Journal of Cyber Policy
2016 - 2024
Current editor(s): Emily Taylor From Taylor & Francis Journals Bibliographic data for series maintained by Chris Longhurst (). Access Statistics for this journal.
Is something missing from the series or not right? See the RePEc data check for the archive and series.
Volume 9, issue 3, 2024
- Editorial introduction Volume 9 No 3 pp. 297-299

- Emily Taylor
- Dark web and internet freedom: navigating the duality to facilitate digital democracy pp. 300-315

- Kristina Radivojevic, Kate Connolly, Anna Klempay and Paul Brenner
- Technical infrastructure as a hidden terrain of disinformation pp. 316-332

- Samantha Bradshaw and Laura DeNardis
- Hack-and-leak operations in Latin America: the case of Guacamaya pp. 333-350

- Sofia Liemann Escobar and James Barr
- Multilateral cooperation in building critical infrastructure security and resilience: case of American deterrence of Chinese cyberthreats pp. 351-376

- Ho Ting (Bosco) Hung
- Network modelling as a tool for cyber diplomacy pp. 377-398

- Robert Collett
- Private-public initiatives for cybersecurity: the case of Ukraine pp. 399-422

- Louise Axon, Jamie Saunders, Patricia Esteve-González, Julia Carver, William Dutton, Michael Goldsmith and Sadie Creese
- Making PROGRESS: a sectoral approach to cyber resilience and its application in sustainable development pp. 423-440

- Lior Tabansky, Paul Cornish and Eynan Lichterman
- Seen and unseen: technology, social media and the fight for racial justice pp. 441-443

- Laura Rose O’Connor
- The Gutenberg parenthesis: the age of print and its lessons for the age of the internet pp. 443-445

- James Ball
Volume 9, issue 2, 2024
- The UN convention on cybercrime: a milestone in cybercrime cooperation? pp. 125-130

- Joyce Hakmeh
- Learning from the ground up: lessons from civil society engagement in addressing the human rights implications of cybercrime legislation pp. 131-148

- Ian Andrew Barber and Sheetal Kumar
- No country is an island: embracing international law enforcement cooperation to reduce the impact of cybercrime pp. 149-158

- John Billow
- Ransomware as a threat to peace and security: understanding and avoiding political worst-case scenarios pp. 159-178

- Mischa Hansel and Jantje Silomon
- On the scale from ransomware to cyberterrorism: the cases of JBS USA, Colonial Pipeline and the wiperware attacks against Ukraine pp. 179-199

- Lora Pitman and Wendy Crosier
- ‘This is not a human rights convention!’: the perils of overlooking human rights in the UN cybercrime treaty pp. 200-220

- Tatiana Tropina
- Applying the right lessons from the negotiation and implementation of the UNTOC and the UNCAC to the implementation of the newly agreed UN ‘cybercrime’ treaty pp. 221-238

- Ian Tennant and Ana Paula Oliveira
- From prepaid cards to bitcoin: How did ransomware hackers adopt cryptocurrencies? pp. 239-255

- Nori Katagiri
- Back to the territorial state: China and Russia’s use of UN cybercrime negotiations to challenge the liberal cyber order pp. 256-287

- Arun Sukumar and Arindrajit Basu
- Global protection against cybercrime is now within reach: HE Faouzia Mebarki explains why the first United Nations effort to create a legally binding instrument on a cyber issue could have far reaching impacts pp. 288-291

- Joyce Hakmeh
- Deter, disrupt, or deceive: assessing cyber conflict as an intelligence contest pp. 292-293

- Tash Buckley
- Hacker, influencer, faker, spy: intelligence agencies in the digital age pp. 294-296

- Beth Whittaker
Volume 9, issue 1, 2024
- Correction pp. I-I

- The Editors
- Introduction from the editor pp. 1-14

- Emily Taylor
- How to maintain trust, respect sovereignty and protect privacy: a new generation of international agreements on cross-border data access pp. 15-19

- Norman Barbosa
- Risks to cybersecurity from data localization, organized by techniques, tactics and procedures pp. 20-51

- Peter Swire, DeBrae Kennedy-Mayo, Drew Bagley, Sven Krasser, Avani Modak and Christoph Bausewein
- Cross-border data sharing: implications for the legal profession in the context of government access to data and protection of legal professional privilege pp. 52-62

