Search Results

There are 56297 results for: content related to: The cybersecurity challenge

  1. Proactive Cybersecurity: A Comparative Industry and Regulatory Analysis

    American Business Law Journal

    Volume 52, Issue 4, Winter 2015, Pages: 721–787, Amanda N. Craig, Scott J. Shackelford and Janine S. Hiller

    Version of Record online : 21 OCT 2015, DOI: 10.1111/ablj.12055

  2. UK cyber security and critical national infrastructure protection

    International Affairs

    Volume 92, Issue 5, September 2016, Pages: 1079–1105, KRISTAN STODDART

    Version of Record online : 31 AUG 2016, DOI: 10.1111/1468-2346.12706

  3. Using BITs to Protect Bytes: Promoting Cyber Peace by Safeguarding Trade Secrets Through Bilateral Investment Treaties

    American Business Law Journal

    Volume 52, Issue 1, Spring 2015, Pages: 1–74, Scott J. Shackelford, Eric L. Richards, Anjanette H. Raymond and Amanda N. Craig

    Version of Record online : 22 JAN 2015, DOI: 10.1111/ablj.12041

  4. The Cyber Worlds of Self-Injurers: Deviant Communities, Relationships, and Selves

    Symbolic Interaction

    Volume 31, Issue 1, Winter 2008, Pages: 33–56, Patricia A. Adler and Peter Adler

    Version of Record online : 22 DEC 2011, DOI: 10.1525/si.2008.31.1.33

  5. You have free access to this content
    Wired yet Disconnected: The Governance of International Cyber Relations

    Global Policy

    Volume 7, Issue 1, February 2016, Pages: 69–78, Chelsey Slack

    Version of Record online : 23 FEB 2016, DOI: 10.1111/1758-5899.12268

  6. Normative Beliefs About Aggression and Cyber Aggression Among Young Adults: A Longitudinal Investigation

    Aggressive Behavior

    Volume 39, Issue 3, May-June 2013, Pages: 161–170, Michelle F. Wright and Yan Li

    Version of Record online : 25 FEB 2013, DOI: 10.1002/ab.21470

  7. Public–private partnerships in national cyber-security strategies

    International Affairs

    Volume 92, Issue 1, January 2016, Pages: 43–62, MADELINE CARR

    Version of Record online : 8 JAN 2016, DOI: 10.1111/1468-2346.12504

  8. Digital Disaster, Cyber Security, and the Copenhagen School

    International Studies Quarterly

    Volume 53, Issue 4, December 2009, Pages: 1155–1175, Lene Hansen and Helen Nissenbaum

    Version of Record online : 2 DEC 2009, DOI: 10.1111/j.1468-2478.2009.00572.x

  9. Cyber Aggression: The Relation between Online Offenders and Offline Social Competence

    Social Development

    Volume 20, Issue 3, August 2011, Pages: 587–604, Corrie L. Schoffstall and Robert Cohen

    Version of Record online : 24 MAR 2011, DOI: 10.1111/j.1467-9507.2011.00609.x

  10. SCADA modeling for performance and vulnerability assessment of integrated cyber–physical systems

    International Transactions on Electrical Energy Systems

    Volume 25, Issue 3, March 2015, Pages: 498–519, Alexandru Stefanov, Chen-Ching Liu, Manimaran Govindarasu and Shinn-Shyan Wu

    Version of Record online : 20 DEC 2013, DOI: 10.1002/etep.1862

  11. You have free access to this content
    Technology adoption and use theory review for studying scientists' continued use of cyber-infrastructure

    Proceedings of the American Society for Information Science and Technology

    Volume 48, Issue 1, 2011, Pages: 1–10, Youngseek Kim and Kevin Crowston

    Version of Record online : 11 JAN 2012, DOI: 10.1002/meet.2011.14504801197

  12. A macro method for measuring economic-benefit returns on cybersecurity investments: The table top approach

    Systems Engineering

    Volume 16, Issue 3, Autumn (Fall) 2013, Pages: 313–328, Paul R. Garvey, Richard A. Moynihan and Les Servi

    Version of Record online : 11 DEC 2012, DOI: 10.1002/sys.21236

  13. The Future of Cyber-Resilience in an Age of Global Complexity

    Politics

    Volume 33, Issue 4, December 2013, Pages: 299–310, Lewis Herrington and Richard Aldrich

    Version of Record online : 1 NOV 2013, DOI: 10.1111/1467-9256.12035

  14. CYBER-ABUSE—A NEW WORLDWIDE THREAT TO CHILDREN'S RIGHTS

    Family Court Review

    Volume 48, Issue 3, July 2010, Pages: 459–481, Tom Altobelli

    Version of Record online : 23 JUN 2010, DOI: 10.1111/j.1744-1617.2010.01323.x

  15. A meta-analysis of sex differences in cyber-bullying behavior: The moderating role of age

    Aggressive Behavior

    Volume 40, Issue 5, September/October 2014, Pages: 474–488, Christopher Barlett and Sarah M. Coyne

    Version of Record online : 6 AUG 2014, DOI: 10.1002/ab.21555

    Corrected by:

    Erratum: Erratum

    Vol. 41, Issue 5, 513, Version of Record online: 22 JUL 2015

  16. The integration of diversely redundant designs, dynamic system models, and state estimation technology to the cyber security of physical systems

    Systems Engineering

    Volume 16, Issue 4, Winter 2013, Pages: 401–412, Barry M. Horowitz and Katherine M. Pierce

    Version of Record online : 1 JAN 2013, DOI: 10.1002/sys.21239

  17. The Joint Development of Traditional Bullying and Victimization With Cyber Bullying and Victimization in Adolescence

    Journal of Research on Adolescence

    Volume 22, Issue 2, June 2012, Pages: 301–309, Paul E. Jose, Moja Kljakovic, Emma Scheib and Olivia Notter

    Version of Record online : 24 OCT 2011, DOI: 10.1111/j.1532-7795.2011.00764.x

  18. From Cyber-Bombs to Political Fallout: Threat Representations with an Impact in the Cyber-Security Discourse

    International Studies Review

    Volume 15, Issue 1, March 2013, Pages: 105–122, Myriam Dunn Cavelty

    Version of Record online : 10 APR 2013, DOI: 10.1111/misr.12023

  19. Cyber victimization and adolescent self-esteem: The role of communication with parents

    Asian Journal of Social Psychology

    Volume 17, Issue 4, December 2014, Pages: 255–263, Yalçın Özdemir

    Version of Record online : 18 AUG 2014, DOI: 10.1111/ajsp.12070

  20. Effectiveness and sustainability of the ViSC Social Competence Program to prevent cyberbullying and cyber-victimization: Class and individual level moderators

    Aggressive Behavior

    Volume 42, Issue 2, March/April 2016, Pages: 181–193, Petra Gradinger, Takuya Yanagida, Dagmar Strohmeier and Christiane Spiel

    Version of Record online : 16 FEB 2016, DOI: 10.1002/ab.21631