Exploring the social implications of buying and selling cyber security
暂无分享,去创建一个
[1] B. Arrigo,et al. The Dark Web and anonymizing technologies: legal pitfalls, ethical prospects, and policy directions from radical criminology , 2021, Crime, Law and Social Change.
[2] Mark D. Button,et al. Comparing private security regulation in the European Union , 2018, The Rise of Comparative Policing.
[3] Marcin Rojszczak,et al. CLOUD act agreements from an EU perspective , 2020, Comput. Law Secur. Rev..
[4] Mark D. Button. The “New” Private Security Industry, the Private Policing of Cyberspace and the Regulatory Questions , 2020 .
[5] A. Bergin,et al. Safety in numbers: Australia's private security guard force and counterterrorism , 2018 .
[6] A. White,et al. Valour for Money? Contested Commodification in the Market for Security , 2018 .
[7] J. Collier. Cyber Security Assemblages: A Framework for Understanding the Dynamic and Contested Nature of Security Provision , 2018, Politics and Governance.
[8] Ronald J. Deibert. Toward a Human-Centric Approach to Cybersecurity , 2018, Ethics & International Affairs.
[9] Karen Lund Petersen,et al. Public–private partnerships on cyber security: a practice of loyalty , 2017 .
[10] Rabih Bashroush,et al. Towards a More Representative Definition of Cyber Security , 2017, J. Digit. Forensics Secur. Law.
[11] I. Loader,et al. How can we better align private security with the public interest? Towards a civilizing model of regulation , 2017 .
[12] Raphael Bossong,et al. A typology of cybersecurity and public-private partnerships in the context of the EU , 2016, Crime, Law and Social Change.
[13] Helena Carrapico,et al. ‘Dialogue, partnership and empowerment for network and information security’: the changing role of the private sector from objects of regulation to regulation shapers , 2016 .
[14] T. Diphoorn. Twilight policing: private security practices in South Africa , 2016 .
[15] Madeline Carr,et al. Public–private partnerships in national cyber-security strategies , 2016 .
[16] Anna Leander. Mercados transgresores de seguridad: una mercancía en disputa y sus prácticas de mercado | Transgressive Security Markets: A Contested Commodity and its Market Practices , 2015 .
[17] Myriam Dunn Cavelty. Cyber-Security and Private Actors , 2015 .
[18] R. Abrahamsen,et al. Routledge Handbook of Private Security Studies , 2015 .
[19] B. Goold,et al. Grudge Spending: The Interplay between Markets and Culture in the Purchase of Security , 2015 .
[20] Paul Rosenzweig,et al. Cyber Weapons & Export Control: Incorporating Dual Use with the PrEP Model , 2014 .
[21] B. Goold,et al. The moral economy of security , 2014 .
[22] Benoît Dupont. Private security regimes: Conceptualizing the forces that shape the private delivery of security , 2014 .
[23] Kristina Irion,et al. Government Cloud Computing and National Data Sovereignty: Government Cloud Computing and National Data Sovereignty , 2012 .
[24] R. Sarre,et al. The Evolution of Security Industry Regulation in Australia: A Critique , 2012 .
[25] A. White. The new political economy of private security , 2012 .
[26] Adam White. The Politics of Private Security , 2010 .
[27] A. White. The Politics of Private Security: Regulation, Reform and Re-Legitimation , 2010 .
[28] Rick Sarre,et al. Private Security in Australia: Trends and Key Characteristics , 2009 .
[29] 吕一旭 Yixu Lu. 引言 (Introduction) , 2009, Provincial China.
[30] R. Sarre,et al. Protective Security in Australia: Scandal, Media Images and Reform , 2008 .
[31] M. Kempa,et al. Private security, political economy and the policing of race , 2008 .
[32] Marc Dacier,et al. Empirical Study of the Impact of Metasploit-Related Attacks in 4 Years of Attack Traces , 2007, ASIAN.
[33] Lucia Zedner,et al. Liquid security , 2006 .
[34] Jr. Graham Hall Turbiville. Outlaw Private Security Firms: Criminal and Terrorist Agendas Undermine Private Security Alternatives , 2006 .
[35] Anne-Marie Singh. Private security and crime control , 2005 .
[36] Lucia Zedner,et al. Too much security , 2003 .
[37] I. Loader. Thinking Normatively About Private Security , 1997 .
[38] M. A. Brown,et al. Rules and Regulations Department of Agriculture Animal and Plant Health Inspection Service 7 Cfr Part 319 Mexican Hass Avocado Import Program , 2022 .
[39] Stuart A. Scheingold,et al. The Politics of Law and Order: Street Crime and Public Policy , 1984 .
[40] Clifford Shearing,et al. Private Security: Implications for Social Control , 1983 .
[41] C. Shearing,et al. Modern Private Security: Its Growth and Implications , 1981, Crime and Justice.