This module is a resource for lecturers
References
Materials with this icon can be found in the E4J Library of Resources.
Publications and online portals
- African Declaration on Internet Rights and Freedoms of 2014.
- Anti-Phishing Working Group. (n.d.). Twenty National Campaigns Deployed .
- Borodkin, Michelle. (2001). Computer Incident Response Team .
- Braithwaite, John. (1982). Enforced self-regulation: A new strategy for corporate crime control. Michigan Law Review 80(7), 1466-1507.
- Brenner, Susan W. (2005). Distributed security: Moving away from reactive law enforcement. International Journal of Communication Law & Policy 9, 1-42.
- CARICOM. (2016). Cyber Security and Cybercrime Action Plan .
- Carnegie Mellon University-Software Engineering Institute (CMU-SEI). (2016).
- Chang, Lennon Yao-Chung. (2011). Cyber-conflict between Taiwan and China. Strategic Insight, Vol. 10(1), 26-35.
- Chang, Lennon Yao-Chung. (2012). Cybercrime in the Greater China Region: Regulatory Responses and Crime Prevention Across the Taiwan Strait . Cheltenham: Edward Elgar.
- Chang, Lennon Yao-Chung, Zhong, Yueying Lena, and Grabosky, Peter. (2018). Citizen co-production of cyber security: Self-Help, Vigilantes, and Cybercrime. Regulation & Governance, Vol. 12: 101-114.
- Chang, Lennon Y. C. and Peter Grabosky. (2017). The governance of cyberspace. In Peter Drahos (ed.). Regulatory Theory: Foundations and Applications (pp. 533-551). ANU Press.
- Chile. National Cybersecurity Policy 2017-2022.
- Commonwealth Telecommunications Organisation. (2014). Commonwealth ICT Ministers Forum 2014. Marlborough House, London.
- Cyber Security Agency of Singapore. (2016). Singapore's Cybersecurity Strategy .
- CyberBayKin. (2018). About the Campaign .
- Dlamini, Zama and Modise, Mapule. (2012). Cyber Security Awareness Initiatives in South Africa: A Synergy Approach. 7th International Conference on Information Warfare and Security (ICIW), University of Washington, Seattle, United States (22-23 March 2012).
- Drahos, Peter. (ed.). (2017). Regulatory Theory: Foundations and Applications . ANU Press.
- ENISA. (2014). Appendix A: Mapping of Cybersecurity Strategies .
- ENISA. (2014). An Evaluation Framework for National Cyber Security Strategies .
- ENISA. (n.d.). ENISA and Cyber Security Strategies .
- ENISA. (n.d.). Annex B - Methodology.
- European Cyber Security Month. (n.d.). International Cyber Awareness Programs New Campaign Packet.
- Frischmann, Brett M. (2003). The Prospect of Reconciling Internet and Cyberspace. Loyola University Chicago Law Journal, Vol. 35(1), 205-234.
- Flynn, Asher & Henry, Nicola. (forthcoming). Image-Based Sexual Abuse. In Oxford Research Encyclopedia of Criminology and Criminal Justice. Oxford University Press.
- Frost & Sullivan Executive Briefing. (2017). 2017 Global Information Security Workforce Study Benchmarking Workforce Capacity and Response to Cyber Risk .
- Global Cyber Security Capacity Centre. (2018). CMM Assessments Around the World .
- Global Cyber Security Capacity Centre. (2016). Cybersecurity Capacity Maturity Model for Nations (Revised Edition). University of Oxford.
- Internet Society. (n.d.). World Summit on the Information Society.
- ISACA. (2017). ISACA Produces New Audit Program Based on NIST Framework.
- ITU. (2018). A Guide to Developing A National Cybersecurity Strategy .
- ITU. (2017). Global Cybersecurity Index (GCI) 2017 .
- ITU. (2015). Global Cybersecurity Index & Cyberwellness Profiles.
- ITU. (2014). Understanding cybercrime: Phenomena, challenges and legal response .
- ITU. (2008). Overview of cybersecurity. Recommendation ITU-T X.1205. Series X: Data Networks, Open System Communications And Security.
- ITU. (n.d.). Cyberthreat Insight .
- ITU. (n.d.). Global Cybersecurity Agenda .
- ITU. (n.d.). National Strategies .
- ITU. (n.d.). National Cybersecurity Strategies Repository .
- Kerr, Orin S. (2003). The Problem of Perspective in Internet Law, Georgetown Law Journal, Vol. 91, 357-377.
- Kurbalija, Jovan. (2014). An Introduction to Internet Governance . 6 th edition. DiploFoundation.
