-
1
-
-
80052903392
-
-
London, England: Association of Chief Police Officer of England, Wales and Northern Ireland
-
Amoo P., Thomson N. ACPO E-crime strategy. London, England: Association of Chief Police Officer of England, Wales and Northern Ireland ; 2009:
-
(2009)
ACPO E-crime Strategy
-
-
Amoo, P.1
Thomson, N.2
-
5
-
-
21244432672
-
The cyberwar debate: Perception and politics in U.S. critical infrastructure protection
-
Bendrath R.. The cyberwar debate: Perception and politics in U.S. critical infrastructure protection. Information & Security. 2001 ; 7: 80-103
-
(2001)
Information & Security
, vol.7
, pp. 80-103
-
-
Bendrath, R.1
-
6
-
-
0038544671
-
Is the mouse click mighty enough to bring society to its knees?
-
Bhalla N.. Is the mouse click mighty enough to bring society to its knees?. Computers & Security. 2003 ; 22: 322-336
-
(2003)
Computers & Security
, vol.22
, pp. 322-336
-
-
Bhalla, N.1
-
12
-
-
84861970077
-
-
Cabinet Office
-
Cabinet Office. (2009b). National security strategy-2009 update published. Retrieved from http://www.cabinetoffice.gov.uk/newsroom/news- releases/2009/090625-security.aspx
-
(2009)
National Security strategy-2009 Update Published
-
-
-
14
-
-
0004033251
-
-
(2nd ed.). London, England: SAGE. London, England: SAGE
-
Dean M. Governmentality: Power and rule in modern society. 2010 ). Governmentality: Power and rule in modern society (2nd ed.). London, England: SAGE. London, England: SAGE ; 2010:
-
(2010)
Governmentality: Power and Rule in Modern Society
-
-
Dean, M.1
-
15
-
-
77950801692
-
-
Department of Homeland Security
-
Department of Homeland Security. (2009). A roadmap for cybersecurity research. Retrieved from www.cyber.st.dhs.gov/docs/DHS-Cybersecurity-Roadmap.pdf
-
(2009)
A Roadmap for Cybersecurity Research
-
-
-
16
-
-
84861978237
-
-
Collins A., ed. Oxford, England: Oxford University Press
-
Emmers R. Contemporary security studies. Collins A., ed. Oxford, England: Oxford University Press ; 2009: 136-151.
-
(2009)
Contemporary Security Studies
, pp. 136-151
-
-
Emmers, R.1
-
20
-
-
84861962990
-
-
Get Safe Online
-
Get Safe Online. (2010). Security is your responsibility. Retrieved from http://www.getsafeonline.org/nqcontent.cfm?a-id=1143
-
(2010)
Security Is Your Responsibility
-
-
-
21
-
-
84861978238
-
-
Government Communications Headquarters
-
Government Communications Headquarters. (2009). GCHQ to host UK cyber security operations centre [Press Release]. Retrieved from http://www.gchq.gov. uk/Press/Pages/Cyber-Security-Operations-Centre.aspx
-
(2009)
GCHQ to Host UK Cyber Security Operations Centre [Press Release]
-
-
-
24
-
-
80051725218
-
-
Haggerty K. Ericson R. V., ed. Toronto, Ontario, Canada: Toronto University Press
-
Haggerty K. The new politics of surveillance and visibility. Haggerty K. Ericson R. V., ed. Toronto, Ontario, Canada: Toronto University Press ; 2006b: 250-278.
-
(2006)
The New Politics of Surveillance and Visibility
, pp. 250-278
-
-
Haggerty, K.1
-
26
-
-
28244435923
-
Pattern of global cyber war and crime: A conceptual framework
-
Ksheti K.. Pattern of global cyber war and crime: A conceptual framework. Journal of International Management. 2005 ; 11: 541-562
-
(2005)
Journal of International Management
, vol.11
, pp. 541-562
-
-
Ksheti, K.1
-
29
-
-
84861998228
-
Cyber security intelligence: Time for some perspective
-
Lewis H.. Cyber security intelligence: Time for some perspective. RUSI Monitor. 2010 ; 8 (3). 4-6
-
(2010)
RUSI Monitor
, vol.8
, Issue.3
, pp. 4-6
-
-
Lewis, H.1
-
31
-
-
84861976460
-
Government needs to define cyber war
-
MillerJ. (2010). Government needs to define cyber war. Federal News Radio. Retrieved from http://www.federalnewsradio.com/index.php?sid= 1880751&nid=35
-
(2010)
Federal News Radio
-
-
Miller, J.1
-
33
-
-
79961179184
-
-
National Security Council
-
National Security Council. (2010). The comprehensive national cybersecurity initiative. Retrieved from http://www.whitehouse.gov/ cybersecurity/comprehensive-national-cybersecurity-initiative
-
(2010)
The Comprehensive National Cybersecurity Initiative
-
-
-
34
-
-
31144461818
-
Where computer security meets national security
-
Nissenbaum H.. Where computer security meets national security. Ethics and Information Technology. 2005 ; 7: 61-73
-
(2005)
Ethics and Information Technology
, vol.7
, pp. 61-73
-
-
Nissenbaum, H.1
-
39
-
-
84874623806
-
-
Denmark A. M. Mulvenan J., ed. Washington, DC: Center for a New American Security
-
Rattray G., Evans C., Healy J. American security in the cyber commons Contested commons: The future of American power in a multi-polar world. Denmark A. M. Mulvenan J., ed. Washington, DC: Center for a New American Security ; 2010: 137-176.
-
(2010)
American Security in the Cyber Commons Contested Commons: The Future of American Power in A Multi-polar World
, pp. 137-176
-
-
Rattray, G.1
Evans, C.2
Healy, J.3
-
41
-
-
51949117093
-
Cybercrime and the culture of fear: Social science fiction(s) and the production of knowledge about cybercrime
-
Wall D. S.. Cybercrime and the culture of fear: Social science fiction(s) and the production of knowledge about cybercrime. Information, Communication & Society. 2008 ; 11: 861-884
-
(2008)
Information, Communication & Society
, vol.11
, pp. 861-884
-
-
Wall, D.S.1
|