Connections the quarterly journal

Форма поиска

  • English
  • Русский
  • Журнал
    • Превью
    • Приоритетные темы на будущее
    • Будущие номера
    • Самые популярные статьи
    • Архив
  • Информация для авторов
  • Афина
Share/Save

International Arms Control and Law Enforcement in the Information Revolution

10.4.05_Barmin_Jones_Moiseeva_Winkelman.pdf

Вид публикации:

Journal Article

Авторы:

Yury Barmin; Grace Jones; Zev Winkelman; Sonya Moiseeva

Источник:

Connections: The Quarterly Journal, Volume 10, № 4, p.73-94 (2011)
  • 17197 просмотров
  • Google Scholar
  • DOI
  • RTF
  • EndNote XML

References

Markoff, John. "At Internet Conference, Signs of Agreement Appear Between U.S. and Russia ." The New York Times (2010).
Talbot, David. "Russia’s Cybersecurity Plans." Technology Review (2010).
Nazario, Jose. "Politically Motivated Denial of Service Attacks." In The Virtual Battlefield: Perspectives on Cyber Warfare., 2009.
James, Randy. "A Brief History of Cybercrime." Time (2009).
J, William, and I Lynn. "Defending A New Domain: The Pentagon’s Cyberstrategy." Foreign Affairs (2010).
Hathaway, Melissa. Securing Our Digital Future., 2009.
Thibodeau, Patrick. "Obama Seeks Big Boost in Cybersecurity Spending." Computer- world (2011).
Thomas, T.. Comparing U.S., Russian and Chinese Information Operations Concepts. Fort Leavenworth, KS: Foreign Military Studies Office, 2004.
Sherstyuk, Vladimir P.. Scientific and Methodological Problems of Information Security . Moscow: Information Security Institute of Moscow State University, 2004.
Understanding Cybercrime: A Guide for Developing Countries. Geneva: International Telecommunication Union (ITU), Telecommunication Development Centre, 2009.
Dylevski, Igor, Sergei Komov, and Sergei Korotkov. Military Aspects of Ensuring International In- formation Security in the Context of Elaborating Universally Acknowledged Principles of International Law. Geneva: United Nations Institute for Disarmament Research, 2007.
O’Murchu, Liam. "Last Minute Paper: An In-depth Look into Stuxnet." Virus Bulletin (2010).
Sharp, Walter Gary. Cyberspace and the Use of Force . Falls Church, VA: Aegis Research Corporation, 1999.
Vatis, Michael. The Council of Europe Convention on Cybercrime, Proceedings of the Workshop on Deterring Cyberattacks: Informing Strategies and Developing Options. Washington, D.C.: National Academies Press, 2010.
Libicki, Martin C.. Cyberdeterrence and Cyberwar . Santa Monica, CA: RAND, 2009.
Srikrishna, Devabhaktuni. "Cyberwarfare: Surviving an Attack." Public Interest Report 63, no. 3 (2010).

Active calls for articles

Empowering the Trans-Atlantic Defense Industrial Base

Deadline:
30.06.2025

Hybrid Operations

Deadline:
15.09.2025

Check also our Google Scholar profile

  • Downloads
  • Cited in
  • How to cite
  • File Name: 10.4.05_Barmin_Jones_Moiseeva_Winkelman.pdf
    Size: 593.46 КБ
    Number of Downloads: 3898
"A Conceptual Model for the Development of a National Cybersecurity Index: An Integrated Framework." In Twenty-first Americas Conference on Information Systems. Puerto Rico, 2015.
"An Evaluation of National Cybersecurity Policies for the Maritime Transportation System." (2017).
APA style: Barmin, Y., Jones G., Winkelman Z., & Moiseeva S. (2011).  International Arms Control and Law Enforcement in the Information Revolution. Connections: The Quarterly Journal. 10(4), 73-94.
Chicago style: Barmin, Yury, Grace Jones, Zev Winkelman, and Sonya Moiseeva. "International Arms Control and Law Enforcement in the Information Revolution." Connections: The Quarterly Journal 10, no. 4 (2011): 73-94.
IEEE style: Barmin, Y., G. Jones, Z. Winkelman, and S. Moiseeva, "International Arms Control and Law Enforcement in the Information Revolution", Connections: The Quarterly Journal, vol. 10, issue 4, pp. 73-94, Fall 2011.
DOI http://dx.doi.org/10.11610/Connections.10.4.05
  • Trending
  • Latest
  • Most cited
  • Борьба с преступностью, ненавистью и дезинформацией в киберпространстве (1,014)
  • Дальнейшее развитие квантовых вычислений и их важность для НАТО (1,013)
  • Как сети социального взаимодействия масштабируются в цивилизации (888)
  • Дезинформация: Политическая реакция для повышения устойчивости граждан (882)
  • Последствия русско-украинской войны для права, экономики и региональной безопасности (854)
view all
  • Модернизация управления кадрами в Вооружённых силах Украины в период военного конфликта: Подготовка новых офицеров
  • Русско-украинская война и цена удобрений
  • Влияние русско-украинской гибридной войны на политику и правила кибербезопасности Европейского Союза
  • Вторжение России в Украину и новейшая история белорусской государственности
  • Женщины, мир и безопасность в войне в Украине
view all
Introduction to Program-based Defense Resource Management (8)
The Art of Shaping Defense Policy: Scope, Components, Relationships (but no Algorithms) (6)
NATO and the South Caucasus: Armenia, Azerbaijan, and Georgia on Different Tracks (5)
Terror-Crime Nexus? Terrorism and Arms, Drug, and Human Trafficking in Georgia (4)
Terrorist Routes in Central Asia: Trafficking Drugs, Humans, and Weapons (4)
view all

© Консорциум военных академий и институтов исследования безопасности Партнерства ради мира, 2012-2024
Этот сайт был разработан и поддерживается Procon Ltd., исполнительным издателем журнала Connections: The Quarterly Journal