Link
Search
Menu
Expand
Document
Publications
Cybersecurity Publications
C
§ Contributing or Clocking In - A Study of Work Engagement
INTRODUCTION
THEORETICAL FRAMEWORK AND REVIEW OF LITERATURE
PURPOSE
METHODS
FINDINGS
CONCLUSIONS, IMPLICATIONS, AND RECOMMENDATIONS
REFERENCES
§ 9/11 Culture War and the Pitfalls of History
§ COUNTERING CHINA’S “TRIDENT” STRATEGY - Frustrating China’s Aims in the East and South China Seas and the Indian Ocean
THE EAST CHINA SEA - DEFENSE LINE
THE SOUTH CHINA SEA - CHINA’S NUCLEAR ASSURED RETALIATION SANCTUARY
THE INDIAN OCEAN - THE SUPPORT AREA FOR THE DEFENSE LINE AND SANCTUARY
CHINA IS A TOUGHER RIVAL THAN EVER
HOW TO COPE WITH CHINA’S NAVAL STRATEGY
NOTES
§ Crafting an Innovation Ecosystem That Works for Working People
Confronting the Technological Challenges Upending Workers’ Lives
The AFL-CIO Commission on the Future of Work
Conclusion
Notes
§ Cyber-Silencing the Community - YouTube, Divino Group, and Reimagining Section 230
INTRODUCTION
PART I - THE PATH TO DIVINO GROUP AND THE ROADBLOCKS FOLLOWING
PART II - SPEECH ON THE INTERNET AND SECTION 230
PART III - REIMAGINING 230 AND RECOURSE FOR CREATORS
CONCLUSION
§ Comment - The Necessary Evolution of State Data Breach Notification Laws - Keeping Pace with New Cyber Threats Quantum Decryption and the Rapid Expansion of Technology
INTRODUCTION
I. EMERGING THREATS HAVE UPENDED DATA BREACH NOTIFICATION LAWS
II. STATE DATA BREACH STATUTES FAIL TO ADDRESS AUTOMATED WIDESPREAD ACCESS AND UNCLEAR ACQUISITION
III. EVOLUTION OF TECHNOLOGY, INCLUDING QUANTUM COMPUTING, REQUIRES CHANGES TO THE CURRENT STATE DATA BREACH NOTIFICATION REGIME
IV. THE PUSH FOR FEDERAL LEGISLATION TO UNIFY A NOTICE STANDARD AND ADDRESS THESE CONCERNS
§ Cyberpolicing in Canada - A Scoping Review
Introduction
Method of Inquiry
Findings
Conclusions and Recommendations
Acknowledgements
Appendix I - List of Peer-Reviewed, Published Canadian Papers on Cyberpolicing Topics (2001-2021).
Appendix II - List of Grey Literature on Cyberpolicing Topics (2001-2021)
Appendix III - List of Topics Based on ASC presentations (2005
3
- 2021
4
).
References
§ Crafted for the Male Gaze - Gender Discrimination in the K-Pop Industry
Introduction
Traditional Gender Roles
Contemporary Gender Roles and Neoliberalism
Gender Roles and the K-pop Industry
Conclusion
Acknowledgments
Recommended Citation
Bibliography
§ Cybersecurity Incident & Vulnerability Response Playbooks
INTRODUCTION
INCIDENT RESPONSE PLAYBOOK
VULNERABILITY RESPONSE PLAYBOOK
APPENDIX A - KEY TERMS
APPENDIX B - INCIDENT RESPONSE CHECKLIST
APPENDIX C - INCIDENT RESPONSE PREPARATION CHECKLIST
APPENDIX E - VULNERABILITY AND INCIDENT CATEGORIES
APPENDIX F - SOURCE TEXT
APPENDIX G - WHOLE-OF-GOVERNMENT ROLES AND RESPONSIBILITIES
§ Cyber security training strategy - dealing with maritime SCADA risks
Introduction
Importance of Cyber Security
Knowledge areas
Proposed curriculum development
Summary and Conclusion
References
§ CYBERSECURITY - CREATING A CYBERSECURITY CULTURE
CHAPTER ONE - INTRODUCTION
CHAPTER TWO - CYBERCRIME IN GOVERNMENTS
CHAPTER THREE - METHODOLOGY
CHAPTER FOUR - RESULTS
CHAPTER FIVE - DISCUSSION
REFERENCES
§ CYBERSPACE SOLARIUM COMMISSION - 2021 Annual Report on Implementation
COMMISSION BACKGROUND
EVALUATING PROGRESS
RECOMMENDATIONS FROM THE CYBERSPACE SOLARIUM COMMISSION REPORT
CYBERSPACE SOLARIUM COMMISSION WHITE PAPERS
ABBREVIATIONS
COMMISSIONERS
STAFF
§ Cyberbullying - Its Social and Psychological Harms Among Schoolers
Introduction
Literature Review
Methods
Results
Discussions
Conclusion
Declaration of Interest Statement
References
§ Cyberbullying and Punishments (Concentrating on Kerala Women)
Kerala a South Indian State
Cyber Harassment Cases in Kerala and Culture
How fish fries can make someone feminist?
Parvathy Thiruvothu- A Fearless Woman
Bhagyalakshmi and group
Ethically Right Or Wrong?
A Positive Change
References
§ CYBER AND TRIA - EXPANDING THE DEFINITION OF AN “ACT OF TERRORISM” TO INCLUDE CYBER ATTACKS
§ Cybersecurity Best Practices for the Safety of Modern Vehicles
§ Crypto and Blockchain Fundamentals
I. FROM THE “INTERNET OF INFORMATION” TO THE “INTERNET OF VALUE”
II. THE INGENUITY AND LIMITATIONS OF BITCOIN
III. Beyond Bitcoin - Other Technical Innovations
IV. BLOCKCHAIN-BASED APPLICATION EXAMPLES
V. New Fundraising Models
VI. WHY THE “INTERNET OF VALUE” NEEDS LEGAL PRACTITIONERS
§ Cryptography, Passwords, Privacy, and the Fifth Amendment
§ Cyber Mercenaries - A New Threat to National Security
§ Cyber Security’s Influence on Modern Society
§ Cyber Mobs, Disinformation, and Death Videos - The Internet as It Is (and as It Should Be)
§ Cybersecurity in Elections - Models of Interagency Collaboration
1. Introduction
2. Cyberthreats throughout the electoral cycle
3. Models of interagency collaboration
4. Operationalizing interagency collaboration
5. Conclusions and recommendations
Annex A - Case studies
References and further reading
About the authors
About International IDEA
§ Cybersecurity Best Practices for Modern Vehicles
§ Construction Cybersecurity and Critical Infrastructure Protection - Significance, Overlaps, and Proposed Action Plan
Just the Docs on GitHub
Cybersecurity Publications