EconPapers    
Economics at your fingertips  
 

Journal of Cyber Policy

2016 - 2024

Current editor(s): Emily Taylor

From Taylor & Francis Journals
Bibliographic data for series maintained by Chris Longhurst ().

Access Statistics for this journal.
Is something missing from the series or not right? See the RePEc data check for the archive and series.


Volume 5, issue 3, 2020

Editorial introduction pp. 329-331 Downloads
The Editors
Nordic lights? National AI policies for doing well by doing good pp. 332-349 Downloads
Jacob Dexe and Ulrik Franke
Proposing cybersecurity regulations for smart contracts pp. 350-371 Downloads
Raffi Teperdjian
Patient-centric cybersecurity pp. 372-391 Downloads
Aaron F. Brantly and Nataliya D. Brantly
Cybersecurity and cyber defence in the emerging democracies pp. 392-412 Downloads
Carlos Solar
Hacking democracy: managing influence campaigns and disinformation in the digital age pp. 413-428 Downloads
Niels Nagelhus Schia and Lars Gjesvik
Now you [don’t] see me: how have new legislation and changing public awareness of the UK surveillance state impacted OSINT investigations? pp. 429-448 Downloads
Anjuli R. K. Shere
Desecuritising cybersecurity: towards a societal approach pp. 449-470 Downloads
Joe Burton and Clare Lain

Volume 5, issue 2, 2020

Editorial introduction pp. 159-162 Downloads
Joyce Hakmeh
Artificial intelligence and the rights to assembly and association pp. 163-179 Downloads
Cameran Ashraf
Countering foreign interference: election integrity lessons for liberal democracies pp. 180-198 Downloads
Adam Henschke, Matthew Sussex and Courteney O’Connor
Deepfake news: AI-enabled disinformation as a multi-level public policy challenge pp. 199-217 Downloads
Christopher Whyte
Managing digital contention in China pp. 218-238 Downloads
Ying Miao
Standardising the splinternet: how China’s technical standards could fragment the internet pp. 239-264 Downloads
Stacie Hoffmann, Dominique Lazanski and Emily Taylor
President Obama and US cyber security policy pp. 265-284 Downloads
Eugenio Lilli
Continuous terrain remodelling: gaining the upper hand in cyber defence pp. 285-301 Downloads
Eviatar Matania and Eldad Tal-Shir
The cybersecurity of municipalities in the United States: an exploratory survey of policies and practices pp. 302-325 Downloads
William Hatcher, Wesley L. Meares and John Heslen
Sandworm: a new era of cyberwar and the hunt for the Kremlin’s most dangerous hackers pp. 326-327 Downloads
Florian J. Egloff and Max Smeets

Volume 5, issue 1, 2020

Editorial Introduction pp. 1-4 Downloads
The Editors
Guest Editorial pp. 5-8 Downloads
The Editors
On market concentration and cybersecurity risk pp. 9-29 Downloads
Dan Geer, Eric Jardine and Eireann Leverett
The influence of internet architecture on centralised versus distributed internet services pp. 30-45 Downloads
Jari Arkko
Consolidation in the DNS resolver market – how much, how fast, how dangerous? pp. 46-64 Downloads
Roxana Radu and Michael Hausding
What lies beneath: transparency in online service supply chains pp. 65-93 Downloads
Jennifer Cobbe, Chris Norval and Jatinder Singh
Unpacking interoperability in competition pp. 94-106 Downloads
Chris Riley
Evaluating competition in the Internet’s infrastructure: a view of GAFAM from the Internet exchanges pp. 107-139 Downloads
Jesse H. Sowell
Reshaping the internet – the impact of the securitisation of internet infrastructure on approaches to internet governance: the case of Russia and the EU pp. 140-157 Downloads
Eva Claessen

