Exploring the social implications of buying and selling cyber security

[1]  B. Arrigo,et al.  The Dark Web and anonymizing technologies: legal pitfalls, ethical prospects, and policy directions from radical criminology , 2021, Crime, Law and Social Change.

[2]  Mark D. Button,et al.  Comparing private security regulation in the European Union , 2018, The Rise of Comparative Policing.

[3]  Marcin Rojszczak,et al.  CLOUD act agreements from an EU perspective , 2020, Comput. Law Secur. Rev..

[4]  Mark D. Button The “New” Private Security Industry, the Private Policing of Cyberspace and the Regulatory Questions , 2020 .

[5]  A. Bergin,et al.  Safety in numbers: Australia's private security guard force and counterterrorism , 2018 .

[6]  A. White,et al.  Valour for Money? Contested Commodification in the Market for Security , 2018 .

[7]  J. Collier Cyber Security Assemblages: A Framework for Understanding the Dynamic and Contested Nature of Security Provision , 2018, Politics and Governance.

[8]  Ronald J. Deibert Toward a Human-Centric Approach to Cybersecurity , 2018, Ethics & International Affairs.

[9]  Karen Lund Petersen,et al.  Public–private partnerships on cyber security: a practice of loyalty , 2017 .

[10]  Rabih Bashroush,et al.  Towards a More Representative Definition of Cyber Security , 2017, J. Digit. Forensics Secur. Law.

[11]  I. Loader,et al.  How can we better align private security with the public interest? Towards a civilizing model of regulation , 2017 .

[12]  Raphael Bossong,et al.  A typology of cybersecurity and public-private partnerships in the context of the EU , 2016, Crime, Law and Social Change.

[13]  Helena Carrapico,et al.  ‘Dialogue, partnership and empowerment for network and information security’: the changing role of the private sector from objects of regulation to regulation shapers , 2016 .

[14]  T. Diphoorn Twilight policing: private security practices in South Africa , 2016 .

[15]  Madeline Carr,et al.  Public–private partnerships in national cyber-security strategies , 2016 .

[16]  Anna Leander Mercados transgresores de seguridad: una mercancía en disputa y sus prácticas de mercado | Transgressive Security Markets: A Contested Commodity and its Market Practices , 2015 .

[17]  Myriam Dunn Cavelty Cyber-Security and Private Actors , 2015 .

[18]  R. Abrahamsen,et al.  Routledge Handbook of Private Security Studies , 2015 .

[19]  B. Goold,et al.  Grudge Spending: The Interplay between Markets and Culture in the Purchase of Security , 2015 .

[20]  Paul Rosenzweig,et al.  Cyber Weapons & Export Control: Incorporating Dual Use with the PrEP Model , 2014 .

[21]  B. Goold,et al.  The moral economy of security , 2014 .

[22]  Benoît Dupont Private security regimes: Conceptualizing the forces that shape the private delivery of security , 2014 .

[23]  Kristina Irion,et al.  Government Cloud Computing and National Data Sovereignty: Government Cloud Computing and National Data Sovereignty , 2012 .

[24]  R. Sarre,et al.  The Evolution of Security Industry Regulation in Australia: A Critique , 2012 .

[25]  A. White The new political economy of private security , 2012 .

[26]  Adam White The Politics of Private Security , 2010 .

[27]  A. White The Politics of Private Security: Regulation, Reform and Re-Legitimation , 2010 .

[28]  Rick Sarre,et al.  Private Security in Australia: Trends and Key Characteristics , 2009 .

[29]  吕一旭 Yixu Lu 引言 (Introduction) , 2009, Provincial China.

[30]  R. Sarre,et al.  Protective Security in Australia: Scandal, Media Images and Reform , 2008 .

[31]  M. Kempa,et al.  Private security, political economy and the policing of race , 2008 .

[32]  Marc Dacier,et al.  Empirical Study of the Impact of Metasploit-Related Attacks in 4 Years of Attack Traces , 2007, ASIAN.

[33]  Lucia Zedner,et al.  Liquid security , 2006 .

[34]  Jr. Graham Hall Turbiville Outlaw Private Security Firms: Criminal and Terrorist Agendas Undermine Private Security Alternatives , 2006 .

[35]  Anne-Marie Singh Private security and crime control , 2005 .

[36]  Lucia Zedner,et al.  Too much security , 2003 .

[37]  I. Loader Thinking Normatively About Private Security , 1997 .

[38]  M. A. Brown,et al.  Rules and Regulations Department of Agriculture Animal and Plant Health Inspection Service 7 Cfr Part 319 Mexican Hass Avocado Import Program , 2022 .

[39]  Stuart A. Scheingold,et al.  The Politics of Law and Order: Street Crime and Public Policy , 1984 .

[40]  Clifford Shearing,et al.  Private Security: Implications for Social Control , 1983 .

[41]  C. Shearing,et al.  Modern Private Security: Its Growth and Implications , 1981, Crime and Justice.