Zobrazeno 1 - 10
of 168
pro vyhledávání: '"Cyber-security regulation"'
Publikováno v:
Michalec, O, Milyaeva, S & Rashid, A 2021, ' Reconfiguring Governance : How cyber security regulations are reconfiguring water governance ', Regulation and Governance . https://doi.org/10.1111/rego.12423
Developments in improved monitoring, asset management and resource efficiencies led to the water industry promising a step-change in the design and operation of these facilities: the “blending” of traditional engineering equipment with digital te
Publikováno v:
Journal of Management Information Systems. 37:758-787
Despite the consensus that information security should become an important consideration in information technology (IT) governance rather than the sole responsibility of the IT department, importan...
Publikováno v:
Vestnik RUDN International Relations, Vol 17, Iss 2, Pp 339-348 (2017)
The purpose of this paper is to investigate a significant and increasing role of cybersecurity in world politics. Cybersecurity threats are one of the main national security, public safety, and economic challenges every nation faces in XXI century. C
Autor:
Bradley Fidler
Publikováno v:
Digital Policy, Regulation and Governance. 19:449-465
Purpose The purpose of this paper is to understand the emerging challenges of cybersecurity governance by analyzing the internet’s early history. Design/methodology/approach Tracing the design and management of early internet and network security t
Autor:
Pankaj P.K. Sen, Paul Kaster
Publikováno v:
IEEE Industry Applications Magazine. 23:14-20
Cybersecurity is a topic of increasing importance and interest to small utility operators like rural electric associations. Cyberattacks are a threat to our society's functioning, and cybersecurity is an urgent need in areas that include national sec
Publikováno v:
Journal of Investment Compliance. 18:27-30
Purpose To analyze the cybersecurity regulations for financial institutions issued by the New York State Department of Financial Services on February 16, 2017. Design/methodology/approach This article summarizes the regulations’ scope and requireme
Autor:
Maxim Dobrinoiu
Publikováno v:
International Journal of Information Security and Cybercrime. 6:25-32
Publikováno v:
International Review of Law, Computers & Technology
International Review of Law, Computers & Technology, 31(2), 188-205
International Review of Law, Computers & Technology, 31(2), 188-205
This article focuses on the role of government in relation to cybersecurity. Traditionally, cybersecurity was primarily seen as a technical issue. In recent years, governments have realised that they, too, have a stake in securing the Internet. In th
The international political economy of the hack: A closer look at markets for cybersecurity software
Autor:
Tom McCourt, Patrick Burkart
Publikováno v:
Popular Communication. 15:37-54
This article examines the development of hacking and cybersecurity software packages as commodities, based on an international political economy of vendors and clients operating in the interstices of international law. Offensive hacking and defensive
Autor:
Nir Kshetri
Publikováno v:
IEEE Security & Privacy. 15:80-85
In December 2016, the US Commission on Enhancing National Cybersecurity released the "Report on Securing and Growing the Digital Economy" in response to challenges posed by cyberthreats. This opinion piece details the report's six imperatives, which