Journal of Cyber Policy
2016 - 2024
Current editor(s): Emily Taylor From Taylor & Francis Journals Bibliographic data for series maintained by Chris Longhurst (). Access Statistics for this journal.
Is something missing from the series or not right? See the RePEc data check for the archive and series.
Volume 5, issue 3, 2020
- Editorial introduction pp. 329-331

- The Editors
- Nordic lights? National AI policies for doing well by doing good pp. 332-349

- Jacob Dexe and Ulrik Franke
- Proposing cybersecurity regulations for smart contracts pp. 350-371

- Raffi Teperdjian
- Patient-centric cybersecurity pp. 372-391

- Aaron F. Brantly and Nataliya D. Brantly
- Cybersecurity and cyber defence in the emerging democracies pp. 392-412

- Carlos Solar
- Hacking democracy: managing influence campaigns and disinformation in the digital age pp. 413-428

- Niels Nagelhus Schia and Lars Gjesvik
- Now you [don’t] see me: how have new legislation and changing public awareness of the UK surveillance state impacted OSINT investigations? pp. 429-448

- Anjuli R. K. Shere
- Desecuritising cybersecurity: towards a societal approach pp. 449-470

- Joe Burton and Clare Lain
Volume 5, issue 2, 2020
- Editorial introduction pp. 159-162

- Joyce Hakmeh
- Artificial intelligence and the rights to assembly and association pp. 163-179

- Cameran Ashraf
- Countering foreign interference: election integrity lessons for liberal democracies pp. 180-198

- Adam Henschke, Matthew Sussex and Courteney O’Connor
- Deepfake news: AI-enabled disinformation as a multi-level public policy challenge pp. 199-217

- Christopher Whyte
- Managing digital contention in China pp. 218-238

- Ying Miao
- Standardising the splinternet: how China’s technical standards could fragment the internet pp. 239-264

- Stacie Hoffmann, Dominique Lazanski and Emily Taylor
- President Obama and US cyber security policy pp. 265-284

- Eugenio Lilli
- Continuous terrain remodelling: gaining the upper hand in cyber defence pp. 285-301

- Eviatar Matania and Eldad Tal-Shir
- The cybersecurity of municipalities in the United States: an exploratory survey of policies and practices pp. 302-325

- William Hatcher, Wesley L. Meares and John Heslen
- Sandworm: a new era of cyberwar and the hunt for the Kremlin’s most dangerous hackers pp. 326-327

- Florian J. Egloff and Max Smeets
Volume 5, issue 1, 2020
- Editorial Introduction pp. 1-4

- The Editors
- Guest Editorial pp. 5-8

- The Editors
- On market concentration and cybersecurity risk pp. 9-29

- Dan Geer, Eric Jardine and Eireann Leverett
- The influence of internet architecture on centralised versus distributed internet services pp. 30-45

- Jari Arkko
- Consolidation in the DNS resolver market – how much, how fast, how dangerous? pp. 46-64

- Roxana Radu and Michael Hausding
- What lies beneath: transparency in online service supply chains pp. 65-93

- Jennifer Cobbe, Chris Norval and Jatinder Singh
- Unpacking interoperability in competition pp. 94-106

- Chris Riley
- Evaluating competition in the Internet’s infrastructure: a view of GAFAM from the Internet exchanges pp. 107-139

- Jesse H. Sowell
- Reshaping the internet – the impact of the securitisation of internet infrastructure on approaches to internet governance: the case of Russia and the EU pp. 140-157

- Eva Claessen
Volume 4, issue 3, 2019
- Introduction from the editor pp. 305-308

- The Editors
- Some emotional considerations in cyber conflict pp. 309-325

- Rose McDermott
- Criminal use of cryptocurrencies: a great new threat or is cash still king? pp. 326-345

- Simon Butler
- Insecure at any bit rate: why Ralph Nader is the true OG of the software design industry pp. 346-361

- Paul Maxwell and Robert Barnsby
- Governance in international technical standards-making: a tripartite model pp. 362-379

- Dominique Lazanski
- The state of Microsoft?: the role of corporations in international norm creation pp. 380-403

- Nancy Ayer Fairbank
- The Uberization of the United Nations’ regime to prevent the online financing of terrorism: tackling the problem of obfuscation in virtual currencies pp. 404-424

- Ethem Ilbiz
- Cybersecurity: today’s most pressing governance issue pp. 425-441

- Christopher Nolan, Glenn Lawyer and Ryan Marshall Dodd
- The AI-cyber nexus: implications for military escalation, deterrence and strategic stability pp. 442-460

- James Johnson
- The perfect weapon: war, sabotage, and fear in the cyber age pp. 461-462

- Joshua E. Kenway
Volume 4, issue 2, 2019
- Introduction from the Editor pp. 139-142

- The Editors
- Can I still trust you, my dear doll? A philosophical and legal exploration of smart toys and trust pp. 143-159

- Esther Keymolen and Simone Van der Hof
- Enabling mass surveillance: data aggregation in the age of big data and the Internet of Things pp. 160-177

- Marie-Helen Maras and Adam Scott Wandt
- A port in the data-sharing storm: the GDPR and the Internet of things pp. 178-196

- Nóra Ni Loideain
- Online child sexual exploitation: towards an optimal international response pp. 197-215

- Victoria Baines
- Indonesian cyberspace expansion: a double-edged sword pp. 216-234

- Thomas Paterson
- Hack-and-leak operations: intrusion and influence in the Gulf pp. 235-256

- James Shires
- Deterring Russian cyber warfare: the practical, legal and ethical constraints faced by the United Kingdom pp. 257-274

- Rod Thornton and Marina Miron
- Conceptualizing cyber policy through complexity theory pp. 275-289

- Aaron F. Brantly
- Cyber power and control: a perspective from strategic theory pp. 290-301

- Samuel Zilincik, Michael Myklin and Petr Kovanda
- Democracy hacked: political turmoil and information warfare in the digital age pp. 302-303

- Rebecca Beigel
- The age of surveillance capitalism: the fight for a human future at the new frontier of power pp. 303-304

- Ryan Shandler
Volume 4, issue 1, 2019
- Introduction from the Editor pp. 1-3

- The Editors
- Building confidence in the cybersphere: a path to multilateral progress pp. 4-21

- Theresa Hitchens and Nancy W. Gallagher
- Russia’s vision of cyberspace: a danger to regime security, public safety, and societal norms and cohesion pp. 22-34

- Lincoln Pigman
- A critical strategy for Taiwan’s cybersecurity: a perspective from critical security studies pp. 35-55

- Hon-min Yau
- Interview, Damian Collins MP pp. 56-59

- The Editors
- A zero-sum game: the zero-day market in 2018 pp. 60-71

- Joss Meakins
- Determinants of cyber readiness pp. 72-89

- Christos Makridis and Max Smeets
- Cyber negotiation: a cyber risk management approach to defend urban critical infrastructure from cyberattacks pp. 90-116

- Gregory Falco, Alicia Noriega and Lawrence Susskind
- Rebalancing cybersecurity imperatives: patching the social layer pp. 117-137

- David V. Gioe, Michael S. Goodman and Alicia Wanless
| |