Organization
Macedonian Path Towards Cybersecurity
Macedonian Path Towards Cybersecurity." Information & Security: An International Journal 32, no. 2 (2015): 109-119.
" Macedonian Path Towards Cybersecurity — Downloaded 10016 times
Creating and Strengthening Cybersecurity in the Republic of Moldova
Creating and Strengthening Cybersecurity in the Republic of Moldova." Information & Security: An International Journal 32, no. 2 (2015): 97-108.
" Creating and Strengthening Cybersecurity in the Republic of Moldova — Downloaded 7800 times
Trusted Networks Initiative: The Netherlands’ Response to DDoS Attacks
Trusted Networks Initiative: The Netherlands’ Response to DDoS Attacks." Information & Security: An International Journal 32, no. 1 (2015): 65-70.
" Trusted Networks Initiative: The Netherlands’ Response to DDoS Attacks — Downloaded 6172 times
Cyberterrorism and Turkey’s Counter-Cyberterrorism Efforts
Cyberterrorism and Turkey’s Counter-Cyberterrorism Efforts." Information & Security: An International Journal 32, no. 1 (2015): 42-64.
" Cyberterrorism and Turkey’s Counter-Cyberterrorism Efforts — Downloaded 10179 times
French Cyber Security and Defence: An Overview
French Cyber Security and Defence: An Overview." Information & Security: An International Journal 32, no. 1 (2015): 29-41.
" French Cyber Security and Defence: An Overview — Downloaded 16756 times
Organising National Cybersecurity Centres
Organising National Cybersecurity Centres." Information & Security: An International Journal 32, no. 1 (2015): 9-26.
" Organising National Cybersecurity Centres — Downloaded 7619 times
Roles and Functions of Cybersecurity Manager
At issue is an overview of the requirements for the person who performs the functions of cybersecurity manager focusing on its roles and responsibilities. Among the main roles are considered obligations of the cybersecurity manager to formulate objectives, priorities and tasks within the department, creating a team of specialists in cybersecurity, balancing the interests and needs of participants in the team, etc.
Securing Cyberspace
Securing Cyberspace." Information & Security: An International Journal 18 (2006): 5-10.
" 1800_securing_cyberspace.pdf — Downloaded 1283 times
Challenges in E-Government and Security of Information
Challenges in E-Government and Security of Information." Information & Security: An International Journal 15, no. 1 (2004): 9-20.
" 15.01_Hwang_Li_ Shen_Chu.pdf — Downloaded 15851 times