Update search
Filter
- All
- Title
- Author
- Author Affiliations
- Full Text
- Abstract
- Keyword
- DOI
- ISBN
- EISBN
- ISSN
- EISSN
- Issue
- Volume
- References
Filter
- All
- Title
- Author
- Author Affiliations
- Full Text
- Abstract
- Keyword
- DOI
- ISBN
- EISBN
- ISSN
- EISSN
- Issue
- Volume
- References
Filter
- All
- Title
- Author
- Author Affiliations
- Full Text
- Abstract
- Keyword
- DOI
- ISBN
- EISBN
- ISSN
- EISSN
- Issue
- Volume
- References
Filter
- All
- Title
- Author
- Author Affiliations
- Full Text
- Abstract
- Keyword
- DOI
- ISBN
- EISBN
- ISSN
- EISSN
- Issue
- Volume
- References
Filter
- All
- Title
- Author
- Author Affiliations
- Full Text
- Abstract
- Keyword
- DOI
- ISBN
- EISBN
- ISSN
- EISSN
- Issue
- Volume
- References
Filter
- All
- Title
- Author
- Author Affiliations
- Full Text
- Abstract
- Keyword
- DOI
- ISBN
- EISBN
- ISSN
- EISSN
- Issue
- Volume
- References
NARROW
Format
Journal
Type
Date
Availability
1-11 of 11
Keywords: Cybersecurity
Close
Follow your search
Access your saved searches in your account
Would you like to receive an alert when new items match your search?
Sort by
Journal Articles
Digital policy and governance frameworks for EHR systems in Tanzania: a scoping review
Available to Purchase
Digital Policy, Regulation and Governance (2026) 28 (1): 52–74.
Published: 11 April 2025
...Augustino Mwogosi; Rajabu Simba Purpose This study aims to examine Tanzania’s digital policy and governance frameworks for electronic health records (EHR) systems, focusing on data protection, cybersecurity and interoperability. The study provides insights into strengthening digital health...
Journal Articles
The social contract theory meets cybersecurity: systematic literature review
Available to Purchase
Digital Policy, Regulation and Governance (2025) 27 (4): 446–465.
Published: 25 September 2024
...Jan Kleiner Purpose This study aims to provide a comprehensive overview of social contract theory (SCT) utilization in cybersecurity literature, elucidating the current state of research, identifying major applications and themes and highlighting gaps, particularly in empirical studies...
Journal Articles
Snowden, Assange, Manning & the new knowledge cyberclass
Available to Purchase
Digital Policy, Regulation and Governance (2023) 25 (4): 402–419.
Published: 25 May 2023
...Emanuel G. Boussios Purpose The purpose of this study is to explore and theorize on the motivations of a new class of whistleblowers or leakers stemming from the “abusive” cybersecurity practices of Western governments. This research primarily focuses on such practices of the US Government...
Journal Articles
The security economics of EdTech: vendors’ responsibility and the cybersecurity challenge in the education sector
Available to Purchase
Digital Policy, Regulation and Governance (2022) 24 (3): 259–273.
Published: 27 April 2022
..., a regulatorily and policy intervention is needed to secure education through procurement processes. Originality/value This paper introduces a novel exploration to the cybersecurity challenge in the education sector, an area of research and policy analysis that remains largely understudied. By adding...
Journal Articles
Expert commissions and norms of responsible behaviour in cyberspace: a review of the activities of the GCSC
Available to Purchase
Digital Policy, Regulation and Governance (2020) 22 (2): 93–107.
Published: 12 May 2020
...Jacqueline Eggenschwiler Purpose Against the background of two decades of debates about responsible behaviour in cyberspace, this paper aims to examine the contributions of non-state actors to processes of cybersecurity norm-making. Specifically, it intends to dissect and critically appraise...
Journal Articles
Data flows and national security: a conceptual framework to assess restrictions on data flows under GATS security exception
Available to Purchase
Digital Policy, Regulation and Governance (2019) 21 (1): 44–70.
Published: 19 December 2018
... objective, including national security, it can challenge the measure under the WTO dispute system. Such a dispute is the topic of this paper. In particular, this paper focuses on disputes related to restrictions on data flows. While some scholars have looked into potential disputes related to cybersecurity...
Journal Articles
Trade regimes as a tool for cyber policy
Available to Purchase
Digital Policy, Regulation and Governance (2019) 21 (1): 19–31.
Published: 19 December 2018
...Karl Grindal Purpose This research develops a framework for assessing international trade regimes which could be used to address global cybersecurity challenges based on the corresponding costs of implementation and their distribution. Trade regimes, such as export controls, tariffs, investment...
Journal Articles
Is cybersecurity eating internet governance? Causes and consequences of alternative framings
Available to Purchase
Digital Policy, Regulation and Governance (2017) 19 (6): 415–428.
Published: 11 September 2017
...Milton Mueller Purpose The purpose of this paper is to clarify the relationship between cybersecurity governance and internet governance and to explore the effects of the current tendency for cybersecurity-related discourse to dominate and change the way we approach the established problems...
Journal Articles
Mapping the cybersecurity institutional landscape
Available to Purchase
Digital Policy, Regulation and Governance (2017) 19 (6): 466–492.
Published: 11 September 2017
...Brenden Kuerbis; Farzaneh Badiei Purpose There is growing contestation between states and private actors over cybersecurity responsibilities, and its governance is ever more susceptible to nationalization. The authors believe these developments are based on an incomplete picture of how...
Journal Articles
Cybersecurity governance: a prehistory and its implications
Available to Purchase
Digital Policy, Regulation and Governance (2017) 19 (6): 449–465.
Published: 11 September 2017
...Bradley Fidler Purpose The purpose of this paper is to understand the emerging challenges of cybersecurity governance by analyzing the internet’s early history. Design/methodology/approach Tracing the design and management of early internet and network security technologies in the USA...
Journal Articles
Negotiating meanings for security in the cyberspace
Available to Purchase
Info (2013) 15 (6): 32–41.
Published: 23 September 2013
... be contacted at: roxana.radu@graduateinstitute.ch © Emerald Group Publishing Limited 2013 Internet Cybersecurity General Assembly ITU States United Nations This article aims to unveil how security in the cyberspace is defined in the UN system and what implications that has for shaping...
