This module is a resource for lecturers
Publications and online portals
African Declaration on Internet Rights and Freedoms of 2014. Anti-Phishing Working Group. (n.d.).
. Twenty National Campaigns Deployed Borodkin, Michelle. (2001).
. Computer Incident Response Team Braithwaite, John. (1982). Enforced self-regulation: A new strategy for corporate crime control.
Michigan Law Review 80(7), 1466-1507. Brenner, Susan W. (2005). Distributed security: Moving away from reactive law enforcement.
International Journal of Communication Law & Policy 9, 1-42. CARICOM. (2016).
. Cyber Security and Cybercrime Action Plan
Carnegie Mellon University-Software Engineering Institute (CMU-SEI). (2016). Chang, Lennon Yao-Chung. (2011).
Cyber-conflict between Taiwan and China. Strategic Insight, Vol. 10(1), 26-35. Chang, Lennon Yao-Chung. (2012).
. Cheltenham: Edward Elgar. Cybercrime in the Greater China Region: Regulatory Responses and Crime Prevention Across the Taiwan Strait Chang, Lennon Yao-Chung, Zhong, Yueying Lena, and Grabosky, Peter. (2018).
Citizen co-production of cyber security: Self-Help, Vigilantes, and Cybercrime. Regulation & Governance, Vol. 12: 101-114. Chang, Lennon Y. C. and Peter Grabosky. (2017).
The governance of cyberspace. In Peter Drahos (ed.). Regulatory Theory: Foundations and Applications (pp. 533-551). ANU Press. Chile.
National Cybersecurity Policy 2017-2022. Commonwealth Telecommunications Organisation. (2014).
Marlborough House, London. Commonwealth ICT Ministers Forum 2014. Cyber Security Agency of Singapore. (2016).
. Singapore's Cybersecurity Strategy CyberBayKin. (2018).
. About the Campaign Dlamini, Zama and Modise, Mapule. (2012).
Cyber Security Awareness Initiatives in South Africa: A Synergy Approach. 7th International Conference on Information Warfare and Security (ICIW), University of Washington, Seattle, United States (22-23 March 2012). Drahos, Peter. (ed.). (2017).
. ANU Press. Regulatory Theory: Foundations and Applications ENISA. (2014).
. Appendix A: Mapping of Cybersecurity Strategies ENISA. (2014).
. An Evaluation Framework for National Cyber Security Strategies ENISA. (n.d.).
. ENISA and Cyber Security Strategies ENISA. (n.d.).
Annex B - Methodology. European Cyber Security Month. (n.d.).
International Cyber Awareness Programs New Campaign Packet. Frischmann, Brett M. (2003).
The Prospect of Reconciling Internet and Cyberspace. Loyola University Chicago Law Journal, Vol. 35(1), 205-234. Flynn, Asher & Henry, Nicola. (forthcoming). Image-Based Sexual Abuse. In
Oxford Research Encyclopedia of Criminology and Criminal Justice. Oxford University Press. Frost & Sullivan Executive Briefing. (2017).
. 2017 Global Information Security Workforce Study Benchmarking Workforce Capacity and Response to Cyber Risk Global Cyber Security Capacity Centre. (2018).
. CMM Assessments Around the World Global Cyber Security Capacity Centre. (2016).
(Revised Edition). University of Oxford. Cybersecurity Capacity Maturity Model for Nations Internet Society. (n.d.).
World Summit on the Information Society. ISACA. (2017).
ISACA Produces New Audit Program Based on NIST Framework. ITU. (2018).
. A Guide to Developing A National Cybersecurity Strategy ITU. (2017).
. Global Cybersecurity Index (GCI) 2017 ITU. (2015).
Global Cybersecurity Index & Cyberwellness Profiles. ITU. (2014).
. Understanding cybercrime: Phenomena, challenges and legal response ITU. (2008).
Overview of cybersecurity. Recommendation ITU-T X.1205. Series X: Data Networks, Open System Communications And Security. ITU. (n.d.).
. Cyberthreat Insight ITU. (n.d.).
. Global Cybersecurity Agenda ITU. (n.d.).
