Este módulo es un recurso para los catedráticos
Referencias
* Los materiales con este ícono se pueden encontrar en la base de datos de bibliografía de Sherloc.
Publicaciones y portales en internet
African Declaration on Internet Rights and Freedoms of 2014 .
Anti-Phishing Working Group. (n.d.). Twenty National Campaigns Deployed .
Borodkin, Michelle. (2001). Computer Incident Response Team .
Braithwaite, John. (1982). Enforced self-regulation: A new strategy for corporate crime control. Michigan Law Review 80(7), 1466-1507.
Brenner, Susan W. (2005). Distributed security: Moving away from reactive law enforcement. International Journal of Communication Law & Policy 9, 1-42.
CARICOM. (2016). Cyber Security and Cybercrime Action Plan .*
Carnegie Mellon University-Software Engineering Institute (CMU-SEI) . (2016).
Chang, Lennon Yao-Chung. (2011). Cyber-conflict between Taiwan and China . Strategic Insight , Vol. 10(1), 26-35. *
Chang, Lennon Yao-Chung. (2012). Cybercrime in the Greater China Region: Regulatory Responses and Crime Prevention Across the Taiwan Strait . Cheltenham: Edward Elgar. *
Chang, Lennon Yao-Chung, Zhong, Yueying Lena, and Grabosky, Peter. (2018). Citizen co-production of cyber security: Self-Help, Vigilantes, and Cybercrime . Regulation & Governance , Vol. 12: 101-114. *
Chang, Lennon Y. C. and Peter Grabosky. (2017). The governance of cyberspace . In Peter Drahos (ed.). Regulatory Theory: Foundations and Applications (pp. 533-551). ANU Press. *
Chile. National Cybersecurity Policy 2017-2022 . *
Commonwealth Telecommunications Organisation. (2014). Commonwealth ICT Ministers Forum 2014. Marlborough House, London.
Cyber Security Agency of Singapore. (2016). Singapore's Cybersecurity Strategy .*
CyberBayKin. (2018). About the Campaign .
Dlamini, Zama and Modise, Mapule. (2012). Cyber Security Awareness Initiatives in South Africa: A Synergy Approach . 7th International Conference on Information Warfare and Security (ICIW), University of Washington, Seattle, United States (22-23 March 2012). *
Drahos, Peter. (ed.). (2017). Regulatory Theory: Foundations and Applications . ANU Press. *
ENISA. (2014). Appendix A: Mapping of Cybersecurity Strategies . *
ENISA. (2014). An Evaluation Framework for National Cyber Security Strategies . *
ENISA. (n.d.). ENISA and Cyber Security Strategies . *
ENISA. (n.d.). Annex B - Methodology.
European Cyber Security Month. (n.d.). International Cyber Awareness Programs New Campaign Packet.
Frischmann, Brett M. (2003). The Prospect of Reconciling Internet and Cyberspace . Loyola University Chicago Law Journal , Vol. 35(1), 205-234. *
Flynn, Asher & Henry, Nicola. (forthcoming). Image-Based Sexual Abuse. In Oxford Research Encyclopedia of Criminology and Criminal Justice . Oxford University Press.
Frost & Sullivan Executive Briefing. (2017). 2017 Global Information Security Workforce Study Benchmarking Workforce Capacity and Response to Cyber Risk . *
Global Cyber Security Capacity Centre. (2018). CMM Assessments Around the World . *
Global Cyber Security Capacity Centre. (2016). Cybersecurity Capacity Maturity Model for Nations (Revised Edition). University of Oxford. *
Internet Society. (n.d.). World Summit on the Information Society.
ISACA. (2017). ISACA Produces New Audit Program Based on NIST Framework .
ITU. (2018). A Guide to Developing A National Cybersecurity Strategy . *
ITU. (2017). Global Cybersecurity Index (GCI) 2017 . *
ITU. (2015). Global Cybersecurity Index & Cyberwellness Profiles.
ITU. (2014). Understanding cybercrime: Phenomena, challenges and legal response .
ITU. (2008). Overview of cybersecurity. Recommendation ITU-T X.1205 . Series X: Data Networks, Open System Communications And Security .
ITU. (n.d.). Cyberthreat Insight .
ITU. (n.d.). Global Cybersecurity Agenda .
