Journal articles on the topic 'Strategic cyber security'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the top 50 journal articles for your research on the topic 'Strategic cyber security.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.
Kuusisto, Tuija, and Rauno Kuusisto. "Strategic Communication for Supporting Cyber-Security." International Journal of Cyber Warfare and Terrorism 3, no. 3 (July 2013): 72–79. http://dx.doi.org/10.4018/ijcwt.2013070105.
Full textBorum, Randy, John Felker, Sean Kern, Kristen Dennesen, and Tonya Feyes. "Strategic cyber intelligence." Information & Computer Security 23, no. 3 (July 13, 2015): 317–32. http://dx.doi.org/10.1108/ics-09-2014-0064.
Full textFischer, Bruno, Dirk Meissner, Richard Nyuur, and David Sarpong. "Guest Editorial: Cyber-Attacks, Strategic Cyber-Foresight, and Security." IEEE Transactions on Engineering Management 69, no. 6 (December 2022): 3660–63. http://dx.doi.org/10.1109/tem.2022.3204165.
Full textLehto, Martti. "The Cyberspace Threats and Cyber Security Objectives in the Cyber Security Strategies." International Journal of Cyber Warfare and Terrorism 3, no. 3 (July 2013): 1–18. http://dx.doi.org/10.4018/ijcwt.2013070101.
Full textJuurvee, Ivo, and Uku Arold. "Psychological Defence and Cyber Security." Revista ICONO14 Revista científica de Comunicación y Tecnologías emergentes 19, no. 1 (January 1, 2021): 70–94. http://dx.doi.org/10.7195/ri14.v19i1.1628.
Full textRomashkina, Nataliya, and Dmitry Stefanovich. "Strategic Risks and Problems of Cyber Security." Voprosy kiberbezopasnosti, no. 5(39) (2020): 77–86. http://dx.doi.org/10.21681/2311-3456-2020-05-77-86.
Full textJames, Lee. "Making cyber-security a strategic business priority." Network Security 2018, no. 5 (May 2018): 6–8. http://dx.doi.org/10.1016/s1353-4858(18)30042-4.
Full textAlghamdi, Mohammed I. "A Strategic Vision to Reduce Cybercrime to Enhance Cyber Security." Webology 17, no. 2 (December 21, 2020): 289–95. http://dx.doi.org/10.14704/web/v17i2/web17031.
Full textBarber, Craig. "Cyber Security Predicting the Future." ITNOW 62, no. 1 (February 17, 2020): 30–31. http://dx.doi.org/10.1093/itnow/bwaa013.
Full textMANUILOV, Y. "Overview of novels of domestic legislation in the field of cyber security (on the example of the Cyber Security Strategy of Ukraine for 2021 – 2025)." INFORMATION AND LAW, no. 4(39) (December 9, 2021): 98–105. http://dx.doi.org/10.37750/2616-6798.2021.4(39).248821.
Full textITAI, YAYA, and Emmanuel Onwubiko. "Impact of Ransomware on Cybersecurity." INTERNATIONAL JOURNAL OF COMPUTERS & TECHNOLOGY 17, no. 1 (January 16, 2018): 7077–80. http://dx.doi.org/10.24297/ijct.v17i1.6750.
Full textRamadhan, Iqbal. "STRATEGI KEAMANAN CYBER SECURITY DI KAWASAN ASIA TENGGARA." Jurnal Asia Pacific Studies 3, no. 2 (January 16, 2020): 181–92. http://dx.doi.org/10.33541/japs.v3i1.1081.
Full textZvozdetska, Oksana. "NATO’s new strategic concept in cybersecurity issues in the context of up-to-the date vulnerability and threat information." Mediaforum : Analytics, Forecasts, Information Management, no. 6 (December 17, 2018): 71–93. http://dx.doi.org/10.31861/mediaforum.2018.6.71-93.
Full textGRIBOIEDOV, S. "Some issues of improving state planning in the sphere of cyber security in conditions of hybrid threats." INFORMATION AND LAW, no. 1(36) (March 11, 2021): 114–22. http://dx.doi.org/10.37750/2616-6798.2021.1(36).238191.
Full textShairgojri, Aadil Ahmad, and Showkat Ahmad Dar. "Emerging Cyber Security India’s Concern and Threats." Journal of Artificial Intelligence, Machine Learning and Neural Network, no. 25 (August 2, 2022): 1–10. http://dx.doi.org/10.55529/jaimlnn.25.1.10.
Full textShairgojri, Aadil Ahmad, and Showkat Ahmad Dar. "Emerging Cyber Security India’s Concern and Threats." International Journal of Information technology and Computer Engineering, no. 24 (July 31, 2022): 17–26. http://dx.doi.org/10.55529/ijitc.24.17.26.
Full textShairgojri, Aadil Ahmad, and Showkat Ahmad Dar. "Emerging Cyber Security India’s Concern and Threats." Journal of Technology Innovations and Energy 1, no. 2 (June 18, 2022): 39–44. http://dx.doi.org/10.56556/jtie.v1i2.201.
