Vesselin Petkov IntroductionShort CVinsert short SV here Full profileThis is the longer CV, presenting education, work experience, etc. Publications Svete, Uroš. Novi izzivi za obramboslovje - obrambne in varnostne razsežnosti uporabe informacijske tehnologije., 2004. Cavelty, Myriam Dunn. "Cyber-Terror– Looming Threat or Phantom Menace? The Framing of the US Cyber-Threat Debate." Journal of Information Technology & Politics 4, no. 1 (2007). Cavelty, Myriam Dunn. "From Cyber-Bombs to Political Fallout: Threat Representations with an Impact in the Cyber-Security Discourse." International Studies Review 15 (2013): 105-122. Karatzogianni, Athina. Cyber-Conflict and Global Politics. Routledge, 2009. Lawson, Sean. Beyond cyber-doom: Cyberattack Scenarios and the Evidence of History In Working Paper. Mercatus Center, George Mason University, 2011. Giacomello, Giampiero. National Governments and Control of the Internet: A Digital Challenge. London: Routledge, 2004. Barnard-Wills, David, and Debi Ashenden. "Securing Virtual Space: Cyber War, Cyber Terror, and Risk." Space and Culture XX, no. X (2012): 1-14. Lawson, Sean. "Beyond Cyber-Doom: Assessing the Limits of Hypothetical Scenarios in the Framing of Cyber-Threats." Journal of Information Technology & Politics 10, no. 1 (2013). Mendez, Fernando. "The European Union and cybercrime: insights from comparative federalism." Journal of European Public Policy 12, no. 3 (2005). Stevens, Tim. Cyber Security and the Politics of Time. Cambridge University Press, 2016. Slayton, Rebecca. "What Is the Cyber Offense-Defense Balance? Conceptions, Causes, and Assessment." International Security 41, no. 3 (2017). Eskola, Marko. "From Risk Society to Network Society: Preventing Cybercrimes in the 21st Century." Journal of Applied Security Research 7, no. 1 (2012). Ashenden, Debi. "Cyber Security: Time for Engagement and Debate." In European Conference on Information Warfare and Security., 2011. Lawson, Sean. "Motivating Cybersecurity: Assessing the Status of Critical Infrastructure as an Object of Cyber Threats." In Securing Critical Infrastructures and Critical Control Systems: Approaches for Threat Protection, 168-189. IGI Global, 2013. Ashraf, Cameran Hooshang. The Spatiality of Power in Internet Control and Cyberwar. Vol. Doctor of Philosophy in Geography. Los Angeles: University of California, 2015. "Securing the homeland: critical infrastructure, risk and (in)security. Introduction ." In Securing 'the Homeland': Critical Infrastructure, Risk and (In)Security . Routledge, 2008. Gomez, Miguel Alberto N.. "Arming Cyberspace: The Militarization of a Virtual Domain." Global Security and Intelligence Studies 1, no. 2 (2016). Tomblin, Jordon. The Rehearsal and Performance of Lawful Access. Vol. Master of Arts in Sociology: Specialization in Digital Humanities. Ontario: Carleton University Ottawa, 2015. Walter, Gregor. Internetkriminalität: eine Schattenseite der Globalisierung In SWP-Studie. Berlin: Stiftung Wissenschaft und Politik -SWP- Deutsches Institut für Internationale Politik und Sicherheit, 2008. Siudak, Piotr. "Redefining cybersecurity through processual ontology of the cyberspace." Politeja 50, no. 14 (2017): 194-211. Smeets, Max. "Integrating offensive cyber capabilities: meaning, dilemmas, and assessment." Defence Studies 18, no. 4 (2018). Boys, James D.. "The Clinton administration’s development and implementation of cybersecurity strategy (1993–2001)." Intelligence and National Security 33, no. 5 (2018). Cavelty, Myriam Dunn. "Like a Phoenix from the Ashes: The Reinvention of Critical Infrastructure Protection as Distributed Security." In Securing the homeland. London: Routledge, 2008. Jones, Synthia S., Bernard Flowers, and Karlton D. Johnson. To Wield Excalibur: Seeking Unity of Effort in Joint Information Operations. Joint Forces Staff College, Joint and Combined Staff Officer School, 2002. Technology in the 21st Century. WordPress.com, 2012. Pages« първа ‹ предишна … 331 332 333 334 335 336 337 338 339 … следваща › последна »