Journal of Cyber Policy
2016 - 2024
Current editor(s): Emily Taylor From Taylor & Francis Journals Bibliographic data for series maintained by Chris Longhurst (). Access Statistics for this journal.
Is something missing from the series or not right? See the RePEc data check for the archive and series.
Volume 3, issue 3, 2018
- Introduction from the editor pp. 287-290

- The Editors
- Comparative industrial policy and cybersecurity: a framework for analysis pp. 291-305

- Vinod K. Aggarwal and Andrew W. Reddie
- The rise of China as a cybersecurity industrial power: balancing national security, geopolitical, and development priorities pp. 306-326

- Tai Ming Cheung
- Government as facilitator: how Japan is building its cybersecurity market pp. 327-343

- Benjamin Bartlett
- A centralised cybersecurity strategy for Taiwan pp. 344-362

- Hsini Huang and Tien-Shen Li
- The European Union’s cybersecurity industrial policy pp. 363-384

- Paul Timmers
- Industrial policy: the holy grail of French cybersecurity strategy? pp. 385-406

- Danilo D’Elia
- A comprehensive security approach: bolstering Finnish cybersecurity capacity pp. 407-429

- Melissa K. Griffith
- UK cybersecurity industrial policy: an analysis of drivers, market failures and interventions pp. 430-444

- Madeline Carr and Leonie Maria Tanczer
- Comparative industrial policy and cybersecurity: the US case pp. 445-466

- Vinod K. Aggarwal and Andrew W. Reddie
- Cyber mercenaries: the state, hackers, and power pp. 467-468

- Florian J. Egloff
- Erratum pp. 469-469

- The Editors
Volume 3, issue 2, 2018
- Introduction from the editor: Evolutions in cybersecurity: issues, norms and frameworks pp. 143-146

- The Editors
- Maritime cybersecurity policy: the scope and impact of evolving technology on international shipping pp. 147-164

- Kimberly Tam and Kevin D. Jones
- From editorial obligation to procedural accountability: policy approaches to online content in the era of information intermediaries pp. 165-186

- Mark Bunting
- Gaps in United States federal government IoT security and privacy policies pp. 187-200

- Deb Crawford and Justin Sherman
- ‘Cyber’ semantics: why we should retire the latest buzzword in security studies pp. 201-216

- Andrew Futter
- Challenges and opportunities for cyber norms in ASEAN pp. 217-235

- Candice Tran Dai and Miguel Alberto Gomez
- Linking cyber strategy with grand strategy: the case of the United States pp. 236-257

- Valentin Weber
- Review of cybersecurity frameworks: context and shared concepts pp. 258-283

- Riza Azmi, William Tibben and Khin Than Win
- Exploding data: reclaiming our cyber security in the digital age pp. 284-285

- Thomas Henshaw
Volume 3, issue 1, 2018
- Introduction from the editor pp. 1-4

- The Editor
- The threats from modern digital subversion and sedition pp. 5-23

- David Omand
- Cyber-securing our elections pp. 24-38

- Amy E. Pope
- Fake news, disinformation, manipulation and online tactics to undermine democracy pp. 39-43

- Susan Morgan
- Taming cyber warfare: lessons from preventive arms control pp. 44-60

- Mischa Hansel, Max Mutschler and Marcel Dickow
- Unpacking cyber norms: private companies as norm entrepreneurs pp. 61-76

- Louise Marie Hurel and Luisa Cruz Lobato
- Conceptualising conflicts in cyberspace pp. 77-95

- Stefan Steiger, Sebastian Harnisch, Kerstin Zettl and Johannes Lohmann
- Freedom of expression in the digital age: enhanced or undermined? The case of Egypt pp. 96-115

- Noha Fathy
- Mind the denominator: towards a more effective measurement system for cybersecurity pp. 116-139

- Eric Jardine
- Top must-reads: the editorial team choices pp. 140-141

- The Editors
Volume 2, issue 3, 2017
- Introduction from the editor pp. 289-292

- Emily Taylor
- Guest Editorial pp. 293-295

- Kathryn C. Brown
- Multi-stakeholder internet governance: successes and opportunities pp. 296-317

- Lawrence E. Strickling and Jonah Force Hill
- Internet multi-stakeholder governance pp. 318-322

- Sally Wentworth
- Avoiding lamentation: to build a future Internet pp. 323-337

- Andrew Sullivan
- Blockchain technology for social impact: opportunities and challenges ahead pp. 338-354

- Walid Al-Saqaf and Nicolas Seidler
- The ‘wicked problem’ of data localisation pp. 355-365

- Konstantinos Komaitis
- Aligning the international protection of ‘the public core of the internet’ with state sovereignty and national security pp. 366-376

- Dennis Broeders
- Language rights and international domain names pp. 377-388

- Undrah B. Baasanjav
- Sizing up people and process: a conceptual lens for thinking about cybersecurity in large and small enterprises pp. 389-404

- Brian Nussbaum and Charlie Lewis
- Top must-reads: the editorial team choices pp. 405-407

- The Editors
Volume 2, issue 2, 2017
- Introduction from the editor pp. 149-151

- The Editors
- The Internet of Things: preparing for the revolution pp. 152-154

- Erica Constance
- Security and privacy in the internet of things pp. 155-184

- Carsten Maple
- The Internet of Automotive Things: vulnerabilities, risks and policy implications pp. 185-194

- Jeremy W. Bryans
- Towards estimating the untapped potential: a global malicious DDoS mean capacity estimate pp. 195-208

- Eireann Leverett and Aaron Kaplan
- Policy measures and cyber insurance: a framework pp. 209-226

- Daniel Woods and Andrew Simpson
- The internet of toys – the impact on children of a connected environment pp. 227-231

- The Editors
- What might have been and could still be: the Trans-Pacific Partnership’s potential to encourage an open internet and digital rights pp. 232-254

- Susan Aaronson
- These are not the terrorist groups you’re looking for: an assessment of the cyber capabilities of Islamic State pp. 255-265

- Rose Bernard
- Iran and the global politics of internet governance pp. 266-284

- Roozbeh Safshekan
- Top must-reads: the editorial team choices pp. 285-287

- The Editors
Volume 2, issue 1, 2017
- Introduction from the editor pp. 1-3

- Emily Taylor
- Tackling cybercrime – the UK response pp. 4-15

- Jamie Saunders
- Structuring the national cyber defence: in evolution towards a Central Cyber Authority pp. 16-25

- Eviatar Matania, Lior Yoffe and Tal Goldstein
- A public policy perspective of the Dark Web pp. 26-38

- Michael Chertoff
- Children as Internet users: how can evidence better inform policy debate? pp. 39-52

- Jasmina Byrne and Patrick Burton
- Cyber risk and the changing role of insurance pp. 53-63

- Mark Camillo
- Internet routing registries, data governance, and security pp. 64-81

- Brenden Kuerbis and Milton Mueller
- Cybersecurity, trustworthiness and resilient systems: guiding values for policy pp. 82-95

- Adam Henschke and Shannon Brandt Ford
- Net neutrality, zero rating and the Minitelisation of the internet pp. 96-122

- Luca Belli
- Politics of cybersecurity capacity building: conundrum and opportunity pp. 123-144

- Patryk Pawlak and Panagiota-Nayia Barmpaliou
- Top must-reads: the editorial team choices pp. 145-147

- The Editors
| |