Full textKela, Rushabh, Abhinav Chawla, Pratishtha Gaur, and Dr Manikandan K. "IMPLEMENTATION OF CYBER SECURITY ATTACKS AND STRATEGIC MITIGATION MECHANISMS." international journal of advanced research in computer science 13, no. 4 (August 20, 2022): 28–34. http://dx.doi.org/10.26483/ijarcs.v13i4.6890.
Full textĐekić, Milica. "How to transfer cyber security skill?" Tehnika 77, no. 3 (2022): 399–402. http://dx.doi.org/10.5937/tehnika2203399d.
Full textFedoniuk, Serhii, and Serhii Maghdysiuk. "US-China Confrontation in Cyber Security." Історико-політичні проблеми сучасного світу, no. 45 (June 27, 2022): 113–27. http://dx.doi.org/10.31861/mhpi2022.45.113-127.
Full textZhou, Hongren. "Strategic Stability in Cyberspace: A Chinese View." China Quarterly of International Strategic Studies 05, no. 01 (January 2019): 81–95. http://dx.doi.org/10.1142/s2377740019500088.
Full textTariq, Khawaja Dawood. "DEFINING CYBER WARFARE." ISSRA Papers 13 (December 31, 2021): 15–26. http://dx.doi.org/10.54690/issrap.v13ixiii.102.
Full textProshchyn, Ihor, and Volodymyr Shypovskyi. "Cyber security in the national security & defence sector of Ukraine: todayʼs challenges and ways to avoid possible threats." Journal of Scientific Papers "Social development and Security" 10, no. 1 (February 29, 2020): 3–8. http://dx.doi.org/10.33445/sds.2020.10.1.1.
Full textShihan, Khadija Hassan, and Mustafa Jawad Radif. "Internal and External Factors to Adopt a Cyber Security Strategy in Iraqi Organisations." Webology 19, no. 1 (January 20, 2022): 5181–98. http://dx.doi.org/10.14704/web/v19i1/web19349.
Full textJakubczak, Weronika, and Hon-min Yau. "TRENDS IN CYBERSECURITY REGULATIONS OF TAIWAN (REPUBLIC OF CHINA) – Phases of Pro motion of major cyber security plans and programs in the National Cyber Security Program of Taiwan (2021–2024)." Zeszyty Naukowe SGSP 1, no. 80 (December 21, 2021): 199–216. http://dx.doi.org/10.5604/01.3001.0015.6485.
Full textKOZUB, Marian, and Adrian Mitręga. "Strategic Thinking about Security in Cyberspace." Rocznik Bezpieczeństwa Morskiego XV - Wydanie specjalne (July 5, 2021): 1–28. http://dx.doi.org/10.5604/01.3001.0015.5893.
Full textHuhtinen, Aki-Mauri, Arto Hirvelä, and Tommi Kangasmaa. "The Opportunities of National Cyber Strategy and Social Media in the Rhizome Networks." International Journal of Cyber Warfare and Terrorism 4, no. 2 (April 2014): 23–34. http://dx.doi.org/10.4018/ijcwt.2014040102.
Full textCzosseck, Christian, Rain Ottis, and Anna-Maria Talihärm. "Estonia after the 2007 Cyber Attacks." International Journal of Cyber Warfare and Terrorism 1, no. 1 (January 2011): 24–34. http://dx.doi.org/10.4018/ijcwt.2011010103.
Full textChokhawala, Kirit I., Vishal H. Bhemwala, and Jayesh N. Modi. "A Strategic approach, Issues and Challenges of Adaptive Cyber Security." RESEARCH REVIEW International Journal of Multidisciplinary 5, no. 7 (July 25, 2020): 121–24. http://dx.doi.org/10.31305/rrijm.2020.v05.i07.025.
Full textBhattacharjee, Subimal. "The Strategic Dimensions of Cyber Security in the Indian Context." Strategic Analysis 33, no. 2 (April 2009): 196–201. http://dx.doi.org/10.1080/09700160802702619.
Full textKello, Lucas. "The Meaning of the Cyber Revolution: Perils to Theory and Statecraft." International Security 38, no. 2 (October 2013): 7–40. http://dx.doi.org/10.1162/isec_a_00138.
Full textWatanabe, Seiko. "STRATEGIC ANALYSIS OF CAPACITY BUILDING FOR THE CYBER SECURITY OF THE UNITED STATES IN ASIA." Jurnal Asia Pacific Studies 4, no. 2 (December 28, 2020): 100–111. http://dx.doi.org/10.33541/japs.v4i2.2800.
Full textKRASNIKOV, S. "Organizational and legal framework of strengthening state capacities in the field of cyber defense." INFORMATION AND LAW, no. 4(39) (December 9, 2021): 155–61. http://dx.doi.org/10.37750/2616-6798.2021.4(39).248846.
