The evolution of global cybersecurity norms in the digital age: A longitudinal study of the cybersecurity norm development process (English)
Free access
- New search for: Madnick, Benjamin
- New search for: Huang, Keman
- New search for: Madnick, Stuart
- New search for: Madnick, Benjamin
- New search for: Huang, Keman
- New search for: Madnick, Stuart
In:
Information Security Journal: A Global Perspective
;
33
, 3
;
204-225
;
2024
- Article (Journal) / Electronic Resource
-
Title:The evolution of global cybersecurity norms in the digital age: A longitudinal study of the cybersecurity norm development process
-
Contributors:
-
Published in:Information Security Journal: A Global Perspective ; 33, 3 ; 204-225
-
Publisher:
- New search for: Taylor & Francis
-
Publication date:2024-05-03
-
Size:22 pages
-
ISSN:
-
DOI:
-
Type of media:Article (Journal)
-
Type of material:Electronic Resource
-
Language:English
-
Keywords:
-
Source:
Table of contents – Volume 33, Issue 3
The tables of contents are generated automatically and are based on the data records of the individual contributions available in the index of the TIB portal. The display of the Tables of Contents may therefore be incomplete.
- 193
-
URL filtering using machine learning algorithmsAljahdalic, Asia Othman / Banafee, Shoroq / Aljohani, Thana et al. | 2024
- 204
-
The evolution of global cybersecurity norms in the digital age: A longitudinal study of the cybersecurity norm development processMadnick, Benjamin / Huang, Keman / Madnick, Stuart et al. | 2024
- 226
-
Bio-Metric Based Colour-Image-Encryption using Multi-Chaotic Dynamical Systems and SHA-256 Hash AlgorithmRahul, B. / Kuppusamy, K. / Senthilrajan, A. et al. | 2024
- 251
-
Using software metrics for predicting vulnerable classes in java and python based systemsSultana, Kazi Zakia / Anu, Vaibhav / Chong, Tai-Yin et al. | 2024
- 268
-
Certificateless directed signature scheme without bilinear pairingGoodarzi, Mojtaba / Eslami, Ziba / Pakniat, Nasrollah et al. | 2024
- 285
-
Information security failures identified and measured – ISO/IEC 27001:2013 controls ranked based on GDPR penalty case analysisSuorsa, M. / Helo, P. et al. | 2024
- 307
-
Privacy and biometrics for smart healthcare systems: attacks, and techniquesWells, Alec / Usman, Aminu Bello et al. | 2024
- 332
-
Chaos based Medical Image Encryption Techniques: A Comprehensive Review and AnalysisPankaj, Shubha / Dua, Mohit et al. | 2024