Connections the quarterly journal

Search form

  • Like Connections page on Facebook
  • Follow us on Twitter
  • Find connections on Istagram
  • Connect with us on LinkedIN
  • Subscribe to Connections RSS
  • English
  • Русский
  • Journal
    • Previews
    • Archive
    • Top papers
    • Athena Award
  • Submissions
    • Guidelines
    • Copyright information
    • Conflict of interest
    • Ethics in publishing
    • Themes
    • Calls for articles
    • Submit a paper
  • About
    • Mission
    • Editorial policy
    • Disclaimer
    • Editorial Board
    • Advisers
    • Author Index
    • Indexing & Archiving
    • Contact Us
    • Privacy policy
Share/Save

Securing Cyberspace

1800_securing_cyberspace.pdf

Publication Type:

Journal Article

Authors:

Petya Ivanova

Source:

Information & Security: An International Journal, Volume 18, p.5-10 (2006)
Tag: 
Organization
Cyber threats
Tags: 
Cybersecurity
I&S tags: 
Cybersecurity
  • 12442 reads
  • Google Scholar
  • DOI
  • RTF
  • EndNote XML

Check also our Google Scolar profile

  • Downloads
  • How to cite
  • File Name: 1800_securing_cyberspace.pdf
    Size: 96.39 KB
    Number of Downloads: 861
APA style: Ivanova, P. (2006).  Securing Cyberspace. Information & Security: An International Journal. 18, 5-10.
Chicago style: Ivanova, Petya. "Securing Cyberspace." Information & Security: An International Journal 18 (2006): 5-10.
IEEE style: Ivanova, P., "Securing Cyberspace", Information & Security: An International Journal, vol. 18, pp. 5-10, 2006.
DOI http://dx.doi.org/10.11610/isij.1800

Related Publications

Evolution of Police Roles in Combatting Cybercrime in the Czech Republic, 2015-2020
Standardization in the Field of Cybersecurity and Cyber Protection in Ukraine
Integrated Approach to Cyber Defence: Human in the Loop. Technical Evaluation Report
TAS: Trust Assessment System
Cyberwarriors: The Backbone of the Future Military or a Misnomer?
Practical Steps in Developing a National Network of Cybersecurity Research Centres in the Framework of ECHO Project
Enhancing the Organisational Culture related to Cyber Security during the University Digital Transformation
Information Sharing Models for Early Warning Systems of Cybersecurity Intelligence
A Model of a Cyber Defence Awareness System of Campaigns with Malicious Information
E-Platform to Maintain Digital Competencies for Collaborative Network Organisations
A Governance Model for an EU Cyber Security Collaborative Network – ECSCON
Organizational Learning in the Academic Literature – Systematic Literature Review
Societal Impact Assessment of a Cyber Security Network Project
Tactical Approach to Cyber Defence in IoT Computer Networks
Neglected Cybersecurity Risks in the Public Internet Hosting Service Providers
A Logical Model for Multi-Sector Cyber Risk Management
Cybersecurity in Switzerland: Challenges and the Way Forward for the Swiss Armed Forces
Israel Defense Forces and National Cyber Defense
Austria’s National Cyber Security and Defense Policy: Challenges and the Way Forward
Cyber Defence in Germany: Challenges and the Way Forward for the Bundeswehr
Towards the Design of a Collaborative Cybersecurity Networked Organisation: Identification and Prioritisation of Governance Needs and Objectives
Integrated Model of Knowledge Management for Security of Information Technologies: Standards ISO/IEC 15408 and ISO/IEC 18045
Integrated Security Management System for Enterprises in Industry 4.0
Generalized Net Model of an Automated System for Monitoring, Analysing and Managing Events Related to Information Security
Cyber Situational Awareness and Information Sharing in Critical Infrastructure Organizations
Cooperation Model for Establishing Secure Digital Transformation in Corporations: Overview of Regulatory Issues
DIGILIENCE - A Platform for Digital Transformation, Cyber Security and Resilience
Implementation Hierarchy and CIO Organization in Bulgaria’s Public Administration
The European Union Moves Ahead on Cybersecurity Research Through Enhanced Cooperation and Coordination
Organising for IT Effectiveness, Efficiency and Cyber Resilience in the Academic Sector: National and Regional Dimensions
Information Sharing for Cyber Threats
The Persistent Need to Reform Cyber Security Services: A Case Study on France
Cyber Security and Resilience of Modern Societies: A Research Management Architecture
Cybersecurity: A Generic Reference Curriculum
Cybersecurity Innovation in NATO: Lessons Learned and Recommendations
The Obama Administration and Incident Response: A Report
Multi-stakeholder Approach to Cybersecurity and Resilience
“We Have Problems for Solutions”: The State of Cybersecurity in Bosnia and Herzegovina
Towards a More Resilient Cyberspace: The Case of Albania
Macedonian Path Towards Cybersecurity
Creating and Strengthening Cybersecurity in the Republic of Moldova
Trusted Networks Initiative: The Netherlands’ Response to DDoS Attacks
Cyberterrorism and Turkey’s Counter-Cyberterrorism Efforts
French Cyber Security and Defence: An Overview
Organising National Cybersecurity Centres
Challenges in E-Government and Security of Information
  • Trending
  • Latest
  • Most cited
  • Corruption as a Cybersecurity Threat in the New World Order (3,604)
  • Disinformation: Policy Responses to Building Citizen Resiliency (3,543)
  • Social Media – Hate Speech – Hate Crime (3,476)
  • Future Development of Quantum Computing and Its Relevance to NATO (3,392)
  • Cyber Skills Gaps – A Systematic Review of the Academic Literature (3,237)
view all
  • Political Analysis or Fortune-Telling by Crystal-Ball? Western Think Tanks' Challenges with Forecasting Putin's War
  • Lessons for NATO to Be Learned from Putin's War in Ukraine: Global Health Engagement, Interoperability, and Lethality
  • Excessive Brotherly Love? - 'Fraternity' of Russians and Ukrainians as a Russian Propaganda Narrative
  • The Impact of War on the Ukraine Military Education System: Moving Forward in War and Peace
  • Distorting Your Perception of Russia’s Aggression: How Can We Combat Information Warfare?
view all
Introduction to Program-based Defense Resource Management (8)
The Art of Shaping Defense Policy: Scope, Components, Relationships (but no Algorithms) (6)
NATO and the South Caucasus: Armenia, Azerbaijan, and Georgia on Different Tracks (5)
Terror-Crime Nexus? Terrorism and Arms, Drug, and Human Trafficking in Georgia (4)
Terrorist Routes in Central Asia: Trafficking Drugs, Humans, and Weapons (4)
view all

© Partnership for Peace Consortium of Defense Academies and Security Studies Institutes, 2012-2022
This site was designed and is maintained by Procon Ltd., Publisher of Connections: The Quarterly Journal