a skill/knowledge gap in ethical hacking literature regarding the meanings, ethics, values, skills/knowledge, roles and responsibilities, and practices of ethical hacking and ethical hackers which underlies an identity and legitimacy crisis for professional ethical hacking practitioners; and a Teaching vs Practice cybersecurity skill gap in ethical hacking curricula. Two main S&T innovation risk mitigation initiatives were explored: An OSINT Analyst cybersecurity role and associated body of knowledge foundation framework as an interdisciplinary research area, and a networked centre of excellence of ethical hacking communities of practice as a knowledge management and governance/policy innovation approach focusing on the systematization and standardization of an ethical hacking body of knowledge.
APA, Harvard, Vancouver, ISO, and other styles
6

Rozsypal, Jakub. "Hlavolam kybernetické bezpečnosti: koncepty, modality a formulace hrozby Evropskou unií." Master's thesis, 2014. http://www.nusl.cz/ntk/nusl-340873.

Full text
Abstract:
This thesis deals with the complex issue of cyber security in international relations, specifics of cyber realm due to its technical nature and particular circumstances of its development as well as with the way how the EU deals with information and communication technologies. Even though cyber security as a category appears with increasing frequency and intensity in the thinking on security and related political debate in the past twenty years, some of its basic tenets are still insufficiently understood. First part of the thesis deals with cyber realm and its specifics as such with effort to pinpoint some of the inherent contradictions between the traditional Westphalian nation states and the fluid character of the digital world. Through analysis of selected relevant incidents as well convincing absence of the "digital- doom" scenarios the peculiar expectation-reality discrepancy will be analysed. The overarching method departs from intersubjective securitization framework. In the last part analysing the EU it is the concept of threat framing that is applied to study and trace the narrative of the EU in these matters. Here a gradual construction of a narrative termed ICT as "fundamental societal building block" reveals itself with cyber related issues making its way into top policy levels through...
APA, Harvard, Vancouver, ISO, and other styles

Books on the topic "Cybersecurity ethics"

1

Christen, Markus, Bert Gordijn, and Michele Loi, eds. The Ethics of Cybersecurity. Cham: Springer International Publishing, 2020. http://dx.doi.org/10.1007/978-3-030-29053-5.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Manjikian, Mary. Cybersecurity Ethics. Routledge, 2017. http://dx.doi.org/10.4324/9781315196275.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Ethics of Cybersecurity. Springer International Publishing AG, 2020.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
4

Cybersecurity Ethics: An Introduction. Taylor & Francis Group, 2017.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
5

Christen, Markus, Bert Gordijn, and Michele Loi. The Ethics of Cybersecurity. Springer, 2020.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
6

Manjikian, Mary. Cybersecurity Ethics: An Introduction. Taylor & Francis Group, 2022.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
7

Manjikian, Mary. Cybersecurity Ethics: An Introduction. Taylor & Francis Group, 2017.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
8

Manjikian, Mary. Cybersecurity Ethics: An Introduction. Taylor & Francis Group, 2017.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
9

Manjikian, Mary. Cybersecurity Ethics: An Introduction. Taylor & Francis Group, 2017.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
10

Manjikian, Mary. Cybersecurity Ethics: An Introduction. Taylor & Francis Group, 2022.

Find full text
APA, Harvard, Vancouver, ISO, and other styles

Book chapters on the topic "Cybersecurity ethics"

1

Manjikian, Mary. "What Is Ethics?" In Cybersecurity Ethics, 3–22. 2nd ed. London: Routledge, 2022. http://dx.doi.org/10.4324/9781003248828-2.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Manjikian, Mary. "Ethics of Artificial Intelligence." In Cybersecurity Ethics, 153–75. 2nd ed. London: Routledge, 2022. http://dx.doi.org/10.4324/9781003248828-10.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Manjikian, Mary. "Military Aspects of Cybersecurity Ethics." In Cybersecurity Ethics, 219–42. 2nd ed. London: Routledge, 2022. http://dx.doi.org/10.4324/9781003248828-13.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Manjikian, Mary. "The Problem of Intellectual Property." In Cybersecurity Ethics, 126–50. 2nd ed. London: Routledge, 2022. http://dx.doi.org/10.4324/9781003248828-8.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Manjikian, Mary. "Big Data and the Ethics of Cybersecurity." In Cybersecurity Ethics, 197–218. 2nd ed. London: Routledge, 2022. http://dx.doi.org/10.4324/9781003248828-12.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Manjikian, Mary. "Cybersecurity, Diversity, Equity, and Inclusion." In Cybersecurity Ethics, 176–96. 2nd ed. London: Routledge, 2022. http://dx.doi.org/10.4324/9781003248828-11.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Manjikian, Mary. "The Problem of Surveillance." In Cybersecurity Ethics, 100–125. 2nd ed. London: Routledge, 2022. http://dx.doi.org/10.4324/9781003248828-7.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Manjikian, Mary. "Three Ethical Frameworks." In Cybersecurity Ethics, 23–42. 2nd ed. London: Routledge, 2022. http://dx.doi.org/10.4324/9781003248828-3.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Manjikian, Mary. "The Problem of Privacy." In Cybersecurity Ethics, 69–99. 2nd ed. London: Routledge, 2022. http://dx.doi.org/10.4324/9781003248828-6.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Manjikian, Mary. "The Ethical Hacker." In Cybersecurity Ethics, 43–65. 2nd ed. London: Routledge, 2022. http://dx.doi.org/10.4324/9781003248828-4.