Full textPăunescu, Dragoș-Mihai. "NATO’S ENCOUNTERS IN THE CYBER DOMAIN." STRATEGIES XXI - Security and Defense Faculty 17, no. 1 (November 9, 2021): 153–58. http://dx.doi.org/10.53477/2668-2001-21-18.
Full textZeijlemaker, Sander, Etiënne A. J. A. Rouwette, Giovanni Cunico, Stefano Armenia, and Michael von Kutzschenbach. "Decision-Makers’ Understanding of Cyber-Security’s Systemic and Dynamic Complexity: Insights from a Board Game for Bank Managers." Systems 10, no. 2 (April 14, 2022): 49. http://dx.doi.org/10.3390/systems10020049.
Full textPutranti, Ika Riswanti, Anita Amaliyah, and Reni Windiani. "Smartcity : Model Ketahanan Siber Untuk Usaha Kecil Dan Menengah." Jurnal Ketahanan Nasional 26, no. 3 (December 31, 2020): 359. http://dx.doi.org/10.22146/jkn.57322.
Full textPandey, Shipra, Rajesh Kumar Singh, Angappa Gunasekaran, and Anjali Kaushik. "Cyber security risks in globalized supply chains: conceptual framework." Journal of Global Operations and Strategic Sourcing 13, no. 1 (January 13, 2020): 103–28. http://dx.doi.org/10.1108/jgoss-05-2019-0042.
Full textIsmail, Suhaila, Elena Sitnikova, and Jill Slay. "SCADA Systems Cyber Security for Critical Infrastructures." International Journal of Cyber Warfare and Terrorism 6, no. 3 (July 2016): 79–95. http://dx.doi.org/10.4018/ijcwt.2016070107.
Full textMolis, Arūnas, Claudia Palazzo, and Kaja Ainsalu. "Mitigating Risks of Hybrid War: Search for an Effective Energy Strategyin The Baltic States." Journal on Baltic Security 4, no. 2 (December 1, 2018): 23–32. http://dx.doi.org/10.2478/jobs-2018-0009.
Full textTrinks, Virgínia de Melo Dantas, Robson de Oliveira Albuquerque, Rafael Rabelo Nunes, and Gibran Ayupe Mota. "Strategic Assessment of Cyber Security Contenders to the Brazilian Agribusiness in the Beef Sector." Information 13, no. 9 (September 13, 2022): 431. http://dx.doi.org/10.3390/info13090431.
Full textSingh, Pukhraj. "Battle-Ready for the Fifth Dimension :." Jindal Journal of International Affairs 1, no. 1 (October 1, 2011): 339–51. http://dx.doi.org/10.54945/jjia.v1i1.24.
Full textSamonek, Aleksandra. "What Is the Future of European Cyber Security? Three Principles of European Cooperation and the Hybrid Joint Strategy of Cyber Defence." Studia Europejskie - Studies in European Affairs 24, no. 2 (July 19, 2020): 43–60. http://dx.doi.org/10.33067/se.2.2020.3.
Full textRenard, Thomas. "Partnering for Global Security: The EU, Its Strategic Partners and Transnational Security Challenges." European Foreign Affairs Review 21, Issue 1 (February 1, 2016): 9–33. http://dx.doi.org/10.54648/eerr2016003.
Full textDOGARU, Olguţa. "The Role of Strategic Partnerships in Maintaining Cyber Security through Cooperation." International Journal of Information Security and Cybercrime 4, no. 1 (June 29, 2015): 22–26. http://dx.doi.org/10.19107/ijisc.2015.01.03.
Full textStaszczyk, Artur. "European Parliament Position on EU Cyber Security and Defense Policy." Reality of Politics 10, no. 1 (March 31, 2019): 122–33. http://dx.doi.org/10.15804/rop201908.
Full textUkhanova, Erkeley. "Cybersecurity and cyber defence strategies of Japan." SHS Web of Conferences 134 (2022): 00159. http://dx.doi.org/10.1051/shsconf/202213400159.
Full textTkach, Yuliia. "CONCEPTUAL MODEL OF CYBER SPACE SECURITY." Technical Sciences and Technologies, no. 4(22) (2020): 96–108. http://dx.doi.org/10.25140/2411-5363-2020-4(22)-96-108.
Full textSebekin, S. "Choosing between Persistent Engagement and Deterrence in the American Cyber security Strategy." International Trends / Mezhdunarodnye protsessy 18, no. 3 (2020): 96–125. http://dx.doi.org/10.17994/it.2020.18.3.62.3.
Full textKosiński, Jerzy, Tomasz Gontarz, and Robert Kośla. "Cybersecurity and the Handling of Cyber Incidents." Internal Security 10, no. 2 (September 16, 2019): 107–28. http://dx.doi.org/10.5604/01.3001.0013.4219.
Full textNobles, Calvin. "Disrupting the U.S. National Security Through Financial Cybercrimes." International Journal of Hyperconnectivity and the Internet of Things 3, no. 1 (January 2019): 1–21. http://dx.doi.org/10.4018/ijhiot.2019010101.
Full text