- Lessig, Lawrence. (1999). Code and Other Laws of Cyberspace . New York: Basic Books.
- Lessig, Lawrence. (2006). Code: Version 2.0 . New York: Basic Books.
- Lindstrom, Gustav and Eric Luiijf. (2012). Political Aims & Policy Methods. In Alexander Klimburg (Ed.). National Cyber Security Framework Manual (pp. 44-65). NATO CCD COE Publication, Tallinn.
- Maras, Marie-Helen. (2014). Transnational Security . CRC Press.
- Masters, Jonathan. (2014). What is Internet Governance? Council on Foreign Relations.
- Morgus, Robert and Justin Sherman. (2018). The Idealized Internet vs. Internet Realities: Analytical Framework for Assessing the Freedom, Openness, Interoperability, Security, and Resiliency of the Global Internet (Version 1.0).
- Mueller, Milton. (2010). Networks and states: The global politics of Internet governance . MIT Press.
- National Security Authority (Slovakia). (2015). Action Plan for the Implementation of the Cyber Security Concept of the Slovak Republic for 2015-2020 .
- NATO CCD COE. (n.d.). Cyber Security Strategy Documents .
- Newhouse, William, Stephanie Keith, Benjamin Scribner, and Greg Witte. (2017). National Initiative for Cybersecurity Education (NICE). Cybersecurity Workforce Framework. NIST Special Publication 800-181.
- Nigeria. National Cybersecurity Strategy . (2014).
- Negroponte, John D., Samuel J. Palmisano, and Adam Segal. (2013). Defending an Open, Global, Secure, and Resilient Internet . Council on Foreign Relations. Independent Task Force Report No. 70.
- NIST. (2018). Path Forward to Support Adaption and Adoption of Cybersecurity Framework: The Framework for Improving Critical Infrastructure Cybersecurity .
- OECD. (2012). Cybersecurity Policy Making at a Turning Point: Analysing a New Generation of National Cybersecurity Strategies for the Internet Economy, OECD Digital Economy Papers, No. 211.
- OECD. (2014). Principles of Internet Policy Making .
- Pazvakavambwa, Regina. (2016). Government to promote cyber security awareness. ITWeb, 17 October 2016.
- Proffitt, Timothy. (2007). Creating and Managing an Incident Response Team for a Large Company . 35.
- Reich, Pauline, Pravin Anand, Vaishal Mittal, Ayushi Kiran, Anna Maria Osula, and Stuart Weinstein (2014). Internet governance: International law and global order in cyberspace. In Manfred Steger, Paul Battersby, and Joseph Siracusa. (eds.). The SAGE Handbook of Globalization (pp. 592-620), Sage.
- Seger, Alexander. (2012). Cybercrime strategies. Global Project on Cybercrime.
- Shepardson, David. (2018). U.S. defends FCC's repeal of net neutrality rules. Reuters, 12 October 2018.
- Swedish Ministry of Justice. (2017). A national cyber security strategy .
- Swedish Ministry of Justice. (2016). A national cyber security strategy .
- UK Centre for the Protection of National Infrastructure. (n.d.). Security Awareness Campaigns .
- UNESCO. (2015). Principles for governing the Internet: A comparative analysis.
- UNODC. (2013). Draft Comprehensive Study on Cybercrime .
- US National Initiative for Cybersecurity Career and Studies (NICCS). Glossary.
- US White House. (2018). National Cyber Strategy 2018 .
- Wahid, Adli. (2016). Introduction to Computer Security Incident Response Team (CSIRT). Asia Pacific Network Information Centre.
- Whitmore, Andrew, Namjoo Choi and Anna Arzrumtsyan. (2009). One Size Fits All? On the Feasibility of International Internet Governance. Journal of Information Technology & Politics, Vol. 6:1, 4-11.
- Working Group on Internet Governance. (2005). Report of the Working Group on Internet Governance .
National and international legislation and conventions
- African Union. Convention on Cyber Security and Personal Data Protection. 2014.
- Commonwealth of Independent States. Agreement on Cooperation in Combating Offences related to Computer Information. 2001.
- Council of Europe. Convention on Cybercrime. 2001.
- Denmark. Data Protection Act. 2018.
- Fiji. Crimes Decree 2009: Division 6 - Computer Offences .
- League of Arab States. Arab Convention on Combating Information Technology Offences. 2010.
- United Arab Emirates. Federal Law No. (1) on Electronic Commerce and Transactions. 2006.
- United Kingdom. Computer Misuse Act. 1990.
- United Kingdom. Data Protection Act. 2018.
Next: Exercises
Back to top