Full text
APA, Harvard, Vancouver, ISO, and other styles

Conference papers on the topic "Cybersecurity ethics"

1

Domingo-Ferrer, Josep. "Ethics by Design in Decentralized Computing." In EICC 2022: European Interdisciplinary Cybersecurity Conference. New York, NY, USA: ACM, 2022. http://dx.doi.org/10.1145/3528580.3535331.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Happa, J., J. R. C. Nurse, M. Goldsmith, S. Creese, and R. Williams. "An Ethics Framework for Research into Heterogeneous Systems." In Living in the Internet of Things: Cybersecurity of the IoT - 2018. Institution of Engineering and Technology, 2018. http://dx.doi.org/10.1049/cp.2018.0026.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Simon, Theo, and Bertrand Venard. "Technical codes’potentialities in cybersecurity. A contextual approach on the ethics of small digital organizations in France." In 2020 International Conference on Cyber Security and Protection of Digital Services (Cyber Security). IEEE, 2020. http://dx.doi.org/10.1109/cybersecurity49315.2020.9138895.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Steinke, Gerhard, Ryan LaBrie, and Satadipa Sarkar. "Recommendation for Continuous Ethical Analysis of AI Algorithms." In EICC 2022: European Interdisciplinary Cybersecurity Conference. New York, NY, USA: ACM, 2022. http://dx.doi.org/10.1145/3528580.3532996.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Davis, Brittany, Christopher Whitfield, and Mohd Anwar. "Extended Abstract: Ethical and Privacy Considerations in Cybersecurity." In 2018 16th Annual Conference on Privacy, Security and Trust (PST). IEEE, 2018. http://dx.doi.org/10.1109/pst.2018.8514188.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Joseph, Anthony, Tega Ileleji, and Mary Joseph. "CYBERSECURITY TALENT SHORTAGE: GENDER AND ETHNIC/RACIAL DIVERSITY." In 13th International Conference on Education and New Learning Technologies. IATED, 2021. http://dx.doi.org/10.21125/edulearn.2021.1936.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Wachter, S. "Ethical and normative challenges of identification in the Internet of Things." In Living in the Internet of Things: Cybersecurity of the IoT - 2018. Institution of Engineering and Technology, 2018. http://dx.doi.org/10.1049/cp.2018.0013.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Lorenz, Birgy, and Kaido Kikkas. "Pedagogical Challenges and Ethical Considerations in Developing Critical Thinking in Cybersecurity." In 2020 IEEE 20th International Conference on Advanced Learning Technologies (ICALT). IEEE, 2020. http://dx.doi.org/10.1109/icalt49669.2020.00085.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Pawlicka, Aleksandra, Marek Pawlicki, Rafał Renk, Rafał Kozik, and Michał Choraś. "The cybersecurity-related ethical issues of cloud technology and how to avoid them." In ARES 2022: The 17th International Conference on Availability, Reliability and Security. New York, NY, USA: ACM, 2022. http://dx.doi.org/10.1145/3538969.3544456.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Partadiredja, Reza Arkan, Carlos Entrena Serrano, and Davor Ljubenkov. "AI or Human: The Socio-ethical Implications of AI-Generated Media Content." In 2020 13th CMI Conference on Cybersecurity and Privacy (CMI) - Digital Transformation - Potentials and Challenges. IEEE, 2020. http://dx.doi.org/10.1109/cmi51275.2020.9322673.

Full text
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!

To the bibliography