ITU. (n.d.). National Strategies . *
ITU. (n.d.). National Cybersecurity Strategies Repository . *
Kerr, Orin S. (2003). The Problem of Perspective in Internet Law , Georgetown Law Journal , Vol. 91, 357-377. *
Kurbalija, Jovan. (2014). An Introduction to Internet Governance . 6 th edition. DiploFoundation. *
Lessig, Lawrence. (1999). Code and Other Laws of Cyberspace . New York: Basic Books.
Lessig, Lawrence. (2006). Code: Version 2.0 . New York: Basic Books. *
Lindstrom, Gustav and Eric Luiijf. (2012). Political Aims & Policy Methods. In Alexander Klimburg (Ed.). National Cyber Security Framework Manual (pp. 44-65). NATO CCD COE Publication, Tallinn.
Maras, Marie-Helen. (2014). Transnational Security . CRC Press. *
Masters, Jonathan. (2014). What is Internet Governance? Council on Foreign Relations. *
Morgus, Robert and Justin Sherman. (2018). The Idealized Internet vs. Internet Realities: Analytical Framework for Assessing the Freedom, Openness, Interoperability, Security, and Resiliency of the Global Internet (Version 1.0). *
Mueller, Milton. (2010). Networks and states: The global politics of Internet governance . MIT Press. *
National Security Authority (Slovakia). (2015). Action Plan for the Implementation of the Cyber Security Concept of the Slovak Republic for 2015-2020 .
NATO CCD COE. (n.d.). Cyber Security Strategy Documents .
Newhouse, William, Stephanie Keith, Benjamin Scribner, and Greg Witte. (2017). National Initiative for Cybersecurity Education (NICE) . Cybersecurity Workforce Framework . NIST Special Publication 800-181. *
Nigeria. National Cybersecurity Strategy . (2014).
Negroponte, John D., Samuel J. Palmisano, and Adam Segal. (2013). Defending an Open, Global, Secure, and Resilient Internet . Council on Foreign Relations. Independent Task Force Report No. 70. *
NIST. (2018). Path Forward to Support Adaption and Adoption of Cybersecurity Framework: The Framework for Improving Critical Infrastructure Cybersecurity .*
OECD. (2012). Cybersecurity Policy Making at a Turning Point: Analysing a New Generation of National Cybersecurity Strategies for the Internet Economy , OECD Digital Economy Papers , No. 211. *
OECD. (2014). Principles of Internet Policy Making .
Pazvakavambwa, Regina. (2016). Government to promote cyber security awareness . ITWeb , 17 October 2016.
Proffitt, Timothy. (2007). Creating and Managing an Incident Response Team for a Large Company . 35.
Reich, Pauline, Pravin Anand, Vaishal Mittal, Ayushi Kiran, Anna Maria Osula, and Stuart Weinstein (2014). Internet governance: International law and global order in cyberspace. In Manfred Steger, Paul Battersby, and Joseph Siracusa. (eds.). The SAGE Handbook of Globalization (pp. 592-620), Sage.
Seger, Alexander. (2012). Cybercrime strategies . Global Project on Cybercrime .*
Shepardson, David. (2018). U.S. defends FCC's repeal of net neutrality rules . Reuters , 12 octubre 2018.
Swedish Ministry of Justice. (2017). A national cyber security strategy .
Swedish Ministry of Justice. (2016). A national cyber security strategy .
UK National Protective Security Authority. (n.d.). Security Awareness Campaigns .
UNESCO. (2015). Principles for governing the Internet: A comparative analysis.
UNODC. (2013). Draft Comprehensive Study on Cybercrime . *
US National Initiative for Cybersecurity Career and Studies (NICCS). Glossary.
US White House. (2018). National Cyber Strategy 2018 .
Wahid, Adli. (2016). Introduction to Computer Security Incident Response Team (CSIRT). Asia Pacific Network Information Centre.
Whitmore, Andrew, Namjoo Choi and Anna Arzrumtsyan. (2009). One Size Fits All? On the Feasibility of International Internet Governance . Journal of Information Technology & Politics , Vol. 6:1, 4-11. *
Working Group on Internet Governance. (2005). Report of the Working Group on Internet Governance .
Legislaciones y convenciones nacionales e internacionales