. National Strategies ITU. (n.d.).
. National Cybersecurity Strategies Repository Kerr, Orin S. (2003).
The Problem of Perspective in Internet Law, Georgetown Law Journal, Vol. 91, 357-377. Kurbalija, Jovan. (2014).
. 6 An Introduction to Internet Governance th edition. DiploFoundation. Lessig, Lawrence. (1999).
Code and Other Laws of Cyberspace . New York: Basic Books. Lessig, Lawrence. (2006).
. New York: Basic Books. Code: Version 2.0 Lindstrom, Gustav and Eric Luiijf. (2012). Political Aims & Policy Methods. In Alexander Klimburg (Ed.).
National Cyber Security Framework Manual (pp. 44-65). NATO CCD COE Publication, Tallinn. Maras, Marie-Helen. (2014).
. CRC Press. Transnational Security Masters, Jonathan. (2014).
Council on Foreign Relations. What is Internet Governance? Morgus, Robert and Justin Sherman. (2018).
(Version 1.0). The Idealized Internet vs. Internet Realities: Analytical Framework for Assessing the Freedom, Openness, Interoperability, Security, and Resiliency of the Global Internet Mueller, Milton. (2010).
. MIT Press. Networks and states: The global politics of Internet governance National Security Authority (Slovakia). (2015).
. Action Plan for the Implementation of the Cyber Security Concept of the Slovak Republic for 2015-2020 NATO CCD COE. (n.d.).
. Cyber Security Strategy Documents Newhouse, William, Stephanie Keith, Benjamin Scribner, and Greg Witte. (2017).
National Initiative for Cybersecurity Education (NICE). Cybersecurity Workforce Framework. NIST Special Publication 800-181. Nigeria.
. (2014). National Cybersecurity Strategy Negroponte, John D., Samuel J. Palmisano, and Adam Segal. (2013).
. Council on Foreign Relations. Independent Task Force Report No. 70. Defending an Open, Global, Secure, and Resilient Internet NIST. (2018).
. Path Forward to Support Adaption and Adoption of Cybersecurity Framework: The Framework for Improving Critical Infrastructure Cybersecurity OECD. (2012).
Cybersecurity Policy Making at a Turning Point: Analysing a New Generation of National Cybersecurity Strategies for the Internet Economy, OECD Digital Economy Papers, No. 211. OECD. (2014).
. Principles of Internet Policy Making Pazvakavambwa, Regina. (2016).
Government to promote cyber security awareness. ITWeb, 17 October 2016. Proffitt, Timothy. (2007).
. 35. Creating and Managing an Incident Response Team for a Large Company Reich, Pauline, Pravin Anand, Vaishal Mittal, Ayushi Kiran, Anna Maria Osula, and Stuart Weinstein (2014). Internet governance: International law and global order in cyberspace. In Manfred Steger, Paul Battersby, and Joseph Siracusa. (eds.).
The SAGE Handbook of Globalization (pp. 592-620), Sage. Seger, Alexander. (2012).
Cybercrime strategies. Global Project on Cybercrime. Shepardson, David. (2018).
U.S. defends FCC's repeal of net neutrality rules. Reuters, 12 October 2018. Swedish Ministry of Justice. (2017).
. A national cyber security strategy Swedish Ministry of Justice. (2016).
. A national cyber security strategy UK National Protective Security Authority. (n.d.).
. Security Awareness Campaigns UNESCO. (2015).
Principles for governing the Internet: A comparative analysis. UNODC. (2013).
. Draft Comprehensive Study on Cybercrime US National Initiative for Cybersecurity Career and Studies (NICCS).
Glossary. US White House. (2018).
. National Cyber Strategy 2018 Wahid, Adli. (2016). Introduction to Computer Security Incident Response Team (CSIRT). Asia Pacific Network Information Centre.
Whitmore, Andrew, Namjoo Choi and Anna Arzrumtsyan. (2009).
One Size Fits All? On the Feasibility of International Internet Governance. Journal of Information Technology & Politics, Vol. 6:1, 4-11. Working Group on Internet Governance. (2005).
. Report of the Working Group on Internet Governance
National and international legislation and conventions