Organization
Macedonian Path Towards Cybersecurity
Macedonian Path Towards Cybersecurity." Information & Security: An International Journal 32, no. 2 (2015): 109-119.
" Macedonian Path Towards Cybersecurity — Downloaded 9414 times
Creating and Strengthening Cybersecurity in the Republic of Moldova
Creating and Strengthening Cybersecurity in the Republic of Moldova." Information & Security: An International Journal 32, no. 2 (2015): 97-108.
" Creating and Strengthening Cybersecurity in the Republic of Moldova — Downloaded 7354 times
Trusted Networks Initiative: The Netherlands’ Response to DDoS Attacks
Trusted Networks Initiative: The Netherlands’ Response to DDoS Attacks." Information & Security: An International Journal 32, no. 1 (2015): 65-70.
" Trusted Networks Initiative: The Netherlands’ Response to DDoS Attacks — Downloaded 5656 times
Cyberterrorism and Turkey’s Counter-Cyberterrorism Efforts
Cyberterrorism and Turkey’s Counter-Cyberterrorism Efforts." Information & Security: An International Journal 32, no. 1 (2015): 42-64.
" Cyberterrorism and Turkey’s Counter-Cyberterrorism Efforts — Downloaded 9708 times
French Cyber Security and Defence: An Overview
French Cyber Security and Defence: An Overview." Information & Security: An International Journal 32, no. 1 (2015): 29-41.
" French Cyber Security and Defence: An Overview — Downloaded 15798 times
Organising National Cybersecurity Centres
Organising National Cybersecurity Centres." Information & Security: An International Journal 32, no. 1 (2015): 9-26.
" Organising National Cybersecurity Centres — Downloaded 7172 times
Roles and Functions of Cybersecurity Manager
At issue is an overview of the requirements for the person who performs the functions of cybersecurity manager focusing on its roles and responsibilities. Among the main roles are considered obligations of the cybersecurity manager to formulate objectives, priorities and tasks within the department, creating a team of specialists in cybersecurity, balancing the interests and needs of participants in the team, etc.
Securing Cyberspace
Securing Cyberspace." Information & Security: An International Journal 18 (2006): 5-10.
" 1800_securing_cyberspace.pdf — Downloaded 1072 times
Challenges in E-Government and Security of Information
Challenges in E-Government and Security of Information." Information & Security: An International Journal 15, no. 1 (2004): 9-20.
" 15.01_Hwang_Li_ Shen_Chu.pdf — Downloaded 14872 times