Connections the quarterly journal

Search form

  • Like Connections page on Facebook
  • Follow us on Twitter
  • Find connections on Istagram
  • Subscribe to Connections RSS
  • English
  • Русский
  • Journal
    • Previews
    • Archive
    • Top papers
    • Athena Award
  • Submissions
    • Guidelines
    • Copyright information
    • Conflict of interest
    • Ethics in publishing
    • Themes
    • Calls for articles
    • Submit a paper
  • About
    • Mission
    • Editorial policy
    • Disclaimer
    • Editorial Board
    • Advisers
    • Author Index
    • Indexing & Archiving
    • Contact Us
    • Privacy policy
Share/Save

Multi-stakeholder Approach to Cybersecurity and Resilience

Publication Type:

Journal Article

Authors:

Todor Tagarev; George Sharkov

Source:

Information & Security: An International Journal, Volume 34, Issue 1, p.59-68 (2016)
Tag: 
Policy and strategy
Organization
Organizing
Tags: 
Cybersecurity
  • 5485 reads
  • Google Scholar
  • DOI
  • RTF
  • EndNote XML
  • Downloads
  • Cited in
  • How to cite
No files have yet been downloaded.
Dulschi, Olivia. Utilisation of Security Systems in Public Administration In Conferinței Științifice Internaționale "Contribuția tinerilor cercetători la dezvoltarea administrației publice". Chișinău: Academia de Administare Publică, 2019.
APA style: Tagarev, T., & Sharkov G. (2016).  Multi-stakeholder Approach to Cybersecurity and Resilience. Information & Security: An International Journal. 34(1), 59-68.
Chicago style: Tagarev, Todor, and George Sharkov. "Multi-stakeholder Approach to Cybersecurity and Resilience." Information & Security: An International Journal 34, no. 1 (2016): 59-68.
IEEE style: Tagarev, T., and G. Sharkov, "Multi-stakeholder Approach to Cybersecurity and Resilience", Information & Security: An International Journal, vol. 34, issue 1, pp. 59-68, 2018, 2016.
DOI https://doi.org/10.11610/isij.3404

Related Publications

Best Practices in the Application of the Concept of Resilience: Building Hybrid Warfare and Cybersecurity Capabilities in the Hungarian Defense Forces
The Concept of Resilience: Security Implications and Implementation Challenges
Assessing the Maturity of National Cybersecurity and Resilience
NATO-EU Cooperation in Cybersecurity and Cyber Defence Offers Unrivalled Advantages
Recommendations and Courses of Action: How to Secure the Post-Covid Future
A Logical Model for Multi-Sector Cyber Risk Management
How Improved Attribution in Cyber Warfare Can Help De-Escalate Cyber Arms Race
National Cyber Security Strategy and the Emergence of Strong Digital Borders
Cybersecurity in Switzerland: Challenges and the Way Forward for the Swiss Armed Forces
Israel Defense Forces and National Cyber Defense
Responding to the Cyber Threat: A UK Military Perspective
Austria’s National Cyber Security and Defense Policy: Challenges and the Way Forward
Cyber Defence in Germany: Challenges and the Way Forward for the Bundeswehr
Towards the Design of a Collaborative Cybersecurity Networked Organisation: Identification and Prioritisation of Governance Needs and Objectives
What If Blockchain Cannot Be Blocked? Cryptocurrency and International Security
DIGILIENCE - A Platform for Digital Transformation, Cyber Security and Resilience
The Concept of Deterrence and its Applicability in the Cyber Domain
Beyond Punishment: Deterrence in the Digital Realm
Theory and Current Practice of Deterrence in International Security
Conceptualizing the Role of Societal Resilience in Countering Hybrid Warfare
The Persistent Need to Reform Cyber Security Services: A Case Study on France
Cybersecurity: A Generic Reference Curriculum
Cybersecurity Innovation in NATO: Lessons Learned and Recommendations
Cyber Operations and Gray Zones: Challenges for NATO
The Obama Administration and Incident Response: A Report
Security Sector Reform Wisdom for Cyber Security Institution Building: The Case of Serbia
A Method for the Development of Cyber Security Strategies
Cybersecurity Strategy’s Role in Raising Kenyan Awareness of Mobile Internet Threats
Macedonian Path Towards Cybersecurity
French Cyber Security and Defence: An Overview
  • Trending
  • Latest
  • Most cited
  • How Improved Attribution in Cyber Warfare Can Help De-Escalate Cyber Arms Race (5,239)
  • National Cyber Security Strategy and the Emergence of Strong Digital Borders (5,012)
  • Austria’s National Cyber Security and Defense Policy: Challenges and the Way Forward (4,676)
  • Cyber Defence in Germany: Challenges and the Way Forward for the Bundeswehr (4,507)
  • Cybersecurity in Switzerland: Challenges and the Way Forward for the Swiss Armed Forces (4,180)
view all
  • Conflict Resilience and the Image of the Other among North and South Koreans
  • After the Crisis: The Role of Resilience in Coming Back Stronger
  • The importance of Resilience in the Agenda Women, Peace and Security, Particularly During the COVID-19 Pandemic
  • Technology as a Resilience Factor in Peace Operations
  • Stabilization Missions – Lessons to Be Learned from Resilience-Based Peacebuilding
view all
Introduction to Program-based Defense Resource Management (8)
The Art of Shaping Defense Policy: Scope, Components, Relationships (but no Algorithms) (6)
NATO and the South Caucasus: Armenia, Azerbaijan, and Georgia on Different Tracks (5)
Terrorist Routes in Central Asia: Trafficking Drugs, Humans, and Weapons (4)
Terror-Crime Nexus? Terrorism and Arms, Drug, and Human Trafficking in Georgia (4)
view all

© Partnership for Peace Consortium of Defense Academies and Security Studies Institutes, 2012-2020
This site was designed and is maintained by Procon Ltd., Publisher of Connections: The Quarterly Journal