Institutions for Cyber Security: International Responses and Global Imperatives
暂无分享,去创建一个
[1] Inis L. ClaudeJr. Collective Legitimization as a Political Function of the United Nations , 1988 .
[2] cyberdetective. Convention on Cybercrime , 2007 .
[3] Martin C. Libicki. Cyberdeterrence and Cyberwar , 2009 .
[4] D. Mitrany,et al. The Functional Approach to World Organization , 1948 .
[5] Stuart E. Madnick,et al. Explorations in Cyber International Relations (ECIR) - Data Dashboard Report #1: CERT Data Sources and Prototype Dashboard System , 2009 .
[6] C. Hailey,et al. Notes on the Contributors , 2010 .
[7] Anne-Marie Slaughter,et al. Disaggregated Sovereignty: Towards the Public Accountability of Global Government Networks , 2004, Government and Opposition.
[8] Myriam Dunn Cavelty. Cyber-Allies: Strengths and Weaknesses of NATO’s Cyberdefense Posture , 2012 .
[9] P. Hall,et al. Political Science and the Three New Institutionalisms , 1996 .
[10] Ronald J. Deibert,et al. Access Controlled - The Shaping of Power, Rights, and Rule in Cyberspace , 2010, Access Controlled.
[11] Buffalo B4B. Plan for action , 1986, Nature.
[12] Paul Sturges,et al. Access Denied: The Practice and Policy of Global Internet Filtering , 2008 .
[13] STOCKTAKING , 1931 .
[14] Paul T. Jaeger,et al. Government policies on the use of social media: legislating for change , 2011, dg.o '11.
[15] Leland M. Goodrich,et al. From League of Nations to United Nations , 1947, International Organization.
[16] A. Klinghoffer,et al. A Plan for Action , 2019, The New Examination System - GCSE.
[17] Stuart E. Madnick,et al. Comparative Analysis of Cybersecurity Metrics to Develop New Hypotheses , 2012 .
[18] Robert O. Keohane,et al. Power and interdependence : world politics in transition , 1978 .
[19] H. Hundley,et al. Emerging challenge: security and safety in cyberspace , 1995 .
[20] N. Choucri. Cyberpolitics in International Relations , 2012 .
[21] Raymond R. Panko. Computer Security Incident Response Teams (CSIRTs) , 2004 .
[22] Robert O. Keohane,et al. The demand for international regimes , 1982, International Organization.
[23] Theodore J. Lowi,et al. American Business, Public Policy, Case-Studies, and Political Theory , 1964 .
[24] Stanley Hoffmann,et al. International Organization and the International System , 1970, International Organization.
[25] Richard Hackworth,et al. OECD 'Guidelines for the Security of Information Systems" , 1993, Security and Control of Information Technology in Society.
[26] Inis L. Claude. Collective Legitimization as a Political Function of the United Nations , 1966 .
[27] K. Schwalm. National Strategy to Secure Cyberspace , 2006 .
[28] P. Calvert. Access Contested: Security, Identity, and Resistance in Asian Cyberspace , 2012 .
[29] H. V. Jagadish,et al. Information warfare and security , 1998, SGMD.
[30] Stuart E. Madnick,et al. Experiences and Challenges with using CERT Data to Analyze International Cyber Security , 2009 .
[31] Simon Reich,et al. The Four Faces of Institutionalism: Public Policy and a Pluralistic Perspective , 2000 .
[32] E. Haas. International Integration: The European and the Universal Process , 1961, International Organization.
[33] Oran R. Young,et al. THE INTERNATIONAL POLITICAL ECONOMY AND INTERNATIONAL INSTITUTIONS , 1996 .