- Anna Drozd
- Interview – Cathrin Bauer-Bulst, European Commission pp. 63-69

- The Editors
- Shades of authoritarian digital sovereignty: divergences in Russian and Chinese data localisation regimes pp. 70-94

- Liliya Khasanova and Katharin Tai
- Data free flow with trust: current landscape, challenges and opportunities pp. 95-120

- Theodore Christakis
- Arabic glitch: technoculture, data bodies, and archives pp. 121-123

- Jessica McClearn
- Correction pp. 124-124

- The Editors
Volume 8, issue 3, 2023
- Introduction From the editor pp. 281-286

- The Editors
- ‘Leapfrogging’ or ‘lagging’?: highlighting critical information infrastructure protection challenges and opportunities in Egypt and Nigeria pp. 287-307

- Nate Allen, Sherif Hashem and Elizabeth Kolade
- The implications of the Arabic case for Bangla content moderation on Facebook: future considerations for combating ‘Bangla’ hate speech pp. 308-326

- Mohammad Pizuar Hossain
- Interview with Will Middleton: The UK's approach to cyber security capacity building in a changing world pp. 327-330

- The Editors
- Cybersecurity and the politics of knowledge production: towards a reflexive practice pp. 331-364

- Fabio Cristiano, Xymena Kurowska, Tim Stevens, Louise Marie Hurel, Noran Shafik Fouad, Myriam Dunn Cavelty, Dennis Broeders, Tobias Liebetrau and James Shires
- Evidence-based cybersecurity policy? A meta-review of security control effectiveness pp. 365-383

- Daniel W. Woods and Sezaneh Seymour
- Unwired pp. 384-385

- Isabel Scavetta
- Atlas of the senseable city pp. 386-388

- Kevin Zandermann
- Privacy is hard and seven other myths: achieving privacy through careful design pp. 388-390

- Kathy Liu
Volume 8, issue 2, 2023
- Correction pp. I-II

- The Editors
- Introduction from the editor pp. 135-136

- Joyce Hakmeh
- Special issue on domain name system (DNS) pp. 137-141

- James Burrell
- Web 3 disruption and the domain name system: understanding the trends of blockchain domain names and the policy implications pp. 142-164

- Georgia Osborn and Nathan Alan
- Self-regulation, internet domains and Indian Ocean territories pp. 165-185

- Samuel Bashfield and James Mortensen
- Towards an understanding of global ‘private ordering’ in ICANN: text mining 23 years of Uniform Domain-Name Dispute-Resolution Policy (UDRP) Decisions pp. 186-217

- Derrick L. Cogburn, Theodore Andrew Ochieng and Haiman M. Wong
- The legacies of long tail and the unfolding of consolidation and concentration in the top-level domain sector pp. 218-238

- Carolina Aguerre
- DNS4EU: a step change in the EU’s strategic autonomy? pp. 239-256

- Roxana Radu
- Establishing baseline criteria for the mitigation of the illegitimate sale of health-related products using the DNS pp. 257-276

- Mark W. Datysgeld
- Cloud empires: how digital platforms are overtaking the state and how we can regain control pp. 277-279

- Niamh Healy
Volume 8, issue 1, 2023
- Editorial introduction – Vol 8.1 pp. 1-3

- The Editors
- Unpacking due diligence in cyberspace pp. 4-25

- Harriet Moynihan
- Out with the old, in with the new: examining national cybersecurity strategy changes over time pp. 26-47

- W. Alec Cram and Jonathan Yuan
- President Obama and China: cyber diplomacy and strategy for a new era pp. 48-66

- Sally K. Burt
- Cyber statecraft by net states: the case of Meta, 2016–2021 pp. 67-87

- Callum J. Harvey and Christopher L. Moore
- Patchy incentives: using law to encourage effective vulnerability response pp. 88-113

- Andrew Cormack and Éireann Leverett
- Normal cyber accidents pp. 114-130

- Sarah Backman
- Atlas of AI: power, politics and the planetary costs of artificial intelligence pp. 131-133

- Sachin Tiwari
- Original sin: power, technology and war in outer space pp. 133-134

- Julia Cournoyer
| |