This module is a resource for lecturers
Advanced reading
The following readings are recommended for those interested in exploring the topics covered in this Module in more detail:
Materials with this icon can be found in the E4J Library of Resources.
- Azmi, Riza, Willam Tibben, and Khin Than Win. (2018). Review of cybersecurity frameworks: context and shared conceptsv. Journal of Cyber Policy, Vol. 3(2), 258-283.
- Finnemore, Marth and Hollis, Duncan. (2016). Constructing Norms for Global Cybersecurity. American Journal of International Law, 110(3), pp. 425-479.
- Jardine, Eric. (2018). Mind the denominator: towards a more effective measurement system for cybersecurity. Journal of Cyber Policy, Vol. 3(1), 116-139.
- Lacy, Mark and Daniel Prince. (2018). Securitization and the global politics of cybersecurity. Global Discourse: An Interdisciplinary Journal of Current Affairs and Applied Contemporary Thought, Vol. 8(1), 100-115.
- Malone, Eloise F. and Michael J. Malone. (2013). The 'wicked problem' of cybersecurity policy: analysis of United States and Canadian policy response. Canadian Foreign Policy Journal, Vol. 19(2), 158-177.
- Sexton, Mark. (2016). U.K. cybersecurity strategy and active cyber defence - issues and risks. Journal of Cyber Policy, Vol. 1(2), 222-224.
- Scott J. Shackelford and Amanda N. Craig. (2014). Beyond the New Digital Divide: Analyzing the Evolving Role of National Governments in Internet Governance and Enhancing Cybersecurity. Stanford Journal of International Law, Vol. 50(1), 119-184.
- Shackelford, Scott J. and Andraz Kastelic. (2016). Toward a State-Centric Cyber Peace: Analyzing the Role of National Cybersecurity Strategies in Enhancing Global Cybersecurity. N.Y.U. Journal of Legislation and Public Policy, Vol. 119, 895-984.
- Thomas, Timothy. (2014). Creating Cyber Strategists: Escaping the 'DIME' Mnemonic. Defence Studies, Vol. 14(4), 370-393.
- Van der Berg, Bibi and Esther Keymolen. (2017). Regulating security on the Internet: control versus trust. International Review of Law, Computers & Technology, Vol. 31(2), 158-177.
Next:
Student assessment
Back to top