Volume 4, issue 3, 2019

Introduction from the editor pp. 305-308 Downloads
The Editors
Some emotional considerations in cyber conflict pp. 309-325 Downloads
Rose McDermott
Criminal use of cryptocurrencies: a great new threat or is cash still king? pp. 326-345 Downloads
Simon Butler
Insecure at any bit rate: why Ralph Nader is the true OG of the software design industry pp. 346-361 Downloads
Paul Maxwell and Robert Barnsby
Governance in international technical standards-making: a tripartite model pp. 362-379 Downloads
Dominique Lazanski
The state of Microsoft?: the role of corporations in international norm creation pp. 380-403 Downloads
Nancy Ayer Fairbank
The Uberization of the United Nations’ regime to prevent the online financing of terrorism: tackling the problem of obfuscation in virtual currencies pp. 404-424 Downloads
Ethem Ilbiz
Cybersecurity: today’s most pressing governance issue pp. 425-441 Downloads
Christopher Nolan, Glenn Lawyer and Ryan Marshall Dodd
The AI-cyber nexus: implications for military escalation, deterrence and strategic stability pp. 442-460 Downloads
James Johnson
The perfect weapon: war, sabotage, and fear in the cyber age pp. 461-462 Downloads
Joshua E. Kenway

Volume 4, issue 2, 2019

Introduction from the Editor pp. 139-142 Downloads
The Editors
Can I still trust you, my dear doll? A philosophical and legal exploration of smart toys and trust pp. 143-159 Downloads
Esther Keymolen and Simone Van der Hof
Enabling mass surveillance: data aggregation in the age of big data and the Internet of Things pp. 160-177 Downloads
Marie-Helen Maras and Adam Scott Wandt
A port in the data-sharing storm: the GDPR and the Internet of things pp. 178-196 Downloads
Nóra Ni Loideain
Online child sexual exploitation: towards an optimal international response pp. 197-215 Downloads
Victoria Baines
Indonesian cyberspace expansion: a double-edged sword pp. 216-234 Downloads
Thomas Paterson
Hack-and-leak operations: intrusion and influence in the Gulf pp. 235-256 Downloads
James Shires
Deterring Russian cyber warfare: the practical, legal and ethical constraints faced by the United Kingdom pp. 257-274 Downloads
Rod Thornton and Marina Miron
Conceptualizing cyber policy through complexity theory pp. 275-289 Downloads
Aaron F. Brantly
Cyber power and control: a perspective from strategic theory pp. 290-301 Downloads
Samuel Zilincik, Michael Myklin and Petr Kovanda
Democracy hacked: political turmoil and information warfare in the digital age pp. 302-303 Downloads
Rebecca Beigel
The age of surveillance capitalism: the fight for a human future at the new frontier of power pp. 303-304 Downloads
Ryan Shandler

Volume 4, issue 1, 2019

Introduction from the Editor pp. 1-3 Downloads
The Editors
Building confidence in the cybersphere: a path to multilateral progress pp. 4-21 Downloads
Theresa Hitchens and Nancy W. Gallagher
Russia’s vision of cyberspace: a danger to regime security, public safety, and societal norms and cohesion pp. 22-34 Downloads
Lincoln Pigman
A critical strategy for Taiwan’s cybersecurity: a perspective from critical security studies pp. 35-55 Downloads
Hon-min Yau
Interview, Damian Collins MP pp. 56-59 Downloads
The Editors
A zero-sum game: the zero-day market in 2018 pp. 60-71 Downloads
Joss Meakins
Determinants of cyber readiness pp. 72-89 Downloads
Christos Makridis and Max Smeets
Cyber negotiation: a cyber risk management approach to defend urban critical infrastructure from cyberattacks pp. 90-116 Downloads
Gregory Falco, Alicia Noriega and Lawrence Susskind
Rebalancing cybersecurity imperatives: patching the social layer pp. 117-137 Downloads
David V. Gioe, Michael S. Goodman and Alicia Wanless
Page updated 2025-04-14